Intelligent lock

ABSTRACT

A method for operating an access control comprises creating a plurality of wake-up schedules for each of one or more wireless transceivers. Each of the plurality of wake-up schedules may be configured to control how frequently a particular wireless transceiver wakes up to transmit or receive information. Each of the plurality of wake-up schedules for the particular wireless transceiver may be different from another one or the plurality of wake-up schedules for the particular wireless transceiver. The method may further comprise automatically switching between the plurality of wake-up schedules for the particular wireless transceiver such that a duration of time between wake-ups for the particular wireless transceiver radio is shorter during some predefined times and longer during other predefined times. The duration of time between wake-ups for each of the one or more of the wireless transceivers may be configurable by an administrative user via an interface.

FIELD OF THE DISCLOSURE

The present disclosure relates generally to intelligent, internetconnected door locks. In particular, but not by way of limitation, thepresent disclosure relates to systems, methods and apparatuses forimproving transmission reliability and battery life of such internetconnected door locks.

BACKGROUND

Access control systems electronically control the locking and unlockingof doors including those for buildings, office suites, residences,rental units and retail establishments. These systems typically use sometype of “credentialing” method such as pressing RFID cards to a reader,inserting magnetic cards into a slot (e.g., in hotel door locks), orentering PIN codes on a keypad to identify people who are allowed toenter. In order to grant access to people for multiple doors in abuilding or across multiple buildings, the selected credentialing methodhas to be synchronized with the lock/device at each door. There arethree primary types of credentialing systems: wired systems, standalonesystems, and standalone door locks. Each of these existing types ofcredentialing systems create various challenges in terms of expense,ease of installation, ease of use, connectivity, and security.Therefore, a need exists for improved access control systems that remedythese deficiencies.

SUMMARY

An aspect of the present disclosure provides a method for operating anaccess control device having a battery, a processor, and one or morewireless transceivers. The method may comprise creating a plurality ofwake-up schedules for each of the one or more wireless transceivers.Each of the plurality of wake-up schedules may be configured to controlhow frequently a particular wireless transceiver wakes up to transmit orreceive information. Each of the plurality of wake-up schedules for theparticular wireless transceiver may be different from another one or theplurality of wake-up schedules for the particular wireless transceiver.The method may further comprise automatically switching between theplurality of wake-up schedules for the particular wireless transceiversuch that a duration of time between wake-ups for the particularwireless transceiver radio is shorter during some predefined times andlonger during other predefined times. The duration of time betweenwake-ups for each of the plurality of wake-up schedules for each of theone or more of the wireless transceivers may be configurable by anadministrative user via an interface.

Another aspect of the disclosure provides an access control device whichmay comprise a battery, a processor, a locking mechanism, a credentialacceptance mechanism, and one or more wireless transceivers configuredto transmit or receive data from the access control device. The accesscontrol device may be configured to create a plurality of wake-upschedules for each of the one or more wireless transceivers. Each of theplurality of wake-up schedules may be configured to control howfrequently a particular wireless transceiver wakes up to transmit orreceive information. Each of the plurality of wake-up schedules for theparticular wireless transceiver may be different from another one or theplurality of wake-up schedules for the particular wireless transceiver.The access control device may be further configured to automaticallyswitch between the plurality of wake-up schedules for the particularwireless transceiver such that a duration of time between wake-ups forthe particular wireless transceiver is shorter during some predefinedtimes and longer during other predefined times. The duration of timebetween wake-ups for each of the plurality of wake-up schedules for eachof the one or more of the wireless transceivers are configurable by anadministrative user via an interface.

BRIEF DESCRIPTION OF THE DRAWINGS

FIG. 1 depicts logical block diagrams of several embodiments ofintelligent locks according to the present disclosure.

FIG. 2 is a logical network diagram showing a lock and a plurality ofnetwork components to which the lock may be directly or indirectlyconnected.

FIG. 3 is a method flowchart depicting steps and one or more algorithmsthat may be used to perform aspects of the present disclosure.

FIG. 4 is a method flowchart depicting an algorithm for determining asleep or wake state of one or more transceivers in a lock according toan embodiment of the present disclosure.

FIG. 5 is an exemplary hardware diagram depicting a lock according to anembodiment of the present disclosure.

FIG. 6 is an exemplary graphical user interface through which anadministrative user may configure settings of a lock according to thepresent disclosure.

FIG. 7 is exemplary graphical user interface through which anadministrative user may configure particular settings, including aduration of time between transceiver waking, of a lock according to thepresent disclosure.

FIG. 8 is a logical block diagram of a computer that may be used toimplement aspects of the present disclosure

DETAILED DESCRIPTION

The word “exemplary” is used herein to mean “serving as an example,instance, or illustration.” Any embodiment described herein as“exemplary” is not necessarily to be construed as preferred oradvantageous over other embodiments.

Existing wired access control systems typically require electricalcables to be pulled to each door from a central control panel in orderto control locking/unlocking doors and to control credentialingmechanisms (e.g., through a card reader or PIN keypad). The controlpanel is then wired to a computer that runs software to manage users.The primary elements of this kind of system are (1) a central computersoftware, (2) a door controller(s), (3) a door locking/unlocking device(electric strike, magnetic lock, etc.), and (4) a credentialingmechanism (card reader, keypad, etc.).

Throughout the disclosure, the term “administrative user” may be used torefer to an individual or set of authorized individuals who own locks orotherwise have permission to change settings of one or more locks. Theterm “access user” may be used to refer to an individual or set ofindividuals who attempt to gain access to a locked area via entering acode into, or presenting a credential to, a lock of the presentdisclosure.

Existing standalone systems are similar to wired systems except theyonly control a single door and are not part of a centralized system. Theprimary elements of this kind of system are (1) a door controller, (2) adoor locking/unlocking device (electric strike, magnetic lock, etc.),(3) a credentialing mechanism (card reader, keypad, etc.), and sometimes(4) a non-connected computer running software to manage access users. Inthe case that software is used, the access user information istransferred from the software to the system using some type of plugincable or reader (e.g. a USB cable, PDA device, etc.).

Existing standalone door locks are single unit door locks with either akeypad, card reader, or other credentialing system built into the lock.These units are comprised of a controller, locking/unlocking device, andcredentialing system all-in-one. Sometimes a non-connected computerrunning software to manage access users is used. In this case as well,the access user information may be transferred from the software to thedoor lock using some type of plugin cable or reader (e.g. a USB cable,PDA device, etc.).

There are four main categories of problems that must be addressed in anylarge-scale access control system, which are problems related to 1)remote doors, 2) onsite maintenance needs, 3) managing multiple locks ina single system, and 4) creating an API that can access multiple locktypes.

Regarding the “remote door” category of problems, each of these problemsstems from the fact that in certain building environments, there arelarge numbers of doors in remote locations. These doors can be difficultand expensive to connect via cable to the centrally located doorcontrollers and computer systems. To address this difficulty in theindustry, some door lock companies and system manufacturers havedeveloped wireless communication capabilities that allow a standalonedoor lock to communicate with central computer software via a localprotocol wireless network. The elements of this solution may include (a)local protocol RF transceivers with a proprietary or industry-standardnon-WiFi radio frequency (Z-Wave, Zigbee, or Bluetooth) installed inboth the door locks and in/on the system door controller and (b)multiple additional gateways that communicate with the door locksthrough the proprietary or industry-standard frequency, and by whicheach gateway then communicates through a WiFi router to the Internet.

