Smart lock systems and methods

ABSTRACT

A lock can receive electricity from a transformer of a doorbell chime while the lock is mounted on a door. The lock can be electrically coupled to the face plate. The face plate can be electrically coupled to the strike plate of the door frame. The strike plate of the doorframe can be electrically coupled to the transformer of the doorbell chime.

CROSS-REFERENCE TO RELATED APPLICATIONS

This application claims the benefit of U.S. Provisional PatentApplication No. 62/018,606; filed Jun. 29, 2014; and entitled DOOR LOCKCHARGING SYSTEMS AND METHODS; the entire contents of which areincorporated herein by reference.

This application claims the benefit of U.S. Provisional PatentApplication No. 62/026,639; filed Jul. 19, 2014; and entitled WIRED HOMEAUTOMATION METHODS AND SYSTEMS; the entire contents of which areincorporated herein by reference.

This application claims the benefit of U.S. Provisional PatentApplication No. 61/872,439; filed Aug. 30, 2013; and entitled DOORBELLCOMMUNICATION SYSTEMS AND METHODS; the entire contents of which areincorporated herein by reference.

This application claims the benefit of and is a continuation-in-part ofU.S. Nonprovisional patent application Ser. No. 14/099,888; filed Dec.6, 2013; and entitled DOORBELL COMMUNICATION SYSTEMS AND METHODS; theentire contents of which are incorporated herein by reference.

This application claims the benefit of and is a continuation-in-part ofU.S. Nonprovisional patent application Ser. No. 14/142,839; filed Dec.28, 2013; and entitled DOORBELL COMMUNICATION SYSTEMS AND METHODS; theentire contents of which are incorporated herein by reference.

This application claims the benefit of and is a continuation-in-part ofU.S. Nonprovisional patent application Ser. No. 14/275,811; filed May12, 2014; and entitled DOORBELL COMMUNICATION SYSTEMS AND METHODS; theentire contents of which are incorporated herein by reference. U.S.Nonprovisional patent application Ser. No. 14/275,811 claimed thebenefit of U.S. Provisional Patent Application No. 61/859,070; filedJul. 26, 2013; and entitled DOORBELL COMMUNICATION SYSTEMS AND METHODS;the entire contents of which are incorporated herein by reference. U.S.Nonprovisional patent application Ser. No. 14/275,811 claimed thebenefit of U.S. Nonprovisional patent application Ser. No. 14/098,772;filed Dec. 6, 2013; and entitled DOORBELL COMMUNICATION SYSTEMS ANDMETHODS; the entire contents of which are incorporated herein byreference.

BACKGROUND

1. Field

Various embodiments disclosed herein relate to door locks. Certainembodiments relate to electronic door locks.

2. Description of Related Art

Doors enable building owners to control access to buildings. Doors ofteninclude locks to guard against unwanted entry. Locks can be configuredto fasten doors to inhibit unauthorized entry into buildings.

Electronic door locks typically require electricity from batteries. Whenthe batteries run out of power, a user can be locked out of a building.Thus, there is a need to reduce occurrences of people inadvertentlybeing locked out of buildings due to electronic door locks running outof electrical power.

SUMMARY

In some embodiments, a doorbell is attached to a wall of a building. Alock can be attached to the door to help secure the door. The doorbellcan be configured to receive electricity from the building. Then, thedoorbell can provide electricity to the door lock via various connectionsystems and methods.

In several embodiments, a lock is configured to receive electricity froma transformer that is electrically coupled to a doorbell chime while thetransformer is located inside of the building. The lock can be mountedon a swinging door. Various embodiments provide a means to transmitelectricity from a power supply of the building to the lock even thoughthe lock is mounted on a swinging door. Several embodiments transmitelectricity from a strike plate assembly to a face plate assembly. Then,the face plate assembly can transmit electricity to the lock.

Several embodiments include near field energy transmission and/or nearfield communication. The electricity can be transmitted via electricalinduction. Direct induction and magnetic induction can be used totransmit electricity from the strike plate assembly to the lock.

In some embodiments, the face plate assembly includes a first set ofelectrical contacts, and the strike plate assembly includes a second setof electrical contacts. The electricity can be transmitted from a powersupply of a building to the lock via the first set and second set ofelectrical contacts.

Several embodiments include a solenoid-driven bolt. Energizing thesolenoid can cause the bolt to extend (i.e., lock the door) and/or cancause the solenoid to retract (i.e., unlock the door). The bolt can be adeadbolt or any suitable latch.

The lock can wirelessly communicate with a remote computing device. Insome embodiments, the lock communicates with a remote computing devicevia power lines of the building. For example, a network connectionmodule can connect the power lines to the Internet.

Locks can include cameras, microphones, speakers, doorbell buttons, anddisplay screens. Locks can be configured to use software to performvarious tasks associated with data communication and/or locking thedoor.

Some embodiments include a lock system that comprises a lock configuredto couple to a door. The lock can be configured to receive electricityfrom a transformer that is located remotely relative to the door. Thetransformer can be configured to provide electrical energy to a doorbellchime. The lock system can comprise an outer housing. The lock systemcan also include a bolt configured to protrude from the outer housingand past a face plate to secure the door by entering a hole in a doorframe. The bolt can be a metal protrusion that slides in and out of thelock. The bolt comprises a throw distance, which can be measured as theprojection of the bolt from the edge of the door. For example, in someembodiments, a bolt can extend between zero and four centimeters from aface plate. Some locks include an electrical control system configuredto adjust the throw distance. For example, the electrical control systemcan cause the bolt to extend and retract relative to the face plate. Aremote computing device can control the electrical control system of thelock. Example remote computing devices include cellular phones,smartphones, laptops, tablets, desktop computers, and other computingdevices capable of data input (e.g., cars with computer displays andwatches capable of wireless communication).

In some embodiments, locks need electricity. A power receiver can enablea lock to receive electrical power wirelessly or via wires. The powerreceiver can be integrated into at least a portion of the lock.

In several embodiments, the lock system comprises a power receivercoupled to the face plate and/or to a side of the door that faces thedoor frame. The power receiver can be configured to receive theelectricity from a power transmitter. The power transmitter can becoupled to a strike plate and/or to a door frame.

In addition to transmitting electricity between the power transmitterand the power receiver, the lock system can communicate via the powerreceiver and the power transmitter. In some embodiments, the lockincludes a wireless data transmitter (e.g., for Wi-Fi or Bluetoothcommunication).

The strike plate can be configured to be coupled to the door frame. Thepower transmitter can be configured to receive the electricity from thetransformer. The power receiver can be electrically coupled to theelectrical control system such that the power receiver is configured toprovide the electricity to the electrical control system such that theelectrical control system is capable of operating the bolt. Theelectrical control system can govern the position of a solenoid that ismechanically coupled to the bolt such that the solenoid can move thebolt to locked and unlocked positions.

In several embodiments, the power receiver is a wireless power receiverand the power transmitter is a wireless power transmitter. The powerreceiver can comprise an induction receiver configured to receive theelectricity from an induction transmitter that can be coupled to thestrike plate. The induction receiver can comprise a first induction coiland the induction transmitter can comprise a second induction coil. Someembodiments transmit the electricity wirelessly via inductive chargingand/or magnetic resonance.

In some embodiments, the lock system further comprises a solenoidcoupled to the outer housing. The solenoid can be configured to controlthe throw distance of the bolt (e.g., by pushing the bolt in and out ofthe face plate). The solenoid can push the bolt into a hole in thestrike plate. The solenoid can pull the bolt out of the hole in thestrike plate. A spring can be arranged to act against the forcegenerated by the solenoid. A spring can be arranged and configured toapply a force on the bolt that pushes the bolt outward relative to theface plate such that the lock is configured to remain in a lockedconfiguration when the solenoid receives insufficient electrical powerto overcome the force.

In several embodiments, the solenoid is electrically coupled to theelectrical control system and the power receiver such that the locksystem is capable of providing the electricity from the transformer tothe power receiver that is coupled to the face plate, and then the powerreceiver is capable of providing the electricity to the solenoid.

In some embodiments, the lock system comprises a keyhole configured toenable a key to adjust the throw distance to unlock the lock. Forexample, the key can cause the bolt to slide in and out of the lock. Thesolenoid can be located between the keyhole and the power receiver ofthe face plate. The solenoid can be electrically coupled to the powerreceiver of the face plate such that the solenoid is configured toreceive the electricity from the transformer.

Some lock embodiments include elements from security systems describedin applications incorporated herein by reference. The embodimentsdescribed herein can be combined with the security system embodimentsincorporated by reference. The remote computing devices described inembodiments incorporated by reference can be used with the lockembodiments described herein. Additional embodiments can be formulatedby replacing the security systems described in applications incorporatedby reference with lock embodiments described herein.

Locks can use the cameras, speakers, microphones, and doorbell buttonsdescribed in embodiments incorporated by reference. In severalembodiments, a camera can be coupled to the outer housing of the lock.The camera can be configured to face outward from the door. A speakerand a microphone can be coupled to the outer housing. The camera can beconfigured to take a picture of a visitor to the lock. For example, thelock can detect when a visitor approaches the lock. The lock can take apicture of the visitor in response to detecting the visitor. The speakercan be configured to enable communication with a user of a remotecomputing device. For example, the speaker can emit sounds from a userof the remote computing device to enable the visitor to hear the user ofthe remote computing device. The microphone can be configured to recordsounds from the visitor for transmission to the remote computing device.For example, the microphone can record the visitor speaking to enablethe user to hear the visitor.

