Technologies for associating an offline Wi-Fi system with a wireless access point

ABSTRACT

A method according to one embodiment includes establishing, by Bluetooth Low Energy (BLE) circuitry of an access control device, a BLE communication connection with a first mobile device while a main microprocessor and a Wi-Fi circuitry of the access control device are in sleep states; waking, by the access control device, the Wi-Fi circuitry of the access control device from the sleep state in response to establishing the BLE communication connection with the mobile device; establishing, by the Wi-Fi circuitry of the access control device, a Wi-Fi communication connection with an access control server in response to waking the Wi-Fi circuitry from the sleep state; and receiving, by the access control device and from the access control server via the Wi-Fi communication connection, access control data for the access control device transmitted from a second mobile device to the access control server.

CROSS-REFERENCE TO RELATED APPLICATIONS

The present application is a continuation of U.S. patent applicationSer. No. 16/369,916 filed Mar. 29, 2019 and issued as U.S. Pat. No.10,548,084, the contents of which are incorporated herein by referencein their entirety.

BACKGROUND

The IEEE 802.11 standard outlines specific protocols for implementingWi-Fi-based wireless local area network (WLAN) communications. TheBluetooth Special Interest Group (SIG) develops and outlines thestandards for implementing Bluetooth communication. According to the802.11 standard, a wireless network station device initiates theconnection to a wireless access point, which is in contrast to aBluetooth network, in which the central device initiates the connectionto a peripheral device. As such, if a wireless network station deviceneeds to communicate via the Internet, it must already be associatedwith a wireless access point. Power-sensitive Wi-Fi devices generallydisassociate from provisioned access points when there is no data totransfer over a network and, therefore, some trigger is generally neededto cause the device to re-associate with the access point. For example,a user typically must physically interact with a station (e.g., via amechanical button) to initiate the station to connection to a wirelessaccess point.

SUMMARY

One embodiment is directed to a unique system, components, and methodsfor associating Wi-Fi circuitry of an access control device with awireless access point and communicating data to the access controldevice. Other embodiments are directed to apparatuses, systems, devices,hardware, methods, and combinations thereof for associating Wi-Ficircuitry of an access control device with a wireless access point andcommunicating data to the access control device. This summary is notintended to identify key or essential features of the claimed subjectmatter, nor is it intended to be used as an aid in limiting the scope ofthe claimed subject matter. Further embodiments, forms, features, andaspects of the present application shall become apparent from thedescription and figures provided herewith.

BRIEF DESCRIPTION OF THE DRAWINGS

The concepts described herein are illustrative by way of example and notby way of limitation in the accompanying figures. For simplicity andclarity of illustration, elements illustrated in the figures are notnecessarily drawn to scale. Where considered appropriate, referenceslabels have been repeated among the figures to indicate corresponding oranalogous elements.

FIG. 1 is a simplified block diagram of at least one embodiment of anaccess control system;

FIG. 2 is a simplified block diagram of at least one embodiment of acomputing system;

FIG. 3 is a simplified block diagram of at least one embodiment of anaccess control device of the system of FIG. 1;

FIG. 4 is a simplified flow diagram of at least one embodiment of amethod for communicating commands for an access control device from amobile device to a server of the system of FIG. 1; and

FIGS. 5 and 6 are a simplified flow diagram of at least one embodimentof a method for associating Wi-Fi circuitry of an access control devicewith a wireless access point and communicating data to the accesscontrol device of the system of FIG. 1.

DETAILED DESCRIPTION

Although the concepts of the present disclosure are susceptible tovarious modifications and alternative forms, specific embodiments havebeen shown by way of example in the drawings and will be describedherein in detail. It should be understood, however, that there is nointent to limit the concepts of the present disclosure to the particularforms disclosed, but on the contrary, the intention is to cover allmodifications, equivalents, and alternatives consistent with the presentdisclosure and the appended claims.

References in the specification to “one embodiment,” “an embodiment,”“an illustrative embodiment,” etc., indicate that the embodimentdescribed may include a particular feature, structure, orcharacteristic, but every embodiment may or may not necessarily includethat particular feature, structure, or characteristic. Moreover, suchphrases are not necessarily referring to the same embodiment. It shouldfurther be appreciated that although reference to a “preferred”component or feature may indicate the desirability of a particularcomponent or feature with respect to an embodiment, the disclosure isnot so limiting with respect to other embodiments, which may omit such acomponent or feature. Further, when a particular feature, structure, orcharacteristic is described in connection with an embodiment, it issubmitted that it is within the knowledge of one skilled in the art toimplement such feature, structure, or characteristic in connection withother embodiments whether or not explicitly described. Additionally, itshould be appreciated that items included in a list in the form of “atleast one of A, B, and C” can mean (A); (B); (C); (A and B); (B and C);(A and C); or (A, B, and C). Similarly, items listed in the form of “atleast one of A, B, or C” can mean (A); (B); (C); (A and B); (B and C);(A and C); or (A, B, and C). Further, with respect to the claims, theuse of words and phrases such as “a,” “an,” “at least one,” and/or “atleast one portion” should not be interpreted so as to be limiting toonly one such element unless specifically stated to the contrary, andthe use of phrases such as “at least a portion” and/or “a portion”should be interpreted as encompassing both embodiments including only aportion of such element and embodiments including the entirety of suchelement unless specifically stated to the contrary.

The disclosed embodiments may, in some cases, be implemented inhardware, firmware, software, or a combination thereof. The disclosedembodiments may also be implemented as instructions carried by or storedon one or more transitory or non-transitory machine-readable (e.g.,computer-readable) storage media, which may be read and executed by oneor more processors. A machine-readable storage medium may be embodied asany storage device, mechanism, or other physical structure for storingor transmitting information in a form readable by a machine (e.g., avolatile or non-volatile memory, a media disc, or other media device).