These types of RF transceiver systems themselves present three mainproblems: First, these types of local networks are very complicated toset up and often require a certified installer. Such installers arescarce and expensive. Second, the door locks themselves are veryexpensive. Third, because of the proprietary or standard RF protocols,the door lock receiver has to be integrated at the factory level to workwith each access control system requiring a one-to-one softwaredevelopment effort between the lock manufacturer and every systemmanufacturer.

The multiple gateways required by these systems also present additionalproblems. For example, such systems may require that a large number ofthem be installed to sufficiently reach the locks with the proprietaryor standard RF networks given their transmission range limitations.Customers have to pay extra for these additional gateways, andinstallation is expensive. Often, these factors result in installersrepeatedly trying to reposition gateways to find optimal coverage.

Regarding the “onsite maintenance” category of problems, existing accesscontrol systems often require expensive hardware and software to bepurchased and maintained onsite in every building in order to manageusers. Additionally, system managers must physically go to the site inorder to manage any additions/deletions of access users and to performsystem maintenance. To solve this problem, some manufacturers havedeveloped true cloud-based systems which run all the software in thecloud, which eliminates the need for an access control system computerat each site. Other companies have used VPNs and other networkingcapabilities to remotely access the onsite servers.

However, this type of cloud-based solution presents new challenges ofits own. Namely, VPN solutions are complex and require a skilled ITstaff, and local servers with access control software require onsitevisits for maintenance.

Regarding the “multiple lock types” category of problems, this refers tothe fact that different types of doors may be locked by electric strike,magnetic lock, or any other variety of electrically and/or magneticallypowered physical locks available in the industry. Different locks canhave different power requirements, wiring requirements, and fail-saferequirements. Further, different locks can have different credentialingmethods, different capabilities to store access user credentials,different lock mode settings (e.g. passage mode, storehouse mode,classroom mode, etc.) and different communication methods andfrequencies (e.g. a WiFi lock pulses or sends information transmission“heartbeats” while Z-wave locks are always on and connected). All ofthese differences must be accounted for by whatever type of overallmanagement system is in place. For purposes of the present disclosure,the term “heartbeats” will be used to describe particular types ofwireless information transmissions that have the characteristics ofbeing sent at regular and/or periodic intervals, and which comprisesimilar or identical types of information in each transmission.

Regarding the “API for multiple lock types” category of problems, thisrefers to the fact that both the firmware that may be used on a localdoor lock, reader, or controller (“Lock Controlling Device”) and thesoftware that may be used for central access control management (“AccessSoftware”) must often need to provide an application program interfacethat allows different vendors of different Lock Controlling Device typesto integrate with different vendors of different Access Software. Thiscan be difficult because each integration between a Lock ControllingDevice and its Access Software requires a one-to-one integration for theAccess Software to be able to control and manage the functions that arespecific and often unique to each Lock Controlling Device. The time andexpense required to complete each of these integrations results in alimited set of Lock Controlling Devices that each Access Software cancontrol. There is no single universal translator that can interpret thecommands required to control most Lock Controlling Devices in a singleconsolidated API.

Aspects of the present disclosure provide systems, methods, andapparatuses for addressing the access control challenges previouslydescribed. Embodiments may include door locks that are both directlycloud-controlled via WiFi and locally RF connected and integrated withaccess control systems. Though other internet-connected door locksexist, most typically use the proprietary or standard local RF protocols(previously described) to then connect, via a gateway for the protocol,to the internet via a local wired or wireless router. For the purposesof clarity in the present disclosure, the term “local RF protocol” willbe used to refer to a proprietary or standard (e.g., BLE, ZigBee,Z-Wave) RF protocol that is used to communicate within a local areanetwork (LAN), mesh network, or other network in a local buildingenvironment, rather than over a Wide Area Network (WAN) or cellular datanetwork. These local RF protocols may also be referred to as“short-range RF protocols.” The term WiFi will be used to refer towireless internet transmission protocols over a WAN. Though WiFi istechnically a radio frequency (RF) protocol, for purposes of clarity inthis disclosure, it will not be referred to as an RF protocol, and willrather be referred to specifically as WiFi.

Using one of these local RF protocols requires the premises to have boththe physical local protocol gateway (usually many of them) as well asthe wired or wireless internet router. Many types of building premises(e.g., hotels, office buildings) already have many wired or wirelessinternet routers to provide internet access to their occupants, so it isadvantageous to simply utilize this existing hardware instead ofinstalling additional local gateway hardware. Some Wi-Fi connected lockswhich utilize existing routers do exist, but a main challenge towidespread implementation of these locks is that battery life is shortbecause of the high-power requirements of WiFi transmission as comparedto local RF protocol. Remote door locks that have only local RF protocolradios use less battery power, but their transmission capability is lesspowerful than that of a WiFi radio and require precise positioning ofgateways as described above. During peak transmission times, the lowerpower transmission capability can result in failed data transmissions.Therefore, WiFi-alone door locks and local RF protocol-alone door locksboth have limitations.

Locks according to the present disclosure may obtain access usercredentials in several different ways. In some embodiments, the lock maycomprise a numerical or alphanumerical keypad or touchscreen interface.In some embodiments, the lock may comprise an RFID reader, BLE reader,magnetic stripe, and/or near-field communication (NFC) reader. These mayaccept credentials that are stored in a key card, fob, smartphone, orother physical device via radio frequency transmission over a very shortrange (e.g., less than 6 inches away from the reader) In someembodiments, a single lock may comprise multiple or all of these typesof credential acceptance mechanisms. The RFID, BLE, and NFC readers alloperate via a type of radio-frequency communication, but to distinguishthe reader “credential acceptance” functionality from the local RFprotocol radio transmissions that are sent to the cloud server, theRFID, BLE, and NFC credential acceptance functionality will be referredto throughout the disclosure as “RF credentialing.”

Locks in accordance with present disclosure may comprise one or moretypes of wireless transceivers. For the purposes of the presentdisclosure, a wireless transceiver may refer to any device thattransmits and/or receives data wirelessly. Certain types of wirelesstransceivers may be referred to specifically as radios, while others maybe referred to as credentialing mechanisms and/or devices. Locksaccording to the present disclosure may comprise a single type of radio,or combinations of multiple types of radios. For example, an embodimentmay comprise a WiFi radio only. Another embodiment may comprise both aWiFi radio and BLE radio. Another may comprise a BLE radio and anotherlocal RF protocol but no WiFi radio. For example, they may comprise aBLE radio and a Zigbee or Zwave radio. Each of these embodiments (WiFionly, WiFi plus BLE, BLE plus Zigbee or Zwave) may implement one or moreaccess user authorization methods.

These access user authorization methods may include physical ortouchscreen keypad code entry that is verified either by remote serverauthentication, local Lock Controlling Device authentication or localalgorithm authentication. Remote server authentication of a code entryrefers to a system wherein an owner of the lock sets a numeric oralphanumeric code on a remote server, and when a user enters the code onthe physical lock, the lock communicates wirelessly with the server toverify if the code matches and access is authorized. Local LockControlling Device authentication of a code entry refers to a systemwherein an owner of the lock sets a numeric or alphanumeric code on aremote server, the remote server instantly (or shortly thereafter) sendsthe code to a Lock Controlling Device and when a user enters the code onthe physical lock, the Lock Controlling Device checks the code enteredby the user to verify if the code matches that previously received fromthe remote server and access is authorized. Local algorithmauthentication refers to a system wherein an administrative user of alock receives a numeric or alphanumeric code generated by an algorithmbased on a serial number of the lock (e.g., on paper or via an onlinesystem of the manufacturer), and when an access user enters the code,the algorithm is performed locally at the lock, without communicatingwirelessly to any server.