In several embodiments, the lock can include a wireless datatransmission system configured to receive lock commands from the remotecomputing device and configured to wirelessly transmit the picture andthe sounds to the remote computing device. The wireless datatransmission system can use Wi-Fi, Bluetooth, and/or radiofrequencymeans of communication.

In some embodiments, a lock system comprises a lock configured to coupleto a door (e.g., to hinder unauthorized entry). The lock can beconfigured to receive electricity from a transformer that is locatedremotely relative to the door. The transformer can be configured toprovide electrical energy to a doorbell chime. The lock system cancomprise a lock that has an outer housing, an electrical control system,a face plate, and a bolt. The bolt and the face plate can be coupled tothe outer housing such that the bolt is arranged and configured toprotrude from the outer housing and past the face plate to secure thedoor by entering a first hole in a door frame. The bolt can comprise athrow distance. The electrical control system can be configured toadjust the throw distance. The electrical control system can be locatedwithin the outer housing of the lock. The outer housing can be at leastpartially embedded within the door while the door is coupled to thebuilding. The outer housing can include a first side that faces outsideand a second side the faces inside the building. The first side caninclude a keyhole, a camera, a microphone, and/or a speaker. The secondside can include a lever capable of adjusting the throw distance.

In some embodiments, the lock system comprises a power receiver coupledto the face plate of the lock. The power receiver can be electricallycoupled to the electrical control system of the lock. The lock systemcan include a strike plate configured to be coupled to the door frame.The strike plate can face towards the face plate such that the boltprotrudes from the face plate and past the strike plate.

In several embodiments, the lock system includes a power transmittercoupled to the strike plate. The power transmitter can be integratedinto the strike plate. (The power receiver can also be integrated intothe face plate.) The power transmitter can be configured to beelectrically coupled to the transformer to receive the electricity fromthe transformer while the transformer is electrically coupled to a powersource of a building and while the transformer is electrically coupledto the doorbell chime. The power transmitter can be placed in sufficientproximity relative to the power receiver such that the power transmitteris capable of receiving the electricity from the transformer and thentransmitting the electricity to the power receiver. If the powertransmitter is not placed within sufficient proximity relative to thepower receiver, then the power transmitter is not capable oftransmitting the electricity to the power receiver. In some embodiments,sufficient proximity is within 30 centimeters, within 15 centimeters,and/or within 5 centimeters. The power transmitter can also be alignedwith the power receiver. The power transmitter is aligned with the powerreceiver when the power transmitter is capable of transmitting theelectricity to the power receiver.

In some embodiments, the power receiver is configured to transmitelectricity to the power transmitter. Thus, the power receiver can alsobe a power transmitter, and the power transmitter can also be a powerreceiver.

In several embodiments, the power transmitter of the strike plate iselectrically coupled to the power receiver of the face plate to enablethe lock to receive the electricity from the transformer. Electricalcoupling can be achieve wirelessly (e.g., via induction) and/or viaconductive wires.

In some embodiments, the power transmitter is located within 20centimeters and/or within 10 centimeters of the power receiver. Thepower transmitter can be inductively coupled with the power receiversuch that the power transmitter is configured to inductively transmitthe electricity to the power receiver of the face plate via electricalinduction. The power transmitter can comprise a first inductionconductor. The power receiver can comprise a second induction conductor.The first induction conductor can located within 10 centimeters and/orwithin 4 centimeters of the second induction conductor.

The first induction conductor can comprise a first induction coil. Thesecond induction conductor can comprise a second induction coil. Theface plate can be aligned with the strike plate such that the firstinduction coil can be inductively coupled with the second inductioncoil. Alignment is achieved when the first induction coil can beinductively coupled with the second induction coil. Alignment does notnecessary require the face plate and the strike plate to be orientedparallel to each other. The face plate and the strike plate can beoffset from each other and still be in alignment if the first inductioncoil can be inductively coupled with the second induction coil. Thus,alignment can be judged by inductive capability.

Some embodiments include removing a doorbell from a wall to gain accessto wires that were attached to the doorbell. These wires can be coupledto the transformer and the chime. These wires can be used to provideelectricity to the lock (e.g., via a strike-plate power-transmissionassembly).

Some embodiments include a junction assembly (e.g., that can take theplace of the removed doorbell). In some embodiments, the junctionassembly is used while the doorbell is used. A first wire and a secondwire can be electrically coupled to the transformer. A third wire and afourth wire can be electrically coupled to the power transmitter. Thejunction assembly can electrically couple the first wire to the thirdwire. The junction assembly can electrically couple the second wire tothe fourth wire. A doorbell can be mechanically coupled and/orelectrically coupled to the junction assembly.

In several embodiments, a strike plate is coupled to the door frame anda face plate is coupled to a side of the door such that the strike platefaces towards the face plate. The side of the door to which the faceplate is coupled can be opposite the side of the door to which hingesare attached. The power transmitter can comprise a first induction coil.The power receiver can comprise a second induction coil. The face platecan be oriented relative to the strike plate such that the firstinduction coil is capable of being inductively coupled with the secondinduction coil. The second induction coil can be oriented at an anglerelative to the first induction coil. The angle can be less than 30degrees and/or less than 20 degrees. The second wire can be electricallycoupled to the transformer via the chime. The second wire can beelectrically coupled to the transformer and the chime. The first wireand the second wire can be electrically coupled to the transformer whilethe transformer is located inside of the building. The first wire andthe second wire can protrude into a second hole that leads to an areaoutside of the building. The second hole can be the hole in which wiresfor a doorbell are located (to enable installing a doorbell on anexterior wall of the building).

The electrical control system can be communicatively coupled to thepower transmitter (e.g., such that the electrical control system iscapable of sending communications to the power transmitter). The powertransmitter can be communicatively coupled to a network connectionmodule that is electrically coupled to a power outlet of the buildingsuch that the network connection module is configured to transmit datato the lock. More information regarding communicating via power lines isincorporated by reference from U.S. Provisional Patent Application No.62/026,639.

BRIEF DESCRIPTION OF THE DRAWINGS

These and other features, aspects, and advantages are described belowwith reference to the drawings, which are intended to illustrate, butnot to limit, the invention. In the drawings, like reference charactersdenote corresponding features consistently throughout similarembodiments.

FIG. 1 illustrates a front view of a communication system, according tosome embodiments.

FIG. 2 illustrates a computing device running software, according tosome embodiments.

FIG. 3 illustrates an embodiment in which a security system is connectedto a building, according to some embodiments.

FIGS. 4-7 illustrate diagrammatic views of security systems providingelectricity to a door lock, according to some embodiments.

FIG. 8 illustrates a front view of a door, according to someembodiments.

FIG. 9 illustrates a history of lock-related events displayed on a userinterface, according to some embodiments.

FIG. 10 illustrates a front view of a watch, according to someembodiments.

FIG. 11 illustrates the watch interacting with a security system,according to some embodiments.

FIG. 12 illustrates an embodiment in which the watch wirelesslycommunicates with a door lock, according to some embodiments.

FIG. 13 illustrates a diagrammatic view of a junction providingelectricity to a lock, according to some embodiments.

FIG. 14 illustrates a diagrammatic view of a lock attached to a door tohelp secure the door while the lock is configured to receive electricityfrom a transformer, according to some embodiments.

FIG. 15 illustrates a diagrammatic view of a charging interface,according to some embodiments.

FIGS. 16 and 17 illustrate perspective views of a lock, according tosome embodiments.

FIGS. 18 and 19 illustrate perspective views of a lock coupled to adoor, according to some embodiments.

FIG. 20 illustrates a front view of a face plate and a strike platewhile the face plate is attached to the side of a door, according tosome embodiments.

FIG. 21 illustrates a perspective view of a lock coupled to a door and astrike plate coupled to a door frame while the door is open slightly,according to some embodiments.

FIG. 22 illustrates a diagrammatic view of a solenoid-operated bolt,according to some embodiments.

FIG. 23 illustrates a perspective view of a face plate and a strikeplate, according to some embodiments.

DETAILED DESCRIPTION

Although certain embodiments and examples are disclosed below, inventivesubject matter extends beyond the specifically disclosed embodiments toother alternative embodiments and/or uses, and to modifications andequivalents thereof. Thus, the scope of the claims appended hereto isnot limited by any of the particular embodiments described below. Forexample, in any method or process disclosed herein, the acts oroperations of the method or process may be performed in any suitablesequence and are not necessarily limited to any particular disclosedsequence. Various operations may be described as multiple discreteoperations in turn, in a manner that may be helpful in understandingcertain embodiments; however, the order of description should not beconstrued to imply that these operations are order dependent.Additionally, the structures, systems, and/or devices described hereinmay be embodied as integrated components or as separate components.

For purposes of comparing various embodiments, certain aspects andadvantages of these embodiments are described. Not necessarily all suchaspects or advantages are achieved by any particular embodiment. Thus,for example, various embodiments may be carried out in a manner thatachieves or optimizes one advantage or group of advantages as taughtherein without necessarily achieving other aspects or advantages as mayalso be taught or suggested herein.

FIG. 1 illustrates a security system 202 (e.g., a doorbell or a lock)that includes a camera assembly 208. When a visitor approaches thesecurity system 202 (e.g., rings a doorbell 212), the security system202 can send a wireless notification to a computing device 204 that islocated remotely relative to the security system 202. For example, theowner of the building to which the security system is attached canreceive the wireless notification when the owner is away from thebuilding.

The owner (i.e., the user) can verify the identity of the visitor asexplained in more detail below. For example, the owner can see thevisitor on the computing device 204. Once the owner has verified theidentity of the visitor, the owner can grant the visitor access to thebuilding (e.g., by unlocking the door lock 250 to let the visitor insidethe building). The security system 202 can be configured such that itcan unlock the door lock 250. In some embodiments, the security system202 wirelessly controls the door lock 250.