In the drawings, some structural or method features may be shown inspecific arrangements and/or orderings. However, it should beappreciated that such specific arrangements and/or orderings may not berequired. Rather, in some embodiments, such features may be arranged ina different manner and/or order than shown in the illustrative figuresunless indicated to the contrary. Additionally, the inclusion of astructural or method feature in a particular figure is not meant toimply that such feature is required in all embodiments and, in someembodiments, may not be included or may be combined with other features.

Referring now to FIG. 1, in the illustrative embodiment, an accesscontrol system 100 for associating Wi-Fi circuitry of an access controldevice with a wireless access point and communicating data to the accesscontrol device includes a mobile device 102, a network 104, a server106, an access control device 108, and a wireless access point 110.Although only one mobile device 102, one network 104, one server 106,one access control device 108, and one wireless access point 110 areshown in the illustrative embodiment of FIG. 1, the access controlsystem 100 may include multiple mobile devices 102, networks 104,servers 106, access control devices 108, and/or wireless access points110 in other embodiments. For example, in some embodiments, one mobiledevice 102 may communicate access control data and/or commandinformation for a particular access control device 108, whereas anothermobile device 102 may establish a Bluetooth Low Energy (BLE)communication connection with the access control device 108, causing theaccess control device 108 to activate its Wi-Fi circuitry and establisha Wi-Fi communication connection with the server 106 as describedherein. Further, in some embodiments, the functions described herein asbeing performed by the server 106 may be performed by a distributednetwork of servers 106 (e.g., cloud servers operating in a cloudcomputing environment 114).

It should be appreciated that the system 100 and technologies describedherein allow an access control device to be triggered by a Bluetoothcentral device to associate with a wireless access point and therebyperform Wi-Fi communications. Accordingly, the system 100 addressesdeficiencies in the Wi-Fi station/access point architecture, allowing astation to be triggered to associate with an access point. It should befurther appreciated that for synchronization and bandwidthconsiderations, for example, the server 106 may function as a singlesource of information such that the access control device 108communicates with the server 106 for data received from the mobiledevice 102 (e.g., via Wi-Fi) rather than communicating directly with themobile device 102 (e.g., via Bluetooth). As such, the access controldevice 108 may retrieve relevant data from the server 106 even if themobile device 102 is nearby the access control device 108 (e.g., withBluetooth range).

As described in greater detail below, the mobile device 102 transmitsaccess control data and/or command data to the server 106 that isintended to be transmitted to a particular access control device 108. Assuch, the server 106 stores that data in association with the particularaccess control device 108. Upon subsequently interacting with a mobiledevice 102 (e.g., the same mobile device 102 that transmitted the accesscontrol data and/or command data or a different mobile device 102), themobile device 102 establishes a BLE communication connection with theaccess control device 108 while a main microprocessor and Wi-Ficommunication circuitry of the access control device 108 are in sleepstates (e.g., low power states), which causes the Wi-Fi circuitry towake from the sleep state to establish a Wi-Fi communication connectionwith the server 106. Thereafter, the access control device 108 mayreceive any relevant access control data and/or command data from theserver 106. Further, in some embodiments, the access control device 108may transmit audit data associated with the access control device 108 tothe server 106.

It should be appreciated that the mobile device 102, the server 106, theaccess control device 108, and/or the wireless access point 110 may beembodied as any type of device or collection of devices suitable forperforming the functions described herein. More specifically, in theillustrative embodiment, the mobile device 102 may be embodied as anytype of device capable of communicating with the server 106 to transmitaccess control data and/or command data to the server 106 and/or capableof establishing a BLE communication connection with the access controldevice 108. As described above, it should be appreciated that the mobiledevice 102 transmitting the data to the server 106 and the mobile device102 establishing a BLE connection with the access control device 108 totrigger its Wi-Fi connection with the server 106 may be the same mobiledevice 102 or different mobile devices 102 depending on the particularembodiment. However, for brevity of the description and without loss ofgenerality, it should be appreciated that the mobile devices 102 may bereferred to herein as being the same.

As shown in FIG. 1, the mobile device 102 includes an application 112that enables the mobile device 102 to communicate various access controldata and/or commands to the server 106 for subsequent transmission tothe access control device 108. It should be appreciated that theapplication 112 may be embodied as any suitable application forperforming the functions described herein. For example, in someembodiments, the application 112 may be embodied as a mobile application(e.g., smartphone application). In some embodiments, it should beappreciated that the application 112 may serve as a client-side userinterface for a web-based application or service of the server 106.

The network 104 may be embodied as any type of communication networkcapable of facilitating communication between the various devices of thesystem 100. As such, the network 104 may include one or more networks,routers, switches, computers, and/or other intervening devices. Forexample, the network 104 may be embodied as or otherwise include one ormore cellular networks, telephone networks, local or wide area networks,publicly available global networks (e.g., the Internet), ad hocnetworks, short-range communication links, or a combination thereof.

The server 106 may be embodied as any type of device(s) capable ofperforming the functions described herein. In some embodiments, theserver 106 may be configured to manage credentials of the access controlsystem 100. For example, depending on the particular embodiment, theserver 106 may be responsible for ensuring that the access controldevices 108 have updated authorized credentials, whitelists, blacklists,device parameters, and/or other suitable data. Additionally, in someembodiments, the server 106 may receive audit data (e.g., security data,raw sensor data, usage data, and/or other relevant audit data) from theaccess control devices 108 for management of the access control system100. In some embodiments, it should be appreciated that the server 106may be configured to communicate with multiple access control devices108 at a single site (e.g., a particular building) and/or acrossmultiple sites. That is, in such embodiments, the server 106 may beconfigured to receive data from access control devices 108 distributedacross a single building, multiple buildings on a single campus, oracross multiple locations.