Other kinds of access user authorization methods may be used instead ofor in conjunction with the remote server authentication or localalgorithm authentication previously described. For example,authentication via a magnetic stripe key card may be used. Wirelesstransceiver credentialing mechanisms, such as an RFID or near-fieldcommunication (NFC) device, in which authentication information iswirelessly transmitted through a short-range wireless protocolimplemented on a physical authentication device, may be used. Thesetypes of physical authentication devices typically comprise an NFCtransceiver and transmit information when in very close proximity—i.e.,a few centimeters or less—of another NFC transceiver, and may includekey fobs, cards, wearable devices, or smartphones, for example. They mayalso comprise capacitive proximity sensors and targets.

Several embodiments of a remote door lock may be implemented accordingto the present disclosure. FIG. 1 shows logical block diagrams ofvarious embodiments. Lock 100 may comprise a WiFi radio 101 and anaccess authentication module 102. As shown, the access authenticationmodule 102 is non-RFID credentialing, meaning it may authenticate accessby other methods previously mentioned (e.g., keypad, algorithm, etc.).Lock 110 may comprise both a WiFi radio 111, one or more local RFprotocol radios 113, and an access authentication module (non-RFIDcredentialing) 112. Lock 120 may comprise no WiFi radios, but may havetwo or more types of local RF protocol radios, including local RFprotocol radio 1 123 and local RF protocol radio 2 124, and an accessauthentication module 122.

Another embodiment is shown as lock 140, which may comprise a WiFi radio141 and an access authentication module 142. The access authenticationmodule 142 may comprise non-RFID credentialing methods but may alsocomprise an RFID credentialing module 145. The RFID credentialing module145 may be implemented by BLE or another type of NFC (i.e., a wirelesstransceiver). Lock 150 may comprise a WiFi radio 151, a local RFprotocol radio 153, access authentication module 152, and RFIDcredentialing module 155. In some embodiments, BLE may be used toimplement both the local RF protocol radio 153 as well as the RFIDcredentialing module. For example, BLE may be used to both connect thelock to the internet and to read a credential. Lock 160 may comprise aplurality of local RF protocol radios 163, 164, an access authenticationmodule 162, and RFID credentialing module 165. The plurality of local RFprotocol radios may be implemented by, for example, a Zigbee radio and aBLE radio, and in some embodiments the Zigbee radio may be used toconnect the lock to the internet and the BLE radio may be primarily usedto implement the RFID credentialing module 165 to read a credential. Insuch embodiments, the BLE radio may be used as a backup to connect tothe internet if the Zigbee radio cannot connect and a gateway exists onsite that can use BLE to communicate with the lock and WiFi tocommunicate with the internet. Lock 170 may have no network connectivitybut may comprise an access authentication module 172 and an RFIDcredentialing module 175. which may be implemented by BLE or another NFCtransceiver.

One aspect of the disclosure is that any of the WiFi and local RFprotocol radios and associated processors may be in either a “sleep”(i.e., low-to-no power requirement) mode or an “awake” (i.e.,functional) mode at given times in order to save power and maximizetransmission power. In general, the WiFi radio may consume more batterypower when it is awake, may transmit more frequently, and its datatransmissions may be more reliable than those of the local RF protocolradio. Several kinds of data transmissions take place between remotedoor locks and the server that controls them, such as the cloud serversin embodiments of the present disclosure. The cloud servers may host anapplication, referred to herein as a “cloud service,” that transmits andreceives information via the internet to and from the locks and to andfrom administrative users. The cloud service may provide one or moreinterfaces for administrative users to access and change information andsettings of their locks. A number of factors may determine whatinformation gets transmitted to and from the locks and the cloudservice, which will be described further in this disclosure. Datatransmitted between locks and the cloud service may be referred tosimply as “transmissions.” Some of the transmissions may include thepreviously described “heartbeat” transmissions, and may compriseinformation such as battery status, number and times of entries, andother lock health information.

In certain circumstances, such as high transmission volume time periods(also referred to herein as “peak times”), it may be preferable toutilize the WiFi radio over the local RF protocol radio to ensure thattransmission takes place. For example, if an administrator user haschanged an access permission (e.g., changed a keypad code oractivated/deactivated a card) at the server, that kind of transmissionis very high-priority, and would most beneficially be transmitted overWiFi during those peak times to ensure that the lock receives thecorrect credential identifying information. Or, if tampering has beendetected at a lock, or a failure of the lock's battery is imminent, thetransmission of such information may also be high-priority. Peak timesin an office building may include the beginning and ending of work hoursor shifts, and peak times in a hotel may include check in, check out,and early evening times, for example.

However, during non-peak times, and/or for less critical informationtransmission (including heartbeats), it may be advantageous to use thelocal RF protocol radio to save battery power. The local RF protocolradio may itself have sleep and awake modes, and in its awake modes maytransmit information such as status data (i.e., a response to an inquiryfrom the cloud server about a status of the lock), battery information,number of access requests, connectivity issues, time-delayed data, orother information that is considered less time-sensitive and/or criticalthan high-priority information. Therefore, the lock may save batterypower by allowing both the WiFi radio and local RF protocol radio to beasleep at the same time or may save battery power by only waking up thelocal RF protocol radio and not the WiFi radio for certaintransmissions.

Another aspect of the disclosure is that one or more of the WiFi radioand local RF protocol radio may transmit data at varying signalstrengths to save battery power. Each radio may transmit at higher orlower power as measured in dBm (decibel-milliwatts), and differentlevels of such power may be advantageous in different environments. Inembodiments of the disclosure, an algorithm may be used to configure anoptimum signal strength for a particular lock to connect to a router orgateway that maximizes reliability and battery power. For example, thelock may check whether connectivity is reliable at its maximum signalstrength and then check at lower signal strengths to find the lowestpossible signal strength that reliably connects to the router orgateway. It is contemplated that in embodiments, this signal strengthcould be adjusted periodically and/or dynamically. For example, the lockcould be set to check every few weeks whether a higher lower signalstrength would be optimal, or it could automatically check when anynetwork connectivity problems were detected. For example, if a new pieceof furniture were to be placed between a router or gateway and the lock,resulting in network connectivity problems, the lock could automaticallyre-run the signal strength optimization algorithm to increase signalstrength.

It is contemplated that the act of a user presenting a credential,either via punching in a code on a keypad, RF credentialing, or anyother method, will wake-up either the local RF protocol radio, the WiFiradio, or both, at any time. RF credentialing can operate either bycontinuously “polling” for a user authentication signal by sending outlow-power transmissions that may identify an RF credential device or bycapacitive proximity sensors that sense “target” objects due to thetarget's ability to be electrically charged. This type of RFcredentialing may be implemented by BLE or another NFC protocol. The RFcredentialing polling function, in many embodiments, may not itselfenter sleep states, because any time a user presents a credential, it isimportant that the lock recognize it. The RF credentialing function maynot require very much power compared to the RF and/or WiFitransmissions. However, it is contemplated that the frequency of RFcredential polling may still be lowered during non-peak times to savepower. For example, polling frequencies may be reduced to once persecond (or lower) instead of 10 times per second. Therefore, the RFcredentialing polling function may be always on, and the presenting ofthe credential itself may serve to wake-up the local RF protocol radioand/or WiFi radio.