The door lock 250 can include a deadbolt or other locking mechanism thatlocks and unlocks a door in response to remote commands. For example,the security system 202 can notify the door lock 250 to lock and unlockthe door. The door lock 250 can be controlled by a remote computingdevice 204 (e.g., a smartphone). Example door locks 250 includeLockitron made by Apigy Inc., the August Smart Lock made by Yves Beharand Jason Johnson, electronic locks made by Schlage (an Allegioncompany), and the Kevo lock made by Kwikset (a division of SpectrumBrands Holdings).

In some embodiments, the security system 202 takes a picture when thedoor lock 250 is unlocked and/or locked to document the identity of theperson unlocking and/or locking the door. The user can record a pictureof the visitor for security purposes.

Electronic door locks (e.g., door lock 250) typically requireelectricity from batteries. When the batteries run out of power, theuser can be locked out of a building. Various embodiments describedherein reduce occurrences of people being locked out of buildings due toelectronic door locks running out of electrical power.

In some embodiments, a doorbell is attached to a wall of a building(e.g., next to a door). The lock can be attached to the door. Thedoorbell can be configured to receive electricity from the building.Then, the doorbell can provide electricity to the door lock via variousconnection systems and methods.

In several embodiments, the door lock and/or the doorbell detects thatthe door lock's electrical power has fallen below a predeterminedthreshold. The doorbell can then send a low-power notification to aremote computing device.

System Embodiments

Communication systems can provide a secure and convenient way for aremotely located individual to communicate with a person who isapproaching a sensor, such as a proximity sensor or motion sensor, orwith a person who rings a doorbell, which can be located in a doorway,near an entrance, or within 15 feet of a door. Some communicationsystems allow an individual to hear, see, and talk with visitors whoapproach at least a portion of the communication system and/or press abutton, such as a doorbell's button. For example, communication systemscan use a computing device to enable a remotely located person to see,hear, and/or talk with visitors. Computing devices can includecomputers, laptops, tablets, mobile devices, smartphones, cellularphones, and wireless devices (e.g., cars with wireless communication).Example computing devices include the iPhone, iPad, iMac, MacBook Air,and MacBook Pro made by Apple Inc. Communication between a remotelylocated person and a visitor can occur via the Internet, cellularnetworks, telecommunication networks, and wireless networks.

Referring now to FIG. 1, communication systems can be a portion of asmart home hub. In some embodiments, the communication system 200 formsthe core of the smart home hub. For example, the various systemsdescribed herein enable complete home automation. In some embodiments,the security system 202 controls various electrical items in a home(e.g., lights, air conditioners, heaters, motion sensors, garage dooropeners, locks, televisions, computers, entertainment systems, poolmonitors, elderly monitors). In some embodiments, the computing device204 controls the security system 202 and other electrical items in ahome (e.g., lights, air conditioners, heaters, motion sensors, garagedoor openers, locks, televisions, computers, entertainment systems, poolmonitors, elderly monitors).

FIG. 1 illustrates a front view of a communication system embodiment.The communication system 200 can include a security system 202 (e.g., adoorbell that has a camera) and a computing device 204. Although theillustrated security system 202 includes many components in one housing,several security system embodiments include components in separatehousings. The security system 202 can include a camera assembly 208 anda doorbell button 212. The camera assembly 208 can be a video camera,which in some embodiments is a webcam.

The security system 202 can include a diagnostic light 216 and a powerindicator light 220. In some embodiments, the diagnostic light 216 is afirst color (e.g., blue) if the security system 202 and/or thecommunication system 200 is connected to a wireless Internet network andis a second color (e.g., red) if the security system 202 and/or thecommunication system 200 is not connected to a wireless Internetnetwork. In some embodiments, the power indicator 220 is a first colorif the security system 202 is connected to a power source. The powersource can be power supplied by the building to which the securitysystem 202 is attached. In some embodiments, the power indicator 220 isa second color or does not emit light if the security system 202 is notconnected to the power source.

The security system 202 (e.g., a doorbell) can include an outer housing224, which can be water resistant and/or waterproof. The outer housingcan be made from metal or plastic, such as molded plastic with ahardness of 60 Shore D. In some embodiments, the outer housing 224 ismade from brushed nickel or aluminum.

Rubber seals can be used to make the outer housing 224 water resistantor waterproof. The security system 202 can be electrically coupled to apower source, such as wires electrically connected to a building'selectrical power system. In some embodiments, the security system 202includes a battery for backup and/or primary power.

Wireless communication 230 can enable the security system 202 (e.g., adoorbell) to communicate with the computing device 204. Some embodimentsenable communication via cellular and/or Wi-Fi networks. Someembodiments enable communication via the Internet. Several embodimentsenable wired communication between the security system 202 and thecomputing device 204. The wireless communication 230 can include thefollowing communication means: radio, Wi-Fi (e.g., wireless local areanetwork), cellular, Internet, Bluetooth, telecommunication,electromagnetic, infrared, light, sonic, and microwave. Othercommunication means are used by some embodiments. In some embodiments,such as embodiments that include telecommunication or cellularcommunication means, the security system 202 can initiate voice calls orsend text messages to a computing device 204 (e.g., a smartphone, adesktop computer, a tablet computer, a laptop computer).

Several embodiments use near field communication (NFC) to communicatebetween the computing device 204 and the security system 202; betweenthe security system 202 and the door lock 250; and/or between thecomputing device 204 and the door lock 250. The security system 202, thecomputing device 204, and/or the door lock 250 can include a NFC tag.Some NFC technologies include Bluetooth, radio-frequency identification,and QR codes.

Several embodiments include wireless charging (e.g., near fieldcharging, inductive charging) to supply power to and/or from thesecurity system 202, the door lock 250, and/or the computing device 204.Some embodiments use inductive charging (e.g., using an electromagneticfield to transfer energy between two objects).

Some embodiments include computer software (e.g., application software),which can be a mobile application designed to run on smartphones, tabletcomputers, and other mobile devices. Software of this nature issometimes referred to as “app” software. Some embodiments includesoftware designed to run on desktop computers and laptop computers.

The computing device 204 can run software with a graphical userinterface. The user interface can include icons or buttons. In someembodiments, the software is configured for use with a touch-screencomputing device such as a smartphone or tablet.

FIG. 2 illustrates a computing device 204 running software. The softwareincludes a user interface 240 displayed on a display screen 242. Theuser interface 240 can include a security system indicator 244, whichcan indicate the location of the security system that the user interfaceis displaying. For example, a person can use one computing device 204 tocontrol and/or interact with multiple security systems, such as onesecurity system located at a front door and another security systemlocated at a back door. Selecting the security system indicator 244 canallow the user to choose another security system (e.g., the back doorsecurity system rather than the front door security system).

The user interface 240 can include a connectivity indicator 248. In someembodiments, the connectivity indicator can indicate whether thecomputing device is in communication with a security system, theInternet, and/or a cellular network. The connectivity indicator 248 canalert the user if the computing device 204 has lost its connection withthe security system 202; the security system 202 has been damaged; thesecurity system 202 has been stolen; the security system 202 has beenremoved from its mounting location; the security system 202 has lostelectrical power; and/or if the computing device 204 cannot communicatewith the security system 202. In some embodiments, the connectivityindicator 248 alerts the user of the computing device 204 by flashing,emitting a sound, displaying a message, and/or displaying a symbol.

In some embodiments, if the security system 202 loses power, losesconnectivity to the computing device 204, loses connectivity to theInternet, and/or loses connectivity to a remote server, a remote server206 sends an alert (e.g., phone call, text message, image on the userinterface 240) regarding the power and/or connectivity issue. In severalembodiments, the remote server 206 can manage communication between thesecurity system 202 and the computing device. In some embodiments,information from the security system 202 is stored by the remote server206. In several embodiments, information from the security system 202 isstored by the remote server 206 until the information can be sent to thecomputing device 204, uploaded to the computing device 204, and/ordisplayed to the remotely located person via the computing device 204.The remote server 206 can be a computing device that stores informationfrom the security system 202 and/or from the computing device 204. Insome embodiments, the remote server 206 is located in a data center.

In some embodiments, the computing device 204 and/or the remote server206 attempts to communicate with the security system 202. If thecomputing device 204 and/or the remote server 206 is unable tocommunicate with the security system 202, the computing device 204and/or the remote server 206 alerts the remotely located person via thesoftware, phone, text, a displayed message, and/or a website. In someembodiments, the computing device 204 and/or the remote server 206attempts to communicate with the security system 202 periodically; atleast every five hours and/or less frequently than every 10 minutes; atleast every 24 hours and/or less frequently than every 60 minutes; or atleast every hour and/or less frequently than every second.

In some embodiments, the server 206 can initiate communication to thecomputer device 204 and/or to the security system 202. In severalembodiments, the server 206 can initiate, control, and/or blockcommunication between the computing device 204 and the security system202.

In several embodiments, a user can log in to an “app,” website, and/orsoftware on a computing device (e.g., mobile computing device,smartphone, tablet, desktop computer) to adjust the security systemsettings discussed herein.

In some embodiments, a computing device can enable a user to watch livevideo and/or hear live audio from a security system due to the user'srequest rather than due to actions of a visitor. Some embodimentsinclude a computing device initiating a live video feed (or a video feedthat is less than five minutes old).