It should be further appreciated that, although the server 106 isdescribed herein as a computing device outside of a cloud computingenvironment, in other embodiments, the server 106 may be embodied as acloud-based device or collection of devices within a cloud computingenvironment 114. Further, in cloud-based embodiments, the server 106 maybe embodied as a “serverless” or server-ambiguous computing solution,for example, that executes a plurality of instructions on-demand,contains logic to execute instructions only when prompted by aparticular activity/trigger, and does not consume computing resourceswhen not in use. That is, the server 106 may be embodied as a virtualcomputing environment residing “on” a computing system (e.g., adistributed network of devices) in which various virtual functions(e.g., Lamba functions, Azure functions, Google cloud functions, and/orother suitable virtual functions) may be executed corresponding with thefunctions of the server 106 described herein. For example, when an eventoccurs (e.g., data is transferred to the server 106 for handling), thevirtual computing environment may be communicated with (e.g., via arequest to an API of the virtual computing environment), whereby the APImay route the request to the correct virtual function (e.g., aparticular server-ambiguous computing resource) based on a set of rules.As such, when a request for the transmission of access control data ismade (e.g., via an appropriate user interface to the server 106), theappropriate virtual function(s) may be executed to perform the actionsbefore eliminating the instance of the virtual function(s).

The access control device 108 may be embodied as any type of devicecapable of controlling access through a passageway. For example, invarious embodiments, the access control device 108 may be embodied as anelectronic lock (e.g., a mortise lock, a cylindrical lock, or a tubularlock), an exit device (e.g., a pushbar or pushpad exit device), a doorcloser, an auto-operator, a motorized latch/bolt (e.g., for a slidingdoor), barrier control device (e.g., battery-powered), or a peripheralcontroller of a passageway. It should be further appreciated that theaccess control device 108 may include a lock mechanism configured tocontrol access through the passageway and/or other components typical ofa lock device. For example, the lock mechanism may include a deadbolt,latch bolt, level, and/or other mechanism adapted to move between alocked state and an unlocked state. In the illustrative embodiment, theaccess control device 108 is configured to communicate with the server106 to receive access control data and/or command data from the mobiledevice 102 (e.g., to lock or unlock a lock mechanism). Additionally, asdescribed in reference to FIG. 3, the illustrative access control device108 includes, among other components, a BLE circuitry 302, a mainmicroprocessor 304, and a Wi-Fi circuitry 306. In other embodiments,however, rather than forming separate circuitries, it should beappreciated that the BLE circuitry 302, the main microprocessor 304, andthe Wi-Fi circuitry 306 may be composed/decomposed in any other physicalconfiguration/combination consistent with the techniques describedherein.

The wireless access point 110 may be embodied as any one or more devicesthat, individually or collectively, allow Wi-Fi devices to connect to awired network and/or the Internet. For example, in some embodiments, thewireless access point 110 may be embodied as a gateway device that iscommunicatively coupled to a router. In other embodiments, the wirelessaccess point 110 may form an integral component of or otherwise form aportion of the router itself. For simplicity and clarity of thedescription, the wireless access point 110 is described herein as beingcommunicatively coupled to the Internet.

It should be appreciated that each of the mobile device 102, the server106, the access control device 108, and/or the wireless access point 110may be embodied as one or more computing devices similar to thecomputing device 200 described below in reference to FIG. 2. Forexample, in the illustrative embodiment, each of the mobile device 102,the server 106, the access control device 108, and the wireless accesspoint 110 includes a processing device 202 and a memory 206 havingstored thereon operating logic 208 (e.g., a plurality of instructions)for execution by the processing device 202 for operation of thecorresponding device.

Referring now to FIG. 2, a simplified block diagram of at least oneembodiment of a computing device 200 is shown. The illustrativecomputing device 200 depicts at least one embodiment of a mobile device,server, access control device, and/or wireless access point that may beutilized in connection with the mobile device 102, the server 106, theaccess control device 108, and/or the wireless access point 110illustrated in FIG. 1. Depending on the particular embodiment, thecomputing device 200 may be embodied as a mobile computing device,server, access control device, desktop computer, laptop computer, tabletcomputer, notebook, netbook, Ultrabook™, cellular phone, smartphone,wearable computing device, personal digital assistant, Internet ofThings (IoT) device, control panel, processing system, wireless accesspoint, router, gateway, and/or any other computing, processing, and/orcommunication device capable of performing the functions describedherein.

The computing device 200 includes a processing device 202 that executesalgorithms and/or processes data in accordance with operating logic 208,an input/output device 204 that enables communication between thecomputing device 200 and one or more external devices 210, and memory206 which stores, for example, data received from the external device210 via the input/output device 204.

The input/output device 204 allows the computing device 200 tocommunicate with the external device 210. For example, the input/outputdevice 204 may include a transceiver, a network adapter, a network card,an interface, one or more communication ports (e.g., a USB port, serialport, parallel port, an analog port, a digital port, VGA, DVI, HDMI,FireWire, CAT 5, or any other type of communication port or interface),and/or other communication circuitry. Communication circuitry of thecomputing device 200 may be configured to use any one or morecommunication technologies (e.g., wireless or wired communications) andassociated protocols (e.g., Ethernet, Bluetooth®, Wi-Fi®, WiMAX, etc.)to effect such communication depending on the particular computingdevice 200. The input/output device 204 may include hardware, software,and/or firmware suitable for performing the techniques described herein.

The external device 210 may be any type of device that allows data to beinputted or outputted from the computing device 200. For example, invarious embodiments, the external device 210 may be embodied as themobile device 102, the server 106, the access control device 108, and/orthe wireless access point 110. Further, in some embodiments, theexternal device 210 may be embodied as another computing device, switch,diagnostic tool, controller, printer, display, alarm, peripheral device(e.g., keyboard, mouse, touch screen display, etc.), and/or any othercomputing, processing, and/or communication device capable of performingthe functions described herein. Furthermore, in some embodiments, itshould be appreciated that the external device 210 may be integratedinto the computing device 200.