The present disclosure provides systems and methods for determining whenand how any of the WiFi and/or local RF protocol radios sleep and wake.One aspect of the present disclosure is that the time and manner inwhich the local RF protocol radio and the WiFi radio will wake-up may beconfigured by an administrator user of a lock or an entire accesscontrol system. This feature may be referred to herein as “userconfigurability” or “user configuration.” It is contemplated that priorto any user configuration, default radio wakeup schedules may behard-coded into the firmware of each lock by the lock manufacturer.These wakeup schedules may include sets of time periods during which thelock is set to wake-up at particular intervals. For example, a lock mayhave default settings including a nighttime schedule, a daytimeschedule, a weekend and weekday schedule, and a holiday schedule. For anoffice building in which most access occurs during weekday, daytimehours, a user (i.e., administrator of the building's door lock system)may configure particular changes to the default sleep/wake schedule.

The lock itself may automatically switch between the wakeup schedules oneach of the transceivers and/or radios. These automatic switches maytake place based on the time of day, day of the week, battery life, orany other factor or settings. The administrative user may wish toconfigure these settings and/or changes based on personal knowledge ofactual lock use at various times. Each wake-up schedule itself may bechanged, either automatically and/or by an administrative user, in orderto change a duration of time between wake-ups of a particular radio. Theadministrative user may configure the daytime, weekday schedules suchthat may wake-up the local RF protocol radio every hour and configurethe nighttime and weekend schedules to wake-up the local RF protocolradio every 4, 8 or 12 hours. The user may configure these schedules ina number of ways. In embodiments, the user may configure the schedulevia a graphical user interface on a computing device remote from thelock via the cloud service. In embodiments, a user may configure thesesettings at the lock itself. In some embodiments, a user may configurethese sleep/wake settings via an internet-connected voice-activateddigital assistant, as will be described in more detail later in thisdisclosure.

FIG. 2 shows a network diagram 200 of a lock 210 and various networkelements to which it may be connected. In embodiments wherein the lock210 comprises a local RF protocol radio, the lock 210 may connect to alocal RF protocol gateway 215, which in turn may connect to a WiFirouter 220. In embodiments wherein the lock 210 comprises a WiFi radio,the lock 210 may directly connect to the WiFi router 220 instead of oras an alternative to connecting to the local RF protocol gateway. TheWiFi router 220 may then connect to the remote server 225 to transmitinformation sent from the lock 210. The remote server 225 may connect toan administrative user computing device 230 to send and receiveinformation. The remote server 225 may store information transmittedfrom the lock 210 and present it at the computing device 230 to allowthe administrative user to view the information and control varioussettings of the lock, such as lock access codes and credentials, andsleep and wake schedules. In some embodiments, the computing device 230may be within a same LAN as the WiFi and in others it may be remote,which allows administrative users anywhere to configure lock settingsvia the remote server 225.

In some embodiments, the network may include a voice-activated digitalassistant 235 (e.g., Google Home®, Amazon Alexa®, etc.), which mayconnect to one or more of the network components to change the settingson the lock 210. The voice-activated digital assistant 235 may beconfigured to receive a voice command such as “change the lock sleepsettings to conserve maximum battery power between 10 pm and 6 am everyday.” Other example commands may include: “set heartbeat interval to 8hours,” “create guest access for Jane Doe using PIN code 1234 on Fridayat 2 pm until Sunday at 11 am,” or “create access user named John Doeusing PIN Code 2468.” In commercial settings, examples may include: “addJane Doe to door 23,” “add access user Jane Doe to Door Group 251,” or,“cancel Jane Doe's access to all doors.”

In response to such commands, the voice-activated digital assistant 235may then send an instruction to one or more of the computing device 230,the remote server 225, the WiFi router 220, and/or the local RF protocolradio 215, depending on where the voice-activated digital assistant 235is in relation to the other network components. It may be in the lock'slocal environment (LAN) or may be remote, for example. The remote server225 and/or the lock 210 may comprise an API to accept commands sent fromthe voice-activated digital assistant 235 to change any setting of thelock 210, including the sleep/wake schedule of the radio(s) of the lock210. In embodiments wherein the voice-activated digital assistant 235 iswithin the local environment of the lock 210, it is contemplated that acommand to change a setting of the lock may be transmitted directly tothe lock via the local WiFi 220, the local RF protocol radio gateway, ordirectly to the lock 210 itself, for instance if the voice-activateddigital assistant 235 is connected to the same local RF radio protocol.Such a direct transmission may allow a local user in a home or office tochange settings on a local lock. The change to the settings may beimplemented without first sending information about the change to theremote server 225. It is contemplated that the change in settingsimplemented locally will indeed be transmitted to the remote server 225at some point in order to allow a remote administrative user to view thechanges, but that information may optionally be transmitted to theremote server 225 at a later time, according to the sleep/wake scheduleof the lock radios for example.

In addition to user configurability, the disclosure provides other waysin which the sleep/wake schedule of the locks may be altered to maximizebattery life and reliability of information transmissions. FIG. 3 is aflowchart showing an overview 300 of the operation of a connected lockof the present disclosure. At block 301, the lock is powered on, and atblock 302, the components of the lock are initialized for operation. Theinitialized components may comprise, for example, the radio(s),associated processor(s), RFID credentialing modules, and any otherelectrical or electromechanical components. At block 303, the WiFi Radioand/or local RF protocol radio and associated processor(s) may enter asleep state, which may be a default state until one or more wakingevents takes place. One event that may wake the radio(s) includes accesscode entry (or any other type of credentialing for unlocking), shown atblock 304. In some embodiments, the entry of an access code mayautomatically wake the radio, but it is contemplated that in someembodiments, it will not, particularly when no internet connection isrequired to verify a credential for entry. Though it may be ideal toinstantly send information about an entry to the remote server, certaincircumstances, such as low battery life, may make it more advantageousto keep the entry information local and only transmit it to the serverthe next time the radio is scheduled to be awakened.

Other waking events may trigger the waking of one or more of the lock'sradios. Block 310 shows a “wake-up decision matrix” block 311 thatcomprises one or more algorithms for determining whether an eventactually results in waking up one or more radios. If an event does notresult in the algorithm deciding to wake one or more radios, then theradios will remain asleep as in block 303. If the event does result inalgorithm deciding to wake one or more radios, the one or more radioswill wake, connect to the remote server via the internet, and transmitstored information at block 312.

Whether the access code entry (or other credentialing for unlocking)results in the one or more radios waking, the lock checks the validityof the code or credential locally, at block 305. If the code orcredential is validated, the lock unlocks at block 306. Whether the codevalidation is successful at unlocking the door or not, the one or moreradios may remain asleep as shown in block 303.

FIG. 4 shows a more detailed block diagram 400 of the wake-up decisionmatrix block 311 of FIG. 3. The wake-up decision matrix shown depictsone embodiment of algorithmic decision blocks that may be used to wakeone or more radios. In other embodiments, fewer or more decision blocksmay be implemented. As shown, at block 412, a decision may be madewhether to wake one or more radios automatically upon code entry. Ifthat decision is configured to be “yes,” (e.g., if such a setting wasconfigured by a user, or by default), the lock may wake-up the radio(s)and connect to the cloud service at block 413. The decision at block412, if not automatically “yes” may be dependent on other conditions.For example, the algorithm may require checking, at block 414, if theaccess code is being entered within a scheduled period for automaticwaking. For example, the user-configured or default setting may requirethat during business hours on weekdays, the radio automatically wakes upupon access code entry. In this example, if the access code is enteredduring non-business hours, the algorithm may check another condition atblock 416. Block 416 depicts a condition wherein if someone has entereda code incorrectly three times in a row, the algorithm wakes up the oneor more radios to send that information to the server. Such a conditionat block 416 may be implemented to alert a user/administrator to thatsomeone authorized may be having trouble with access, or that someoneunauthorized may be tampering with the lock. If none of the conditionsin blocks 412, 414, or 416 are met, resulting in a “yes, wake-up theradio(s),” the radios may remain asleep as shown at block 415.