In some embodiments, the user interface 240 displays an image 252 suchas a still image or a video of an area near and/or in front of thesecurity system 202. The image 252 can be taken by the camera assembly208 and stored by the security system 202, server 206, and/or computingdevice 204. The user interface 240 can include a recording button 256 toenable a user to record images, videos, and/or sound from the cameraassembly 208, microphone of the security system 202, and/or microphoneof the computing device 204.

In several embodiments, the user interface 240 includes a picture button260 to allow the user to take still pictures and/or videos of the areanear and/or in front of the security system 202. The user interface 240can also include a sound adjustment button 264 and a mute button 268.The user interface 240 can include camera manipulation buttons such aszoom, pan, and light adjustment buttons. In some embodiments, the cameraassembly 208 automatically adjusts between Day Mode and Night Mode. Someembodiments include an infrared camera and/or infrared lights toilluminate an area near the security system 202 to enable the cameraassembly 208 to provide sufficient visibility (even at night).

In some embodiments, buttons include diverse means of selecting variousoptions, features, and functions. Buttons can be selected by mouseclicks, keyboard commands, and/or touching a touch screen. Manyembodiments include buttons that can be selected without touch screens.

In some embodiments, the user interface 240 includes a quality selectionbutton, which can allow a user to select the quality and/or amount ofdata transmitted from the security system 202 to the computing device204 and/or from the computing device 204 to the security system 202.

In some embodiments, video can be sent to and/or received from thecomputing device 204 using video chat protocols such as FaceTime (byApple Inc.) or Skype (by Microsoft Corporation). In some embodiments,these videos are played by videoconferencing apps on the computingdevice 204 instead of being played by the user interface 240.

The user interface 240 can include a termination button 276 to endcommunication between the security system 202 and the computing device204. In some embodiments, the termination button 276 ends the ability ofthe person located near the security system 202 (i.e., the visitor) tohear and/or see the user of the computing device 204, but does not endthe ability of the user of the computing device 204 to hear and/or seethe person located near the security system 202.

In some embodiments, a button 276 is both an answer button (to accept acommunication request from a visitor) and is termination button (to endcommunication between the security system 202 and the computing device204). The button 276 can include the word “Answer” when the system isattempting to establish two-way communication between the visitor andthe user. Selecting the button 276 when the system is attempting toestablish two-way communication between the visitor and the user canstart two-way communication. The button 276 can include the words “EndCall” during two-way communication between the visitor and the user.Selecting the button 276 during two-way communication between thevisitor and the user can terminate two-way communication. In someembodiments, terminating two-way communication still enables the user tosee and hear the visitor. In some embodiments, terminating two-waycommunication causes the computing device 204 to stop showing video fromthe security system and to stop emitting sounds recorded by the securitysystem.

In some embodiments, the user interface 240 opens as soon as thesecurity system detects a visitor (e.g., senses indications of avisitor). Once the user interface 240 opens, the user can see and/orhear the visitor even before “answering” or otherwise accepting two-waycommunication, in several embodiments.

Some method embodiments include detecting a visitor with a securitysystem. The methods can include causing the user interface to display ona remote computing device 204 due to the detection of the visitor (e.g.,with or without user interaction). The methods can include displayingvideo from the security system and/or audio from the security systembefore the user accepts two-way communication with the visitor. Themethods can include displaying video from the security system and/oraudio from the security system before the user accepts the visitor'scommunication request. The methods can include the computing devicesimultaneously asking the user if the user wants to accept (e.g.,answer) the communication request and displaying audio and/or video ofthe visitor. For example, in some embodiments, the user can see and hearthe visitor via the security system before opening a means of two-waycommunication with the visitor.

In some embodiments, the software includes means to start the video feedon demand. For example, a user of the computing device might wonder whatis happening near the security system 202. The user can open thesoftware application on the computing device 204 and instruct theapplication to show live video and/or audio from the security device 202even if no event near the security system 202 has triggered thecommunication.

In several embodiments, the security device 202 can be configured torecord when the security device 202 detects movement and/or the presenceof a person. The user of the computing device 204 can later review allvideo and/or audio records when the security device 202 detectedmovement and/or the presence of a person.

Referring now to FIG. 1, in some embodiments, the server 206 controlscommunication between the computing device 204 and the security system202, which can be a doorbell with a camera, a microphone, and a speaker.In several embodiments, the server 206 does not control communicationbetween the computing device 204 and the security system 202.

In some embodiments, data captured by the security system and/or thecomputing device 204 (such as videos, pictures, and audio) is stored byanother remote device such as the server 206. Cloud storage, enterprisestorage, and/or networked enterprise storage can be used to store video,pictures, and/or audio from the communication system 200 or from anypart of the communication system 200. The user can download and/orstream stored data and/or storage video, pictures, and/or audio. Forexample, a user can record visitors for a year and then later can reviewconversations with visitors from the last year. In some embodiments,remote storage, the server 206, the computing device 204, and/or thesecurity system 202 can store information and statistics regardingvisitors and usage.

FIG. 3 illustrates an embodiment in which a security system 202 isconnected to a building 300, which can include an entryway 310 that hasa door 254. A door lock 250 can be configured to lock and unlock thedoor 254. Electrical wires 304 can electrically couple the securitysystem 202 to the electrical system of the building 300 such that thesecurity system 202 can receive electrical power from the building 300.

A wireless network 308 can allow devices to wirelessly access theInternet. The security system 202 can access the Internet via thewireless network 308. The wireless network 308 can transmit data fromthe security system 202 to the Internet, which can transmit the data toremotely located computing devices 204. The Internet and wirelessnetworks can transmit data from remotely located computing devices 204to the security system 202. In some embodiments, a security system 202connects to a home's Wi-Fi.

As illustrated in FIG. 3, one computing device 204 (e.g., a laptop, asmartphone, a mobile computing device, a television) can communicatewith multiple security systems 202. In some embodiments, multiplecomputing devices 204 can communicate with one security system 202.

In some embodiments, the security system 202 can communicate (e.g.,wirelessly 230) with a television 306, which can be a smart television.Users can view the television 306 to see a visitor and/or talk with thevisitor.

Lock Embodiments

Referring now to FIGS. 3 and 4, in some embodiments, a doorbell (e.g., asecurity system 202) is attached to a wall 750 of a building 300 (e.g.,the doorbell is not attached to a door). The lock 250 can be attached tothe door 254. The doorbell can be configured to receive electricity fromthe building 300 through electrical wires 304. Then, the doorbell canprovide electricity to the door lock 250 via various connection systemsand methods.

FIG. 4 illustrates a diagrammatic view of a security system 202providing electricity to a door lock 250. The door lock 250 can includebatteries 752. The electricity from the security system 202 (e.g., adoorbell) can charge the batteries 752 of the door lock 250.

The building 300 can be electrically coupled to a power source 754. Insome embodiments, the power source 754 provides 110 volts, 120 volts, or220 volts (plus or minus 20 volts). The power source can be electricallycoupled to a transformer 756 to convert the electricity from the powersource 754 to have more suitable characteristics for the security system202 and/or for a chime 302. In some embodiments, the transformer 756 hasan output of 16 volts (plus or minus 5 volts). Pressing a doorbellbutton 212 (labeled in FIG. 1) of the security system 202 can cause thechime 302 to emit a notification sound (e.g., a “ringing” sound).

The chime 302 can be a mechanical chime configured to emit a doorbellringing sound. The chime 302 can also comprise a speaker attached to awall inside of the building 300. The speaker can be configured to emit asound to notify people inside of the building 300 that the securitysystem 202 has detected a visitor.

The security system 202 can be electrically coupled to the chime 302 andto the transformer 756. The chime 302 can be electrically coupled to thesecurity system 202 and to the transformer 756.

The security system 202 can wirelessly communicate 230 with remotecomputing devices 204 located outside of the building 300. The remotecomputing device 204 can control the door lock 250 (e.g., directly orvia the security system 202). The computing device 204 can lock orunlock the door lock 250. The remote computing device can also runfacial recognition software (e.g., an “app”).

An interface 758 can enable the security system 202 to charge the doorlock 250 (e.g., via electrical coupling and/or via wireless energytransmission). The interface 758 can enable near field charging from thesecurity system 202 to the door lock 250. Some wireless energytransmission embodiments use direct induction followed by resonantmagnetic induction. Several wireless energy transmission embodiments useelectromagnetic radiation.

Referring now to FIG. 6, in some embodiments, the interface 758 includesa first side 768 that is electrically coupled to the security system 202(e.g., by two wires 764, 766). The interface 758 can also include asecond side 770 that is electrically coupled to the door lock 250. Thefirst side 768 can include a conductor and the second side 770 caninclude a conductor. The two conductors can be mutual-inductivelycoupled or magnetically coupled by configuring the conductors such thatchange in current flow through one conductor induces a voltage acrossthe ends of the other conductor (through electromagnetic induction).Interface 758 embodiments can include sufficient mutual inductance toenable electricity from the power source 754 to provide power to thedoor lock 250 and/or charge the batteries 752 (e.g., via the securitysystem 202).

The interface 758 can enable the security system 202 to communicate withthe door lock 250. The interface 758 can enable near field communicationbetween the security system 202 and the door lock 250. In someembodiments, the interface 758 comprises a NFC system.

Several embodiments use near field communication (NFC) to communicatebetween the door lock 250 and the security system 202; between thecomputing device 204 and the door lock 250; and between the computingdevice 204 and the security system 202. The security system 202, thecomputing device 204, and/or the door lock 250 can include a NFC tag.Some NFC technologies include Bluetooth, radio-frequency identification(RFID), and QR codes.

