Intelligent door lock system with wireless access control system

ABSTRACT

A wireless access control system is provided to lock or unlock a first door at a dwelling. A remote access device transmits a first signal and a second signal. The user remote access device is configured to be in communication with: an apparatus that controls transmission of displacement or rotational mechanical energy, a bolt coupled to the first door with the bolt coupled to an input rod and an output rod, where in operation the bolt locks and unlocks the first door, an energy source coupled to the apparatus that controls transmission of displacement or rotational mechanical energy, a wireless communication device to communicate with the user remote access device, a drive shaft associated with the first door that assists in locking and unlocking the bolt in response to communication with the user&#39;s user remote access device and receiving the first signal. The user remote access device is configured to be in communication with a second lock at a vehicle of the user or at an office of the user. The user remote access device is configured to communicate with the second lock with the second signal to cause the second lock to lock or be unlocked. The remote access device has a controller for generating the first and second signals.

CROSS-REFERENCE TO RELATED APPLICATIONS

This application claims the priority benefit of all of the following:which is a Continuation of patent application Ser. No. 14/622,578, filedFeb. 13, 2015, which is a Continuation-In-Part of patent applicationSer. No. 14/622,192, filed Feb. 13, 2015, which is aContinuation-In-Part of patent application Ser. No. 14/622,054, filedFeb. 13, 2015, which is a Continuation-In-Part of patent applicationSer. No. 14/471,470, filed Aug. 28, 2014, which is aContinuation-In-Part of patent application Ser. No. 14/471,414, filedAug. 28, 2014, which is a Continuation-In-Part of patent applicationSer. No. 14/469,186, filed Aug. 26, 2014, which claims priority to U.S.Provisional Patent Application No. 62/036,971, filed Aug. 13, 2014. Ser.No. 14/469,186 which is a Continuation-In-Part of patent applicationSer. No. 14/469,127, filed Aug. 26, 2014, which claims priority to U.S.Provisional Patent Application No. 62/036,979, filed Aug. 13, 2014. Ser.No. 14/469,127 which is a Continuation-In-Part of patent applicationSer. No. 14/465,527 filed Aug. 21, 2014, which claims priority to U.S.Provisional Patent Application No. 62/036,989, filed Aug. 13, 2014. Ser.No. 14/465,527 which is a Continuation-In-Part of patent applicationSer. No. 14/465,513, filed Aug. 21, 2014, which claims priority to U.S.Provisional Patent Application No. 62/036,991, filed Aug. 13, 2014. Ser.No. 14/465,513 which is a Continuation-In-Part of patent applicationSer. No. 14/461,177, filed Aug. 15, 2014, now U.S. Pat. No. 9,326,094,issued Apr. 26, 2016, which claims priority to U.S. Provisional PatentApplication No. 62/036,993, filed Aug. 13, 2014. Ser. No. 14/461,177which is a Continuation-In-Part of patent application Ser. No.14/459,054, filed Aug. 13, 2014, which is a Continuation-In-Part ofpatent application Ser. No. 14/321,000, filed Jul. 1, 2014, which is aContinuation-In-Part of patent application Ser. No. 14/321,260, filedJul. 1, 2014, now U.S. Pat. No. 9,359,794, issued on Jun. 7, 2016, whichis a Continuation of patent application Ser. No. 14/212,569, filed Mar.14, 2014, now U.S. Pat. No. 9,322,201, issued on Apr. 26, 2016, which isa Continuation of patent application Ser. No. 14/208,182, filed Mar. 13,2014, which is a Continuation of patent application Ser. No. 14/208,947,filed Mar. 13, 2014, which is a Continuation of patent application Ser.No. 14/207,882, filed Mar. 13, 2014, which is a Continuation of patentapplication Ser. No. 14/207,833, filed Mar. 13, 2014, which is aContinuation of patent application Ser. No. 14/206,619, filed Mar. 12,2014, which is a Continuation of patent application Ser. No. 14/206,536,filed Mar. 12, 2014, which claims benefit of U.S. Provisional PatentApplication No. 61/800,937, filed Mar. 15, 2013. Ser. No. 14/206,536,which is a Continuation of patent application Ser. No. 14/205,973, filedMar. 12, 2014, which claims benefit of U.S. Provisional PatentApplication No. 61/801,335, filed Mar. 15, 2013. Ser. No. 14/205,973,which is a Continuation of patent application Ser. No. 14/205,783, filedMar. 12, 2014, which claims benefit of U.S. Provisional PatentApplication No. 61/801,294, filed Mar. 15, 2013. Ser. No. 14/205,783,which is a Continuation of patent application Ser. No. 14/205,608, filedMar. 12, 2014, now U.S. Pat. No. 9,322,194, issued on Apr. 26, 2016.Ser. No. 14/205,608, which claims benefit of U.S. Provisional PatentApplication No. 61/801,236, filed Mar. 15, 2013.

BACKGROUND

Field of the Invention

The present invention is directed to access control systems, and moreparticularly to wireless access control system to lock or unlock atleast two different doors.

Description of the Related Art

Door lock assemblies often include deadbolts. Typically such an assemblyincluded a latch which is depressed during closure of the door and, withsubstantially complete closure, extends into a recess of the doorstrike. Such a latch by itself is often easy to improperlydepress-release by an unauthorized person, with a card-type element oreven a pry bar. Also the outer knob assembly can be torqued off with awrench to gain access to the mechanism and thereby to the room closed bythe door. Deadbolts are not as susceptible to these unauthorizedactivities. Doors having deadbolts typically use a latch mechanism. Thisis because (1) the latch holds the door snug against rattling whereasthe deadbolt by necessity must have clearance between it and the strikeplate recess edges (but because of the clearance, the door can rattle),and (2) the latch automatically holds the door shut since it is onlymomentarily depressed during door closure from its normally extendedcondition and then extends into a door strike recess when the door isfully closed.

Except in rare devices where the deadbolt is operated by an electricalsolenoid, the deadbolt, to be effective, must be manually thrown by aperson inside the room or building, or if the deadbolt is actuatable byan external key, the person leaving the room or building must purposelyengage the deadbolt by a key as the person leaves. However, if a personforgets to so actuate the deadbolt, either manually with an inner handturn when inside, or by a key outside, an intruder need only inactivatethe latch mechanism in order to gain unauthorized entry. Motel and hotelrooms often do not even have a key actuated deadbolt and thus areparticularly susceptible to unauthorized entry and theft when the personis not in the room.

In recent years, mechanisms were developed to enable retraction, i.e.Inactivation, of the deadbolt simultaneously with the latch for quickrelease even under panic exit conditions. But to lock the door stillrequired manual actuation of the deadbolt with the inner hand turn or akey on the outside.

In one door lock assembly a deadbolt is shift able between an extendedlock position and a retracted position and means for shifting thedeadbolt from the extended position to the retracted position which ischaracterized by biasing means for applying a bias on the deadbolttoward the extended lock position; restraining means for restraining thedeadbolt in the retracted position against the bias of the biasing meansand being actuatable to release the deadbolt to enable the biasing meansto shift the deadbolt to the extended lock position; and trigger means.For actuating the restraining means to release the deadbolt and therebyallow the biasing means to shift the deadbolt to the extended lockposition.

Such a door lock assembly is for use in a door frame and thus theinvention extends to the door lock assembly of the present invention incooperation with a door frame.

Some deadbolt locks are automatically actuated with closure of the door,the deadbolt being mechanically actuated to the extended lock position.The deadbolt in its retracted position is spring-biased toward theextended lock position, but is retained in a cocked condition by adeadbolt restraining and releasing device which is trigger actuatable toactivate the deadbolt into its locked condition. The trigger mechanismmay have a portion that protrudes from the door to engage the doorstrike of the door frame upon closure of the door, thereby causing thedeadbolt to be released and shifted to the locked condition. Theprotruding portion of the trigger mechanism can also serve to hold thedoor snug against rattling.

In another door lock assembly for a hinged door and cooperative with adoor strike of a door frame, a deadbolt is provided mounting in thedoor. The dead bolt is shift able between a retracted non-lock positionand an extended lock position. It includes a manually operable devicefor shifting the deadbolt from the extended lock position to theretracted non-lock position. A biasing device applies a bias on thedeadbolt toward the extended lock position. A restraining device isbiased into a restraining relationship with the deadbolt in theretracted position. This restrains the deadbolt in the retractedposition against the bias of the biasing device. A trigger releases arestraining means when the trigger is actuated and includes a protrudingportion for engaging a door strike for actuating the trigger. A doorstrike includes a surface to engage and depress the trigger protrudingportion for actuation of the trigger and release of the deadboltrestraining means, and includes an opening to receive the deadbolt whenextended.

The use of electronic systems for the control and operation of locks isbecoming increasingly common. The present invention is directed to anarrangement that permits the electronic and manual control of the lockoperation to be separated to allow manual operation of the lockindependently of the electronic drive system for the lock. The lock ofthe present invention is useful in situations where an electroniccontroller is temporarily unavailable, for example where a controllerhas been lost, misplaced or damaged.

There are currently some electronic deadbolt lock arrangements. In onedevice, a lock has a bolt movable between locked and unlockedconditions. The lock has a manual control device that serves to operatethe lock between locked and unlocked conditions. A power drive iscoupled by a transmission to the manual control device. The lock isoperated between the locked and unlocked conditions in response tooperation of the power drive. A transmission mechanism couples themanual control device and the power drive, whereby the lock movesbetween the locked and unlocked conditions. The transmission mechanismis operable to decouple the power drive from the manual control means toenable the lock to be operated by the manual control deviceindependently of the power drive.

However, most deadbolts require that a user manually use a metal key tolock or unlock the deadbolt.

There is a need for a wireless access control system to lock or unlock adoor at a dwelling.

SUMMARY

An object of the present invention to provide a wireless access controlsystem.

Another object of the present invention is to provide a wireless accesscontrol system with a remote access device that transmits first andsecond signals to unlock or lock at least two doors.

These and other objects of the present invention are achieved in awireless access control system to lock or unlock a first door at adwelling. A remote access device transmits a first signal and a secondsignal. The user remote access device is configured to be incommunication with: an apparatus that controls transmission ofdisplacement or rotational mechanical energy, a bolt coupled to thefirst door with the bolt coupled to an input rod and an output rod,where in operation the bolt locks and unlocks the first door, an energysource coupled to the apparatus that controls transmission ofdisplacement or rotational mechanical energy, a wireless communicationdevice to communicate with the user remote access device, a drive shaftassociated with the first door that assists in locking and unlocking thebolt in response to communication with the user's user remote accessdevice and receiving the first signal. The user remote access device isconfigured to be in communication with a second lock at a vehicle of theuser or at an office of the user. The user remote access device isconfigured to communicate with the second lock with the second signal tocause the second lock to lock or be unlocked. The remote access devicehas a controller for generating the first and second signals.

BRIEF DESCRIPTION OF THE DRAWINGS

FIG. 1(a) illustrates one embodiment of BLE/WiFi Bridge.

FIG. 1(b) is an exploded view of a mounting assembly of an intelligentdoor lock device that can be used with the present invention.

FIG. 1(c) illustrates various embodiments of a positioning sensingdevice coupled to a drive shaft.

FIG. 1 (d) illustrates one embodiment of a door lock device that can beused for retrofitting with an embodiment of an intelligent door lockdevice of the present invention.

FIG. 1(e) illustrates coupling of a positioning sensing device with adrive shaft of a door lock device.

FIG. 1(f) illustrates one embodiment of an intelligent door lock systemof the present invention with an off-center drive.

FIG. 1(g) illustrates a wireless bridge that can be used in oneembodiment of the present invention.

FIGS. 2(a)-(c) illustrate embodiments of front and back surfaces of amain circuit that can be used and included in the intelligent door lockdevice of the present invention.

FIGS. 2(d)-(f) illustrate an embodiment of non-wire, direct connectionbetween PCBAs in one embodiment of the present invention, with positionof a PCBA in intelligent door lock device.

FIGS. 3(a)-(b) illustrate embodiments of LED lighting that can be usedwith the present invention.

FIGS. 4(a)-(d) illustrate one embodiment of a faceplate and views of ahousing that can be used with the present invention.

FIGS. 5(a) and (b) illustrate the rotation range, with a minimized slotlength of a faceplate lock that can be used in one embodiment of thepresent invention.

FIGS. 6(a) and (b) illustrate hook slots that can be used with thepresent invention.

FIGS. 7(a) through (e) illustrate one embodiment of a mount, withattachment to the mounting plate that can be used with the presentinvention.

FIGS. 8(a)-(b) illustrate embodiments of the present invention wheremagnets are utilized.

FIGS. 9(a)-(e) illustrate embodiments of the present invention with winglatches.

FIGS. 10(a)-(c) and FIGS. 11(a)-(d) illustrate further details of winglatching that is used in certain embodiments of the present invention.

FIGS. 12(a)-(d) illustrate embodiments of battery contacts that can beused with the present invention.

FIGS. 13(a) and (b) illustrate embodiments of a motor and gears in oneembodiment of the present invention.

FIG. 14 illustrates an embodiment of the plurality of motion transferdevice, including but not limited to gears, used in one embodiment ofthe present invention.

FIGS. 15(a)-(b) illustrate an embodiment of a speaker mounting.

FIGS. 15(c)-(d) illustrate an embodiment of an accelerometer FPC serviceloop.

FIG. 16 illustrates one embodiment of a back-end associated with theintelligent door lock system.

FIG. 17 is a diagram illustrating an implementation of an intelligentdoor lock system.

FIGS. 18(a) and (b) illustrate one embodiment of the present inventionwith a front view and a back view of a door with a bolt and anintelligent door lock system.

FIG. 19 illustrates more details of an embodiment of an intelligent doorlock system of the present invention.

FIG. 20 illustrates one embodiment of the present invention showing aset of interactions between an intelligent door lock system, a mobile orcomputer and an intelligent door lock system back-end.

FIG. 21(a)-21(g) are examples of a user interface for an owner of abuilding that has an intelligent door lock system in one embodiment ofthe present invention.

FIGS. 22(a)-22(e) are examples of a user interface for a guest of anowner of a building that has an intelligent door lock system in oneembodiment of the present invention.

FIGS. 23(a) and (b) illustrate one embodiment of an intelligent doorlock system with an empty extension and extension gear adapters.

FIG. 24 illustrates one embodiment of a mobile device that is used withthe intelligent door lock system.

25(a)-(d) represent a logical diagram of a Cloud lock access servicesInfrastructure in accordance with one embodiment of the presentinvention.

FIG. 26 shows one embodiment of a flowchart illustrating an example of aprocess for tracking signal strength.

FIG. 27 is a flowchart illustrating another example of a process fortracking signal strength.

FIG. 28 illustrates one embodiment of a triangulation algorithm forlocation estimation that can be used with the bridge.

FIG. 29 illustrates one embodiment of a K-nearest neighbor averagingalgorithm for location estimate that can be used with the bridge.

DETAILED DESCRIPTION

As used herein, the term engine refers to software, firmware, hardware,or other component that can be used to effectuate a purpose. The enginewill typically include software instructions that are stored innon-volatile memory (also referred to as secondary memory). When thesoftware instructions are executed, at least a subset of the softwareinstructions can be loaded into memory (also referred to as primarymemory) by a processor. The processor then executes the softwareinstructions in memory. The processor may be a shared processor, adedicated processor, or a combination of shared or dedicated processors.A typical program will include calls to hardware components (such as I/Odevices), which typically requires the execution of drivers. The driversmay or may not be considered part of the engine, but the distinction isnot critical.

As used herein, the term database is used broadly to include any knownor convenient means for storing data, whether centralized ordistributed, relational or otherwise.

As used herein a mobile device includes, but is not limited to, a cellphone, such as Apple's iPhone®, other portable electronic devices, suchas Apple's iPod Touches®, Apple's iPads®, and mobile devices based onGoogle's Android® operating system, and any other portable electronicdevice that includes software, firmware, hardware, or a combinationthereof that is capable of at least receiving the signal, decoding ifneeded, exchanging information with a server to verify information.Typical components of mobile device may include but are not limited topersistent memories like flash ROM, random access memory like SRAM, acamera, a battery, LCD driver, a display, a cellular antenna, a speaker,a Bluetooth® circuit, and WIFI circuitry, where the persistent memorymay contain programs, applications, and/or an operating system for themobile device. A mobile device can be a key fob. A key fob which can bea type of security token which is a small hardware device with built inauthentication mechanisms. It is used to manage and secure access tonetwork services, data, provides access, communicates with door systemsto open and close doors and the like.

As used herein, the term “computer” or “mobile device or computingdevice” is a general purpose device that can be programmed to carry outa finite set of arithmetic or logical operations. Since a sequence ofoperations can be readily changed, the computer can solve more than onekind of problem. A computer can include of at least one processingelement, typically a central processing unit (CPU) and some form ofmemory. The processing element carries out arithmetic and logicoperations, and a sequencing and control unit that can change the orderof operations based on stored information. Peripheral devices allowinformation to be retrieved from an external source, and the result ofoperations saved and retrieved.