Though not shown, a number of other algorithmic decision blocks may beimplemented according to the disclosure. Examples include whether thebattery life is below a particular threshold, whether a threshold numberof events has occurred between server communication transmittals,whether other patterns of user behavior have been detected, whethertampering has been detected, temperature, time, date, target batterylevels, and any other inputs the lock is capable of detecting. Thealgorithm(s) can also determine whether to wake-up only one of theavailable radios under certain conditions, such as just the local RFprotocol radio or only the WiFi radio.

Another aspect of the disclosure is that the processor(s) of the lockmay include logic to implement self-optimization of radio wake and sleepschedules based on learning from detected inputs. That is, the lock mayuse artificial intelligence or machine learning logic to increase ordecrease the frequency of radio wake-ups, set radio wake-up times forparticular time periods or conditions, and otherwise adjust parametersfor when and how information is transmitted from the lock to the server.This logic may operate by receiving multiple inputs over time, such asthe inputs described with reference to the wake-up decision matrix 411of FIG. 4. The logic may further operate by detecting patterns of userbehavior, and by using all such inputs over time to detect patterns inhow the inputs increase or decrease battery life and informationtransmission reliability. As an example, the processor logic may detecta pattern wherein the lock is used very regularly and frequently between8 am and 10 pm for five days in a row, and may know (via programming orconnection to a day/date Internet API) that these five days areweekdays. It may detect that the locks are used significantly lessbetween the hours of 10 pm and 8 am on these same days, and may thenautomatically adjust the radio wakeup schedules to be more frequentduring the 8 am to 10 pm weekday hours. The lock may then detect thatthe following two days, the locks are used between the hours of 9 am and1 pm at a frequency that is lower than the weekday 8 am-10 pm frequency,but more than the weekday 10 pm-8 am frequency, and may adjust the radiowakeup schedules to a medium frequency during these times. It iscontemplated that each kind of input described herein may be used as abasis for the artificial intelligence logic to automatically adjustradio wake and sleep schedules and information transmissions.

FIG. 5 shows an exploded view hardware diagram of a lock 500 accordingto an embodiment of the present disclosure. As shown, the lock 500 maycomprise a keypad 520. The lock may also comprise a reader/controllercomponent 510, which may house one or more processors, batteries, localRF protocol radios, WiFi radios, and/or RFID/BLE credential accessmodules as depicted in FIG. 1.

Another aspect of the disclosure is that the lock may automaticallyenter a power-saving mode that overrides a regular wake and sleepschedule when a local RF protocol network and/or WiFi network is down.In locks that connect to the internet via either type of radio, the lockmay detect when network connectivity has been lost. In such an event,the lock may override a setting in which the radio(s) automaticallywake-up upon the entry of an access code, or in which the radios arenormally scheduled to wake-up every hour. In some embodiments, when thelock detects network connectivity failure, the wake-up schedule canautomatically adjust such that it the times between new connectionattempts dynamically increase. For example, if a lock detects a networkoutage, the lock may try to connect 5 minutes after the first miss, thenagain in 25 minutes, then again in 90 min, then in 240 minutes, then in360 minutes. In embodiments, the lock may try repeatedly at a 360 mininterval (for example, 10 times) and then stop trying. At this time, thelock may remain offline until physically woken up or reconnected.

In such example where a new power-saving wake-up schedule overrides anexisting regular schedule, this new RF radio wake configuration may beimplemented as a result of a binary decision algorithm (i.e., networkconnectivity or no network connectivity), as in the above example. Inother embodiments, a power-saving wake-up schedule may be dynamicallyimplemented based on other inputs (e.g., time of day, date, batterylevels, etc.). Sample inputs could include “if it is Thursday, and it isafter 5:00 pm, and the battery level is below XX, and the internet wentdown, then change the wake frequency to YY.” Such dynamic variable inputmay be implemented with a preset combination like the above example orwith an AI implementation that allows the lock to optimize battery lifethrough modifying wake cycles on its own as it gathers data about whichvariables historically contribute the most to battery life extension.

Locks of the present disclosure, and the cloud service associatedtherewith, may include additional features for automatically adjustingsleep and wake schedules that provide ease-of-use benefits foradministrative users. In locks that use any type of RFID or BLE forcredentialing access users, or in locks that use any type of radio toconnect to the internet, a default power-saving sleep schedule may beimplemented automatically when an access user presents a credential thatindicates the access user is a temporary or guest user. For example,locks of the present disclosure may often be used for vacation rentals,and the credentials given to vacation renters may have propertiesindicating that the credential is temporary. The presentation of such acredential itself may cause the lock to automatically enter a “vacationmode” sleep and wake schedule for the radio(s). For example, it mayautomatically decrease a polling period during which the RFID or BLEtransceiver is polling for credentials. It may also increase thesleeping intervals during the weekdays or weekends, for example.

Another automatic ease-of-use feature is the ability to automaticallyset a type of sleep or wake schedule depending on a use case or businesstype selection by an administrative user. For example, an administrativeuser may be able to select that the lock is being used for an officebuilding, a hotel, a home, or a private vacation rental. Theadministrative user may be able to make such a selection on an interfaceof the lock (such as a keypad), on a remote computing device (e.g., a PCor smartphone), or via a voice-activated digital assistant. Each ofthese use cases or business types may have different default sleep andwake schedules.

As previously described, some locks of the present disclosure mayimplement a local algorithm lock, which does not require an internetconnection to unlock when a code or credential is presented. In someembodiments, locks may comprise both a local algorithm lock, an RFID orBLE credentialing lock, and/or a keypad for code entry. Such locks mayor may not comprise a separate local RF protocol radio or WiFi radio. Inthose that do comprise a separate local RF protocol radio or WiFi radio,the sleep or wake schedules and algorithms may determine whether thelocal algorithm lock or if the RFID/BLE lock will be used to open thelock. As an example, if a lock comprised each of algorithmcredentialing, WiFi radio, a keypad, and RF credentialing, anadministrative user could use the algorithm credentialing function inthe following scenario: if the administrative user needs to get a lastminute guest (access user) into a vacation rental unit, and the internetat the unit has just gone down, the administrative user can issue analgorithm credential that will work immediately on the lock even thoughthere is no connectivity.

In some embodiments, the radio wake-up schedules may be based on, orchanged, in response to access user behavior. For example, in any locksthat connect to the internet, locks may have the ability toautomatically reconfigure the radio wakeup settings if an access userpresents a credential (keypad press, RFID, or BLE) and the credential isdenied more than two times. Referring back to FIG. 4, at block 416, sucha user action may be part of an algorithm to determine whether the radiowakes up. It is contemplated that even if the current radio wake-upschedule is set to wake-up at a later time, this action can immediatelywake-up and connect, and can alter the wake-up schedule until apredetermined time, or until it is reset by an administrative user.