FIG. 5 illustrates a security system 202 e that is simpler than thesecurity system 202 illustrated in FIG. 4. The security system 202 e hasa normally open switch. Pressing the doorbell button 212 e closes theswitch to make the chime 302 emit a notification sound. The securitysystem 202 e can be used with the interface 758 to charge the door lock250.

FIG. 6 illustrates a wiring embodiment that can be used with any of theembodiments. A first wire 760 electrically couples the transformer 756to the security system 202 (which has a doorbell button 212). A secondwire 762 electrically couples the security system 202 and the chime 302.

The first wire 760 and the second wire 762 can exit a hole in the wall750 of the building 300. Some methods include decoupling a doorbell fromthe first wire 760 and the second wire 762, and then coupling the firstwire 760 and the second wire 762 to the security system 202 (e.g., toprovide electricity from the power source 754 to the security system202).

A third wire 764 and a fourth wire 766 can electrically couple thesecurity system 202 to a first side 768 of the interface 758. Wires 772,774 can electrically couple the door lock 250 to the second side 770 ofthe interface 758. The first side 768 and the second side 770 can enablewireless electrical energy transmission from the security system 202 tothe door lock 250 via the interface 758.

A fifth wire 776 can electrically couple the chime 302 to thetransformer 756. Pressing the doorbell button 212 can cause the securitysystem 202 to close the circuit from the transformer 756 to the chime302 (e.g., to “ring” the chime).

The security system 202 can drain electricity through a wire 762 to thechime 302. The drained electricity can be below a threshold that causesthe chime 302 to emit a notification sound (e.g., a “ring”). In thisway, the security system 202 can receive electricity from thetransformer 756 to charge the door lock 250 even when the securitysystem 202 is not causing the chime 302 to emit a notification sound.

FIG. 7 illustrates a diagrammatic view of a charging system 778, whichcan include the interface 758. Many variations of the interface 758 arepossible. The interface 758 can include a first side 768 that iselectrically coupled and/or mechanically coupled to the security system202. The interface 758 can also include a second side 770 that iselectrically coupled and/or mechanically coupled to the door lock 250.

The interface 758 can comprise or be part of an induction chargingsystem 778. The first side 768 can comprise a first induction coil 780.The induction charging system 778 can use the first induction coil 780to create an alternating electromagnetic field from the first side 768.

The second side 770 can comprise a second induction coil 782 that gainspower from the electromagnetic field generated using the first inductioncoil 780. The second side 770 and/or the door lock 250 can convert thepower from the electromagnetic field into electrical current to chargethe batteries 752. (Current can flow through the second induction coil782 due to the magnetic flux caused by the first induction coil 780.)The first induction coil 780 and the second induction coil 782 form anelectrical transformer to wirelessly charge the door lock 250.

In some embodiments, the second side 770 includes a second inductionconductor 788 configured to perform the functions described hereinregarding the second conduction coil 782. The second induction conductor788 can comprise a metal portion, which can be straight.

The second side 770 can be integrated into a side of the door 254 (shownin FIG. 6). For example, the second side 770 can be coupled to the sideof the door that includes the face plate (e.g., the face plate throughwhich a deadbolt or latching mechanism can protrude). In someembodiments, the second side 770 is coupled to the face plate.

The first side 768 can be integrated into a door frame and/or door jamb.In several embodiments, the first side 768 is coupled to a strike platethat is attached to a door frame and/or door jamb. The strike plate canbe configured to receive the deadbolt or latching mechanism (e.g., asthe deadbolt or latching mechanism protrudes into a strike box).

FIG. 8 illustrates a front view of a door 254. A door lock 250 isconfigured to lock the door 254. The door lock 250 includes a face plate784. Second sides 770 are coupled to the face plate 784 to enable thedoor lock 250 to receive electrical power from first sides 768 (shown inFIG. 7), which can be coupled to a door frame, a door jamb, and/or astrike plate. Second sides 770 can be coupled to the edge 786 of thedoor 254.

FIG. 13 illustrates a diagrammatic view of a lock 250 attached to a door254 to help secure the door 254. The lock 250 can be configured toreceive electricity from the building 300. Some embodiments include ajunction 1050, which can be electrically coupled to a chime 302 and atransformer 756. The transformer 756 can be electrically coupled to apower source 754 of the building 300. The junction 1050 can beelectrically coupled to wires 760, 762 that are electrically coupled tothe chime 302 and the transformer 756 such that the junction 1050, thechime 302, and the transformer 756 are part of a circuit that can beopened and closed by a doorbell button 212. The transformer 756 islocated remotely relative to the door 254.

Two wires 764, 766 can electrically couple the junction 1050 to theinterface 758. For example, the wires 764, 766 can be electricallycoupled to the first side 768 of the interface 758. The first side 768can include a conductor configured to transmit electricity to the secondside 770 of the interface 758. The second side 770 is electricallycoupled to the door lock 250. Embodiments use many different means totransmit electricity from the first side 768 to the second side 770.Example means include electrical induction, inductive charging, magneticresonance, magnetic induction, electrical contacts, and spring-loadedelectrical contacts. Some electrical contacts are silver alloys and/or asuitable conductive metal.

The junction 1050 can electrically couple a first wire 760 to a thirdwire 764. The junction 1050 can electrically couple a second wire 762 toa fourth wire 766. The junction 1050 can include a housing in which wireconnectors (e.g., a WingTwist made by Ideal Industries, Inc.) couplewires together.

FIG. 14 illustrates a diagrammatic view of a lock 250 attached to a door254 to help secure the door 254. Some embodiments include removing adoorbell (e.g., 202 e in FIG. 5) to uncover wires 764, 766 that exit ahole 1050 in a wall 750 of a building 300. The junction 1050 (shown inFIG. 13) can be placed over the hole 750 and/or at least partiallyinside the hole 750. In FIG. 14, a first wire 760 is coupled to a thirdwire 764 and a second wire 762 is coupled to a fourth wire 766 such thatthe door lock 250 can receive electricity from the transformer 756 viathe interface 758, which can include induction coils. The inductioncoils can be integrated into a face plate and a strike plate. The faceplate can be mounted on the edge 1066 of a door 254. The edge 1066 canbe the side of the door 254 that faces the strike plate when the door254 is closed. The strike plate can be mounted on a door frame 1052.Closing the door 254 can align the strike plate and the face plate suchthat the interface 758 is capable of transmitting electricity viainduction.

The face plate can be a small, rectangular metal piece on the edge of adoor through which the bolt (e.g., a latch) protrudes. The strike platecan be a small, rectangular metal piece that receives the bolt (e.g., alatch) from the door. The bolt can extend through the strike plate.

FIG. 15 illustrates a diagrammatic view of a lock charging system 1058that includes an interface 758. The interface 758 can be arranged andconfigured for inductive charging (e.g., near field charging andcommunication). The junction 1050 can electrically couple a firstinduction coil 780 to a power supply of a building. The door lock 250can be electrically coupled to a second induction coil 782. The firstinduction coil 780 can be mechanically coupled to a strike plate. Thesecond induction coil 782 can be mechanically coupled to a face plate.Closing the door 254 (shown in FIG. 14) can position the secondinduction coil 782 relative to the first induction coil 780 to enablethe power supply 754 (shown in FIG. 14) to provide electricity to thelock 250 via induction.

FIG. 15 illustrates an embodiment that includes near field energytransmission and near field communication. The electricity can betransmitted via electrical induction. Direct induction and magneticinduction can be used to transmit electricity from the strike plateassembly to the lock.

Embodiments can use many different types of induction. Resonantinductive coupling, synchronized magnetic-flux phase coupling and/orelectrodynamic induction can be used for near field wirelesstransmission of electrical energy. For example, two coils can be tunedto resonate at approximately the same frequency. A resonant and aresonance transformer can be used to wirelessly transmit electricalenergy.

The Wireless Power Consortium has developed standards for wireless powertransmission. One interface standard is called Qi. Qi uses resonantinductive coupling. Embodiments can use induction methods, procedures,and structures according to the Qi standards.

The Power Matters Alliance (PMA) has also developed standards andprotocols for wireless power transmission. The standards are based oninductive coupling technology to enable inductive and resonant powertransfer. Embodiments can use induction methods, procedures, andstructures according to the PMA standards.

Wireless power transfer systems can also be used for digital transceivercommunication. Some embodiments also enable cloud-based devicemanagement.

The embodiments described herein can use standards from the WirelessPower Consortium and from the Power Matters Alliance. Severalembodiments use other standards and means of wireless powertransmission.

FIGS. 16 and 17 illustrate perspective views of a door lock 250 a. FIG.16 illustrates an exterior side of the door lock 250 a. The exteriorside can be placed on the side of the door that faces outside when thedoor is closed. The exterior side of the door lock 250 a can include acamera assembly 1072 that faces outward relative to the door. Theexterior side can also include a keyhole 1074 configured to enable aperson to insert a key to adjust the throw of the bolt 1076 (to lock orunlock the door).

FIG. 17 illustrates an interior side of the door lock 250 a. Theinterior side can be placed on the side of the door that faces insidewhen the door is closed. The interior side can include a handle 1080configured to enable a person to rotate the handle 1080 to lock orunlock the door.

The door lock 250 a can be a portion of the lock system 1068 illustratedin FIG. 21. The door lock 250 a helps illustrate various embodiments ofthe door locks 250 described herein. The door lock 250 a can be used inplace of the door locks 250 described herein. Features described in thecontext of door locks 250 can be used with the embodiments described inthe context of door locks 250 a.