The processing device 202 may be embodied as any type of processor(s)capable of performing the functions described herein. In particular, theprocessing device 202 may be embodied as one or more single ormulti-core processors, microcontrollers, or other processor orprocessing/controlling circuits. For example, in some embodiments, theprocessing device 202 may include or be embodied as an arithmetic logicunit (ALU), central processing unit (CPU), digital signal processor(DSP), and/or another suitable processor(s). The processing device 202may be a programmable type, a dedicated hardwired state machine, or acombination thereof. Processing devices 202 with multiple processingunits may utilize distributed, pipelined, and/or parallel processing invarious embodiments. Further, the processing device 202 may be dedicatedto performance of just the operations described herein, or may beutilized in one or more additional applications. In the illustrativeembodiment, the processing device 202 is programmable and executesalgorithms and/or processes data in accordance with operating logic 208as defined by programming instructions (such as software or firmware)stored in memory 206. Additionally or alternatively, the operating logic208 for processing device 202 may be at least partially defined byhardwired logic or other hardware. Further, the processing device 202may include one or more components of any type suitable to process thesignals received from input/output device 204 or from other componentsor devices and to provide desired output signals. Such components mayinclude digital circuitry, analog circuitry, or a combination thereof.

The memory 206 may be of one or more types of non-transitorycomputer-readable media, such as a solid-state memory, electromagneticmemory, optical memory, or a combination thereof. Furthermore, thememory 206 may be volatile and/or nonvolatile and, in some embodiments,some or all of the memory 206 may be of a portable type, such as a disk,tape, memory stick, cartridge, and/or other suitable portable memory. Inoperation, the memory 206 may store various data and software usedduring operation of the computing device 200 such as operating systems,applications, programs, libraries, and drivers. It should be appreciatedthat the memory 206 may store data that is manipulated by the operatinglogic 208 of processing device 202, such as, for example, datarepresentative of signals received from and/or sent to the input/outputdevice 204 in addition to or in lieu of storing programming instructionsdefining operating logic 208. As shown in FIG. 2, the memory 206 may beincluded with the processing device 202 and/or coupled to the processingdevice 202 depending on the particular embodiment. For example, in someembodiments, the processing device 202, the memory 206, and/or othercomponents of the computing device 200 may form a portion of asystem-on-a-chip (SoC) and be incorporated on a single integratedcircuit chip.

In some embodiments, various components of the computing device 200(e.g., the processing device 202 and the memory 206) may becommunicatively coupled via an input/output subsystem, which may beembodied as circuitry and/or components to facilitate input/outputoperations with the processing device 202, the memory 206, and othercomponents of the computing device 200. For example, the input/outputsubsystem may be embodied as, or otherwise include, memory controllerhubs, input/output control hubs, firmware devices, communication links(i.e., point-to-point links, bus links, wires, cables, light guides,printed circuit board traces, etc.) and/or other components andsubsystems to facilitate the input/output operations.

The computing device 200 may include other or additional components,such as those commonly found in a typical computing device (e.g.,various input/output devices and/or other components), in otherembodiments. It should be further appreciated that one or more of thecomponents of the computing device 200 described herein may bedistributed across multiple computing devices. In other words, thetechniques described herein may be employed by a computing system thatincludes one or more computing devices. Additionally, although only asingle processing device 202, I/O device 204, and memory 206 areillustratively shown in FIG. 2, it should be appreciated that aparticular computing device 200 may include multiple processing devices202, I/O devices 204, and/or memories 206 in other embodiments. Further,in some embodiments, more than one external device 210 may be incommunication with the computing device 200.

As used herein, “Bluetooth” includes traditional Bluetooth BasicRate/Enhanced Rate (BR/EDR) technology and Bluetooth Low Energy (BLE)technology and refers to one or more components, architectures,communication protocols, and/or other systems, structures, or processesdefined by and/or compliant with one or more Bluetooth specifications,addendums, and/or supplements overseen by the Bluetooth Special InterestGroup (SIG) including, for example, active, legacy, withdrawn,deprecated, and/or subsequently introduced Bluetooth Core Specifications(CSs) (Bluetooth CS Version 1.0B, Bluetooth CS Version 1.1, Bluetooth CSVersion 1.2, Bluetooth CS Version 2.0+EDR, Bluetooth CS Version 2.1+EDR,Bluetooth CS Version 3.0+HS, Bluetooth CS Version 4.0, Bluetooth CSVersion 4.1, Bluetooth CS Version 4.2, Bluetooth CS Version 5.0);active, legacy, withdrawn, deprecated, and/or subsequently introducedBluetooth Core Specification Addendums (CSAs) (Bluetooth CSA Version 1,Bluetooth CSA Version 2, Bluetooth CSA Version 3, Bluetooth CSA Version4, Bluetooth CSA Version 5, Bluetooth CSA Version 6); Bluetooth CoreSpecification Supplements (CSSs) (Bluetooth CSS Version 1, Bluetooth CSSVersion 2, Bluetooth CSS Version 3, Bluetooth CSS Version 4, BluetoothCSS Version 5, Bluetooth CSS Version 6, Bluetooth CSS Version 7);active, legacy, withdrawn, deprecated, and/or subsequently introducedBluetooth Mesh Networking Specifications (Bluetooth Mesh ProfileSpecification 1.0, Bluetooth Mesh Model Specification 1.0, BluetoothMesh Device Properties 1.0); active, legacy, withdrawn, deprecated,and/or subsequently introduced Bluetooth Traditional ProfileSpecifications (3DSP, A2DP, AVRCP, BIP, BPP, CTN, DI, DUN, FTP, GAVDP,GNSS, GOEP, GPP, HCRP, HDP, HFP, HID, HSP, MAP, MPS, OPP, PAN, PBAP,SAP, SPP, SYNCH, VDP); active, legacy, withdrawn, deprecated, and/orsubsequently introduced Bluetooth Protocol Specifications (AVCTP, AVDTP,BNEP, IrDA, MCAP, RFCOMM, 3WIRE, SD, TCP, UART, USB, WAPB); active,legacy, withdrawn, deprecated, and/or subsequently introduced BluetoothGeneric Attribute Profile (GATT) services, characteristics,declarations, descriptors, and profiles (ANP, ANS, AIOP, AIOS, BAS, BCS,BLP, BLS, BMS, CGMP, CGMS, CPP, CPS, CSCP, CSCS, CTS, DIS, ESP, ESS,FMP, FTMP, FTMS, GSS, GLP, GLS, HIDS, HOGP, HPS, HRP, HRS, HTP, HTS,IAS, IDP, IDS, IPS, IPSP, LLS, LNP, LNS, NDCS, OTP, OTS, PASP, PASS,PXP, PLXP, PLXS, RCP, RCS, RSCP, RSCS, TRUS, ScPP, ScPS, TDS, TIP, TPS,UDS, WSP, WSS); and/or other Bluetooth specifications, addendums, and/orsupplements.