Another aspect of the disclosure is that administrative users can beinstantly notified of particular statuses or indicators of a lock via a“lock health notification” system. This system may utilize a webapplication that is part of the cloud service to implement suchnotifications. For internet-connected locks, notifications may occur inthe form of email, text or push notification. One type of notificationmay occur if the data on a lock is not in sync with the data on a webapplication (at the cloud service) or on an administrative user's mobileapplication. For example, if an administrative user sets an access pincode for a guest access user via the web or mobile application, andgives the guest access user the access pin code for a keypad lock, andif it does not work properly for the guest access user to open the lockduring the specified time frame, (as set in a web or mobile application)the lock will notify the administrative user that the data on the lockis not in sync with the data in a web or mobile application. It iscontemplated that a failed PIN code entry would result in a heartbeattransmission automatically initiated by the pressing of a key, and thatany pending access code changes from the server would be transmittedback to the lock to resolve the failed PIN attempt. However, thisnotification feature may allow the administrative user to immediatelytroubleshoot any connection problems between the lock and the server,for example. It could also notify the administrative user of any defectwith the lock itself: for example, if it is able to communicate but isnot able to store code data on the lock's memory. A number of othertypes of notifications about the health of the lock may be sent vianotification. For example, an administrator may wish to be notified anytime a lock is within 10 hours of needing to have its battery replaced,an administrative user may be able to define these notification settingsthrough any user interface such as a PC browser, mobile device orvoice-activated digital assistant.

Yet another feature allows an administrative user to utilize thetechnology built into the lock to provision the lock onto a LAN.Provisioning of a smart device onto a LAN typically requires entering anSSID and passphrase associated with a WiFi router in the LANenvironment. While many computing devices such as smartphones andtablets have full alphanumeric keypads for entering an SSID andpassphrase, many locks of the present disclosure will not. Instead, anRFID smartcard may be used to configure the SSID settings andpassphrase. For example, in locks that use RFID or BLE to credentialaccess users and connect to the internet, an administrative user maypresent at the lock a smart card that is preconfigured with a localnetwork's SSID and passphrase such that the act of simply presentingthis smart card to the lock will automatically provision the lock ontothe local network.

Another aspect of the disclosure provides a Progressive Radio Wake-up(PRW) feature when an internet connection is missed, lost, orunavailable. It is contemplated that for various reasons, internetconnections may be interrupted. The one or more radios of a lock may beset to a particular wake-up schedule via the methods describedthroughout the disclosure, but if the lock is unable to connect duringits scheduled waking times, the lock may automatically alter the radiowake-up frequency to a faster frequency in order to connect as soon aspossible to make up for the missed connection. The increase in wake-upfrequency can be set to a steady, but faster frequency, or to afrequency that gets progressively faster with each additional missedconnection. Such a progressive radio wake-up feature may only beimplemented during previously-indicated peak times in embodiments, whenfrequent transmissions are critical, because such a feature couldquickly reduce battery life during a long network outage. As describedearlier in the disclosure, a corresponding battery-saving featureprovides that during network outages, the sleep duration betweenheartbeat transmissions progressively increases in time. The options toeither progressively increase or decrease the sleep duration may beoptimized based on requirements for battery saving and ensuringtransmission. Such options may be hard coded into the lock's firmware orcan be user configurable and defined by an administrative user throughany user interface on a PC, mobile device or voice-activated digitalassistant.

As previously described, a web application (i.e., aSoftware-as-a-service (“SaaS”) application), mobile application or othercloud platform may be utilized to implement one or more aspects of thepresent disclosure. The various applications may be used to control,monitor, and/or adjust any of attributes of locks or networks of locksdiscussed throughout the disclosure. It is contemplated that one or morethird party applications may be used to remotely control, monitor, andor adjust attributes of the locks via one or more APIs. FIG. 6 shows anexemplary user interface 600 through which an administrative user mayview and configure aspects of a particular lock. As shown, among theconfigurable features are a name 601, a programming code 602, a “WakeWi-Fi” initiation action 603, a mute feature 604, a heartbeat intervaltime setting 605, an auto-lock activation feature 606, and a lock actionschedule (i.e., a wake-up schedule) selection feature 607. As shown, the“Wake Wi-Fi,” 603, heartbeat interval 605, and lock action schedule 607each have drop down menus indicated by arrows 613, 615, and 617,respectively. The “Wake Wi-Fi” initiation action in this particularexample is to wake “on any user action, e.g., keypress,” which is onesetting that optimizes the reliability of transmissions to and from thelock at important times even if other lock settings are highly optimizedfor preserving battery life (e.g., long sleep periods). Additionalconfigurability options for various features described in thisdisclosure may be available in embodiments of the user interface 600.

FIG. 7 shows a drop-down menu 715 of the heartbeat interval 605 shown inFIG. 6. As shown, an administrative user may select varying lengths oftime for sleep durations between heartbeat intervals. In the embodimentshow, the heartbeat can be selected as “always on,” or can be selectedto be sent in intervals ranging from 5 minutes to 12 hours. As describedpreviously in this disclosure, longer sleep durations may be implementedto conserve battery life.

Referring next to FIG. 8, it is a block diagram depicting an exemplarymachine that includes a computer system 800 within which a set ofinstructions can execute for causing a device to perform or execute anyone or more of the aspects and/or methodologies of the presentdisclosure. The components in FIG. 8 are examples only and do not limitthe scope of use or functionality of any hardware, software, embeddedlogic component, or a combination of two or more such componentsimplementing particular embodiments.

Computer system 800 may include a processor 801, a memory 803, and astorage 808 that communicate with each other, and with other components,via a bus 840. The bus 840 may also link a display 832, one or moreinput devices 833 (which may, for example, include a keypad, a keyboard,a mouse, a stylus, etc.), one or more output devices 834, one or morestorage devices 835, and various tangible storage media 836. All ofthese elements may interface directly or via one or more interfaces oradaptors to the bus 840. For instance, the various tangible storagemedia 836 can interface with the bus 840 via storage medium interface826. Computer system 800 may have any suitable physical form, includingbut not limited to one or more integrated circuits (ICs), printedcircuit boards (PCBs), mobile handheld devices (such as mobiletelephones or PDAs), laptop or notebook computers, distributed computersystems, computing grids, or servers.

Processor(s) 801 (or central processing unit(s) (CPU(s))) optionallycontains a cache memory unit 802 for temporary local storage ofinstructions, data, or computer addresses. Processor(s) 801 areconfigured to assist in execution of computer readable instructions.Computer system 800 may provide functionality for the componentsdepicted in FIG. 1 as a result of the processor(s) 801 executingnon-transitory, processor-executable instructions embodied in one ormore tangible computer-readable storage media, such as memory 803,storage 808, storage devices 835, and/or storage medium 836. Thecomputer-readable media may store software that implements particularembodiments, and processor(s) 801 may execute the software. Memory 803may read the software from one or more other computer-readable media(such as mass storage device(s) 835, 836) or from one or more othersources through a suitable interface, such as network interface 820. Thesoftware may cause processor(s) 801 to carry out one or more processesor one or more steps of one or more processes described or illustratedherein. Carrying out such processes or steps may include defining datastructures stored in memory 803 and modifying the data structures asdirected by the software.

The memory 803 may include various components (e.g., machine readablemedia) including, but not limited to, a random access memory component(e.g., RAM 804) (e.g., a static RAM “SRAM”, a dynamic RAM “DRAM, etc.),a read-only component (e.g., ROM 805), and any combinations thereof. ROM805 may act to communicate data and instructions unidirectionally toprocessor(s) 801, and RAM 804 may act to communicate data andinstructions bidirectionally with processor(s) 801. ROM 805 and RAM 804may include any suitable tangible computer-readable media describedbelow. In one example, a basic input/output system 806 (BIOS), includingbasic routines that help to transfer information between elements withincomputer system 800, such as during start-up, may be stored in thememory 803.