As used herein, the term “Internet” is a global system of interconnectedcomputer networks that use the standard Internet protocol suite (TCP/IP)to serve billions of users worldwide. It is a network of networks thatconsists of millions of private, public, academic, business, andgovernment networks, of local to global scope, that are linked by abroad array of electronic, wireless and optical networking technologies.The Internet carries an extensive range of information resources andservices, such as the inter-linked hypertext documents of the World WideWeb (WWW) and the infrastructure to support email. The communicationsinfrastructure of the Internet consists of its hardware components and asystem of software layers that control various aspects of thearchitecture, and can also include a mobile device network, e.g., acellular network.

As used herein, the term “extranet” is a computer network that allowscontrolled access from the outside. An extranet can be an extension ofan organization's intranet that is extended to users outside theorganization that can be partners, vendors, and suppliers, in isolationfrom all other Internet users. An extranet can be an intranet mappedonto the public Internet or some other transmission system notaccessible to the general public, but managed by more than one company'sadministrator(s). Examples of extranet-style networks include but arenot limited to:

LANs or WANs belonging to multiple organizations and interconnected andaccessed using remote dial-up

LANs or WANs belonging to multiple organizations and interconnected andaccessed using dedicated lines

Virtual private network (VPN) that is comprised of LANs or WANsbelonging to multiple organizations, and that extends usage to remoteusers using special “tunneling” software that creates a secure, usuallyencrypted network connection over public lines, sometimes via an ISP

As used herein, the term “Intranet” is a network that is owned by asingle organization that controls its security policies and networkmanagement. Examples of intranets include but are not limited to:

A LAN

A Wide-area network (WAN) that is comprised of a LAN that extends usageto remote employees with dial-up access

A WAN that is comprised of interconnected LANs using dedicatedcommunication lines

A Virtual private network (VPN) that is comprised of a LAN or WAN thatextends usage to remote employees or networks using special “tunneling”software that creates a secure, usually encrypted connection over publiclines, sometimes via an Internet Service Provider (ISP)

For purposes of the present invention, the Internet, extranets andintranets collectively are referred to as (“Network Systems”).

For purposes of the present invention, Bluetooth LE devices andperipheral devices are Bluetooth low energy devices, marketed asBluetooth Smart.

In one embodiment of the present invention, illustrated in FIG. 1, aBluetooth/WiFi bridge 11 is provided that includes, a computing device13 in an interior of a dwelling 15 with an internet-facing radio 17, anda second radio 19 communicating with one or more Bluetooth LE devices21. For purposes of the present invention Bluetooth LE devices 21 areBluetooth LE devices 21, Bluetooth LE peripheral devices 21 and thelike, hereafter collectively “Bluetooth LE devices 21. As non-limitingexamples the Bluetooth LE devices can have power from 40 mW hours to 40W hours. As non-limiting examples, Bluetooth devices 21 include but arenot limited to: mobile devices, wearable devices, wearable devicessupporting BLE, including but not limited to: Smart Wristwatches, smartbracelets, smart jewelry, smart tags, smart fobs, smart clothing, shoes,glasses, any type of wearable device and the like.

In one embodiment the computing device 13 is configured to connectBluetooth LE devices 21 to the Network Systems.

In one embodiment the bridge 11 is coupled to the intelligent door locksystem 10 via secure digital keys distributed by Cloud lock accessservices Lock Access Services.

In one embodiment the bridge 11 allows BLE devices in the dwelling tointeract with the cloud lock access services and with otherInternet-connected devices via the intermediary that is the cloud lockaccess services. It will be appreciated that the dwelling includes allstructures besides homes.

In one embodiment the bridge determines signal strength between thebridge 11, and the Bluetooth LE device 21. In another embodiment thebridge 11 determines signal strength of between the bridge 11, theBluetooth LE device 21 and the intelligent door lock system 10.

The retrieved signal strength information is sent to the cloud lockaccess services for processing. It one embodiment, as described below, atriangulation algorithm is applied between the bridge 11, the BluetoothLE device 21 and the intelligent door lock system.

In one embodiment the bridge 11 uses detection of known Bluetoothdevices and peripheral devices, hereafter collectively Bluetooth devices21, tied to specific individual people in the interior or at an exteriorof the dwelling. The bridge 11 tracks signal strength over time to: (i)determine if known or unknown people are inside or outside the dwelling,(ii) if people are approaching the dwelling, entering the dwelling,exiting the dwelling, moving away from the building and the like. In oneembodiment the bridge 11 with the detection of the presence of aBluetooth device 21 relays lock operations of the intelligent door locksystem (manual or via a mobile application), door 12 movements, door 12knocks to allow making these determinations of presence and movementwith an algorithm as set forth below.

In one embodiment the bridge 11 interacts with the cloud lock accessservices to gather and relay data. This data can be gathered and storedlocally, at the back-end 68, and in a cloud lock access services baseddata layer. This is then used to determine the location and movement ofpeople in and out the dwelling.

In one embodiment the bridge 11 discovers the intelligent door locksystem 10 over a Bluetooth device 21 networking. In one embodiment thisis achieved by the bridge discovering lock devices 22 and theiravailable services by scanning the Bluetooth LE 21 network for connecteddevices, advertising their presence and their services for obtaininglock device 22 status (secured or unsecured), communicates lock device22 activity, communicates door 12 activity (door 12 opening and closing,door 12 knocks, and the like) and operates the lock to lock and unlockthe bolt 24 to secure or unsecure the lock device 22.

In one embodiment the bridge 11 provides communication to otherBluetooth devices 21 without the use of a mobile device. As non-limitingexamples, the bridge 11 allows: WiFi-enabled devices in a dwelling tointeract with Bluetooth devices 21 in the dwelling; WiFi-enabled devicesin a dwelling to interact with the intelligent door lock system 10 overBluetooth; allows a Bluetooth device 21 in a dwelling to interact withInternet-based services and API's using a dwelling's home WiFi networkand Network System connection; allows people to operate an intelligentdoor lock system and other Bluetooth devices over a Network System fromanywhere outside a dwelling; extend network coverage of Bluetoothdevices in a dwelling in order to understand who is in the dwelling, whois away, who is coming and who is going when doors 12 and lock devices22 are operated and the like.

In one embodiment the bridge 11 extends Network System coverage ofBluetooth devices 21 other than lock devices 22 to performdevice-specific operations, including but not limited to: gatheringinformation about the presence of the Bluetooth device 21, theoperational status of the Bluetooth device 21, the operational historyof the Bluetooth device 21 and performing Bluetooth device 21 specificoperations including but not limited to: turning the Bluetooth device 21off and on, changing the mode of operations of the Bluetooth device 21,changing the operational settings of the Bluetooth device 21 andscheduling these device operations based on ad hoc, daily, weekly,monthly or other schedules.

In one embodiment the intelligent door lock system 10 trusts the bridge11 for commands (remote status) after an intelligent door lock systemowner or designee is registered at the back-end of the intelligent doorlock system using a cloud lock access services-based access system thatgrants the bridge 11 access to the intelligent door lock system 10.

In one embodiment the intelligent door lock system 10 owners or designeerants the bridge 11 access to the lock device 22 by using their digitalcredentials, which can be stored at the cloud lock access services or atthe back-end 68, to pair a specific bridge 11 with a specificintelligent door lock system 10 grant specific rights. As non-limitingexample, the specific rights include but are not limited to, gatheringof status and operational history of the system 10, triggering lockdevice 22 operations in real-time, as well as applications forinterfacing with the bridge 11 and a Bluetooth device 21.

In one embodiment the bridge 11 is used to determine if an intelligentdoor lock system 10 owners or designee with a non-internet connectdevice is at an interior or an exterior of a dwelling.

In one embodiment the bridge 11 is used to determine if the person isapproaching or moving away from the dwelling. In one embodiment thebridge 11 measures the signal strength of the Bluetooth LE devices 21.

In one embodiment as a Bluetooth LE device 21, coupled to a person movesaway from the bridge lithe signal strength decreases, as more fullydiscuss hereafter. Similarly, as the signal strength increases thisindicates that a person with the Bluetooth LE device is approaching thedwelling.

In one embodiment, each room of a dwelling with the intelligent doorlock system has a bridge 11. In another embodiment, the major rooms ofthe dwelling each have a bridge 11.

In one embodiment the bridge 11 learns habits, movements, and the likeof the intelligent door lock system 10 owners or designee.

In one embodiment a triangulation is provided between the bridge 11, theintelligent door lock system 10 and a Bluetooth LE device 21, as morefully explained hereafter.

In one embodiment the computing device 13 provides for coordination ofinformation flow between the two radios 15 and 17. The computing device13 is configured to enable the two radios, 15 and 17 to communicate andtake incoming and outgoing information from one radio into a format thatthe other radio can transmit and receive. The internet facing radio 15is configured to communicate through a router 25 to the Network Systemsand the BLE LE devices 21 connect to Network Systems via one of theradios 15, 17 through the computing device 13 through the internetfacing radio 16 through the router 25 to Network Systems, with thebridge 11 communicating with a data center 27.

In one embodiment the internet facing radio 115 is configured tocommunicate through the router 25 to Network Systems. The Bluetooth LEdevices 21 connect to Network Systems, via the computing device 13, withthe bridge 11 communicating with a data center 27.

The computing device 13 provides for coordination of information flowbetween the two radios 15 and 17. Because most radios speak in differentfrequencies or protocols, packet sizes, and the like, the computingdevice 13 enables the two radios 15 and 17 to communicate, takesincoming and outgoing information from one radio into the proper formatthat the other radio can transmit and receive. In one embodiment thecomputing device makes the first and second radios 16 and 18 the samething.

A logic circuit 27 is in the computing device 13.

In one embodiment a wall wart in the dwelling is configured tocommunicate with other Bluetooth devices, including but not limited toredundant or backup power supplies, redundant data communicationsconnections, environmental controls (e.g., air conditioning, firesuppression) and various security devices, thermostats, audio systems,appliances, gates, outdoor electrical equipment and the like.

In one embodiment the internet facing radio 15 is configured tocommunicate through the router 25 to Network Systems and Bluetooth LEdevices 21 connected to Network Systems via the computing device 13. Thebridge 11 communicates with the data center 27.

In one embodiment the computing device 13 is a wall wart, and equivalentelement, which is a power adapter that contains the plug for a walloutlet.

In one embodiment the radios 15 and 17 transmit radio waves forcommunication purposes.

In one embodiment the bridge 11 provides at least a partial probabilityanalysis of where a person with a Bluetooth LE device 21 is located, aswell as to the existence of an adverse condition including but notlimited to entrance via a window or door to the dwelling.

In one embodiment system 10 is an identification management system at adwelling 15 includes one or more bridges 11 in the dwelling 15. Eachbridge 11 includes a computing device 13 in an interior or exterior of adwelling 15 with the internet-facing radio 17, and the second radio 19communicating with one or more Bluetooth LE devices 21 or an equivalentdevice.

One or more Bluetooth devices or Bluetooth peripheral devices 21,collectively, Bluetooth devices 21, are in communication with the bridge11. The Bluetooth device 21 is at an exterior of the dwelling 15. Anintelligent door lock system is in communication with the bridge 11 andthe one or more Bluetooth devices 21. The bridge 11 uses detection of aBluetooth device 21 that is associated with a person to track theperson.

In one embodiment a signal strength between the bridge 11 and theBluetooth device 21 is used to identify the person.

In one embodiment the bridge 11 is configured to provide real timeconductivity to one or more servers, as more fully discussed hereafter.The one or more servers can be located at a cloud infrastructure. In oneembodiment the one or more servers are at a backend of the system 10.

In one embodiment the system 10 is configured to provide an identify ofa person entering or exiting the dwelling 15. The Bluetooth device 21can be any device that associates a person with a person's identify.

In one embodiment facial/body motion recognition is utilized foridentification. In one embodiment the equivalent device is selected fromat least one of a mobile device, a key fob, a wearable device,

In one embodiment identification is taken in order to determine intent.In one embodiment the identification is to determine an intent of theperson entering or exiting from the dwelling 15.

System 10 and/or the cloud can continuously sniff the air foridentification of one or more persons.

The detection of facial/body motion expressions is described hereafter.

In one embodiment the door lock system 10 includes a vibration/tappingsensing device 11 configured to be coupled to intelligent lock system10. In one embodiment the intelligent door lock system 10 is incommunication with a mobile device 210 that includes a vibration/tapingsensing device to lock or unlock a door associated with the intelligentdoor lock system.

In one embodiment the vibration/tapping sensing device 11 sensesknocking on the door and locks or unlocks the door. In one embodimentthe vibration/tapping sensing device 11 is not included as part of theactual intelligent door lock system 10. In one embodiment thevibration/tapping sensing device 11 is coupled to the drive shaft 14. Itwill be appreciated that the vibration/tapping sensing device 11 can becoupled to other elements of the intelligent door lock system 10. Thevibration/tapping sensing device detects vibration or knocking appliedto a door that is used to unlock or lock the intelligent door locksystem 10. This occurs following programming the intelligent door locksystem 10. The programming includes a user's vibration code/pattern, andthe like. Additionally, a user can give a third person a knockcode/pattern to unlock the intelligent door lock system 10 of the door12. The knocking is one that is recognized as having been defined by auser of the door lock system 10 as a means to unlock the door. Theknocking can have a variety of different patterns, tempos, duration,intensity and the like.

The vibration/tapping sensing device 11 detects oscillatory motionresulting from the application of oscillatory or varying forces to astructure. Oscillatory motion reverses direction. The oscillation may becontinuous during some time period of interest or it may beintermittent. It may be periodic or nonperiodic, i.e., it may or may notexhibit a regular period of repetition. The nature of the oscillationdepends on the nature of the force driving it and on the structure beingdriven.

Motion is a vector quantity, exhibiting a direction as well as amagnitude. The direction of vibration is usually described in terms ofsome arbitrary coordinate system (typically Cartesian or orthogonal)whose directions are called axes. The origin for the orthogonalcoordinate system of axes is arbitrarily defined at some convenientlocation.

In one embodiment, the vibratory responses of structures can be modeledas single-degree-of-freedom spring mass systems, and many vibrationsensors use a spring mass system as the mechanical part of theirtransduction mechanism.

In one embodiment the vibration/tapping sensing device 11 can measuredisplacement, velocity, acceleration, and the like.

A variety of different vibration/tapping sensing devices 11 can beutilized, including but not limited to accelerometers, optical devices,electromagnetic and capacitive sensors, contact devices, transducers,displacement transducers, piezoelectric sensors, piezoresistive devices,variable capacitance, servo devices, audio devices where transfer of thevibration can be gas, liquid or solid, including but not limited tomicrophones, geo-phones, and the like.

Suitable accelerometers include but are not limited to: Piezoelectric(PE); high-impedance output; Integral electronics piezoelectric (IEPE);low-impedance output Piezoresistive (PR); silicon strain gauge sensorVariable capacitance (VC); low-level, low-frequency Servo force balance;and the like.

The vibration/tapping sensing device 11 can be in communication with anintelligent door lock system back-end 68, via Network Systems, as morefully described hereafter.

In one embodiment, the intelligent door lock system 10

is configured to be coupled to a structure door 12, including but notlimited to a house, building and the like, window, locked cabinet,storage box, bike, automobile door or window, computer locks, vehicledoors or windows, vehicle storage compartments, and the like. In oneembodiment, the intelligent door lock system 10 is coupled to anexisting drive shaft 14 of a lock device 22 already installed and isretrofitted to all or a portion of the lock device 22, which includes abolt/lock 24. In another embodiment, the intelligent door lock system 10is attached to a door 12, and the like, that does not have apre-existing lock device. FIG. 1(b) illustrates door lock elements thatcan be at an existing door, to provide for the mounting of theintelligent door lock system 10 with an existing lock device 22.

FIG. 1(b) illustrates door lock elements that can be at an existingdoor, to provide for the mounting of the intelligent door lock system 10with an existing lock device 22.

FIG. 1(b) illustrates one embodiment of a lock device 22 that can bepre-existing at a door 10 with the intelligent door lock system 10retrofitted to it. Components of the lock device 22 may be included withthe intelligent door lock device 10, as more fully discussed hereafter.

In one embodiment, the intelligent door lock system 10 includes apositioning sensing device 16, a motor 38, an engine/processor 36 with amemory and one or more wireless communication devices 40 coupled to acircuit 18. The motor 38 converts any form of energy into mechanicalenergy. As a non-limiting example, three more four wirelesscommunications devices 40 are in communication with circuit 18. In oneembodiment the vibration sensing device can be included with thepositioning sensing device.

In one embodiment, the intelligent door lock system 10 is provided withthe position sensing device 16 configured to be coupled to the driveshaft 14 of the lock device 22. The position sensing device 16 sensesposition of the drive shaft 14 and assists in locking and unlocking thebolt/lock 24 of the lock device 22. The engine 36 is provided with amemory. The engine 36 is coupled to the positioning sensing device 16. Acircuit 18 is coupled to the engine 36 and an energy source 50 iscoupled to the circuit. A device 38 converts energy into mechanicalenergy and is coupled to the circuit 18, positioning sensing device 16and the drive shaft 14. Device 38 is coupled to the energy source 50 toreceive energy from the energy source 50, which can be via the circuit18.

In one embodiment, the intelligent door lock system 10 includes any orall of the following, a face plate 20, ring 32, latches such as winglatches 37, adapters 28 coupled to a drive shaft 14, one or moremounting plates 26, a back plate 30, a power sensing device 46, energysources, including but not limited to batteries 50, and the like.