It should be further appreciated that the access control device 108 mayinclude, more specifically, a BLE circuitry 302, a main microprocessor304, and a Wi-Fi circuitry 306 as shown in FIG. 3.

The BLE circuitry 302 may be embodied as or include any type ofcircuitry or collection of circuitries (e.g., chipsets) suitable forperforming Bluetooth communication (e.g., BLE communication) with otherdevices in the system 100 (e.g., mobile devices 102) and otherwiseperforming the functions described herein. Although described herein asbeing “BLE” circuitry in the illustrative embodiment, it should beappreciated that the circuitry 302 may be embodied as traditionalBluetooth Basic Rate/Enhanced Rate (BR/EDR) communication circuitry inother embodiments. Further, depending on the particular embodiment, theBLE circuitry 302 may be compliant with any one or more of the Bluetoothspecifications set forth herein or newer.

The main microprocessor 304 may be embodied as or include any type ofdevice or collection of devices capable of processing data and otherwiseperforming the functions described herein. For example, in someembodiments, the main microprocessor 304 may be embodied as a processingdevice similar to the processing device 202 of FIG. 2. Further, itshould be appreciated that the main microprocessor 304 may be configuredto operate in multiple power states. For example, in the illustrativeembodiment, the main microprocessor 304 is configured to operate in anormal power state and a low power sleep state that consumes less powerthan the normal power state. In other embodiments, it should beappreciated that the main microprocessor 304 may be configured tooperate in more than two power states (e.g., having multiple low powerstates).

The Wi-Fi circuitry 306 may be embodied as or include any type ofcircuitry or collection of circuitries (e.g., chipsets) suitable forperforming Wi-Fi-based communication with other devices in the system100 (e.g., the wireless access point 110). As described herein, itshould be appreciated that the Wi-Fi circuitry 306 may be configured tooperate in multiple power states. For example, in the illustrativeembodiment, the Wi-Fi circuitry 306 is configured to operate in a normalpower state and a low power sleep state that consumes less power thanthe normal power state. In other embodiments, it should be appreciatedthat the Wi-Fi circuitry 306 may be configured to operate in more thantwo power states (e.g., having multiple low power states). Althoughdescribed herein by the same name for simplicity, it should beappreciated that the normal and low power sleep states of the mainmicroprocessor 304 and the Wi-Fi circuitry 306 may be different powerstates, for example, having different levels of power consumption.Further, as indicated above, rather than forming separate circuitries,it should be appreciated that the BLE circuitry 302, the mainmicroprocessor 304, and the Wi-Fi circuitry 306 may becomposed/decomposed in another suitable physicalconfiguration/combination in other embodiments.

Referring now to FIG. 4, in use, the system 100 may execute a method 400for communicating commands for the access control device 108 from themobile device 102 to the server 106. It should be appreciated that theparticular blocks of the method 400 are illustrated by way of example,and such blocks may be combined or divided, added or removed, and/orreordered in whole or in part depending on the particular embodiment,unless stated to the contrary. The illustrative method 400 begins withblock 402 in which the mobile device 102 determines one or more commandsand/or other access control data to be issued/sent to the access controldevice 108. It should be appreciated that the particular commands and/oraccess control data may vary depending on the particular embodiment. Forexample, the commands may include a command to unlock a lock mechanismof the access control device 108, lock a lock mechanism of the accesscontrol device 108, retrieve a firmware update for the access controldevice 108, retrieve updated access control permissions, retrieveupdated access control schedules, and/or other suitable commands/data.Further, in some embodiments, the mobile device 102 may determine oridentify relevant credential data associated with a user of the mobiledevice 102 and/or the mobile device 102 itself.

In block 404, the mobile device 102 establishes a wireless communicationconnection with the server 106 for transmission of the command(s) and/oraccess control data. It should be appreciated that the wirelesscommunication connection may be established according to any suitablecommunication protocol and/or using any suitable networks (e.g.,cellular communication, Internet-based communication, etc.). In block406, the mobile device 102 transmits the determined command(s) and/oraccess control data to the server 106. Further, in some embodiments, itshould be appreciated that the server 106 may authenticate the mobiledevice 102 and/or its user. Accordingly, the mobile device 102 maytransmit any relevant credential data, PIN data, and/or otherauthentication data, and the mobile device 102 and server 106 mayexecute a suitable authentication algorithm. It should be appreciatedthat, in some embodiments, one or more other wired and/or wirelesstechniques may be used to transmit commands to the server 106 (e.g., viaweb application, Postman, or another suitable technology or protocol).

In block 408, the server 106 stores the received command(s) and/oraccess control data in association with the access control device 108.For example, the server 106 may utilize a database that stores thereceived command(s) and/or access control data and associates the storeddata with the relevant access control device 108 such that it can besubsequently retrieved by the access control device 108 as describedherein.

Although the blocks 402-408 are described in a relatively serial manner,it should be appreciated that various blocks of the method 400 may beperformed in parallel in some embodiments. Further, it should beappreciated that, in other embodiments, the system 100 may execute adifferent method for communicating commands for the access controldevice 108 to the server 106.