Fixed storage 808 is connected bidirectionally to processor(s) 801,optionally through storage control unit 807. Fixed storage 808 providesadditional data storage capacity and may also include any suitabletangible computer-readable media described herein. Storage 808 may beused to store operating system 809, EXECs 810 (executables), data 811,API applications 812 (application programs), and the like. Often,although not always, storage 808 is a secondary storage medium (such asa hard disk) that is slower than primary storage (e.g., memory 803).Storage 808 can also include an optical disk drive, a solid-state memorydevice (e.g., flash-based systems), or a combination of any of theabove. Information in storage 808 may, in appropriate cases, beincorporated as virtual memory in memory 803.

In one example, storage device(s) 835 may be removably interfaced withcomputer system 800 (e.g., via an external port connector (not shown))via a storage device interface 825. Particularly, storage device(s) 835and an associated machine-readable medium may provide nonvolatile and/orvolatile storage of machine-readable instructions, data structures,program modules, and/or other data for the computer system 800. In oneexample, software may reside, completely or partially, within amachine-readable medium on storage device(s) 835. In another example,software may reside, completely or partially, within processor(s) 801.

Bus 840 connects a wide variety of subsystems. Herein, reference to abus may encompass one or more digital signal lines serving a commonfunction, where appropriate. Bus 840 may be any of several types of busstructures including, but not limited to, a memory bus, a memorycontroller, a peripheral bus, a local bus, and any combinations thereof,using any of a variety of bus architectures. As an example and not byway of limitation, such architectures include an Industry StandardArchitecture (ISA) bus, an Enhanced ISA (EISA) bus, a Micro ChannelArchitecture (MCA) bus, a Video Electronics Standards Association localbus (VLB), a Peripheral Component Interconnect (PCI) bus, a PCI-Express(PCI-X) bus, an Accelerated Graphics Port (AGP) bus, HyperTransport(HTX) bus, serial advanced technology attachment (SATA) bus, and anycombinations thereof.

Computer system 800 may also include an input device 833. In oneexample, a user of computer system 800 may enter commands and/or otherinformation into computer system 800 via input device(s) 833. Examplesof an input device(s) 833 include, but are not limited to, analpha-numeric input device (e.g., a keyboard), a pointing device (e.g.,a mouse or touchpad), a touchpad, a joystick, a gamepad, an audio inputdevice (e.g., a microphone, a voice response system, etc.), an opticalscanner, a video or still image capture device (e.g., a camera), and anycombinations thereof. Input device(s) 833 may be interfaced to bus 840via any of a variety of input interfaces 823 (e.g., input interface 823)including, but not limited to, serial, parallel, game port, USB,FIREWIRE, THUNDERBOLT, or any combination of the above.

In particular embodiments, when computer system 800 is connected tonetwork 830, computer system 800 may communicate with other devices,specifically mobile devices and enterprise systems, connected to network830. Communications to and from computer system 800 may be sent throughnetwork interface 820. For example, network interface 820 may receiveincoming communications (such as requests or responses from otherdevices) in the form of one or more packets (such as Internet Protocol(IP) packets) from network 830, and computer system 800 may store theincoming communications in memory 803 for processing. Computer system800 may similarly store outgoing communications (such as requests orresponses to other devices) in the form of one or more packets in memory803 and communicated to network 830 from network interface 820.Processor(s) 801 may access these communication packets stored in memory803 for processing.

Examples of the network interface 820 include, but are not limited to, anetwork interface card, a modem, and any combination thereof. Examplesof a network 830 or network segment 830 include, but are not limited to,a wide area network (WAN) (e.g., the Internet, an enterprise network), alocal area network (LAN) (e.g., a network associated with an office, abuilding, a campus or other relatively small geographic space), atelephone network, a direct connection between two computing devices,and any combinations thereof. A network, such as network 830, may employa wired and/or a wireless mode of communication. In general, any networktopology may be used.

Information and data can be displayed through a display 832. Examples ofa display 832 include, but are not limited to, a liquid crystal display(LCD), an organic liquid crystal display (OLED), a cathode ray tube(CRT), a plasma display, and any combinations thereof. The display 832can interface to the processor(s) 801, memory 803, and fixed storage808, as well as other devices, such as input device(s) 833, via the bus840. The display 832 is linked to the bus 840 via a video interface 822,and transport of data between the display 832 and the bus 840 can becontrolled via the graphics control 821.

In addition to a display 832, computer system 800 may include one ormore other peripheral output devices 834 including, but not limited to,an audio speaker, a printer, and any combinations thereof. Suchperipheral output devices may be connected to the bus 840 via an outputinterface 824. Examples of an output interface 824 include, but are notlimited to, a serial port, a parallel connection, a USB port, a FIREWIREport, a THUNDERBOLT port, and any combinations thereof.

In addition or as an alternative, computer system 800 may providefunctionality as a result of logic hardwired or otherwise embodied in acircuit, which may operate in place of or together with software toexecute one or more processes or one or more steps of one or moreprocesses described or illustrated herein. Reference to software in thisdisclosure may encompass logic, and reference to logic may encompasssoftware. Moreover, reference to a computer-readable medium mayencompass a circuit (such as an IC) storing software for execution, acircuit embodying logic for execution, or both, where appropriate. Thepresent disclosure encompasses any suitable combination of hardware,software, or both.

Those of skill in the art would understand that information and signalsmay be represented using any of a variety of different technologies andtechniques. For example, data, instructions, commands, information,signals, bits, symbols, and chips that may be referenced throughout theabove description may be represented by voltages, currents,electromagnetic waves, magnetic fields or particles, optical fields orparticles, or any combination thereof.

Those of skill would further appreciate that the various illustrativelogical blocks, modules, circuits, and algorithm steps described inconnection with the embodiments disclosed herein may be implemented aselectronic hardware, computer software, or combinations of both. Toclearly illustrate this interchangeability of hardware and software,various illustrative components, blocks, modules, circuits, and stepshave been described above generally in terms of their functionality.Whether such functionality is implemented as hardware or softwaredepends upon the particular application and design constraints imposedon the overall system. Skilled artisans may implement the describedfunctionality in varying ways for each particular application, but suchimplementation decisions should not be interpreted as causing adeparture from the scope of the present invention.

The various illustrative logical blocks, modules, and circuits describedin connection with the embodiments disclosed herein may be implementedor performed with a general purpose processor, a digital signalprocessor (DSP), an application specific integrated circuit (ASIC), afield programmable gate array (FPGA) or other programmable logic device,discrete gate or transistor logic, discrete hardware components, or anycombination thereof designed to perform the functions described herein.A general-purpose processor may be a microprocessor, but in thealternative, the processor may be any conventional processor,controller, microcontroller, or state machine. A processor may also beimplemented as a combination of computing devices, e.g., a combinationof a DSP and a microprocessor, a plurality of microprocessors, one ormore microprocessors in conjunction with a DSP core, or any other suchconfiguration.

The steps of a method or algorithm described in connection with theembodiments disclosed herein may be embodied directly in hardware, in asoftware module executed by a processor, or in a combination of the two.A software module may reside in RAM memory, flash memory, ROM memory,EPROM memory, EEPROM memory, registers, hard disk, a removable disk, aCD-ROM, or any other form of storage medium known in the art. Anexemplary storage medium is coupled to the processor such the processorcan read information from, and write information to, the storage medium.In the alternative, the storage medium may be integral to the processor.The processor and the storage medium may reside in an ASIC. The ASIC mayreside in a user terminal. In the alternative, the processor and thestorage medium may reside as discrete components in a user terminal.