Referring now to FIGS. 16 and 17, the lock 250 a can be configured toreceive electricity from a transformer that is located remotely relativeto the door (e.g., as illustrated in FIG. 13). The lock system cancomprise an outer housing 1082. The lock system can also include a bolt1076 configured to protrude away from the outer housing 1082 and past aface plate 1084 to secure the door 254 by entering a hole 1090 in a doorframe 1052 (shown in FIG. 21). The bolt 1076 can be a metal protrusionthat slides in and out of the lock 250 a. The bolt 1076 comprises athrow distance 1078, which can be measured as the projection of the boltfrom the side of the door that typically includes the face plate 1084.For example, in some embodiments, a bolt 1076 can extend between zeroand four centimeters from a face plate 1084. The bolt 1076 can have thegeometry of a deadbolt or can be angled (as is the case when a bolt is atype of latch).

Some locks include an electrical control system 1092, which can includea printed circuit board with any necessary components. The electricalcontrol system 1092 can include a Wi-Fi communication system 1094 and abattery 1096. The electrical control system 1092 can be placed withinthe housing 1082 of the lock 250 a. The electrical control system 1092is configured to adjust the throw distance 1078 of the bolt 1076. Forexample, the electrical control system 1092 can cause the bolt 1076 toextend and retract relative to the face plate 1084.

A remote computing device 204 can control the electrical control system1092 of the lock 250 a. Example remote computing devices includecellular phones, smartphones, laptops, tablets, desktop computers, andother computing devices capable of data input (e.g., cars with computerdisplays and watches capable of wireless communication).

In some embodiments, locks need electricity. A power receiver can enablea lock to receive electrical power wirelessly or via wires. The powerreceiver can be integrated into at least a portion of the lock.

Referring now to FIGS. 15 and 16, the lock system comprises a powerreceiver 1098 coupled to the face plate and/or to a side of the doorthat faces the door frame. The power receiver 1098 can be configured toreceive the electricity from a power transmitter 1120. The powertransmitter 1120 can be coupled to a strike plate 1086 and/or to a doorframe.

In addition to transmitting electricity between the power transmitter1120 and the power receiver 1098, the lock system can communicate viathe power receiver 1098 and the power transmitter 1120. In someembodiments, the lock 250 a includes a wireless data transmitter (e.g.,for Wi-Fi or Bluetooth communication). The Wi-Fi system 1094 is anembodiment of a wireless data transmitter.

Referring now to FIG. 21, the strike plate 1086 can be configured to becoupled to a door frame 1052. The power transmitter 1120 can beconfigured to receive the electricity from the transformer 756. Thepower receiver 1098 can be electrically coupled to the electricalcontrol system 1092 (shown in FIG. 16) such that the power receiver 1098is configured to provide the electricity to the electrical controlsystem 1092 such that the electrical control system 1092 is capable ofoperating the bolt 1076. The electrical control system 1092 can governthe position of a solenoid that is mechanically coupled to the bolt 1076such that the solenoid can move the bolt to locked and unlockedpositions.

FIG. 20 illustrates a front view of the face plate 1084 and the strikeplate 1086. The door 254 is shown but the door frame 1052 is hidden. Inthe embodiment illustrated in FIG. 20, the power receiver 1098 is awireless power receiver and the power transmitter 1120 is a wirelesspower transmitter. The power receiver 1098 is an induction receiver.

The power transmitter 1120 is an induction transmitter. Once the faceplate 1084 is sufficiently proximate to the strike plate 1086, the powerreceiver 1098 will be arranged to receive the electricity 1122 from theinduction transmitter. The power transmitter 1120 comprises at least oneinduction coil 1124 that is coupled to the strike plate 1086. The powerreceiver 1098 comprises at least one induction coil 1124 that is coupledto the face plate 1084. The door lock 250 a enables transmitting theelectricity 1122 wirelessly via inductive charging and/or magneticresonance.

FIG. 22 illustrates a schematic view of a solenoid 1130 that is coupledto the outer housing 1082 of the door lock 250 a in some embodiments.(The outer housing 1082 is shown in FIG. 16.)

Referring now to FIGS. 16 and 22, the solenoid 1130 can be configured tocontrol the throw distance 1078 of the bolt 1076 (e.g., by pushing thebolt in and out of the face plate 1084). The solenoid 1130 can push thebolt 1076 into a hole 1090 in the strike plate 1086 (shown in FIG. 21).The solenoid 1130 can pull the bolt 1076 out of the hole 1090 in thestrike plate 1086. A spring can be arranged to act against the forcegenerated by the solenoid. A spring 1134 can be arranged and configuredto apply a force on the bolt 1076 that pushes the bolt 1076 outwardrelative to the face plate 1084 such that the lock 250 a is configuredto remain in a locked configuration when the solenoid 1130 receivesinsufficient electrical power to overcome the force of the spring 1134.

In several embodiments, the solenoid 1130 is electrically coupled to theelectrical control system 1092 and the power receiver 1098 (shown inFIG. 21) such that the lock system is capable of providing theelectricity from the transformer to the power receiver that is coupledto the face plate 1084, and then the power receiver 1098 is capable ofproviding the electricity to the solenoid 1130.

The solenoid 1130 can be placed at least partially inside a solenoidhousing 1132, which can be coupled to the housing 1082 of the lock 250 asuch that the solenoid is arranged to retract the bolt 1076 whensufficient electrical power is applied to the solenoid 1130 (to overcomethe force of the spring 1134). A travel limiter 1136 can prevent thebolt 1076 from extending too far. The travel limiter 1136 can bearranged to collide with the solenoid housing 1132 to prevent the bolt1076 from extending too far.

The solenoid 1130 can be located between the keyhole 1074 and the powerreceiver 1098 of the face plate 1084. The solenoid 1130 can beelectrically coupled to the power receiver 1098 of the face plate 1084such that the solenoid 1130 is configured to receive the electricityfrom the transformer.

Some lock embodiments include elements from security systems describedin applications incorporated herein by reference. The embodimentsdescribed herein can be combined with the security system embodimentsincorporated by reference. The remote computing devices described inembodiments incorporated by reference can be used with the lockembodiments described herein. Additional embodiments can be formulatedby replacing the security systems described in applications incorporatedby reference with lock embodiments described herein.

Locks can use the cameras, speakers, microphones, and doorbell buttonsdescribed in embodiments incorporated by reference. In severalembodiments, a camera can be coupled to the outer housing of the lock.The camera can be configured to face outward from the door. A speakerand a microphone can be coupled to the outer housing. The camera can beconfigured to take a picture of a visitor to the lock. For example, thelock can detect when a visitor approaches the lock.

The lock can take a picture of the visitor in response to detecting thevisitor. The speaker can be configured to enable communication with auser of a remote computing device. For example, the speaker can emitsounds from a user of the remote computing device to enable the visitorto hear the user of the remote computing device. The microphone can beconfigured to record sounds from the visitor for transmission to theremote computing device. For example, the microphone can record thevisitor speaking to enable the user to hear the visitor.

FIG. 18 illustrates a perspective view of a door lock 250 a integratedinto a door 254. From the perspective illustrated in FIG. 18, the rightside of the door is configured to be attached to hinges and the leftside of the door is configured to face towards a strike plate of a doorframe. The door lock 250 a includes a camera 1072, a speaker 1128, and amicrophone 1126.

Referring now to FIG. 16, the lock 250 a can include a wireless datatransmission system (e.g., the Wi-Fi system 1094) configured to receivelock commands from the remote computing device 204 and configured towirelessly transmit pictures and sounds from the visitor to the remotecomputing device 204. The wireless data transmission system can useWi-Fi, Bluetooth, and/or radiofrequency means of communication. Thepower transmitter 1120 is integrated into the strike plate 1086. Thepower receiver 1098 is integrated into the face plate 1084.

In some embodiments, the power transmitter is located within 20centimeters and/or within 10 centimeters of the power receiver. Thepower transmitter can be inductively coupled with the power receiversuch that the power transmitter is configured to inductively transmitthe electricity to the power receiver of the face plate via electricalinduction.

Referring now to FIG. 20, the power transmitter 1120 can comprise afirst induction conductor (e.g., a coil 1124). The power receiver 1098can comprise a second induction conductor (e.g., a coil 1124). The firstinduction conductor can located within 10 centimeters and/or within 4centimeters of the second induction conductor.

The face plate 1084 can be aligned with the strike plate 1086 such thatthe first induction coil can be inductively coupled with the secondinduction coil. Alignment is achieved when the first induction coil canbe inductively coupled with the second induction coil. Alignment doesnot necessary require the face plate and the strike plate to be orientedparallel to each other. The face plate and the strike plate can beoffset from each other and still be in alignment if the first inductioncoil can be inductively coupled with the second induction coil. Thus,alignment can be judged by inductive capability.

Some embodiments include removing a doorbell from a wall to gain accessto wires that were attached to the doorbell. These wires can be coupledto the transformer and the chime. These wires can be used to provideelectricity to the lock (e.g., via a strike-plate power-transmissionassembly).

In several embodiments, a strike plate is coupled to the door frame anda face plate is coupled to a side of the door such that the strike platefaces towards the face plate. The side of the door to which the faceplate is coupled can be opposite the side of the door to which hingesare attached. The power transmitter can comprise a first induction coil.The power receiver can comprise a second induction coil. The face platecan be oriented relative to the strike plate such that the firstinduction coil is capable of being inductively coupled with the secondinduction coil. The second induction coil can be oriented at an anglerelative to the first induction coil. The angle can be less than 30degrees and/or less than 20 degrees. The second wire can be electricallycoupled to the transformer via the chime. The second wire can beelectrically coupled to the transformer and the chime. The first wireand the second wire can be electrically coupled to the transformer whilethe transformer is located inside of the building. The first wire andthe second wire can protrude into a second hole that leads to an areaoutside of the building. The second hole can be the hole in which wiresfor a doorbell are located (to enable installing a doorbell on anexterior wall of the building).