Referring now to FIGS. 5-6, in use, the system 100 may execute a method500 for associating the Wi-Fi circuitry 306 of the access control device108 with the wireless access point 110 and communicating access controldata to the access control device 108. It should be appreciated that theparticular blocks of the method 500 are illustrated by way of example,and such blocks may be combined or divided, added or removed, and/orreordered in whole or in part depending on the particular embodiment,unless stated to the contrary. In the illustrative embodiment, themethod 500 is commenced when the main microprocessor 304 and the Wi-Ficircuitry 306 of the access control device 108 are in corresponding lowpower sleep states.

The illustrative method 500 begins with block 502 of FIG. 5 in which theaccess control device 108 establishes a BLE connection with a mobiledevice 102 (e.g., the mobile device 102 described in reference to themethod 400 of FIG. 4 or a different mobile device 102). For example, amobile device 102 may come within BLE communication range of the accesscontrol device 108 and establish a “low-level” BLE connection with theaccess control device 108 (e.g., in response to a BLE advertisement). Inparticular, in the illustrative embodiment, the “low-level” BLEconnection (e.g., via a “BLE Connect” function) may be an initialconnection between the mobile device 102 and the access control device108 such that the mobile device 102 can be an unpaired device (e.g.,before any credential information is transmitted from the mobile device102 to the access control device 108). It should be appreciated that themobile device 102 that establishes the BLE connection with the accesscontrol device 108 may or may not be the same as, or related to, themobile device 102 that transmitted the command(s) and/or access controldata to the server 106 as described in reference to the method 400 ofFIG. 4.

In block 504, the access control device 108 wakes its Wi-Fi circuitry306 in response to the BLE connection. In particular, in block 506, theBLE circuitry 302 of the access control device 108 causes (e.g.,generates or sends) an interrupt to the main microprocessor 304 thatwakes the main microprocessor 304 from the low power sleep state in theillustrative embodiment. In other words, the main microprocessor 304transitions from the low power sleep state to the normal power state inresponse to the interrupt. In block 508, the illustrative mainmicroprocessor 304 determines that the BLE circuitry 302 has establisheda connection with another device (e.g., the mobile device 102) and, inblock 510, the main microprocessor 304 wakes the Wi-Fi circuitry 306from the lower power sleep state. In particular, in some embodiments,the main microprocessor 304 may execute a “start function” that triggersthe Wi-Fi circuitry 306 to transition from the low power sleep state tothe normal power state. In other embodiments, the access control device108 may otherwise wake its Wi-Fi circuitry 306 in response to the BLEconnection.

In block 512, the access control device 108 establishes a Wi-Ficommunication connection with the server 106 using the Wi-Fi circuitry306. More specifically, the access control device 108 may establish aWi-Fi communication connection/link with the wireless access point 110,which is communicatively coupled to the server 106 (e.g., over theInternet).

In block 514, the access control device 108 requests any pendingcommands and/or other access control data from the server 106 via theWi-Fi communication connection. The server 106 determines whether it hasstored thereon, or otherwise has access to, commands and/or other accesscontrol data associated with the requesting access control device 108.For example, the server 106 may store such data in a database inassociation with the corresponding access control device 108 forsimplified searching.

If the server 106 determines, in block 516 of FIG. 6, that it has storedthereon, or otherwise has access to, one or more commands and/or otheraccess control data associated with the requesting access control device108, the method 500 advances to block 518 in which the server 106transmits a commands message to the access control device 108 via theWi-Fi communication connection (e.g., via the connection between theserver 106 and the wireless access point 110 and further via the Wi-Ficonnection between the wireless access point 110 and the access controldevice 108). It should be appreciated that the commands message mayinclude the command(s) and/or access control data retrieved by theserver 106 (e.g., received by the mobile device 102 by virtue of themethod 400 of FIG. 4). In some embodiments, the commands message may,additionally or alternatively, provide access instructions and/ordirections for retrieving the relevant data from a particular source. Asindicated above, it should be appreciated that the command(s) mayinclude, for example, a command to unlock a lock mechanism of the accesscontrol device 108, lock a lock mechanism of the access control device108, retrieve a firmware update for the access control device 108,retrieve updated access control permissions, retrieve updated accesscontrol schedules, and/or other suitable commands/data. As such, inblock 520, the access control device 108 may execute one or morecommands associated with the commands message by performing thecommanded function(s). The method 500 advances to block 522.

Similarly, if the server 106 determines, in block 516, that is does nothave stored thereon, or otherwise have access to, any commands or accesscontrol data associated with the requesting access control device 108,the method 500 advances to block 522 in which the access control device108 is synchronized with the server 106 via the Wi-Fi communicationconnection (e.g., via the Wi-Fi connection between access control device108 and the wireless access point 110 and further via the connectionbetween the wireless access point 110 and the server 106). In doing so,in some embodiments, the access control device 108 may determine whetherit has audit data (e.g., security data, raw sensor data, usage data,and/or other relevant audit data) and/or other relevant data to transmitto the server 106. For example, in some embodiments, the access controldevice 108 may transmit state data indicative of a current state of theaccess control device 108 (e.g., the current operational state of a lockmechanism and/or other component(s) of the access control device 108).Although the blocks 516-520 and the block 522 are illustrated serially,it should be appreciated that those blocks may be performed in parallelin some embodiments.

In block 524, the access control device 108 places the Wi-Fi circuitry306 in the low power sleep state. Further, in some embodiments, theaccess control device 108 may also transition the main microprocessor304 from the normal power state to the low power sleep state (e.g.,subsequent to processing any relevant data associated with the method500).

Although the blocks 502-524 are described in a relatively serial manner,it should be appreciated that various blocks of the method 500 may beperformed in parallel in some embodiments.