In one embodiment (see FIG. 1(c)), the intelligent door lock system 10retrofits to an existing lock device 22 already installed and in placeat a door 12, and the like. The existing lock device 12 can include oneor more of the following elements, drive shaft 14, a lock device 22 withthe bolt/lock 24, a mounting plate 26, one or more adapters 28 fordifferent lock devices 22, a back plate 30, a plurality of motiontransfer devices 34, including but not limited to, gears 34, and thelike.

In one embodiment, the memory of engine/processor 36 includes states ofthe door 12. The states are whether the door 12 is a left handed mounteddoor, or a right handed mounted door, e.g, opens from a left side or aright side relative to a door frame. The states are used with theposition sensing device 16 to determine via the engine/processor 36 ifthe lock device 22 is locked or unlocked.

In one embodiment, the engine/processor 36 with the circuit 18 regulatesthe amount of energy that is provided from energy source 50 to the motor38. This thermally protects the motor 38 from receiving too much energyand ensures that the motor 38 does not overheat or become taxed.

FIG. 1(d) illustrates various embodiments of the positioning sensingdevice 16 coupled to the drive shaft 14.

A variety of position sensing devices 16 can be used, including but notlimited to, accelerometers, optical encoders, magnetic encoders,mechanical encoders, Hall Effect sensors, potentiometers, contacts withticks, optical camera encoders, and the like.

As a non-limiting example, an accelerometer 16, well known to thoseskilled in the art, detects acceleration. The accelerometer 16 providesa voltage output that is proportional to a detected acceleration.Suitable accelerometers 16 are disclosed in, U.S. Pat. No. 8,347,720,U.S. Pat. No. 8,544,326, U.S. Pat. No. 8,542,189, U.S. Pat. No.8,522,596. EP0486657B1, EP 2428774 A1, incorporated herein by reference.

In one embodiment, the position sensing device 16 is an accelerometer16. Accelerometer 16 includes a flex circuit coupled to theaccelerometer 16. The accelerometer reports X, Y, and X axis informationto the engine/processor 36 of the drive shaft 14. The engine/processor36 determines the orientation of the drive shaft 14, as well as doorknocking, bolt/lock 24 position, door 12 close/open (action) sensing,manual key sensing, and the like, as more fully explained hereafter.

Suitable optical encoders are disclosed in U.S. Pat. No. 8,525,102, U.S.Pat. No. 8,351,789, and U.S. Pat. No. 8,476,577, incorporated herein byreference.

Suitable magnetic encoders are disclosed in U.S. Publication20130063138, U.S. Pat. No. 8,405,387, EP2579002A1, EP2642252 A1,incorporated herein by reference.

Suitable mechanical encoders are disclosed in, U.S. Pat. No. 5,695,048,and EP2564165A2, incorporated herein by reference.

Suitable Hall Effect sensors are disclosed in, EP2454558B1 andEP0907068A1, incorporated herein by reference.

Suitable potentiometers are disclosed in, U.S. Pat. No. 2,680,177,EP1404021A3, CA2676196A1, incorporated herein by reference.

In various embodiments, the positioning sensing device 16 is coupled tothe drive shaft 14 by a variety of means, including but not limited tothe adapters 28. In one embodiment, the position sensing device 16 usesa single measurement, as defined herein, of drive shaft 14 positionsensing which is used to determine movement in order the determine thelocation of the drive shaft 14 and the positioning sensing device 16.The exact position of the drive shaft 14 can be measured with anothermeasurement without knowledge of any previous state. Single movement,which is one determination of position sensing, is the knowledge ofwhether the door 12 is locked, unlocked or in between. One advantage ofthe accelerator is that one can determine position, leave if off, comeback at a later time, and the accelerometer 16 will know its currentposition even if it has been moved since it has been turned off. It willalways know its current position.

In one embodiment the position sensing device 16, including but notlimited to the accelerometer 16, provides an acceleration signal to acontroller coupled to the intelligent door lock system 10 and includedas part of the intelligent door lock system, or positioned at the door12, in response to sensed acceleration.

In one embodiment the positioning sensing device 16, including but notlimited to the accelerator 16, provides an acceleration signal to acontroller, at the intelligent door lock system 10, in response tosensed acceleration.

In one embodiment the intelligent door lock system 10 includes anaccelerometer 16 for determining movement, such as a knock or the dooropening, in which the lock is disposed and controlling a radio or theintelligent door lock system 10 via a controller, as a function of theacceleration signal.

In one embodiment, the mobile device 201 includes an accelerometer 1246and outputs an acceleration signal to a controller 1218 uponacceleration of the mobile device 201. The acceleration signal is outputto the controller 1218 and a radio signal generator is triggered tobegin generating a radio signal.

In one embodiment a wireless access control system for a door includes alock assembly 10 coupled at the door 10 and has a lock, wirelesscircuitry and a controller that in operation provides for a change inthe lock for a locked and lock position, and further can have aproximity detector. A user mobile device 201 is in communication withthe lock assembly 10. An accelerometer 16 can be at the door, the locksystem 10 and/or the mobile device 201.

In one embodiment, the intelligent lock system 10 is a wireless accesscontrol system is provided to lock or unlock a door 12 at a dwelling. Aremote access device, including but not limited to a mobile device 210,transmits a signal. The lock system 10 includes a lock 22, a processor36 with a memory, one or more wireless communication device 40 coupledto a circuit 18 and one or more motion transfer device 34 coupled to adrive shaft 14. The lock 22 receives the signal, enabling the lock 22 tobe one of locked or unlocked in response to the signal. The remoteaccess device 210 has a controller for generating the signal, and anaccelerometer 16 providing an acceleration signal to the controller whenthe accelerometer 16 experiences an acceleration. The controllergenerates the signal in response to the acceleration signal.

In one embodiment the memory stores an identifier associated with arespective remote access device, and the lock 22 only provides access toa predetermined remote access device having an identifier stored in thememory during a respective predetermined time period associated in thememory with the remote access device.

In one embodiment a proximity detector is included and configured todetermine a presence of a user upon receipt of a proximity detectorinput.

In one embodiment the remote access device includes a geo positioningsystem and the signal has a geo location of the remote access device. Inone embodiment the lock 22 exhibits a low power broadcast state and ahigh rate broadcast. A listening state can also be provided. In oneembodiment the processor 36 causes the lock 22 to exhibit a high ratebroadcast and the listening state as a function of the geo location ofthe remote access device.

In one embodiment a proximity detector is provided that detects apresence of a user. The proximity detector sends a presence signal tothe processor 36 when the presence of a user is detected. The processor36 causes the lock 22 to change a status of the lock 22 from one oflocked to unlocked and unlocked to locked in response to the presencesignal.

In one embodiment the remote access device includes a geo positioningsystem, and the signal includes a geo location of the remote accessdevice. The processor 36 causes the lock 22 to change from one of lockedto unlocked and unlocked to locked as a function of the geo location.

In one embodiment at least one antenna transmits a signal, anaccelerometer 16 detects acceleration of a door 12 in which the lock 22is coupled to, and the processor 36 receives an accelerometer signalthat causes a signal to be transmitted by the antenna in response to theacceleration signal.

In one embodiment, the positioning sensing device 16 is directly coupledto the drive shaft 14, as illustrated in FIG. 1(d). Sensing position ofthe positioning sensing device 16 is tied to the movement of the driveshaft 14. In one embodiment with an accelerometer 16, the accelerometer16 can detect X, Y and Z movements. Additional information is thenobtained from the X, Y, and Z movements. In the X and Y axis, theposition of the drive shaft 14 is determined; this is true even if thedrive shaft 14 is in motion. The Z axis is used to detect a variety ofthings, including but not limited to, door 12 knocking, picking of thelock 22, break-in and unauthorized entry, door 12 open and closingmotion. If a mobile device 201 is used to open or close, the processor36 determines the lock 22 state.

In one embodiment, the same positioning sensing device 16 is able todetect knocks by detecting motion of the door 12 in the Z axis. As anon-limiting example, position sensing is in the range of counter andclock wise rotation of up to 180 degrees for readings. The maximumrotation limit is limited by the position sensing device 16, and moreparticularly to the accelerometer cable. In one embodiment, the resultis sub 1° resolution in position sensing. This provides a higherlifetime because sampling can be done at a slower rate, due to knowingthe position after the position sensing device 16 has been turned offfor a time period of no great 100 milli seconds. With the presentinvention, accuracy can be enhanced taking repeated measurements. Withthe present invention, the positioning sensing device 16, such as theaccelerometer, does not need to consume additional power beyond what theknock sensing application already uses.

In one embodiment, the position sensing device 16 is positioned on thedrive shaft 14, or on an element coupled to the drive shaft 14. In oneembodiment, a position of the drive shaft 14 and power sensing deviceand/or a torque limited link 38 are known. When the position of thedrive shaft 14 is known, it is used to detect if the bolt/lock 24 of adoor lock device 22 is in a locked or unlocked position, as well as adepth of bolt/lock 24 travel of lock device 22, and the like. Thisincludes but is not limited to if someone, who turned the bolt/lock 24of lock device 22 from the inside using the ring 32, used the key toopen the door 12, if the door 12 has been kicked down, attempts to pickthe bolt/lock 24, bangs on the door 12, knocks on the door 12, openingand closing motions of the door 12 and the like. In various embodiments,the intelligent door lock system 10 can be interrogated via hardware,including but not limited to a key, a mobile device, a computer, keyfob, key cards, personal fitness devices, such as Fitbit®, nike fuel,jawbone up, pedometers, smart watches, smart jewelry, car keys, smartglasses, including but not limited to Google Glass, and the like.

During a power up mode, the current position of the drive shaft 14 isknown.

Real time position information of the drive shaft 14 is determined andthe bolt/lock 24 of lock device 22 travels can be inferred from theposition information of the drive shaft 14. The X axis is a directionalong a width of the door 12, the Y axis is in a direction along alength of a door 12, and the Z axis is in a direction extending from asurface of the door 12.

In one embodiment, the accelerometer 16 is the knock sensor. Knockingcan be sensed, as well as the number of times a door 12 is closed oropened, the physical swing of the door 12, and the motion the door 12opening and closing. With the present invention, a determination is madeas to whether or not someone successfully swung the door 12, if the door12 was slammed, and the like. Additionally, by coupling the positionsensing device 16 on the moveable drive shaft 14, or coupled to it, avariety of information is provided, including but not limited to, if thebolt/lock 24 is stored in the correct orientation, is the door 12properly mounted and the like.

In one embodiment, a calibration step is performed to determine theamount of drive shaft 14 rotations to fully lock and unlock thebolt/lock 24 of lock device 22. The drive shaft 14 is rotated in acounter-counter direction until it can no longer rotate, and the same isthen done in the clock-wise direction. These positions are then storedin the engine memory. Optionally, the force is also stored. A command isthen received to rotate the drive shaft 14 to record the amount ofrotation. This determines the correct amount of drive shaft 14 rotationsto properly lock and unlock the lock device 22.

In another embodiment, the drive shaft 14 is rotated until it does notmove anymore. This amount of rotation is then stored in the memory andused for locking and unlocking the lock device 22.

In another embodiment, the drive shaft 14 is rotated until it does notmove anymore. However, this may not provide the answer as to full lockand unlock. It can provide information as to partial lock and unlock.Records from the memory are then consulted to see how the drive shaft 14behaved in the past. At different intervals, the drive shaft 14 isrotated until it does not move anymore. This is then statisticallyanalyzed to determine the amount of drive shaft 14 rotation for fulllocking and unlocking. This is then stored in the memory.

In one embodiment, the engine/processor 36 is coupled to at least onewireless communication device 40 that utilizes audio and RFcommunication to communicate with a wireless device, including but notlimited to a mobile device/key fob 210, with the audio used tocommunicate a security key to the intelligent door lock system 10 fromthe wireless device 210 and the RF increases a wireless communicationrange to and from the at least one wireless communication device 40. Inone embodiment, only one wireless communication device 40 is used forboth audio and RF. In another embodiment, one wireless communicationdevice 40 is used for audio, and a second wireless communication device40 is used for RF. In one embodiment, the bolt/lock 22 is included inthe intelligent door lock system 10. In one embodiment, the audiocommunications initial set up information is from a mobile device/keyfob 210 to the intelligent door lock system 10, and includes at leastone of, SSID WiFi, password WiFi, a Bluetooth key, a security key anddoor configurations.

In one embodiment, an audio signal processor unit includes an audioreceiver, a primary amplifier circuit, a secondary amplifier circuit, acurrent amplifier circuit, a wave detection circuit, a switch circuitand a regulator circuit. In one embodiment, the audio receiver of eachsaid audio signal processor unit is a capacitive microphone. In oneembodiment, the switch circuit of each audio signal processor unit isselected from one of a transistor and a diode. In one embodiment, theregulator circuit of each audio signal processor unit is a variableresistor. In one embodiment, the audio mixer unit includes a leftchannel mixer and a right channel mixer. In one embodiment, theamplifier unit includes a left audio amplifier and a right audioamplifier. In one embodiment, the Bluetooth device includes a soundvolume control circuit with an antenna, a Bluetooth microphone and avariable resistor, and is electrically coupled with the left channelmixer and right channel mixer of said audio mixer unit. Additionaldetails are in U.S. Publication US20130064378 A1, incorporated fullyherein by reference.

In one embodiment, the faceplate 20 and/or ring 32 is electricallyisolated from the circuit 18 and does not become part of circuit 18.This allows transmission of RF energy through the faceplate 20. Invarious embodiments, the faceplate and/or ring are made of materialsthat provide for electrical isolation. In various embodiments, thefaceplate 20, and/or the ring 32 are at ground. As non-limitingexamples, (i) the faceplate 20 can be grounded and in non-contact withthe ring 32, (ii) the faceplate 20 and the ring 32 are in non-contactwith the ring 32 grounded, (iii) the faceplate 20 and the ring can becoupled, and the ring 32 and the faceplate 20 are all electricallyisolated from the circuit 18. In one embodiment, the ring 32 is theouter enclosure to the faceplate 20, and the bolt/lock 24 and lockdevice 22 is at least partially positioned in an interior defined by thering 32 and the faceplate 20.

In one embodiment, the lock device 22 has an off center drive mechanismrelative to the outer periphery that allows up to R displacements from acenter of rotation of the bolt/lock 24 of lock device 22, where R is aradius of the bolt/lock 24, 0.75 R displacements, 0.5 R displacements,and the like, as illustrated in FIG. 1(e). The off center drivemechanism provides for application of mechanical energy to the lockdevice 22 and bolt/lock 22 off center relative to the outer periphery.

As illustrated in FIG. 1(f) in one embodiment, a wireless communicationbridge 41 is coupled to a first wireless communication device 40 thatcommunicates with Network Systems via a device, including but notlimited to a router, a 3G device, a 4G device, and the like, as well asmobile device 210. The wireless communication bridge 41 is also coupledto a second wireless communication device 40 that is coupled to theprocessor 38, circuit 18, positioning sensing device 16, motor 38 andthe lock device 22 with bolt/lock 24, and provides for more localcommunication. The first wireless communication device 40 is incommunication with the second wireless communication device 40 viabridge 41. The second wireless communication device 40 provides localcommunication with the elements of the intelligent door lock system 10.In one embodiment, the second communication device 45 is a Bluetoothdevice. In one embodiment, the wireless communication bridge 41 includesa third wireless communication device 40. In one embodiment, thewireless communication bridge 41 includes two wireless communicationdevices 40, e.g, and third and fourth wireless communication devices 40.In one embodiment, the wireless communication bridge 41 includes a WiFiwireless communication device 40 and a Bluetooth wireless communicationdevice 40.

FIG. 1(g) illustrates various elements that are coupled to the circuit18 in one embodiment of the present invention.

In one embodiment of the present invention, a haptic device 49 isincluded to provide the user with haptic feedback for the intelligentdoor lock system 10, see FIG. 1(g). The haptic device is coupled to thecircuit 18, the processor 38, and the like. In one embodiment, thehaptic device provides a visual indication that the bolt/lock 24 of lockdevice 22 has reach a final position. In another embodiment, the hapticdevice 49 provides feedback to the user that the bolt/lock 24 of lockdevice 22 has reached a home open position verses a final position sothe user does not over-torque. A suitable haptic device 49 is disclosedin U.S. Publication No. 20120319827 A1, incorporated herein byreference.

In one embodiment, the wing latches 37 are used to secure theintelligent door lock system 10 to a mounting plate 26 coupled to thedoor 12. In one embodiment, the wing latches 37 secure the intelligentdoor lock system 10 to a mounting plate 26 coupled to a door 12 withoutadditional tools other than the wing latches 37.

FIG. 1(g) illustrates one embodiment of circuit 18, as well as elementsthat includes as part of circuit 18, or coupled to circuit 18, asdiscussed above.

FIGS. 2(a)-(c) illustrate front and back views of one embodiment ofcircuit 18, and the positioning of circuit 18 in the intelligent doorlock system 10. FIGS. 2(d)-(e) illustrate an embodiment of non-wire,direct connection between PCBAs. FIG. 2 (e) shows the relativepositioning of a PCBA in the intelligent door lock device 10.