In several embodiments, the power transmitter of the strike plate iselectrically coupled to the power receiver of the face plate to enablethe lock to receive the electricity from the transformer. Electricalcoupling can be achieve wirelessly (e.g., via induction) and/or viaconductive wires.

FIG. 23 illustrates an embodiment that enables electric coupling viaconductive wires (rather than via induction). In the face plate 1084,the coils are replaced with spring-loaded electrical contacts 1140. Inthe strike plate 1086, the coils are replaced with conductive tabs 1142configured to form an electrical connection with the electrical contacts1140 when the door is closed.

The electrical control system can be communicatively coupled to thepower transmitter (e.g., such that the electrical control system iscapable of sending communications to the power transmitter). The powertransmitter can be communicatively coupled to a network connectionmodule that is electrically coupled to a power outlet of the buildingsuch that the network connection module is configured to transmit datato the lock. More information regarding communicating via power lines isincorporated by reference from U.S. Provisional Patent Application No.62/026,639.

Lock History Embodiments

FIG. 9 illustrates a history 570 of lock-related events displayed on auser interface (e.g., of a smartphone, tablet, laptop, desktop computer,or television). The history can include when a door was locked andunlocked. The history can also include when the lock was set up and/or“paired” with the computing device 204 (show in FIG. 1).

Several embodiments comprise taking at least one image of the visitor oneach occasion the visitor unlocks the lock 250; associating a time and adate with each additional image; and recording the additional images,the times, and the dates in the remote database 436. Methods can furthercomprise enabling the remote computing device 204 to display the images,the times, and the dates. For example, a user of the remote computingdevice 204 can search through the images to see the visitor who enteredthe building at a particular entry time (as captured in the history).

Watch Embodiments

FIG. 10 illustrates a front view of a computing device 204, which can bea watch that a user can wear around a wrist. The watch can include adisplay screen 242, which can show a user interface 240. The userinterface 240 can include all of the features described in the contextof FIG. 2.

A user can receive visitor notifications via the watch. The watch canenable a user to “answer” her door. The user can see video of thevisitor that is recorded by the security system 202 (shown in FIG. 1)via the display screen 242. The watch can include a microphone and aspeaker to enable the user to talk with the visitor.

FIG. 11 illustrates the watch interacting with the security system 202,the server 206, and the door lock 250. The watch can connect to awireless network 308 (shown in FIG. 3). The watch can also communicatewith the security system 202 via short range communication protocolssuch as Bluetooth. The watch can be a “smart watch” with all thefeatures of smartphones. In several embodiments, the watch comprises acellular phone.

FIG. 12 illustrates an embodiment in which the watch is a computingdevice 204 that wirelessly communicates with a door lock 250. The watchcan include a user interface 240 that enables a user to lock and unlockthe door lock 250 remotely.

Mechanical Doorbell and Digital Doorbell Embodiments

Some embodiments combine a digital doorbell operating system with amechanical doorbell operating system. In some embodiments, the securitysystem 202 in FIG. 1 can comprise a digital doorbell in which thedoorbell closes the circuit to ring a chime due to software rather thandue to a mechanical switch that is directly activated by a personpushing a doorbell button. In several embodiments, the security system202 e in FIG. 5 can be a mechanical doorbell. With a mechanicaldoorbell, a person physically closes the circuit to ring the chime bypressing the doorbell button 212 e.

Referring now to FIG. 5, several security system embodiments include asystem that runs software with a mechanical doorbell in one rigidhousing. These embodiments can receive electricity from a power source754 to run software configured to detect visitors and to enable sendingvisitor notifications to remote computing devices 204 (shown in FIG. 1).These embodiments can also include a doorbell button 212 e (shown inFIG. 1) configured such that pressing the doorbell button 212 ephysically closes a circuit between the transformer 756 and the chime302.

In some embodiments, a digital doorbell operating system and amechanical doorbell operating system run on the same platform utilizingone power source 754. This power source 754 can be coupled to the twooperating systems via wires that protrude out of a doorbell hole of abuilding.

Visitor Identification Embodiments

Many embodiments utilize the visitor identification abilities of theperson using the remote computing device 204 (shown in FIG. 1). Varioustechnologies, however, can be used to help the user of the remotecomputing device 204 to identify the visitor. Some embodiments useautomated visitor identification that does not rely on the user, someembodiments use various technologies to help the user identify thevisitor, and some embodiments display images and information (e.g., aguest name) to the user, but otherwise do not help the user identify thevisitor.

Referring now to FIG. 1, the camera assembly 208 can be configured tovisually identify visitors through machine vision and/or imagerecognition. For example, the camera assembly 208 can take an image ofthe visitor. Software run by any portion of the system can then compareselect facial features from the image to a facial database. In someembodiments, the select facial features include dimensions based onfacial landmarks. For example, the distance between a visitor's eyes;the triangular shape between the eyes and nose; and the width of themouth can be used to characterize a visitor and then to compare thevisitor's characterization to a database of characterization informationto match the visitor's characterization to an identity (e.g., anindividual's name, authorization status, and classification). Someembodiments use three-dimensional visitor identification methods.

Some embodiments include facial recognition such that the cameraassembly 208 waits until the camera assembly 208 has a good view of theperson located near the security system 202 and then captures an imageof the person's face.

Some embodiments include fingerprint matching to verify the identity ofthe visitor. A visitor can place her finger over the camera assembly 208to enable the system 200 to detect her fingerprint. Some security system202 embodiments include a fingerprint reader 210.

The fingerprint reader 210 can enable the system to compare thefingerprint of the visitor to a database of fingerprints to identifyand/or classify the visitor. The database of fingerprints can be createdby the user and/or can include a database of fingerprints from a lawenforcement agency (e.g., a database of criminals).

The fingerprint reader 210 can use any suitable algorithm includingminutia and pattern algorithms. The fingerprint reader 210 can analyzefingerprint patterns including arch patterns, loop patterns, and whorlpatterns. The fingerprint reader 210 can include any suitablefingerprint sensor including optical, ultrasonic, passive capacitance,and active capacitance sensors.

The fingerprint reader 210 can be integrated into the outer housing 224of the security system 202, which can be mounted within seven feet of adoor or entryway of rental lodging, such as a hotel room or an apartmentfor short-term rent. In some embodiments, the security system 202 can beconfigured to be mounted in an entryway. Some methods include mounting asecurity system in an entryway of a building.

The fingerprint reader 210 can be integrated into the doorbell button212. Pressing the doorbell button 212 can enable the fingerprint reader210 to analyze the fingerprint of the visitor.

Several embodiments can establish a visitor's identity by detecting asignal from a device associated with the visitor (e.g., detecting thevisitor's smartphone). Examples of such a signal include Bluetooth,Wi-Fi, RFID, NFC, and/or cellular telephone transmissions.

Some embodiments include using a doorbell to detect the visitor afterthe visitor has approached the doorbell while the visitor is locatedoutside of a building (e.g., the building 300 in FIG. 3) to which thedoorbell is attached. The building can comprise a door having a lock250. The lock 250 can be configured to fasten the door to inhibitunauthorized entry into the building (without breaking down the door).

Combinations with Embodiments Incorporated by Reference

The embodiments described herein can be combined with any of theembodiments included in the applications incorporated by reference. Invarious embodiments, the security systems described herein can includefeatures and methods described in the context of security systems fromapplications incorporated by reference.

Interpretation

None of the steps described herein is essential or indispensable. Any ofthe steps can be adjusted or modified. Other or additional steps can beused. Any portion of any of the steps, processes, structures, and/ordevices disclosed or illustrated in one embodiment, flowchart, orexample in this specification can be combined or used with or instead ofany other portion of any of the steps, processes, structures, and/ordevices disclosed or illustrated in a different embodiment, flowchart,or example. The embodiments and examples provided herein are notintended to be discrete and separate from each other.

The section headings and subheadings provided herein are nonlimiting.The section headings and subheadings do not represent or limit the fullscope of the embodiments described in the sections to which the headingsand subheadings pertain. For example, a section titled “Topic 1” mayinclude embodiments that do not pertain to Topic 1 and embodimentsdescribed in other sections may apply to and be combined withembodiments described within the “Topic 1” section.

Some of the devices, systems, embodiments, and processes use computers.Each of the routines, processes, methods, and algorithms described inthe preceding sections may be embodied in, and fully or partiallyautomated by, code modules executed by one or more computers, computerprocessors, or machines configured to execute computer instructions. Thecode modules may be stored on any type of non-transitorycomputer-readable storage medium or tangible computer storage device,such as hard drives, solid state memory, flash memory, optical disc,and/or the like. The processes and algorithms may be implementedpartially or wholly in application-specific circuitry. The results ofthe disclosed processes and process steps may be stored, persistently orotherwise, in any type of non-transitory computer storage such as, e.g.,volatile or non-volatile storage.

The various features and processes described above may be usedindependently of one another, or may be combined in various ways. Allpossible combinations and subcombinations are intended to fall withinthe scope of this disclosure. In addition, certain method, event, state,or process blocks may be omitted in some implementations. The methods,steps, and processes described herein are also not limited to anyparticular sequence, and the blocks, steps, or states relating theretocan be performed in other sequences that are appropriate. For example,described tasks or events may be performed in an order other than theorder specifically disclosed. Multiple steps may be combined in a singleblock or state. The example tasks or events may be performed in serial,in parallel, or in some other manner. Tasks or events may be added to orremoved from the disclosed example embodiments. The example systems andcomponents described herein may be configured differently thandescribed. For example, elements may be added to, removed from, orrearranged compared to the disclosed example embodiments.