In some embodiments, it should be appreciated that the access controldevice 108 may be triggered to wake up the Wi-Fi circuitry 306 and/orthe main microprocessor 304 according to another mechanism. For example,in some embodiments, the access control device 108 may include aphysical button, handle, or actuator that may be contacted by the userto wake up the access control device 108 components. In anotherembodiment, the access control device 108 may include a timer that willwake up with Wi-Fi circuitry 306 and/or the main microprocessor 304after a predetermined period of time has lapsed. It should beappreciated that the access control device 108 may utilize multipletriggers in some embodiments.

According to an embodiment, a method includes establishing, by BluetoothLow Energy (BLE) circuitry of an access control device, a BLEcommunication connection with a first mobile device while a mainmicroprocessor and a Wi-Fi circuitry of the access control device are insleep states, waking, by the access control device, the Wi-Fi circuitryof the access control device from the sleep state in response toestablishing the BLE communication connection with the mobile device,establishing, by the Wi-Fi circuitry of the access control device, aWi-Fi communication connection with an access control server in responseto waking the Wi-Fi circuitry from the sleep state, and receiving, bythe access control device and from the access control server via theWi-Fi communication connection, access control data for the accesscontrol device transmitted from a second mobile device to the accesscontrol server. In some embodiments, waking the Wi-Fi circuitry of theaccess control device from the sleep state may include generating, bythe BLE circuitry, an interrupt to the main microprocessor that wakesthe main microprocessor from the sleep state in response to establishingthe BLE connection with the first mobile device and waking, by the mainmicroprocessor, the Wi-Fi circuitry in response to the interrupt. Insome embodiments, establishing the Wi-Fi communication connection withthe access control server may include establishing a Wi-Fi communicationwith a wireless access point that is communicatively coupled with theaccess control server over the Internet. In some embodiments, receivingthe access control data may include transmitting, by the access controldevice and to the access control server, a request for pending accesscontrol commands associated with the access control device andreceiving, by the access control device and from the access controlserver, at least one pending access control command stored inassociation with the access control device. In some embodiments, the atleast one pending access control command may include a command to one oflock a lock mechanism of the access control device or unlock the lockmechanism of the access control device. In some embodiments, the methodmay further include executing, by the access control device, the atleast one pending access control command. In some embodiments, themethod may further include transmitting, by the access control deviceand to the access control server via the Wi-Fi communication connection,audit data associated with the access control device. In someembodiments, the method may further include placing the Wi-Fi circuitryin the sleep state in response to receiving the access control data fromthe access control server. In some embodiments, the method may furtherinclude transmitting, by the second mobile device, the access controldata to the access control server via a wireless communicationconnection between the second mobile device and the access controlserver and storing, by the access control server, the access controldata in association with the access control device. In some embodiments,the first mobile device may be different from the second mobile device.In some embodiments, the server may be executed in a cloud computingenvironment.

According to another embodiment, an access control device includes amain microprocessor configured to operate in at least a first normalpower state and a first sleep state, a Wi-Fi circuitry configured tooperate in at least a second normal power state and a second sleepstate, and a Bluetooth Low Energy (BLE) circuitry configured toestablish a BLE communication connection with a first mobile devicewhile the main microprocessor is in the first sleep state and the Wi-Ficircuitry is in the second sleep state and generate an interrupt to themain microprocessor that transitions the main microprocessor from thefirst sleep state to the first normal power state, wherein the mainmicroprocessor is configured to transition the Wi-Fi circuitry from thesecond sleep state to the second normal power state in response to theinterrupt, and the Wi-Fi circuitry is configured to establish a Wi-Ficommunication connection with an access control server in response totransitioning to the second normal power state and receive accesscontrol data from the access control device transmitted from a secondmobile device to the access control server. In some embodiments, toestablish the Wi-Fi communication connection with the access controlserver may include to establish a Wi-Fi communication with a wirelessaccess point that is communicatively coupled with the access controlserver over the Internet. In some embodiments, to receive the accesscontrol data may include to transmit a request for pending accesscontrol commands associated with the access control device to the accesscontrol server and receive at least one pending access control commandstored in association with the access control device from the accesscontrol server. In some embodiments, the access control device mayfurther include an electronic lock mechanism adapted to move between alocked position and an unlocked position, and the at least one pendingaccess control command may include a command to one of move theelectronic lock mechanism to the locked position or move the electroniclock mechanism to the unlocked position. In some embodiments, the mainmicroprocessor may be configured to execute the at least one pendingaccess control command. In some embodiments, the Wi-Fi circuitry mayreturn to the sleep state in response to receipt of the access controldata from the access control server.

According to yet another embodiment, an access control system includesan access control server and an access control device having a mainmicroprocessor configured to operate in at least a first normal powerstate and a first sleep state, a Wi-Fi circuitry configured to operatein at least a second normal power state and a second sleep state, and aBluetooth Low Energy (BLE) circuitry configured to establish a BLEcommunication connection with a first mobile device while the mainmicroprocessor is in the first sleep state and the Wi-Fi circuitry is inthe second sleep state and generate an interrupt to the mainmicroprocessor that wakes the main microprocessor from the first sleepstate to the first normal power state, wherein the main microprocessoris configured to wake the Wi-Fi circuitry from the second sleep state tothe second normal power state in response to the interrupt and the Wi-Ficircuitry is configured to establish a Wi-Fi communication connectionwith the access control server in response to entering the second normalpower state and receive access control data from the access controldevice transmitted from a second mobile device to the access controlserver. In some embodiments, the access control system may furtherinclude the second mobile device, wherein the second mobile device maybe configured to transmit the access control data to the access controlserver via a wireless communication connection between the second mobiledevice and the access control server, and the access control server maybe configured to store the access control data in association with theaccess control device. In some embodiments, the first mobile device maybe different from the second mobile device.