In one embodiment, the main circuit 18 is coupled to, the engine 36 witha processor and memory, the motor 38, wireless communication device 40such as a WiFi device including but not limited to a Bluetooth devicewith an antenna, position sensing device 16, speaker (microphone) 17,temperature sensor 42, battery voltage sensor 44, current sensor orpower sensor 46 that determines how hard the motor 38 is working, aprotection circuit to protect the motor from overheating, an LED array48 that reports status and one or more batteries 50 that power circuit18, see FIG. 1(g).

The current sensor 46 monitors the amount of current that goes to themotor 38 and this information is received and processed by theengine/processor 36 with memory and is coupled to the circuit 18. Theamount of current going to the motor 38 is used to determine the amountof friction experienced by door 12 and/or lock device 22 with lock/bolt24 in opening and/or closing, as applied by the intelligent door locksystem 10 and the positioning sensing device 16 to the drive shaft 14.The circuit 18 and engine/processor 36 can provide for an adjustment ofcurrent. The engine/processor 36 can provide information regarding thedoor and friction to the user of the door 12.

FIGS. 3(a)-(b) illustrate embodiments of LED 48 lighting that caninclude diffusers, a plurality of LED patterns point upward, inward, andoutward and a combination of all three. In one embodiment two controlPCDs are provide to compare side by side. Each LED 48 can beindependently addressable to provide for maximization of light with thefewest LEDs 48. In one embodiment, an air gap is provided.

FIGS. 4(a)-(d), illustrate one embodiment of a faceplate 20 and views ofthe housing 32 and faceplate 20.

FIGS. 5(a) and (b) illustrate the rotation range of the ring 32, with aminimized slot length of a bolt/lock 24 of lock device 22 in oneembodiment of the present invention. In one embodiment, there is a 1:1relationship of ring 32 and shaft rotation. In other embodiments, theratio can change. This can be achieved with gearing. In variousembodiments, the bolt/lock 24 and/or lock device 22 can have a rotationof 20-5 and less turns clockwise or counter-clockwise in order to openthe door 12. Some lock devices 22 require multiple turns.

FIGS. 6(a) and (b), with front and back views, illustrate hook slots 52that can be used with the present invention.

FIGS. 7(a) through (f) illustrate an embodiment of a mount 54, withattachment to the mounting plate 26. Screws 56 are captured in thehousing 58, and/or ring 32 and accessed through a battery cavity. A usercan open holes for access and replace the screws 56. In one embodiment,the screws extend through the mounting plate 26 into a door hole. In oneembodiment, a height of the mounting plate 26 is minimized. Duringassembly, the lock device 22 is held in place, FIG. 7(c), temporarily bya top lip, FIG. 7(d) and the lock drive shaft 14.

FIGS. 8(a)-(b) illustrate embodiments where magnets 60 are utilized. Themagnet 60 locations are illustrated as are the tooled recesses from thetop and side. In one embodiment, the magnets 60 are distanced by rangesof 1-100 mm, 3-90, 5-80 mm apart and the like.

FIGS. 9(a)-(e) illustrate embodiments of the present invention with winglatches 36. The wing latches 36 allow for movement of the lock device 22with bolt/lock 24 towards its final position, in a Z-axis directiontowards the door 12. Once the lock device 22 with bolt/lock 24 is in afinal position, the wing latches 36 allows for the secure mountingwithout external tools. The wing latches 36 do the mounting. Winglatches 36 enable mounting of the lock device 22 and bolt/lock 24 withuse of only the Z axis direction only, and X and Y directionality arenot needed for the mounting.

In one embodiment, a lead in ramp, FIG. 9 (e) is used to pull theelements together.

FIGS. 10(a)-(c) and FIGS. 11(a)-(d) illustrate further details of winglatching.

FIGS. 12(a)-(d) illustrate embodiments of battery contacts 64.

FIGS. 13(a) and (b) illustrate embodiments of motor 38 and one or moregears 34, with a gearbox 66. In one embodiment, a first gear 34 insequence takes a large load if suddenly stopped while running.

FIG. 14 illustrates an embodiment of a plurality of motion transferdevices such as gears 34. There can be come backlash in a gear train asa result of fits and tolerances. There can also be play between adapters28 and lock drive shafts 14. This can produce play in an out gearbox 66ring. This can be mitigated with a detent that located the outer ring.

The intelligent door lock system 10 can be in communication with anintelligent door lock system back-end 68, via Network Systems, as morefully described hereafter.

In one embodiment, the flex circuit 18, which has an out-of planedeflection of at least 1 degree, includes a position detector connector46, Bluetooth circuit, and associated power points, as well as otherelements.

In one embodiment, the intelligent door lock system 10 can useincremental data transfer via Network Systems, including but not limitedto BLUETOOTH® and the like. The intelligent door lock system 10 cantransmit data through the inductive coupling for wireless charging. Theuser is also able to change the frequency of data transmission.

In one embodiment, the intelligent door lock system 10 can engage inintelligent switching between incremental and full syncing of data basedon available communication routes. As a non-limiting example, this canbe via cellular networks, WiFi, BLUETOOTH® and the like.

In one embodiment, the intelligent door lock system 10 can receivefirmware and software updates from the intelligent lock system back-end68.

In one embodiment, the intelligent door lock system 10 produces anoutput that can be received by an amplifier, and decoded by an I/Odecoder to determine I/O logic levels, as well as, both clock and datainformation. Many such methods are available including ratio encoding,Manchester encoding, Non-Return to Zero (NRZ) encoding, or the like;alternatively, a UART type approach can be used. Once so converted,clock and data signals containing the information bits are passed to amemory at the intelligent door lock system 10 or intelligent door locksystem back-end 68.

In one embodiment, the intelligent door lock system 10, or associatedback-end 68, can includes a repeatable pseudo randomization algorithm inROM or in ASIC logic.

FIGS. 15(a)-(b) illustrate an embodiment of a speaker 17 and speakermounting 70.

FIGS. 15(c)-(d) illustrate one embodiment of an accelerometer FPCservice loop.

As illustrated in FIG. 16, the intelligent door lock system back-end 68can include one or more receivers 74, one or more engines 76, with oneor more processors 78, coupled to conditioning electronics 80, one ormore filters 82, one or more communication interfaces 84, one or moreamplifiers 86, one or more databases 88, logic resources 90 and thelike.

The back-end 68 knows that an intelligent door lock system 10 is with auser, and includes a database with the user's account information. Theback-end 68 knows if the user is registered or not. When the intelligentdoor lock system 10 is powered up, the back-end 68 associated thatintelligent door lock system 10 with the user.

The conditioning electronics 80 can provide signal conditioning,including but not limited to amplification, filtering, converting, rangematching, isolation and any other processes required to make sensoroutput suitable for processing after conditioning. The conditioningelectronics can provide for, DC voltage and current, AC voltage andcurrent, frequency and electric charge. Signal inputs accepted by signalconditioners include DC voltage and current, AC voltage and current,frequency and electric charge. Outputs for signal conditioningelectronics can be voltage, current, frequency, timer or counter, relay,resistance or potentiometer, and other specialized output.

In one embodiment, the one or more processors 78, can include a memory,such as a read only memory, used to store instructions that theprocessor may fetch in executing its program, a random access memory(RAM) used by the processor 78 to store information and a master dock.The one or more processors 78 can be controlled by a master clock thatprovides a master timing signal used to sequence the one or moreprocessors 78 through internal states in their execution of eachprocessed instruction. In one embodiment, the one or more processors 78can be low power devices, such as CMOS, as is the necessary logic usedto implement the processor design. Information received from the signalscan be stored in memory.

In one embodiment, electronics 92 are provided for use in intelligentdoor system 10 analysis of data transmitted via System Networks. Theelectronics 92 can include an evaluation device 94 that provides forcomparisons with previously stored intelligent door system 10information.

Signal filtering is used when the entire signal frequency spectrumcontains valid data. Filtering is the most common signal conditioningfunction, as usually not all the signal frequency spectrum containsvalid data.

Signal amplification performs two important functions: increases theresolution of the inputted signal, and increases its signal-to-noiseratio.

Suitable amplifiers 86 include but are not limited to sample and holdamplifiers, peak detectors, log amplifiers, antilog amplifiers,instrumentation amplifiers, programmable gain amplifiers and the like.

Signal isolation can be used in order to pass the signal from to ameasurement device without a physical connection. It can be used toisolate possible sources of signal perturbations.

In one embodiment, the intelligent door lock system back-end 68 canprovide magnetic or optic isolation. Magnetic isolation transforms thesignal from voltage to a magnetic field, allowing the signal to betransmitted without a physical connection (for example, using atransformer). Optic isolation takes an electronic signal and modulatesit to a signal coded by light transmission (optical encoding), which isthen used for input for the next stage of processing.

In one embodiment, the intelligent door lock system 10 and/or theintelligent door lock system back-end 68 can include ArtificialIntelligence (AI) or Machine Learning-grade algorithms for analysis.Examples of AI algorithms include Classifiers, Expert systems, casebased reasoning, Bayesian networks, and Behavior based AI, Neuralnetworks, Fuzzy systems, Evolutionary computation, and hybridintelligent systems.

Information received or transmitted from the back-end 68 to theintelligent door system 10 and mobile device 210 can use logicresources, such as AI and machine learning grade algorithms to providereasoning, knowledge, planning, learning communication, and createactions.

In one embodiment, AI is used to process information from theintelligent door lock system 10, from mobile device 210, and the like.The back-end 68 can compute scores associated with various riskvariables involving the intelligent door lock system 10. These score canbe compared to a minimum threshold from a database and an outputcreated. Alerts can be provided to the intelligent door lock system 10,mobile device 210 and the like. The alert can provide a variety ofoptions for the intelligent door lock system 10 to take, categorizationsof the received data from the mobile device 210, the intelligent doorlock system 10, and the like, can be created. A primary option can becreated as well as secondary options.

In one embodiment, data associated with the intelligent door lock system10 is received. The data can then be pre-processed and an array ofaction options can be identified. Scores can be computed for theoptions. The scores can then be compared to a minimum threshold and toeach other. A sorted list of the action options based on the comparisoncan be outputted to the intelligent door lock system 10, the mobiledevice 210 and the like. Selections can then be received indicatingwhich options to pursue. Action can then be taken. If an update to theinitial data is received, the back-end 68 can then return to the step ofreceiving data.

Urgent indicators can be determined and directed to the intelligent doorlock system 10, including unlocking, locking and the like.

Data received by the intelligent door lock system 10 and mobile device210 can also be compared to third party data sources.

In data evaluation and decision making, algorithm files from a memorycan be accessed specific to data and parameters received from theintelligent door lock system 10 and mobile device 210.

Scoring algorithms, protocols and routines can be run for the variousreceived data and options. Resultant scores can then be normalized andweights assigned with likely outcomes.

The intelligent door lock system 10 can be a new lock system mounted toa door 12, with all or most of the elements listed above, or it can beretrofitted over an existing lock device 22.

To retrofit the intelligent door lock system 10 with an existing locksystem, the user makes sure that the existing lock device 22 andbolt/lock 24 is installed right-side up. The existing thumb-turn is thenremoved. With some lock devices 22, additional mounting plates 26 needto be removed and the intelligent door lock system 10 can includereplacement screws 56 that are used. The correct mounting plate 26 isthen selected. With the existing screws 56 in the thumb-turn, the usersequentially aligns with 1 of 4 mounting plates 26 that are supplied orexist. This assists in determining the correct diameter and replace ofthe screws 56 required by the bolt/lock 24. The mounting plate 26 isthen positioned. The correct adapter 28 is positioned in a center of themounting plate 26 to assist in proper positioning. Caution is made toensure that the adapter 28 does not rub the sides of the mounting plate26 and the screws 56 are then tightened on the mounting plate 26. Theintelligent door lock system bolt/lock 24 of lock device 22 is thenattached. In one embodiment, this is achieved by pulling out side winglatches 36, sliding the lock device 22 and/or bolt/lock 24 over theadapter 28 and pin and then clamping down the wings 36 to the mountingplate 26. The faceplate is rotated to open the battery compartment andthe battery tabs are then removed to allow use of the battery contacts64. An outer metal ring 32 to lock and unlock the door 12 is thenrotated. An app from mobile device 210 and/or key then brings the userthrough a pairing process.

A door 12 can be deformed, warped, and the like. It is desirable toprovide a customer or user, information about the door, e.g., if it isdeformed, out of alignment, if too much friction is applied when openingand closing, and the like.

As recited above, the current sensor 46 monitors the amount of currentthat goes to the motor 38 and this information is received and processedby the engine/processor 36 with memory and is coupled to the circuit 18.The amount of current going to the motor 38 is used to determine theamount of friction experienced by door 12 and/or lock device 22 inopening and/or closing, as applied by the intelligent door lock system10 and the positioning sensing device 16 to the drive shaft 14. Thecircuit 18 and engine/processor 36 can provide for an adjustment ofcurrent. The engine/processor 36 can provide information regarding thedoor and friction to the user of the door 12.

In one embodiment of the present invention, the intelligent door locksystem 10 provides an ability to sense friction on the lock device 22and/or door 12 by measuring the torque required to move the bolt/lock24. The intelligent door lock system 10 increases the applied torquegradually until the bolt/lock 24 moves into its desired position, andthe applied torque is the minimum amount of torque required to move thebolt/lock 24, which is directly related to how deformed the door is.

In one embodiment, when a bad door is detected, a customer can benotified that their door may require some servicing. In one embodiment,door deformation can be detected with a torque device is used todetermine if the torque applied when the door is rotated is too high. Asa non-limiting example, this can be 2-15 in lbs of torque Theintelligent door lock system back end 68 can then perform a comparisonbetween the measured torque with a standard, or a norm that is includedin the one or more databases 88.

In one embodiment of the present invention, before the door is serviced,the intelligent door lock system 10 allows operation by offering ahigh-friction mode. As a non-limiting example, the high friction mode iswhen, as non-limiting examples, 2 inch lbs, 3 inch lbs., 3.5 inchpounds, and the like are required to open the door. In the high frictionmode, the bolt/lock 24 is driven while the user is pushing, lifting,torqueing the door, pulling, performing visual inspections of rust,blockage, other conditions that can compromise a door and the like, thatis applied to the doorknob. The position sensing device 16 is used todetermine if the bolt/lock 24 was moved to a final position. In the highfriction mode, motion of the door closing is confirmed. Upon detectingthe closing of the door, the bolt/lock 24 is then driven. When the userreceives an auditory, visual, or any other type of perceptibleconfirmation, the user then knows that the door has been locked. In oneembodiment, the firmware elements, of the intelligent door lock system10, as well as other door lock device 22 elements, can also attempt todrive the bolt/lock 24 for a second time when the first time fails.However, this can result in more power consumption, reducing lifetime ofthe power source, particularly when it is battery 50 based.

In one embodiment of the present invention, the intelligent door locksystem 10 seeks to have the motor 38 operate with reduced energyconsumption for energy source lifetime purposes, as well as eliminate orreduce undesirable noises, operations, and user experiences that occurwhen this is a failure in door locking and unlocking, particularly dueto door deformation, door non-alignment, as well as other problems withthe door that can be irritating to the person locking or unlocking thedoor.

In one embodiment of the present invention, the intelligent door locksystem back-end 68 can track performance of doors and friction levelsacross time and build a service to encourage users to better maintaintheir doors. Such service can be a comparison of a door's friction levelto other users that are similar geographic locations, at similar weatherpattern, such that the user is encouraged to maintain their doors at acompetent level. There can be a comparison to standards that at acertain level the door becomes unsafe. Guidelines are provided as to howto maintain their doors. This can be achieved by asking a door user whatimproves their door, including but not limited to, pushing, lifting,torqueing the door, pulling, visual inspections of rust, blockage, otherconditions that can compromise a door, and the like. The analysis andcomparison can be conducted at the back-end 68 and the results computedto door lock operator as well as others.

In one embodiment of the present invention, the intelligent door locksystem 10 has a deformed operation mode that can be activated after aselected amount of time. As a non-limiting example, this can immediatelyafter the user has been notified, more than 1 pico second, 1 second, 5seconds, and greater periods of time. The deformed operation mode can beactivated by the intelligent door lock system 10 itself, or by theintelligent door lock system back-end 68. It can be activated on thedoor operator's request. In one embodiment, the back-end 68 cananticipate these problems. As non-limiting examples, these can includebut are not limited to, due to analysis of doors 12 in similargeographic areas, doors under similar conditions, doors with similarhistories, similar environmental conditions, as well as the history of aparticular door, and the like.

The deformed mode provides cooperation with the door user to morereadily open the door. In one embodiment, this is a mechanism for thedoor to communicate back to the door lock operator. As a non-limitingexample, feedback can be provided to the door operator. Such feedbackcan include, but is not limited to, communication via, tactile, audio,visual, temperature, electronic, wirelessly, through a computer, mobiledevice and the like. In another embodiment, the operator can signify tothe door the operator's desire to leave by unlocking and opening thedoor 12. This is a door operator and lock communication. The dooroperator can close the door, which is sensed by the intelligent doorlock system 10, a timer can then be initiated to provide with dooroperator with a selected time period in which the door operator canmanually alleviate the friction problem. When the time has expired, theintelligent door system 10 can then lock the door 12. Upon detecting asuccessful door locking event, the intelligent door lock system 10 canadvise the door operator that there is a successful door locking. If thedoor locking is not successful, the intelligent door lock system 10 canprovide a message to the door operator via a variety of means, includingbut not limited to a message or alert to the door lock operator's mobiledevice. Such a mobile device message provides the door operator withnotification that door locking was not successful or achieved, and thedoor lock operator can then take action to lock the door 12 either inperson, wirelessly, and the like.