Conditional language used herein, such as, among others, “can,” “could,”“might,” “may,” “e.g.,” and the like, unless specifically statedotherwise, or otherwise understood within the context as used, isgenerally intended to convey that certain embodiments include, whileother embodiments do not include, certain features, elements and/orsteps. Thus, such conditional language is not generally intended toimply that features, elements and/or steps are in any way required forone or more embodiments or that one or more embodiments necessarilyinclude logic for deciding, with or without author input or prompting,whether these features, elements and/or steps are included or are to beperformed in any particular embodiment. The terms “comprising,”“including,” “having,” and the like are synonymous and are usedinclusively, in an open-ended fashion, and do not exclude additionalelements, features, acts, operations and so forth. Also, the term “or”is used in its inclusive sense (and not in its exclusive sense) so thatwhen used, for example, to connect a list of elements, the term “or”means one, some, or all of the elements in the list. Conjunctivelanguage such as the phrase “at least one of X, Y, and Z,” unlessspecifically stated otherwise, is otherwise understood with the contextas used in general to convey that an item, term, etc. may be either X,Y, or Z. Thus, such conjunctive language is not generally intended toimply that certain embodiments require at least one of X, at least oneof Y, and at least one of Z to each be present.

The term “and/or” means that “and” applies to some embodiments and “or”applies to some embodiments. Thus, A, B, and/or C can be replaced withA, B, and C written in one sentence and A, B, or C written in anothersentence. A, B, and/or C means that some embodiments can include A andB, some embodiments can include A and C, some embodiments can include Band C, some embodiments can only include A, some embodiments can includeonly B, some embodiments can include only C, and some embodiments caninclude A, B, and C. The term “and/or” is used to avoid unnecessaryredundancy.

While certain example embodiments have been described, these embodimentshave been presented by way of example only, and are not intended tolimit the scope of the inventions disclosed herein. Thus, nothing in theforegoing description is intended to imply that any particular feature,characteristic, step, module, or block is necessary or indispensable.Indeed, the novel methods and systems described herein may be embodiedin a variety of other forms; furthermore, various omissions,substitutions, and changes in the form of the methods and systemsdescribed herein may be made without departing from the spirit of theinventions disclosed herein.

1. A lock system for a building door comprising a lock configured tocouple to the building door, wherein the lock is configured to receiveelectricity from a transformer that is located remotely relative to thebuilding door, wherein the transformer is configured to provideelectrical energy to a doorbell chime, the lock system comprising: anouter housing; a bolt configured to protrude from the outer housing andpast a face plate to secure the building door by entering a hole in adoor frame, wherein the bolt comprises a throw distance; an electricalcontrol system configured to adjust the throw distance; and a conductionreceiver coupled to the face plate, wherein the conduction receivercomprises an electrical contact, wherein the electrical contact of theconduction receiver is configured to conductively receive theelectricity from a conductive tab of a conduction transmitter.
 2. Thelock system of claim 1, wherein the conduction transmitter is coupled toa strike plate, wherein the strike plate is configured to be coupled tothe door frame, wherein the conduction transmitter is configured toreceive the electricity from the transformer, wherein the conductionreceiver is electrically coupled to the electrical control system suchthat the conduction receiver is configured to provide the electricity tothe electrical control system such that the electrical control system iscapable of operating the bolt.
 3. The lock system of claim 2, whereinthe conduction receiver is a wireless conduction receiver and theconduction transmitter is a wireless conduction transmitter.
 4. The locksystem of claim 3, wherein the conduction receiver is configured toreceive the electricity from an conduction transmitter that is coupledto the strike plate, wherein the electrical contact of the conductionreceiver comprises a first electrical contact and a second electricalcontact.
 5. The lock system of claim 2, wherein the lock system furthercomprises a solenoid coupled to the outer housing, wherein the solenoidis configured to control the throw distance of the bolt.
 6. The locksystem of claim 5, wherein the solenoid is electrically coupled to theelectrical control system, and wherein the solenoid is electricallycoupled to the conduction receiver that is coupled to the face platesuch that the lock system is capable of providing the electricity fromthe transformer to the conduction receiver that is coupled to the faceplate, and then the conduction receiver is capable of providing theelectricity to the solenoid.
 7. The lock system of claim 5, wherein thelock system further comprises a spring configured to apply a force onthe bolt that pushes the bolt outward relative to the face plate suchthat the lock is configured to remain in a locked position when thesolenoid receives insufficient electrical power to overcome the force.8. The lock system of claim 2, further comprising: a keyhole configuredto enable a key to adjust the throw distance to unlock the lock; acamera coupled to the outer housing, wherein the camera is configured toface outward from the building door; a speaker coupled to the outerhousing; a microphone coupled to the outer housing, wherein the camerais configured to take a picture of a visitor to the lock, wherein thespeaker is configured to enable communication with a user of a remotecomputing device, and wherein the microphone is configured to recordsounds from the visitor for transmission to the remote computing device;and a wireless data transmission system configured to receive lockcommands from the remote computing device and configured to wirelesslytransmit the picture and the sounds to the remote computing device.
 9. Alock system comprising a lock configured to couple to a door, whereinthe lock is configured to receive electricity from a transformer that islocated remotely relative to the door, wherein the transformer isconfigured to provide electrical energy to a doorbell chime, the locksystem comprising: the lock comprising an outer housing, an electricalcontrol system, a face plate, and a bolt, wherein the bolt and the faceplate are coupled to the outer housing such that the bolt is arrangedand configured to protrude from the outer housing and past the faceplate to secure the door by entering a first hole in a door frame,wherein the bolt comprises a throw distance, and wherein the electricalcontrol system is configured to adjust the throw distance; a conductionreceiver coupled to the face plate of the lock, wherein the conductionreceiver comprises an electrical contact, wherein the conductionreceiver is electrically coupled to the electrical control system of thelock; a strike plate configured to be coupled to the door frame, whereinthe strike plate faces towards the face plate such that the boltprotrudes from the face plate and past the strike plate; and aconduction transmitter coupled to the strike plate, wherein theconduction transmitter comprises a conductive tab, wherein theconduction transmitter is configured to be electrically coupled to thetransformer to receive the electricity from the transformer while thetransformer is electrically coupled to a power source of a building andwhile the transformer is electrically coupled to the doorbell chime,wherein the conduction transmitter is configured to conductivelytransmit the electricity from the conductive tab of the conductiontransmitter to the electrical contact of the conduction receiver tothereby enable the lock to receive the electricity from the transformer.10. (canceled)
 11. (canceled)
 12. The lock system of claim 9, whereinthe conductive tab of the conduction transmitter comprises a pair ofconductive tabs, wherein the electrical contact of the conductionreceiver comprises a pair of electrical contacts, and wherein the faceplate is aligned with the strike plate such that the pair of conductivetabs is conductively coupled with the pair of electrical contacts. 13.(canceled)
 14. (canceled)
 15. (canceled)
 16. The lock system of claim 9,further comprising: a keyhole configured to enable a key to adjust thethrow distance to unlock the lock; a camera coupled to the outerhousing, wherein the camera is configured to face outward from the door;a speaker coupled to the outer housing; a microphone coupled to theouter housing, wherein the camera is configured to take a picture of avisitor to the lock, wherein the speaker is configured to emit a firstsound from a user of a remote computing device, and wherein themicrophone is configured to record a second sound from the visitor fortransmission to the remote computing device; and a wireless datatransmission system configured to receive lock commands from the remotecomputing device and configured to wirelessly transmit the picture andthe second sound to the remote computing device.
 17. The lock system ofclaim 9, further comprising: a junction assembly; a first wire and asecond wire, wherein the first wire and the second wire are electricallycoupled to the transformer; and a third wire and a fourth wire, whereinthe third wire and the fourth wire are electrically coupled to theconduction transmitter, wherein the junction assembly electricallycouples the first wire to the third wire, and wherein the junctionassembly electrically couples the second wire to the fourth wire. 18.The lock system of claim 17, further comprising a doorbell, wherein thedoorbell is coupled to the junction assembly.
 19. The lock system ofclaim 17, wherein the strike plate is coupled to the door frame, theface plate is coupled to a side of the door such that the strike platefaces towards the face plate, the conductive tab of the conductiontransmitter comprises a pair of conductive tabs, the electrical contactof the conduction receiver comprises a pair of electrical contacts,wherein the face plate is oriented relative to the strike plate suchthat the pair of conductive tabs is conductively coupled with the pairof electrical contacts, the second wire is electrically coupled to thetransformer via the chime, the first wire and the second wire areelectrically coupled to the transformer while the transformer is locatedinside of the building, and the first wire and the second wire protrudeinto a second hole that leads to an area outside of the building. 20.The lock system of claim 9, wherein the electrical control system iscommunicatively coupled to the conduction transmitter, and theconduction transmitter is communicatively coupled to a networkconnection module that is electrically coupled to a power outlet of thebuilding such that the network connection module is configured totransmit data to the lock.
 21. The lock system of claim 4, wherein theconductive tab of the conduction transmitter comprises a firstconductive tab and a second conductive tab, and wherein the first andsecond electrical contacts of the conduction receiver physically touchthe first and second conductive tabs of the conduction transmitter. 22.The lock system of claim 12, wherein the pair of electrical contactsphysically touches the pair of conductive tabs.
 23. (canceled) 24.(canceled)
 25. (canceled)