The previous description of the disclosed embodiments is provided toenable any person skilled in the art to make or use the presentinvention. Various modifications to these embodiments will be readilyapparent to those skilled in the art, and the generic principles definedherein may be applied to other embodiments without departing from thespirit or scope of the invention. Thus, the present invention is notintended to be limited to the embodiments shown herein but is to beaccorded the widest scope consistent with the principles and novelfeatures disclosed herein.

What is claimed is:
 1. A method for operating an access control devicehaving a battery, a processor, and a plurality of wireless transceivers,the method comprising: creating a plurality of wake-up schedules foreach of the plurality of wireless transceivers; wherein each of theplurality of wake-up schedules is configured to: control how frequentlya particular wireless transceiver of the plurality of wirelesstransceivers wakes up to transmit or receive information; and each ofthe plurality of wake-up schedules for the particular wirelesstransceiver is different from another one or the plurality of wake-upschedules for the particular wireless transceiver; automaticallyswitching between the plurality of wake-up schedules for the particularwireless transceiver such that a duration of time between wake-ups forthe particular wireless transceiver is shorter during some predefinedtimes and longer during other predefined times; wherein the duration oftime between wake-ups for each of the plurality of wake-up schedules foreach of the plurality of wireless transceivers are configurable by anadministrative user via an interface.
 2. The method of claim 1, whereinthe automatic switching between the plurality of wake-up schedules isdetermined by one or more settings, and the one or more settings areconfigurable by the user.
 3. The method of claim 1, wherein: theplurality of wireless transceivers comprises a radio-frequency (RF)credentialing mechanism configured to accept an access credential, andwherein the plurality of wake-up schedules for the RF credentialingmechanism controls how frequently the RF credentialing mechanism wakesup to poll for the access credential; and the method further comprises:automatically switching between the plurality of wake-up schedules forthe RF credentialing mechanism such that a duration of time betweenwake-ups for the RF credentialing mechanism is shorter during somepredefined times and longer during other predefined times.
 4. The methodof claim 3, wherein one or more of the: automatic switching; and theduration of time between wake-ups for the RF credentialing mechanism isconfigurable by the administrative user.
 5. The method of claim 1,wherein: the automatic switching between the plurality of wake-upschedules for the particular wireless transceiver such that a durationof time between wake-ups for the particular wireless transceiver isshorter during some predefined times and longer during other predefinedtimes is based on one or more inputs, the one or more inputs beingselected from the group consisting of: a time of day, a day of the week,and a type of building environment.
 6. The method of claim 1, wherein:duration of time between wake-ups for each of the plurality of wake-upschedules for each of the plurality of wireless transceivers isdynamically adjusted based on detecting one or more inputs.
 7. Themethod of claim 6, wherein the one or more inputs includes: a frequencyof access user credentialing attempts over a predefined period of time;and a battery power level.
 8. The method of claim 6, wherein the dynamicadjusting is implemented over time via an artificial intelligencealgorithm.
 9. The method of claim 1, wherein the interface is avoice-activated personal digital assistant in wireless communicationwith a network connected to the access control device.
 10. The method ofclaim 1, further comprising: waking one or more of the plurality ofwireless transceivers immediately upon receiving an access usercredential attempt.
 11. The method of claim 3, wherein the automaticswitching between the plurality of wake-up schedules for the RFcredentialing mechanism such that a duration of time between wake-upsfor the RF credentialing mechanism is shorter during some predefinedtimes and longer during other predefined times; and is dynamicallyadjusted based on detecting one or more inputs, the one or more inputscomprising: a frequency of access user credentialing attempts over apredefined period of time; and a battery power level.
 12. The method ofclaim 1, further comprising: overriding the one or more of the pluralityof wake-up schedules with another power-saving wake-up schedule when aconnection to a wireless network fails due to an outage of the wirelessnetwork.
 13. The method of claim 12, wherein another power-savingwake-up schedule dynamically increases the duration of time betweenwireless transceiver wake-ups while the outage of the wireless networkpersists.
 14. The method of claim 1, wherein the plurality of wirelesstransceivers comprises at least one WiFi radio and at least one local RFprotocol radio.
 15. The method of claim 14, wherein at least one of theplurality of wake-up schedules for the at least one local RF protocolradio wakes the local RF protocol radio more frequently than at leastone of the plurality of wake-up schedules for the at least one WiFiradio wakes the WiFi radio during some of the predefined times.
 16. Anaccess control device comprising: a battery; a processor; a lockingmechanism; a credential acceptance mechanism; and a plurality ofwireless transceivers configured to transmit or receive data from theaccess control device wherein the access control device is configuredto: create a plurality of wake-up schedules for each of the plurality ofwireless transceivers; wherein each of the plurality of wake-upschedules is configured to: control how frequently a particular wirelesstransceiver of the plurality of wireless transceivers wakes up totransmit or receive information, and each of the plurality of wake-upschedules for the particular wireless transceiver is different fromanother one or the plurality of wake-up schedules for the particularwireless transceiver; automatically switch between the plurality ofwake-up schedules for the particular wireless transceiver such that aduration of time between wake-ups for the particular wirelesstransceiver is shorter during some predefined times and longer duringother predefined times; wherein the duration of time between wake-upsfor each of the plurality of wake-up schedules for each of the pluralityof wireless transceivers are configurable by an administrative user viaan interface.
 17. The access control device of claim 16, wherein atleast one of the plurality of wireless transceivers is also thecredential acceptance mechanism.
 18. The access control device of claim16, wherein the automatic switching between the plurality of wake-upschedules is determined by one or more settings, and the one or moresettings are configurable by the user.
 19. The access control device ofclaim 16, wherein: the automatic switching between the plurality ofwake-up schedules for the particular wireless transceiver such that aduration of time between wake-ups for the particular wirelesstransceiver is shorter during some predefined times and longer duringother predefined times is based on one or more inputs, the one or moreinputs being selected from the group consisting of: a time of day, a dayof the week, and a type of building environment.
 20. The access controldevice of claim 16, wherein duration of time between wake-ups for eachof the plurality of wake-up schedules for each of the plurality ofwireless transceivers is dynamically adjusted based on detecting one ormore inputs.
 21. The access control device of claim 20, wherein the oneor more inputs includes: a frequency of access user credentialingattempts over a predefined period of time; and a power level of thebattery.
 22. The access control device of claim 20, wherein the dynamicadjusting is implemented over time via an artificial intelligencealgorithm.
 23. The access control device of claim 16, wherein theinterface is a voice-activated personal digital assistant in wirelesscommunication with a network connected to the access control device. 24.The access control device of claim 16, wherein the device is furtherconfigured to: override the one or more of the plurality of wake-upschedules with another power-saving wake-up schedule when a connectionto a wireless network fails due to an outage of the wireless network.25. The access control device of claim 24, wherein another power-savingwake-up schedule dynamically increases the duration of time betweenwireless transceiver wake-ups while the outage of the wireless networkpersists.
 26. The access control device of claim 16, wherein theplurality of wireless transceivers comprises at least one WiFi radio.27. The access control device of claim 16, wherein the plurality ofwireless transceivers comprises at least one local RF protocol radio.28. The access control device of claim 16, wherein the credentialacceptance mechanism is a keypad.
 29. The access control device of claim16, wherein the interface is a smartphone graphical user interface. 30.The access control device of claim 16, wherein one or more of theplurality of wireless transceivers is configured to wake immediatelyupon receiving an access user credential attempt.