For entry, communication with the lock device 22 may be different. Inone embodiment, it can be locking coupled with close proximity to amobile device that is exterior to the door.

In another embodiment of the present invention, the intelligent doorlock system back-end 68 can track performance of doors and frictionlevels across time and build a simple service to encourage users tomaintain their doors better, as discussed above.

This information can be stored in the one or more databases 64.

In one embodiment of the present invention, the intelligent door locksystem 10 unlocks when a selected temperature is reached, when smoke isdetected, when a fire is detected by processor 38 and the like. Asnon-limiting examples, the intelligent door lock system 10 unlocks thebolt/lock 24 when a temperature is sensed by the temperature sensor 46that, as non-limiting examples, is greater than 40 degrees C., anytemperature over 45 degrees C. and the like. The temperature sensor 46212 sends a signal to the processor 36 which communicates with the motor38 that will then cause the drive shaft 14 to rotate sufficiently andunlock the bolt/lock 24. An arm can also be activated. It will beappreciated that the processor 36 can be anywhere as long as it is incommunication with the temperature sensor 46, and the motor 38, whichcan be at the intelligent door lock system 10, at the back-end 68,anywhere in the building, and at any remote location. The processor 36determines if there is an unsafe condition, e.g., based on a rise intemperature and this then results in an unlocking of the bolt/lock 24.

In one embodiment, the intelligent door lock system back-end 68 cantrack performance of doors and friction levels across time and build aservice to encourage users to better maintain their doors, as discussedabove.

FIG. 17 is a diagram illustrating an implementation of an intelligentdoor look system 100 that allows an intelligent lock on one or morebuildings to the controlled, as described above, and also controlledremotely by a mobile device or computer, as well as remotely by anintelligent lock system back-end component 114, a mobile device or acomputing device 210 of a user who is a member of the intelligent doorlock system 100, as disclosed above. The intelligent door lock systemback-end component 114 may be any of those listed above included in theintelligent lock system back-end 68, one or more computing resources,such as cloud lock access services computing resources or servercomputers with the typical components, that execute a plurality of linesof computer code to implement the intelligent door lock system 100functions described above and below. Each computing device 210 of a usermay be a processing unit based device with sufficient processing power,memory and connectivity to interact with the intelligent door locksystem back-end component 114. As a non-limiting example, the mobiledevice or computing device 210 may be as defined above, and includethose disclosed below, that is capable of interacting with theintelligent door lock back-end component 114. In one implementation, themobile device or computing device 210 may execute an application storedin the memory of the mobile device computing device 210 using aprocessor from the mobile device or computing device 210 to interactwith the intelligent door lock back-end component 114. Examples of auser interface for that application is shown in FIGS. 21(a)-22(e)discussed below in more detail.

In another embodiment, the mobile device or computing device 210 mayexecute a browser stored in the memory of the mobile or computing device210 using a processor from the mobile device or computing device 210 tointeract with the intelligent door lock system back-end component 114.Each of the elements shown in FIG. 17 may be linked by System Networks,including but not limited to a cellular network, a Bluetooth system, theInternet (HTTPS), a WiFi network and the like.

As shown in FIG. 17, each user's mobile device or computer 210 mayinteract with the intelligent door lock system back-end 68 over SystemNetworks, including but not limited to a wired or wireless network, suchas a cellular network, digital data network, computer network and mayalso interact with the intelligent door lock system 10 using SystemNetworks. Each mobile device or computing device 210 may alsocommunicate with a WiFi network 115 or Network Systems over, as anon-limiting example, a network and the WiFi network 115 may thencommunicate with the intelligent door lock system 10.

FIGS. 18(a) and (b) illustrate a front view and a back view,respectively, of a door 120 with intelligent door lock system 10. Thefront portion of the door 120 (that is outside relative to a building ordwelling) shown in FIG. 17 looks like a typical door 120 with a boltassembly 122 and a doorknob and lock assembly 124. The back portion ofthe door 120, that is inside of the dwelling when the door 120 isclosed, illustrated in FIG. 18(b) has the same doorknob and lockassembly 124, but then has an intelligent door lock system 100 that isretrofitted onto the bolt assembly 124 as described below in moredetail.

The intelligent door look assembly 100 may have an extension gear whichextends through the baseplate of the smart door lock. The baseplate mayhave one or more oval mounting holes to accommodate various rose screwdistances from 18 mm to 32 mm to accommodate various different doors. Inone implementation, the intelligent door lock system 100 may have acircular shape and also a rotating bezel. The rotating bezel allows auser to rotate the smart door lock and thus manually lock or unlock thebolt as before. The extension gear extends through the baseplate andthen interacts with the existing bolt elements and allows the smart doorlock to lock/unlocks the bolt. The extension gear may have a modularadapter slot at its end which interfaces with an extension rod of thebolt assembly 124. These modular adapters, as shown in FIG. 23(b), maybe used to match the existing extension rod of the bolt assembly 124.The smart door lock housing may further include an energy source, suchas a battery, a motor assembly, such as a compact, high-torque,high-accuracy stepper motor, and a circuit board that has at least aprocessor, a first wireless connectivity circuit and a second wirelessconnectivity circuit, as described above. In one embodiment, the firstwireless connectivity circuit may be a Bluetooth chip that allows thesmart door lock to communicate using a Bluetooth protocol with acomputing device of a user, such as a smartphone, tablet computer andthe like. The second wireless connectivity circuit may be a WiFi chipthat allows the smart door lock to communicate using a WiFi protocolwith a back-end server system. The circuit board components may beintercoupled to each other and also coupled to the energy source and themotor for power and to control the motor, respectively. Each of thecomponents described here may be coupled to the energy source andpowered by the energy source.

FIG. 19 illustrates the smart door lock system 100 being retrofittedonto a bolt in a door 10. As shown in FIG. 19, when the intelligent doorlock system 100 is installed on the door 120, the thumb turn 124 isremoved (replaced by the bezel that allows the user to manually unlockor lock the bolt.) In addition, the extension gear 126 of theintelligent door lock system 100, and more specifically the slottedportion 126(a) at the end of the extension gear, is mechanically coupledto the extension rod 128 of the bolt assembly as show in FIG. 19. Whenthe intelligent door lock system 100 is installed, as shown in FIG. 19,the user can rotate the bezel 132 to manually lock or unlock the boltassembly. In addition, when commanded to do so, the motor assembly inthe intelligent door lock system 100 can also turn the extension gear126 that in turn turns the extension rod and lock or unlock the boltassembly. Thus, the extension gear 126 allows the smart door lock to actas a manual thumb turn (using the bezel) and rotate either clockwise orcounterclockwise to engage or disengage the bolt of a bolt. Theextension gear 126 is designed in a manner to control the physicalrotation of extension rods/axial actuators/tail pieces/tongues 128 whichare traditional rotated by means of a thumb turn. This is achieved bydesigning the extension gear 126 with modular gear adapters as shown inFIG. 23(b) to fit over the extension rod 22 as shown. This allows theextension gear 126 to fit with a variety of existing extension rods.

FIG. 20 illustrates a set of interactions between the intelligent doorlock system 100, mobile or computing device 210 and intelligent doorlock system back-end 68, that may include a pairing process 138 and alock operation process 140. During the pairing process 138, theintelligent door lock system 100 and mobile or computing device 210 canbe paired to each other and also authenticated by the intelligent doorlock system back-end 68. Thus, as shown in FIG. 20, during the pairingprocess, the intelligent door look system 100 is powered on and becomesdiscoverable, while the mobile or computing device 210 communicates withthe intelligent door lock system back-end 68, and has its credentialsvalidated and authenticated. Once the mobile or computing device 210,and the app on the mobile or computing device 210, is authenticated, themobile or computing device 210 discovers the lock, such as through aBluetooth discovery process, since the intelligent door look system 100and the mobile or computing device 210 are within a predeterminedproximity to each other. The mobile or computing device 210 may thensend a pairing code to the intelligent door look system 100, and in turnreceive a pairing confirmation from the intelligent door lock system100. The pairing process is then completed with the processesillustrated in FIG. 20. The lock operation may include the steps listedin FIG. 20 to operate the intelligent door look system 100 wirelesslyusing the mobile or computing device 210.

The intelligent door lock system 100 may be used for various functions.As a non-limiting example, the intelligent door lock system 100 mayenable a method to exchange a security token between mobile or computingdevice 210 and the intelligent door look system 100. All or all of theintelligent door look systems 100 may be registered with the intelligentdoor lock back-end 68 with a unique registration ID. The unique ID ofthe an intelligent door look system 100 may be associated with a uniquesecurity token that can only be used to command a specific intelligentdoor look system 100 to lock or unlock. Through a virtual keyprovisioning interface of the intelligent door lock system back-end 68,a master user, who may be an administrator, can issue a new securitytoken to a particular mobile or computing device 210. The intelligentdoor look system 100 can periodically broadcast an advertisement of itsavailable services over System Networks. When the mobile or computingdevice 210 is within a predetermined proximity of the intelligent doorlook system 100, which varies depending on the protocol being used, themobile or computing device 210 can detect the advertisement from theintelligent door lock assembly 100.

The application on the mobile or computing device 210 detects theintelligent door look system 100 and a communications session can beinitiated. The token, illustrated as a key 118 in FIG. 20, is exchangedand the lock is triggered to unlock automatically. Alternatively, if theintelligent door look system 100 is equipped with a second wirelesscommunications circuit, then the intelligent door look system 100 canperiodically query the intelligent door lock system back-end 68 forcommands. A user can issue commands via a web interface to theintelligent door lock system back-end 68, and the intelligent door looksystem 100 can lock or unlock the door 120. The intelligent door locksystem 100 may also allow the user to disable auto-unlock, at which timethe application on the user's mobile or computing device 210 can providea notification which then allows the user to press a button on themobile or computing device 210 to lock or unlock the lock.

The intelligent door lock system 100 may also allow for the triggeringof multiple events upon connection to an intelligent door look system100 by a mobile or computing device 210. As a non-limiting example, theintelligent door look system 100 can detect and authenticate the mobileor computing device 210, as described herein, and initiate a series ofactions, including but not limiting to, unlocking doors 100, turning onlights, adjusting temperature, turning on stereo etc. The commands forthese actions may be carried out by the mobile or computing device 210or the intelligent door lock system back-end 68. In addition, through aweb interface of the intelligent door lock system back-end 68, the usermay define one or more events to be triggered upon proximity detectionand authentication of the user's mobile or computing device 210 to theintelligent door look system 100.

The intelligent door lock system 100 may also allow for the intelligenttriggering of events associated with an individual. In particular,environmental settings may be defined per individual in the intelligentdoor lock system back-end 68 and then applied intelligently bysuccessive ingress by that person into a building that has anintelligent door look system 100. For example: person A arrives home andits mobile or computing device 210 is authenticated by the intelligentdoor look system 100. His identity is shared with the intelligent doorlock system back-end 68. The intelligent door lock system back-end 68may send environmental changes to other home controllers, such as“adjust heat to 68 degrees”. Person B arrives at the same building anhour later and her mobile or computing device 210 is also authenticatedand shared with the intelligent door lock system back-end 68. Theintelligent door lock system back-end 68 accesses her preferredenvironmental variables such as “adjust heat to 71 degrees”. Theintelligent door lock system back-end understands that person B hasasked for a temperature increase and issues the respective command tothe dwelling thermostat. In one example, the intelligent door lockback-end system 68 has logic that defers to the higher temperaturerequest or can deny it. Therefore if person A entered the home afterperson B, the temperature would not be decreased.

FIGS. 21(a)-(g) are examples of a user interface for an owner of abuilding that has an intelligent door lock system 100. These userinterfaces may be seen by a user who is the owner of a building that hasan intelligent door look system 100 with the unique ID. FIG. 21(a) is abasic home screen while FIG. 22(b) shows the smart door locks (in akeychain) which the user of the mobile or computing device 210 hasaccess rights to in intelligent door lock system 100. FIG. 21(c)illustrates an example of a user interface when a particular intelligentdoor look system 100 is locked. FIG. 22(d) illustrates an example of auser interface when a particular intelligent door look system 100 isunlocked. FIGS. 21(e) and (f) are user interface examples that allow theowner to add other users/people to be able to control the intelligentdoor look system 100 of the building. FIG. 21(g) is an example of aconfiguration interface that allows the owner of the building tocustomize a set of permissions assigned for each intelligent door locksystem 100.

FIGS. 22(a)-(e) are examples of a user interface for a guest of an ownerof a building that has an intelligent door lock system 100.

FIGS. 23(a) and (b) illustrate an intelligent door look system 100 andextension gear adapters 142. In particular, FIG. 23(a) shows the bolt ofa lock device with an empty extension gear receptacle that allowsdifferent extension gear adapters 150 (shown in FIG. 7B) to be insertedinto the receptacle so that the an intelligent door look system 100 maybe used with a number of different bolts of lock devices that each havea different shaped extension rod and/or extension rods that havedifferent cross-sections.

Referring now to FIG. 24, 1212 is a block diagram illustratingembodiments of a mobile or computing device 210 that can be used withintelligent door lock system 10.

The mobile or computing device 210 can include a display 1214 that canbe a touch sensitive display. The touch-sensitive display 1214 issometimes called a “touch screen” for convenience, and may also be knownas or called a touch-sensitive display system. The mobile or computingdevice 210 may include a memory 1216 (which may include one or morecomputer readable storage mediums), a memory controller 1218, one ormore processing units (CPU's) 1220, a peripherals interface 1222,Network Systems circuitry 1224, including but not limited to RFcircuitry, audio circuitry 1226, a speaker 1228, a microphone 1230, aninput/output (I/O) subsystem 1232, other input or control devices 1234,and an external port 1236. The mobile or computing device 210 mayinclude one or more optical sensors 1238. These components maycommunicate over one or more communication buses or signal lines 1240.

It should be appreciated that the mobile or computing device 210 is onlyone example of a portable multifunction mobile or computing device 210,and that the mobile or computing device 210 may have more or fewercomponents than shown, may combine two or more components, or a may havea different configuration or arrangement of the components. The variouscomponents shown in FIG. 24 may be implemented in hardware, software ora combination of hardware and software, including one or more signalprocessing and/or application specific integrated circuits.

Memory 1216 may include high-speed random access memory and may alsoinclude non-volatile memory, such as one or more magnetic disk storagedevices, flash memory devices, or other non-volatile solid-state memorydevices. Access to memory 1216 by other components of the mobile orcomputing device 210, such as the CPU 1220 and the peripherals interface1222, may be controlled by the memory controller 1218.

The peripherals interface 1222 couples the input and output peripheralsof the device to the CPU 1220 and memory 1216. The one or moreprocessors 1220 run or execute various software programs and/or sets ofinstructions stored in memory 1216 to perform various functions for themobile or computing device 210 and to process data.

In some embodiments, the peripherals interface 1222, the CPU 1220, andthe memory controller 1218 may be implemented on a single chip, such asa chip 1242. In some other embodiments, they may be implemented onseparate chips.

The Network System circuitry 1244 receives and sends signals, includingbut not limited to RF, also called electromagnetic signals. The NetworkSystem circuitry 1244 converts electrical signals to/fromelectromagnetic signals and communicates with communications networksand other communications devices via the electromagnetic signals. TheNetwork Systems circuitry 1244 may include well-known circuitry forperforming these functions, including but not limited to an antennasystem, an RF transceiver, one or more amplifiers, a tuner, one or moreoscillators, a digital signal processor, a CODEC chipset, a subscriberidentity module (SIM) card, memory, and so forth. The Network Systemscircuitry 1244 may communicate with networks, such as the Internet, alsoreferred to as the World Wide Web (WWW), an intranet and/or a wirelessnetwork, such as a cellular telephone network, a wireless local areanetwork (LAN) and/or a metropolitan area network (MAN), and otherdevices by wireless communication.

The wireless communication may use any of a plurality of communicationsstandards, protocols and technologies, including but not limited toGlobal System for Mobile Communications (GSM), Enhanced Data GSMEnvironment (EDGE), high-speed downlink packet access (HSDPA), widebandcode division multiple access (W-CDMA), code division multiple access(CDMA), time division multiple access (TDMA), BLUETOOTH®, WirelessFidelity (Wi-Fi) (e.g., IEEE 802.11a, IEEE 802.11b, IEEE 802.11g and/orIEEE 802.11n), voice over Internet Protocol (VoIP), Wi-MAX, a protocolfor email (e.g., Internet message access protocol (IMAP) and/or postoffice protocol (POP)), instant messaging (e.g., extensible messagingand presence protocol (XMPP), Session Initiation Protocol for InstantMessaging and Presence Leveraging Extensions (SIMPLE), and/or InstantMessaging and Presence Service (IMPS)), and/or Short Message Service(SMS)), or any other suitable communication protocol, includingcommunication protocols not yet developed as of the filing date of thisdocument.