What is claimed is:
 1. A method, comprising: establishing, by a firstwireless communication circuitry of an access control device, a firstwireless communication connection with a first mobile device while amain microprocessor and a second wireless communication circuitry of theaccess control device are in low power states, wherein the secondwireless communication circuitry is different from the first wirelesscommunication circuitry; waking, by the access control device, thesecond wireless communication circuitry of the access control devicefrom the low power state in response to establishing the first wirelesscommunication connection with the first mobile device; establishing, bythe second wireless communication circuitry of the access controldevice, a second wireless communication connection with an accesscontrol server in response to waking the second wireless communicationcircuitry from the low power state; and receiving, by the access controldevice and from the access control server via the second wirelesscommunication connection, access control data for the access controldevice transmitted from a second mobile device to the access controlserver.
 2. The method of claim 1, wherein waking the second wirelesscommunication circuitry of the access control device from the low powerstate comprises: generating, by the first wireless communicationcircuitry, an interrupt to the main microprocessor that wakes the mainmicroprocessor from the low power state in response to establishing thefirst wireless communication connection with the first mobile device;and waking, by the main microprocessor, the second wirelesscommunication circuitry in response to the interrupt.
 3. The method ofclaim 2, wherein waking the second wireless communication circuitry inresponse to the interrupt comprises executing one or more executableinstructions by the main microprocessor to trigger the second wirelesscommunication circuitry to transition from the low power state to ahigher power state.
 4. The method of claim 1, wherein establishing thesecond wireless communication connection with the access control servercomprises establishing a wireless communication connection with awireless access point that is communicatively coupled with the accesscontrol server over the Internet.
 5. The method of claim 1, whereinreceiving the access control data comprises: transmitting, by the accesscontrol device and to the access control server, a request for one ormore pending access control messages associated with the access controldevice; and receiving, by the access control device and from the accesscontrol server, at least one pending access control message stored inassociation with the access control device.
 6. The method of claim 5,wherein the at least one pending access control message comprises acommand to one of locking a lock mechanism of the access control deviceor unlocking the lock mechanism of the access control device.
 7. Themethod of claim 5, wherein the at least one pending access controlmessage comprises a command to retrieve a firmware update for the accesscontrol device.
 8. The method of claim 5, wherein the at least onepending access control message comprises a command to retrieve at leastone of updated access control permissions or updated access controlschedules for the access control device.
 9. The method of claim 1,further comprising transmitting, by the access control device and to theaccess control server via the second wireless communication connection,audit data associated with the access control device.
 10. The method ofclaim 1, further comprising placing the second wireless communicationcircuitry in the low power state in response to receiving the accesscontrol data from the access control server.
 11. The method of claim 1,further comprising: transmitting, by the second mobile device, theaccess control data to the access control server via a third wirelesscommunication connection between the second mobile device and the accesscontrol server; and storing, by the access control server, the accesscontrol data in association with the access control device.
 12. Anaccess control device, comprising: a main microprocessor configured tooperate in at least a first low power state and a first higher powerstate; a first wireless communication circuitry configured to operate inat least a second low power state and a second higher power state; and asecond wireless communication circuitry different from the firstwireless communication circuitry and configured to (i) establish a firstwireless communication connection with a first mobile device while themain microprocessor is in the first low power state and the firstwireless communication circuitry is in the second low power state and(ii) generate an interrupt to the main microprocessor that transitionsthe main microprocessor from the first low power state to the firsthigher power state; wherein the main microprocessor is configured totransition the first wireless communication circuitry from the secondlow power state to the second higher power state in response to theinterrupt; and wherein the first wireless communication circuitry isconfigured to (i) establish a second wireless communication connectionwith an access control server in response to transitioning to the secondhigher power state and (ii) receive access control data from the accesscontrol device transmitted from a second mobile device to the accesscontrol server.
 13. The access control device of claim 12, wherein toestablish the second wireless communication connection with the accesscontrol server comprises to establish a wireless communicationconnection with a wireless access point that is communicatively coupledwith the access control server over the Internet.
 14. The access controldevice of claim 12, wherein to receive the access control data comprisesto: transmit a request for one or more pending access control messagesassociated with the access control device to the access control server;and receive at least one pending access control message stored inassociation with the access control device from the access controlserver.
 15. The access control device of claim 14, further comprising anelectronic lock mechanism adapted to move between a locked position andan unlocked position; and wherein the at least one pending accesscontrol message comprises a command to move the electronic lockmechanism to the locked position or move the electronic lock mechanismto the unlocked position.
 16. The access control device of claim 12,wherein the main microprocessor is configured to execute at least oneinstruction associated with the at least one pending access controlmessage.
 17. The access control device of claim 12, wherein the firstwireless communication circuitry returns to the second low power statein response to receipt of the access control data from the accesscontrol server.
 18. An access control system, comprising: an accesscontrol server; and an access control device having a mainmicroprocessor configured to operate in at least a first low power stateand a first higher power state, a first wireless communication circuitryconfigured to operate in at least a second low power state and a secondhigher power state, and a second wireless communication circuitrydifferent from the first wireless communication circuitry and configuredto (i) establish a first wireless communication connection with a firstmobile device while the main microprocessor is in the first low powerstate and the first wireless communication circuitry is in the secondlow power state and (ii) generate an interrupt to the mainmicroprocessor that wakes the main microprocessor from the first lowpower state to the first higher power state; wherein the mainmicroprocessor is configured to wake the first wireless communicationcircuitry from the second low power state to the second higher powerstate in response to the interrupt; and wherein the first wirelesscommunication circuitry is configured to (i) establish a second wirelesscommunication connection with the access control server in response toentering the second higher power state and (ii) receive access controldata from the access control device transmitted from a second mobiledevice to the access control server.
 19. The access control system ofclaim 18, further comprising the second mobile device; wherein thesecond mobile device is configured to transmit the access control datato the access control server via a third wireless communicationconnection between the second mobile device and the access controlserver; and wherein the access control server is configured to store theaccess control data in association with the access control device. 20.The access control system of claim 19, wherein the first mobile deviceis different from the second mobile device.