The audio circuitry 1226, the speaker 1228, and the microphone 1230provide an audio interface between a user and the mobile or computingdevice 210. The audio circuitry 1226 receives audio data from theperipherals interface 1222, converts the audio data to an electricalsignal, and transmits the electrical signal to the speaker 1228. Thespeaker 1228 converts the electrical signal to human-audible soundwaves. The audio circuitry 1226 also receives electrical signalsconverted by the microphone 1230 from sound waves. The audio circuitry1226 converts the electrical signal to audio data and transmits theaudio data to the peripherals interface 1222 for processing. Audio datamay be retrieved from and/or transmitted to memory 1216 and/or theNetwork Systems circuitry 1244 by the peripherals interface 1222. Insome embodiments, the audio circuitry 1226 also includes a headset jack.The headset jack provides an interface between the audio circuitry 1226and removable audio input/output peripherals, such as output-onlyheadphones or a headset with both output (e.g., a headphone for one orboth ears) and input (e.g., a microphone).

The I/O subsystem 1232 couples input/output peripherals on the mobile orcomputing device 210, such as the touch screen 1214 and otherinput/control devices 1234, to the peripherals interface 1222. The I/Osubsystem 1232 may include a display controller 1246 and one or moreinput controllers 210 for other input or control devices. The one ormore input controllers 1 receive/send electrical signals from/to otherinput or control devices 1234. The other input/control devices 1234 mayinclude physical buttons (e.g., push buttons, rocker buttons, etc.),dials, slider switches, and joysticks, click wheels, and so forth. Insome alternate embodiments, input controller(s) 1252 may be coupled toany (or none) of the following: a keyboard, infrared port, USB port, anda pointer device such as a mouse. The one or more buttons may include anup/down button for volume control of the speaker 1228 and/or themicrophone 1230. The one or more buttons may include a push button. Aquick press of the push button may disengage a lock of the touch screen1214 or begin a process that uses gestures on the touch screen to unlockthe device, as described in U.S. patent application Ser. No. 11/322,549,“Unlocking a Device by Performing Gestures on an Unlock Image,” filedDec. 23, 2005, which is hereby incorporated by reference in itsentirety. A longer press of the push button may turn power to the mobileor computing device 210 on or off. The user may be able to customize afunctionality of one or more of the buttons. The touch screen 1214 isused to implement virtual or soft buttons and one or more softkeyboards.

The touch-sensitive touch screen 1214 provides an input interface and anoutput interface between the device and a user. The display controller1246 receives and/or sends electrical signals from/to the touch screen1214. The touch screen 1214 displays visual output to the user. Thevisual output may include graphics, text, icons, video, and anycombination thereof (collectively termed “graphics”). In someembodiments, some or all of the visual output may correspond touser-interface objects, further details of which are described below.

A touch screen 1214 has a touch-sensitive surface, sensor or set ofsensors that accepts input from the user based on haptic and/or tactilecontact. The touch screen 1214 and the display controller 1246 (alongwith any associated modules and/or sets of instructions in memory 1216)detect contact (and any movement or breaking of the contact) on thetouch screen 1214 and converts the detected contact into interactionwith user-interface objects (e.g., one or more soft keys, icons, webpages or images) that are displayed on the touch screen. In an exemplaryembodiment, a point of contact between a touch screen 1214 and the usercorresponds to a finger of the user.

The touch screen 1214 may use LCD (liquid crystal display) technology,or LPD (light emitting polymer display) technology, although otherdisplay technologies may be used in other embodiments. The touch screen1214 and the display controller 1246 may detect contact and any movementor breaking thereof using any of a plurality of touch sensingtechnologies now known or later developed, including but not limited tocapacitive, resistive, infrared, and surface acoustic wave technologies,as well as other proximity sensor arrays or other elements fordetermining one or more points of contact with a touch screen 1214.

A touch-sensitive display in some embodiments of the touch screen 1214may be analogous to the multi-touch sensitive tablets described in thefollowing U.S. Pat. No. 6,323,846 (Westerman et al.), U.S. Pat. No.6,570,557 (Westerman et al.), and/or U.S. Pat. No. 6,677,932(Westerman), and/or U.S. Patent Publication 2002/0015024A1, each ofwhich is hereby incorporated by reference in their entirety. However, atouch screen 1214 displays visual output from the portable mobile orcomputing device 210, whereas touch sensitive tablets do not providevisual output.

A touch-sensitive display in some embodiments of the touch screen 1214may be as described in the following applications: (1) U.S. patentapplication Ser. No. 11/381,313, “Multipoint Touch Surface Controller,”filed May 12, 2006; (2) U.S. patent application Ser. No. 10/840,862,“Multipoint Touchscreen,” filed May 6, 2004; (3) U.S. patent applicationSer. No. 10/903,964, “Gestures For Touch Sensitive Input Devices,” filedJul. 30, 2004; (4) U.S. patent application Ser. No. 11/048,264,“Gestures For Touch Sensitive Input Devices,” filed Jan. 31, 2005; (5)U.S. patent application Ser. No. 11/038,590, “Mode-Based Graphical UserInterfaces For Touch Sensitive Input Devices,” filed Jan. 18, 2005; (6)U.S. patent application Ser. No. 11/228,758, “Virtual Input DevicePlacement On A Touch Screen User Interface,” filed Sep. 16, 2005; (7)U.S. patent application Ser. No. 11/228,700, “Operation Of A ComputerWith A Touch Screen Interface,” filed Sep. 16, 2005; (8) U.S. patentapplication Ser. No. 11/228,737, “Activating Virtual Keys Of ATouch-Screen Virtual Keyboard,” filed Sep. 16, 2005; and (9) U.S. patentapplication Ser. No. 11/367,749, “Multi-Functional Hand-Held Device,”filed Mar. 3, 2006. All of these applications are incorporated byreference herein in their entirety.

The touch screen 1214 may have a resolution in excess of 1000 dpi. In anexemplary embodiment, the touch screen has a resolution of approximately1060 dpi. The user may make contact with the touch screen 1214 using anysuitable object or appendage, such as a stylus, a finger, and so forth.In some embodiments, the user interface is designed to work primarilywith finger-based contacts and gestures, which are much less precisethan stylus-based input due to the larger area of contact of a finger onthe touch screen. In some embodiments, the device translates the roughfinger-based input into a precise pointer/cursor position or command forperforming the actions desired by the user.

In some embodiments, in addition to the touch screen, the mobile orcomputing device 210 may include a touchpad (not shown) for activatingor deactivating particular functions. In some embodiments, the touchpadis a touch-sensitive area of the device that, unlike the touch screen,does not display visual output. The touchpad may be a touch-sensitivesurface that is separate from the touch screen 1214 or an extension ofthe touch-sensitive surface formed by the touch screen.

In some embodiments, the mobile or computing device 210 may include aphysical or virtual click wheel as an input control device 1234. A usermay navigate among and interact with one or more graphical objects(henceforth referred to as icons) displayed in the touch screen 1214 byrotating the click wheel or by moving a point of contact with the clickwheel (e.g., where the amount of movement of the point of contact ismeasured by its angular displacement with respect to a center point ofthe click wheel). The click wheel may also be used to select one or moreof the displayed icons. For example, the user may press down on at leasta portion of the click wheel or an associated button. User commands andnavigation commands provided by the user via the click wheel may beprocessed by an input controller 1252 as well as one or more of themodules and/or sets of instructions in memory 1216. For a virtual clickwheel, the click wheel and click wheel controller may be part of thetouch screen 1214 and the display controller 1246, respectively. For avirtual click wheel, the click wheel may be either an opaque orsemitransparent object that appears and disappears on the touch screendisplay in response to user interaction with the device. In someembodiments, a virtual click wheel is displayed on the touch screen of aportable multifunction device and operated by user contact with thetouch screen.

The mobile or computing device 210 also includes a power system 1214 forpowering the various components. The power system 1214 may include apower management system, one or more power sources (e.g., battery 1254,alternating current (AC)), a recharging system, a power failuredetection circuit, a power converter or inverter, a power statusindicator (e.g., a light-emitting diode (LED)) and any other componentsassociated with the generation, management and distribution of power inportable devices.

The mobile or computing device 210 may also include one or more sensors1238, including not limited to optical sensors 1238. An optical sensorcan be coupled to an optical sensor controller 1248 in I/O subsystem1232. The optical sensor 1238 may include charge-coupled device (CCD) orcomplementary metal-oxide semiconductor (CMOS) phototransistors. Theoptical sensor 1238 receives light from the environment, projectedthrough one or more lens, and converts the light to data representing animage. In conjunction with an imaging module 1258 (also called a cameramodule); the optical sensor 1238 may capture still images or video. Insome embodiments, an optical sensor is located on the back of the mobileor computing device 210, opposite the touch screen display 1214 on thefront of the device, so that the touch screen display may be used as aviewfinder for either still and/or video image acquisition. In someembodiments, an optical sensor is located on the front of the device sothat the user's image may be obtained for videoconferencing while theuser views the other video conference participants on the touch screendisplay. In some embodiments, the position of the optical sensor 1238can be changed by the user (e.g., by rotating the lens and the sensor inthe device housing) so that a single optical sensor 1238 may be usedalong with the touch screen display for both video conferencing andstill and/or video image acquisition.

The mobile or computing device 210 may also include one or moreproximity sensors 1250. In one embodiment, the proximity sensor 1250 iscoupled to the peripherals interface 1222. Alternately, the proximitysensor 1250 may be coupled to an input controller in the I/O subsystem1232. The proximity sensor 1250 may perform as described in U.S. patentapplication Ser. No. 11/241,839, “Proximity Detector In HandheldDevice,” filed Sep. 30, 2005; Ser. No. 11/240,788, “Proximity DetectorIn Handheld Device,” filed Sep. 30, 2005; Ser. No. 13/096,386, “UsingAmbient Light Sensor To Augment Proximity Sensor Output”; Ser. No.11/586,862, “Automated Response To And Sensing Of User Activity InPortable Devices,” filed Oct. 24, 2006; and Ser. No. 11/638,251,“Methods And Systems For Automatic Configuration Of Peripherals,” whichare hereby incorporated by reference in their entirety. In someembodiments, the proximity sensor turns off and disables the touchscreen 1214 when the multifunction device is placed near the user's ear(e.g., when the user is making a phone call). In some embodiments, theproximity sensor keeps the screen off when the device is in the user'spocket, purse, or other dark area to prevent unnecessary batterydrainage when the device is a locked state.

In some embodiments, the software components stored in memory 1216 mayinclude an operating system 1260, a communication module (or set ofinstructions) 1262, a contact/motion module (or set of instructions)1264, a graphics module (or set of instructions) 1268, a text inputmodule (or set of instructions) 1270, a Global Positioning System (GPS)module (or set of instructions) 1272, and applications (or set ofinstructions) 1272.

The operating system 1260 (e.g., Darwin, RTXC, LINUX, UNIX, OS X,WINDOWS, or an embedded operating system such as VxWorks) includesvarious software components and/or drivers for controlling and managinggeneral system tasks (e.g., memory management, storage device control,power management, etc.) and facilitates communication between varioushardware and software components.

The communication module 1262 facilitates communication with otherdevices over one or more external ports 1274 and also includes varioussoftware components for handling data received by the Network Systemscircuitry 1244 and/or the external port 1274. The external port 1274(e.g., Universal Serial Bus (USB), FIREWIRE, etc.) is adapted forcoupling directly to other devices or indirectly over a network (e.g.,the Internet, wireless LAN, etc.). In some embodiments, the externalport is a multi-pin (e.g., 30-pin) connector that is the same as, orsimilar to and/or compatible with the 30-pin connector used on iPod(trademark of Apple Computer, Inc.) devices.

The contact/motion module 106 may detect contact with the touch screen1214 (in conjunction with the display controller 1246) and other touchsensitive devices (e.g., a touchpad or physical click wheel). Thecontact/motion module 106 includes various software components forperforming various operations related to detection of contact, such asdetermining if contact has occurred, determining if there is movement ofthe contact and tracking the movement across the touch screen 1214, anddetermining if the contact has been broken (i.e., if the contact hasceased). Determining movement of the point of contact may includedetermining speed (magnitude), velocity (magnitude and direction),and/or an acceleration (a change in magnitude and/or direction) of thepoint of contact. These operations may be applied to single contacts(e.g., one finger contacts) or to multiple simultaneous contacts (e.g.,“multitouch”/multiple finger contacts). In some embodiments, thecontact/motion module 106 and the display controller 1246 also detectscontact on a touchpad. In some embodiments, the contact/motion module1284 and the controller 1286 detects contact on a click wheel.

Examples of other applications that may be stored in memory 1216 includeother word processing applications, JAVA-enabled applications,encryption, digital rights management, voice recognition, and voicereplication.

In conjunction with touch screen 1214, display controller 1246, contactmodule 1276, graphics module 1278, and text input module 1280, acontacts module 1282 may be used to manage an address book or contactlist, including: adding name(s) to the address book; deleting name(s)from the address book; associating telephone number(s), e-mailaddress(es), physical address(es) or other information with a name;associating an image with a name; categorizing and sorting names;providing telephone numbers or e-mail addresses to initiate and/orfacilitate communications by telephone, video conference, e-mail, or IM;and so forth.

FIGS. 25(a)-(d) represents a logical diagram of a cloud lock accessservices Infrastructure that can be utilized with the present inventionthat is in communication with the bridge 11, Bluetooth devices 21 and/orthe intelligent door lock system 10. As shown, the cloud lock accessservices encompasses web applications, mobile devices, personal computerand/or laptops and social networks, such as, Twitter®. (“Twitter®” is atrademark of Twitter Inc.). It will be appreciated that other socialnetworks can be included in the cloud lock access services and Twitter®has been given as a specific example. Therefore, every component formspart of the cloud lock access services which comprises servers,applications and clients as defined above.

The cloud lock access services based system facilitates adjustingutilization and/or allocation of hardware resource(s) to remote clients.The system includes a third party service provider, that is provided bythe methods used with the present invention, that can concurrentlyservice requests from several clients without lottery participantperception of degraded computing performance as compared to conventionaltechniques where computational tasks can be performed upon a client or aserver within a proprietary intranet. The third party service provider(e.g., “cloud lock access services”) supports a collection of hardwareand/or software resources. The hardware and/or software resources can bemaintained by an off-premises party, and the resources can be accessedand utilized by identified lottery participants over Network System.Resources provided by the third party service provider can be centrallylocated and/or distributed at various geographic locations. For example,the third party service provider can include any number of data centermachines that provide resources. The data center machines can beutilized for storing/retrieving data, effectuating computational tasks,rendering graphical outputs, routing data, and so forth.

In one embodiment the cloud is used for the remote door 12 statusoperation, remote door operation for locking, unlocking and the like.

According to an illustration, the third party service provider canprovide any number of resources such as data storage services,computational services, word processing services, electronic mailservices, presentation services, spreadsheet services, gaming services,web syndication services (e.g., subscribing to a RSS feed), and anyother services or applications that are conventionally associated withpersonal computers and/or local servers. Further, utilization of anynumber of third party service providers similar to the third partyservice provider is contemplated. According to an illustration,disparate third party service providers can be maintained by differingoff-premise parties and a lottery participant can employ, concurrently,at different times, and the like, all or a subset of the third partyservice providers.

By leveraging resources supported by the third party service provider,limitations commonly encountered with respect to hardware associatedwith clients and servers within proprietary intranets can be mitigated.Off-premises parties, instead of lottery participants of clients orNetwork System administrators of servers within proprietary intranets,can maintain, troubleshoot, replace and update the hardware resources.Further, for example, lengthy downtimes can be mitigated by the thirdparty service provider utilizing redundant resources; thus, if a subsetof the resources are being updated or replaced, the remainder of theresources can be utilized to service requests from lottery participants.According to this example, the resources can be modular in nature, andthus, resources can be added, removed, tested, modified, etc. while theremainder of the resources can support servicing lottery participantrequests. Moreover, hardware resources supported by the third partyservice provider can encounter fewer constraints with respect tostorage, processing power, security, bandwidth, redundancy, graphicaldisplay rendering capabilities, etc. as compared to conventionalhardware associated with clients and servers within proprietaryintranets.

The system can include a client device, which can be the wearable deviceand/or the wearable device lottery participant's mobile device thatemploys resources of the third party service provider. Although oneclient device is depicted, it is to be appreciated that the system caninclude any number of client devices similar to the client device, andthe plurality of client devices can concurrently utilize supportedresources. By way of illustration, the client device can be a desktopdevice (e.g., personal computer), mobile device, and the like. Further,the client device can be an embedded system that can be physicallylimited, and hence, it can be beneficial to leverage resources of thethird party service provider.

Resources can be shared amongst a plurality of client devicessubscribing to the third party service provider. According to anillustration, one of the resources can be at least one centralprocessing unit (CPU), where CPU cycles can be employed to effectuatecomputational tasks requested by the client device. Pursuant to thisillustration, the client device can be allocated a subset of an overalltotal number of CPU cycles, while the remainder of the CPU cycles can beallocated to disparate client device(s). Additionally or alternatively,the subset of the overall total number of CPU cycles allocated to theclient device can vary over time. Further, a number of CPU cycles can bepurchased by the lottery participant of the client device. In accordancewith another example, the resources can include data store(s) that canbe employed by the client device to retain data. The lottery participantemploying the client device can have access to a portion of the datastore(s) supported by the third party service provider, while access canbe denied to remaining portions of the data store(s) (e.g., the datastore(s) can selectively mask memory based upon lotteryparticipant/device identity, permissions, and the like). It iscontemplated that any additional types of resources can likewise beshared.

The third party service provider can further include an interfacecomponent that can receive input(s) from the client device and/or enabletransferring a response to such input(s) to the client device (as wellas perform similar communications with any disparate client devices).According to an example, the input(s) can be request(s), data,executable program(s), etc. For instance, request(s) from the clientdevice can relate to effectuating a computational task,storing/retrieving data, rendering a lottery participant interface, andthe like via employing one or more resources. Further, the interfacecomponent can obtain and/or transmit data over a Network Systemconnection. According to an illustration, executable code can bereceived and/or sent by the interface component over the Network Systemconnection. Pursuant to another example, a lottery participant (e.g.employing the client device) can issue commands via the interfacecomponent.

In one embodiment, the third party service provider includes a dynamicallocation component that apportions resources, which as a non-limitingexample can be hardware resources supported by the third party serviceprovider to process and respond to the input(s) (e.g., request(s), data,executable program(s), and the like, obtained from the client device.

Although the interface component is depicted as being separate from thedynamic allocation component, it is contemplated that the dynamicallocation component can include the interface component or a portionthereof. The interface component can provide various adaptors,connectors, channels, communication paths, etc. to enable interactionwith the dynamic allocation component.

In one embodiment a system includes the third party service providerthat supports any number of resources (e.g., hardware, software, andfirmware) that can be employed by the client device and/or disparateclient device(s) not shown. The third party service provider furthercomprises the interface component that receives resource utilizationrequests, including but not limited to requests to effectuate operationsutilizing resources supported by the third party service provider fromthe client device and the dynamic allocation component that partitionsresources, including but not limited to, between lottery participants,devices, computational tasks, and the like. Moreover, the dynamicallocation component can further include a lottery participant stateevaluator, an enhancement component and an auction component.

The user state evaluator can determine a state associated with a userand/or the client device employed by the user, where the state canrelate to a set of properties. For instance, the user state evaluatorcan analyze explicit and/or implicit information obtained from theclient device (e.g., via the interface component) and/or retrieved frommemory associated with the third party service provider (e.g.,preferences indicated in subscription data). State related data yieldedby the user state evaluator can be utilized by the dynamic allocationcomponent to tailor the apportionment of resources.

In one embodiment, the user state evaluator can consider characteristicsof the client device, which can be used to apportion resources by thedynamic allocation component. For instance, the user state evaluator canidentify that the client device is a mobile device with limited displayarea. Thus, the dynamic allocation component can employ this informationto reduce resources utilized to render an image upon the client devicesince the cellular telephone may be unable to display a rich graphicaluser interface.

Moreover, the enhancement component can facilitate increasing anallocation of resources for a particular lottery participant and/orclient device.

In one embodiment a system employs load balancing to optimizeutilization of resources. The system includes the third party serviceprovider that communicates with the client device (and/or any disparateclient device(s) and/or disparate third party service provider(s)). Thethird party service provider can include the interface component thattransmits and/or receives data from the client device and the dynamicallocation component that allots resources. The dynamic allocationcomponent can further comprise a load balancing component that optimizesutilization of resources.

In one embodiment, the load balancing component can monitor resources ofthe third party service provider to detect failures. If a subset of theresources fails, the load balancing component can continue to optimizethe remaining resources. Thus, if a portion of the total number ofprocessors fails, the load balancing component can enable redistributingcycles associated with the non-failing processors.

In one embodiment a system archives and/or analyzes data utilizing thethird party service provider. The third party service provider caninclude the interface component that enables communicating with theclient device. Further, the third party service provider comprises thedynamic allocation component that can apportion data retentionresources, for example. Moreover, the third party service provider caninclude an archive component and any number of data store(s). Access toand/or utilization of the archive component and/or the data store(s) bythe client device (and/or any disparate client device(s)) can becontrolled by the dynamic allocation component. The data store(s) can becentrally located and/or positioned at differing geographic locations.Further, the archive component can include a management component, aversioning component, a security component, a permission component, anaggregation component, and/or a restoration component.

The data store(s) can be, for example, either volatile memory ornonvolatile memory, or can include both volatile and nonvolatile memory.By way of illustration, and not limitation, nonvolatile memory caninclude read only memory (ROM), programmable ROM (PROM), electricallyprogrammable ROM (EPROM), electrically erasable programmable ROM(EEPROM), or flash memory. Volatile memory can include random accessmemory (RAM), which acts as external cache memory. By way ofillustration and not limitation, RAM is available in many forms such asstatic RAM (SRAM), dynamic RAM (DRAM), synchronous DRAM (SDRAM), doubledata rate SDRAM (DDR SDRAM), enhanced SDRAM (ESDRAM), Synchlink DRAM(SLDRAM), Rambus direct RAM (RDRAM), direct Rambus dynamic RAM (DRDRAM),and Rambus dynamic RAM (RDRAM). The data store(s) of the subject systemsand methods is intended to comprise, without being limited to, these andany other suitable types of memory. In addition, it is to be appreciatedthat the data store(s) can be a server, a database, a hard drive, andthe like.

The management component facilitates administering data retained in thedata store(s). The management component can enable providingmulti-tiered storage within the data store(s), for example. According tothis example, unused data can be aged-out to slower disks and importantdata used more frequently can be moved to faster disks; however, theclaimed subject matter is not so limited. Further, the managementcomponent can be utilized (e.g. by the client device) to organize,annotate, and otherwise reference content without making it local to theclient device. Pursuant to an illustration, enormous video files can betagged via utilizing a cell phone. Moreover, the management componentenables the client device to bind metadata, which can be local to theclient device, to file streams (e.g., retained in the data store(s));the management component can enforce and maintain these bindings.

Additionally or alternatively, the management component can allow forsharing data retained in the data store(s) with disparate lotteryparticipants and/or client devices. For example, fine-grained sharingcan be supported by the management component.

The versioning component can enable retaining and/or tracking versionsof data. For instance, the versioning component can identify a latestversion of a document (regardless of a saved location within datastore(s)).

The security component limits availability of resources based on lotteryparticipant identity and/or authorization level. For instance, thesecurity component can encrypt data transferred to the client deviceand/or decrypt data obtained from the client device. Moreover, thesecurity component can certify and/or authenticate data retained by thearchive component.

The permission component can enable a lottery participant to assignarbitrary access permissions to various lottery participants, groups oflottery participants and/or all lottery participants.

Further, the aggregation component assembles and/or analyzes collectionsof data. The aggregation component can seamlessly incorporate thirdparty data into a particular lottery participant's data.

The restoration component rolls back data retained by the archivecomponent. For example, the restoration component can continuouslyrecord an environment associated with the third party service provider.Further, the restoration component can playback the recording.

Algorithm

FIG. 26 is a flowchart illustrating an example of a process for trackingsignal strength of between the bridge 11 and the Bluetooth LE devices21, as well as the intelligent door lock system 10. While FIG. 26illustrates exemplary steps according to one embodiment, otherembodiments may omit, add to, and/or modify any of the steps shown inFIG. 26.

An algorithm described hereafter computes proximity of a Bluetoothdevice 21 from the intelligent door lock system 10 of a dwelling andfrom the one or more bridges in the dwelling. The relative signalstrength of connections to these two devices during lock operations isrecorded as a threshold value. When the proximity to the bridge, placedinside the home is closer than before the lock operation, we willcompute algorithmically that the device is inside the home.

In one embodiment the time spent with a relatively consistent signalstrength value is a strong indicator a person being in the dwelling. Arapid change of proximity following a lock operation will be anindicator of coming.

In one embodiment a lock device 22 operation of the intelligent doorlock system 10 followed by a rapid change of proximity is an indicatorof going from the dwelling.

The process of FIG. 26 begins by measuring the signal strength ofwireless signals between the bridge 11 and the Bluetooth LE devices 21at step 310. The signal strength may be measured in any of the waysdiscussed above, including the bridge 11 measuring the power ofdownstream wireless signals. Step 310 may be initiated in accordancewith a predefined schedule or in response to a predetermined event.

At step 320, parameter data of the non-interconnect device isdetermined. The parameter data may include location, time, and/orvelocity coordinates associated with the non-interconnect device at thetime of the signal strength measurement. Step 320 may be performed inany variety of ways, including but not limited to the use of GPSinformation. Further, step 320 may be initiated by a predefined scheduleor a predefined event, as discussed above.

At step 330, the signal strength and parameter data are transmitted tothe cloud lock access services. Step 330 may be performed in any of theways discussed above, including using upstream control, communication,or out-of-band channels of Network System. The signal strength andparameter data, and optionally additional data, may be combined to formnetwork status data, which is transmitted to the cloud lock accessservices at step 330.

At step 340, the signal strength and parameter data are used to analyzethe signal strength between the bridge 11 and a Bluetooth LE device 21.The network operations center 150 is able to process the data in any ofthe ways discussed above, including mapping the signal strength togeographic representations of the bridge 11 and a Bluetooth LE device21, based on the parameter data. A graphical representation of at leasta section of the strength of the signal between the bridge 11 and aBluetooth LE device 12 may be generated to illustrate instances ofmeasured signal strength plotted based on corresponding parameter data.Network operators may use the output of the cloud lock access servicesto analyze, configure, reconfigure, overhaul, and/or optimize thewireless network, as discussed above.

FIG. 26 is a flowchart illustrating another example of a process fortracking signal strength between the bridge 11 and a Bluetooth LE device21. While FIG. 26 illustrates exemplary steps according to oneembodiment, other embodiments may omit, add to, and/or modify any of thesteps shown in FIG. 26.

The process of FIG. 26 begins by measuring the signal strength betweenthe bridge 11 and a Bluetooth LE device 21 at step 410. The signalstrength may be measured in any of the ways discussed above, includingmeasuring the power of downstream wireless signals being received fromthe cloud lock access services relative to bridge 11 and a Bluetooth LEdevice 21. Step 410 may be initiated in accordance with a predefinedschedule or in response to a predetermined event.

At step 420, it is determined whether the measured signal strength islower than a predetermined threshold. The predetermined threshold may bedefined by network operators and may be based on a desired level ofsignal power that provides effective signal strength. If it isdetermined at step 420 that the measured signal strength is not lowerthan the predetermined threshold, the process returns to step 410, atwhich step another measurement of signal strength is obtained eitherimmediately, according to an established schedule, or in response to apredetermined trigger event.

On the other hand, if it is determined at step 420 that the measuredsignal strength is lower than the predetermined threshold, the processcontinues at step 430. In one embodiment, at step 430, parameter data ofthe Bluetooth LE device 21 is determined. As non-limiting examples, theparameter data may include location, time, and/or velocity coordinatesassociated with the Bluetooth LE device 21 relative to the bridge 11.Step 430 may be performed in any of the ways discussed above, includingusing GPS signals to determine GPS coordinate data.

At step 440, it is determined whether the measured signal strength isadequate for transmission of data upstream to the cloud lock accessservices from the Bluetooth LE device 21. Step 440 may be performed bycomparing the measured signal strength to a predetermined transmissionthreshold, which may be defined by network operators based on a level ofsignal power that supports reliable upstream data transmissions from thewireless device.

If it is determined at step 440 that the measured signal strength isinadequate for transmission of data, the process continues at step 445.At step 445, the signal strength and parameter data are buffered forsubsequent transmission. Step 445 may be performed by storing the datato memory to maintain the data until it can be transmitted. In oneembodiment, from step 445, the process returns to step 410 to obtainanother measurement of signal strength. Multiple instances of data maybe buffered until signal strength becomes strong enough for the storeddata to be transmitted from the Bluetooth LE device 21. In other words,steps 410-440 may be repeated with different measurements being gatheredand stored for later transmission when the signal strength becomesstrong enough to support upstream transmissions.

If it is determined at step 440 that the measured signal strength isadequate for data transmission, the process continues to step 450. Atstep 450, the signal strength and parameter data are transmitted to thecloud lock access services. Step 450 may be performed in any of the waysdiscussed above, including using upstream control, communication, orout-of-band channels of the wireless network 144. The signal strengthand parameter data, and optionally additional data, may be combined toform network status data, which is transmitted to the cloud lock accessservices at step 450.

At step 460, the signal strength and parameter data are used to analyzeany number of parameters relative to Bluetooth LE device 21,particularly its location. The cloud is able to process the data in anyof the ways discussed above, including mapping the signal strength togeographic representations of the wireless network 144, based on theparameter data. A graphical representation may be generated toillustrate instances of measured signal strength plotted based oncorresponding parameter data.

FIG. 28 illustrates one embodiment of a triangulation algorithm forlocation estimation that can be used for the bridge 11, the intelligentdoor lock system 10 and a Bluetooth LE device 21. In one embodiment thetriangulation computes the location estimate by solving systems ofquadratic equations. In one embodiment the triangulation forms circleswhose centers are the locations of the transmitters, e.g., access pointsor base stations. Geometries other than circles can be used. In FIG. 28,the locations and RF characteristics of access points 1, 2, and 3 of thebridge 11, the intelligent door lock system 10 and the Bluetooth LEdevice 21 have been obtained at numerous known locations. Distances d1between the object and the access point 1, d2 between the bridge 11, theintelligent door lock system 10 and the Bluetooth LE device 21 and theaccess point 2, and d3 between them and the access point 3 arecalculated based on radio wave characteristics, e.g., TOA or TDOA. Itwill be appreciated than communication other than radio waves can beused.

Triangulation forms sets of circles. Each of the reference points,access points 1, 2 or 3, becomes the center of a circle, and thedistances between the object and the center, d1, d2 or d3, becomes theradius of that circle.

Triangulation estimates locations based on various intersection areasformed by these circles. If three formed circles meet at a single spot,that spot becomes the location estimate as a result of thetriangulation. However, as a practical matter, the three circles rarelywill meet at a single spot. More often, if the circles intersect, theywill intersect in multiple spots. In FIG. 28, the three circles have sixintersection points, P1, P2, P3, P4, P5 and P6. The triangulationalgorithm examines areas formed by the intersection points to obtain alocation estimate for the bridge 11, the intelligent door lock system 10and the Bluetooth LE device. Specifically, the triangle formed by P2, P4and P5 has the smallest area among all possible triangles formed bythese intersection points, and the centroid X of the triangle (P2, P4,P5) is the best location estimate of the object.

FIG. 29 illustrates the K-nearest neighbor averaging algorithm forlocation estimate, wherein K=5. Typically, K is larger than 2.Experimental analysis shows that K=3 gives the best performance. Let atriplet (Sa, Sb, Sc) represent a set of run-time signal strengthmeasurements at a location of interest from the bridge 11, theintelligent door lock system 10 and the Bluetooth LE device 21,represented as a, b, and c. Five triplets which have the least root meansquare (RMS) error in signal strength between the run-time and theoff-line measurements are found. The root mean square error in signalstrength is calculated as follows:rms=√{square root over((a−ai)2+(b−bi)2+(c−ci)2)}{square rootover((a−ai)2+(b−bi)2+(c−ci)2)}{square rootover((a−ai)2+(b−bi)2+(c−ci)2)}  (1)

wherein (Sa, Sb, Sc) represents off-line signal strength measurements atthe location of interest.

In particular, these five triplets are: signal strength triplet (a1, b1,c1) at position L1 (x1, y1) from a, b and c; signal strength triplet(a2, b2, c2) at position L2 (x2, y2) from a, b and c; and signalstrength triplet (a5, b5, c5) at position L5 (x5, y5) from a, b and c.L1, . . . , L5 are determined by using the location informationdatabase. The location information database for RF-based static sceneanalysis typically contains entries used to map RF signal metrics topositions (i.e., transfer from signal domain to space domain). Thepositions of these five locations are averaged to yield the locationestimate of the object as follows:L=(L1+L2+L3+L4+L5)/5  (2)

In one embodiment, the smallest M-polygon algorithm for locationestimate, wherein M=3. M is the number of access points, or basestations, used for the system. M=3 gives reasonably good performance forthe algorithm. The bridge 11, intelligent door lock system 10 andBluetooth LE device 21, represented as A, B, and C provide separatecandidate locations A1, A2, B1, B2, C1 and C2 that match best with theoff-line measurements. The algorithm then searches for the polygon thathas the smallest perimeter formed by candidate locations contributed byeach reference base station, wherein one and only one candidate fromeach base station must constitute a vertex of the polygon. In FIG. 29,candidate locations A1, B2 and C2 form the smallest perimeter polygon,in this case, a triangle. The final location estimate of the object isthe centroid X of the polygon:x=(A1+B2+C2)/3  (3)

In one embodiment the conventional static scene analysis maps from theradio signal domain to the space domain. The final estimate is typicallywithin a coordinate system. A main drawback of the static scene analysisis that it cannot effectively cope with the impact of errors in theradio signal domain. Due to interference and noise, objects at differentlocations might be represented similarly in the radio signal domain, aphenomenon called aliasing. The conventional methods cannot detectaliasing, and may provide these different locations with similarlocation estimates.

In one embodiment a selective fusion location estimation (SELFLOC)algorithm selectively combines or fuses multiple location informationsources to yield a combined estimate in a theoretically optimal manner.The SELFLOC algorithm is disclosed in U.S. patent application Ser. No.10/330,523, filed Dec. 27, 2002, which is incorporated herein byreference.

In one embodiment, an overview of the SELFLOC algorithm to fuse threeinformation sources 1, 2 and 3. Each input branch is individuallyweighted by one of the weights 1, 2, and 3. The sum of the weightedinput branches provides the SELFLOC estimate.

The branch weights 1, 2 and 3 are calibrated during the off-line stageusing error feedback. A minimum mean square error (MMSE) algorithm canbe used for SELFLOC weight training and calibration. As shown in FIG. 4,three location estimates available independently are to be fused, andx-coordinates of these estimates are X1, X2 and X3. The weights forthese input branches are w1, w2, and W3 respectively. Thus, the SELFLOCestimate X could be written as:X=w1·X1+w2·X2+w3·X3.Facial/Body Motion Detection

In one embodiment a facial and/or body motion expression detector isused to detect the intent of a person. In one embodiment a digital stillimage is acquired that includes a face and/or body motion. A group ofpixels is identified that corresponds to the face/body motion in thedigital still image. A collection of low resolution images is generatedin-camera, captured or otherwise obtained in-camera including multipleinstances of the face/body motion. The face/body motion is trackedwithin the collection of low resolution images. In one embodimentcropped versions are acquired of images of the collection including theface/body motion. Facial/body motion expression state information of theface/body motion is accumulated based on the cropped versions. Astatistical facial expression state of the face/body motion isclassified. One or more facial/body motion expression state-dependentoperations is/are initiated.

Embodiments of the invention employ in-camera training of newclassifiers (i.e., instead of reusing the exact detection classifiers),that are used for separating one face/body motion from another. Incertain embodiments, a binary classifier is built for face/body motionsthat are and/or should be recognized. This training means that upon userrequest samples of the target face/body motion are acquired by employinga face/body motion detection algorithm. These samples are then used aspositive samples for a binary classifier. Negative samples are eitherused from a small collection of generic face/body motions and/or fromother previously trained face/body motions, which are stored locally. Arelatively short classifier cascade is then trained.

In certain embodiments, the process may be repeated for face/bodymotions that the user selects for future recognition. In a typical liveview mode, the camera will run the tracking algorithm. A new detectedface/body motion will be compared against the classifiers in therelatively short cascade in the recognition database. Depending onclassifier responses and confidence accumulation, over several frames, avoting algorithm will choose one of the database face/body motions ordecide that the face/body motion does not belong to the recognition set.

In certain embodiments, information from the detection process is usedto adjust the recognition process. For one such embodiment, theadjustment of the recognition process is effected dynamically based onthe detector/tracker.

In accordance with various embodiments a particular face/body motion mayhave a number of recognition profiles, since the illumination conditionscan change the classifier responses quite significantly. When apreviously trained face/body motion is not correctly recognized under acertain condition, a new recognition profile can be added to thatface/body motion either automatically or upon user input.

In general, certain embodiments allow the use of detection classifiersto perform recognition based on detection probability. That is, theface/body motion detector probability output is used to re-scale theclassifiers for the recognizer. For one such embodiment, the detectorindicates if a face/body motion is a “strong” or “weak” face/body motionand then the result is boosted or suppressed in accordance with theindication.

For certain embodiments, facial/body motion expression detection worksas an add-on feature to the face/body motion tracking algorithm. It willreceive as input the face/body motion region in the form of a polygonsuch as a rectangle, or alternatively a square, rhombus, triangle,circle, or otherwise, as well as the already computed integral imagesand other available maps.

The facial/body motion expression detection algorithm will run a binaryclassifier on each of the tracked face/body motion regions and willdecide with a certain degree of confidence whether each of the face/bodymotions is smiling or not smiling. If the required confidence level toprovide an answer is not reached, the smiling-state of the face/bodymotion will be declared as uncertain or unknown. In certain embodiments,the prerequisites for the face/body motion may be that it should befrontal, with in-plane orientation close to 0, 90 or −90.

The facial/body motion expression classifier is the same type of chainwith Haar and census features as the face/body motion detector. Duringthe training part, it is learned to differentiate between positivesmiling samples and negative non-smiling samples. The samples areface/body motion crops which are obtained by running the face/bodymotion detector and by automatic cropping based on manual or automaticmarkings on images with face/body motions. The samples may have the sameupright orientation, with slight variations.

In an alternative embodiment of the system the samples could be mouthregion crops, which hold most of the useful information for facial/bodymotion expression classification. Such alternative system involves anadditional identification of the mouth region prior to the actualclassification. This can be done by running a feature based mouthdetector, or identifying the mouth by a maximum color saturation regionin the bottom half of the face/body motion or another alternativemethod. This general approach adds an extra level of uncertainty, butmay be advantageous in utilizing less data.

The training process may provide a binary classifier chain that candecide the smiling state for a whole face/body motion region as it isdelivered by the face/body motion detector. Facial/body motionexpression detection/classification may be executed on individualframes, but the logic spans over several frames as confidence is beingaccumulated in order to provide a consistent response for a certainface/body motion. On a particular frame, the facial/body motionexpression classifier runs only on face/body motion rectangles (or otherpolygons) coming directly from the detector, because these are bestcentered and fitted over the face/body motion, before the trackingalgorithm re-evaluates the rectangle position. The facial/body motionexpression classifier is also evaluated at several slightly shiftedpositions around the face/body motion region.

A confidence based on these neighboring classifications is summed up andthresholded. A smiling decision can be positive, negative orinconclusive. The classifier evaluation is done by the same engine asthe one running the face/body motion detector, but the facial/bodymotion expression classifiers are provided instead of the face/bodymotion ones. During a sequence of frames, a smiling confidence parameterassigned to each tracked face/body motion, is either incremented ordecremented for each positive or, respectively, negative facial/bodymotion expression response. This confidence parameter may be integer,and may be bound by upper and lower limits such that the smilingdecision is responsive enough, and will not lock in a certain state. Theconfidence parameter is updated after each facial/body motion expressionclassification (which occurs each frame or at an interval). The finalfacial/body motion expression state output for a face/body motion may beinquired at each frame (may be continuously output), and may be based onthe sign and the absolute value of the integer confidence parameter.

In accordance with certain embodiments, an algorithm is capable ofdetecting smiling frontal face/body motions, as in-camera applications.The algorithm could be viewed as a standalone feature of digital camerasfor facial/body motion expression detection (e.g., facial/body motionexpression or frown detection). Certain embodiments may also be employedin apparatuses or methods involving decisions or further actions basedon the presence of a smiling person and may include this algorithm as adecision algorithm.

In an alternative embodiment, Discreet Cosine Transforms (DCTs) areused.

In certain embodiments, the facial/body motion expression to be detectedis a facial/body motion expression. There may be two databases, one withfacial/body motion expressions, and the other with non-facial/bodymotion expression, greyscale images. A training algorithm is applied toeach database. For one embodiment, the steps of the training algorithmmay be identical or substantially the same for both databases. Crops maybe used including entire face/body motions or just mouth regions oranother subset at least including mouth regions, as outputted from aface/body motion detector. In alternative embodiments where blinks arebeing detected, then just eye region crops may be used or another subsetat least including one or both eyes.

Images are read from the database (e.g., as squared crops delivered bythe face/body motion detection algorithm). Then, for each image, thefollowing steps may be performed:

1. Re-dimension the image to 25×25 pixels. This can be effected usingbilinear interpolation, or alternatively bicubic splines.

2. Apply the 2DCT transform:

3. Set the pixels in the upper left corner of the transformed matrix(20% of the number of pixels on Ox times 20% of the number of pixels onOy) to 0.

This corresponds to removing the low frequency coefficients which arerelated to person features

4. Apply the 21DCT transform:

5. Set all the negative values to 0.

6. Apply an improved histogram equalization: ▪a. For each pixel, computethe mean of its horizontal, vertical and diagonal neighbors;

b. Sort pixels after their grey level, then after the computed mean;

c. Assign new levels of grey to each pixel;

d. Re-sort pixels in the original position.

The process will also work with conventional histogram equalization,though the quality of the results may be reduced.

7. Reshape the image to a vector (e.g. using vectorization).

For the whole database, after all images have been reshaped to vectors,perform the following steps:

8. Sort the vectors in 8 clusters using k-means. This is an arbitraryclustering that has been determined empirically to be sufficient toaffect an advantageous concept. In general, the clustering may bedifferent as will be appreciated by those skilled in the art.

9. Retain the cluster's centroids.

The training algorithm may be performed offline (i.e., the clustercentroids can be computed a priori and stored in a memory unit).

The following sequence may be applied for performing detection offacial/body motion expression or non-facial/body motion expressions (orblinks, etc.).

1. Load the cluster centroids.

2. Read the image to be classified.

3. If necessary, turn it to a grayscale image.

4. Re-dimension the image to 25×25 pixels.

5. Apply the 2DCT transform.

6. Set the pixels in the upper left corner of the transformed matrix(20% of the number of pixels on Ox times 20% of the number of pixels onOy) to 0.

7. Apply the 21DCT transform.

8. Set the negative values to 0.

9. Apply the improved histogram equalization.

10. Reshape the image to a vector.

11. Compute the Euclidian distances between the vector and all theclusters centroids.

12. Find the minimum distance.

13. Assign to the test image the same label (Facial/body motionexpression or NonFacial/body motion expression) as the images within theclosest cluster.

For certain embodiments, the number of clusters (e.g., 8 clusters foreach database) may be varied. Additionally, or alternatively, the numberof pixels made 0 after 2DCT (in this case 5×5 pixels) may be varied.

As will be appreciated by those skilled in the art, many alternativeembodiments of the invention are possible. For example, the principleembodiment describes a technique that determines the facial/body motionexpression/no-facial/body motion expression state of a face/body motionregion within a digital image. It is implicit that a face/body motiontracking/face/body motion detector has been run on the image and thatknowledge of the location of face/body motion region(s) within theanalyzed image is made available to the “facial/body motion expressiondetector”. This technique can be applied both within a digital cameragiven sufficient computing resources, and may be implemented partlywithin the camera (e.g. face/body motion detection) and partly outsidethe camera (e.g. facial/body motion expression detection using derivedand saved face/body motion detection information), or in certainembodiments both the face/body motion detection process and thefacial/body motion expression detection are used to post-processpreviously acquired images.

In one embodiment the digital camera may acquire a constant stream ofpreview and/or post-view images, and where a face/body motion trackingalgorithm is embodied within the camera, then information about thedetermined face/body motion regions within each frame of the previewstream is available on a real-time basis. Where the present algorithm issufficiently optimized, it can be applied in real-time either inparallel with, or sequentially following the application of theface/body motion tracker algorithm. Such an embodiment enables (i)improvements in the facial/body motion expression detection processitself and (ii) additional operational features to be provided to a userof the camera.

With respect to item (i) and referring to the computing of Euclidiandistances between the vector and cluster centroids, and to the findingof minimum distance per steps 11 & 12 of the above-described exemplaryembodiment, where such a real-time facial/body motion expressiondetection algorithm is implemented, it is possible to compute thefacial/body motion expression/no-facial/body motion expression state ofa tracked face/body motion region and to accumulate this stateinformation over multiple pre-acquisition frames. This enablesstatistical analysis of the facial/body motion expression/no-facial/bodymotion expression state of a face/body motion and is useful to avoidconfounding factors such as sudden changes in illumination and/orface/body motion pose which may degrade the accuracy of the facial/bodymotion expression detection algorithm. Thus, sudden inter-framefluctuations in the facial/body motion expression feature vector can beignored until the feature vector stabilizes.

In one embodiment in addition to calculating the facial/body motionexpression feature vector for each frame, and determining itsfacial/body motion expression/no-facial/body motion expression state,the algorithm calculates a difference vector between subsequent framesof the preview/postview image stream. Where this is greater than acertain threshold it may either be interpreted as indicating a suddenchange in external illumination or pose (which may be confirmed by theexposure determining subsystem of the camera for the case ofillumination, or by the face/body motion-lock characterization of theface/body motion tracking algorithm) or it may be interpreted as atransition between facial/body motion expression and no-facial/bodymotion expression states (which may be confirmed by analysis ofsubsequent preview/postview frames).

In alternative embodiments, a running average of the facial/body motionexpression feature vector may be calculated and this averaged featurevector is used to determine the facial/body motionexpression/no-facial/body motion expression state of a face/body motionregion over multiple preview frames.

In yet a further embodiment, the distances between the currentfacial/body motion expression feature vector and both the nearestfacial/body motion expression centroid and the nearest no-facial/bodymotion expression centroid are calculated for each preview frame. Theratio between these two distances is analyzed statistically over severalframes and used to determine a facial/body motionexpression/no-facial/body motion expression probability measure ratherthan a simple facial/body motion expression/no-facial/body motionexpression state measure. Thus where a facial/body motion expressionfeature vector is a normalized distance of 0.2 from the nearestfacial/body motion expression centroid and a distance of 0.8 from thenearest no-facial/body motion expression centroid it is 80% likely to bea facial/body motion expression or 20% likely to be not a facial/bodymotion expression. In a variation on this embodiment the log of thenormalized distance is used to calculate a probability rather than thenormalized distance itself.

With respect to item (ii) above, where the facial/body motion expressiondetection process is operable on a preview/post-view stream, it ispossible to monitor state transitions of tracked face/body motionregions. This enables, for example, a camera to implement an improved“group shot” feature, where an image is captured when everyone in apreview frame is determined to be smiling.

In other embodiments, the camera could issue a warning beep if one ormore people are not smiling (the “facial/body motion expressionguarantee” feature); or acquisition could delayed until everyone (or aplurality or certain percentage or certain number) are determined to besmiling.

In embodiments where additional image reconstruction and/or compositingand/or super-resolution algorithms are available within the camera thenface/body motion regions, or portions thereof, from one or more previewframes may be combined with the main acquired image to ensure that afinal, composited image presents the “best facial/body motionexpression” for each detected face/body motion. The judging of thequality of a facial/body motion expression may be achieved using afacial/body motion expression/no-facial/body motion expressionprobability as described above.

Metadata relating to the facial/body motion expression/no-facial/bodymotion expression state or facial/body motion expression probability maybe stored/saved with other information relating to the relevant trackedface/body motion region.

The foregoing description of various embodiments of the claimed subjectmatter has been provided for the purposes of illustration anddescription. It is not intended to be exhaustive or to limit the claimedsubject matter to the precise forms disclosed. Many modifications andvariations will be apparent to the practitioner skilled in the art.Particularly, while the concept “component” is used in the embodimentsof the systems and methods described above, it will be evident that suchconcept can be interchangeably used with equivalent concepts such as,class, method, type, interface/body motion, module, object model, andother suitable concepts. Embodiments were chosen and described in orderto best describe the principles of the invention and its practicalapplication, thereby enabling others skilled in the relevant art tounderstand the claimed subject matter, the various embodiments and withvarious modifications that are suited to the particular usecontemplated.

What is claimed is:
 1. A wireless access control system to lock orunlock a first door at a dwelling, comprising: a remote access devicetransmitting a first signal and a second signal; the user remote accessdevice in communication with a door lock system that controlstransmission of displacement or rotational mechanical energy of a doorlock system drive shaft, the drive shaft associated with the first doorand assists in locking and unlocking a bolt in response to receiving thefirst signal, the bolt coupled to the first door with the bolt coupledto the drive shaft, in operation the bolt locks and unlocks the firstdoor, the door lock system including an energy source coupled to anapparatus that controls transmission of displacement or rotationalmechanical energy for the door lock system drive shaft, the door locksystem further including a wireless communication device; the userremote access device in communication with a second lock at a vehicle ofthe user or at an office of the user, # in response to the second signalthe second lock is locked or unlocked; and wherein the remote accessdevice has a controller for generating the first and second signals. 2.The system of claim 1, wherein the first and second signals aredifferent.
 3. The system of claim 1, wherein the first and secondsignals are the same.
 4. The system of claim 1, wherein the user remoteaccess device includes audio circuitry.
 5. The system of claim 1,wherein the user remote access device includes a speaker.
 6. The systemof claim 1, wherein the speaker converts an electrical signal to a humanaudible sound.
 7. The system of claim 5, wherein the user remote accessdevice includes a microphone.
 8. The system of claim 1, wherein the userremote access device includes a touch screen.
 9. The system of claim 8,wherein the user remote access device includes a display controller. 10.The system of claim 8, wherein the touch screen has a touch-sensitivesurface.
 11. The system of claim 1, wherein the user remote accessdevice includes a touchpad.
 12. The system of claim 1, wherein theremote access device includes a power system.
 13. The system of claim12, wherein the remote access device includes a power management system.14. The system of claim 1, wherein the remote access device includes oneor more sensors.
 15. The system of claim 1, wherein the remote accessdevice includes an optical sensor.
 16. The system of claim 1, whereinthe remote access device includes a proximity sensor.
 17. The system ofclaim 1, wherein the remote access device is a mobile device.