A door lock is conventionally used in a door to control access to a restricted area, such as an interior of a house or a business, beyond the door. Authorized users (e.g., a homeowner and family members, a business owner, an employee of a business, etc.) are provided with a physical or electronic key to unlock a door lock to access the restricted area. Prospective users (e.g., guests, customers, service personnel, etc.) of the door seeking to gain access to the restricted area are selectively granted access to the restricted area by an authorized user. In some instances, unauthorized users (e.g., strangers, criminals, uninvited guests, etc.) may successfully or unsuccessfully attempt to enter a restricted area through a door.
The figures are not to scale. Instead, to clarify multiple layers and regions, the thickness of the layers may be enlarged in the drawings. Wherever possible, the same reference numbers will be used throughout the drawing(s) and accompanying written description to refer to the same or like parts. As used in this patent, stating that any part (e.g., a layer, film, area, or plate) is in any way positioned on (e.g., positioned on, located on, disposed on, or formed on, etc.) another part, means that the referenced part is either in contact with the other part, or that the referenced part is above the other part with one or more intermediate part(s) located therebetween. Stating that any part is in contact with another part means that there is no intermediate part between the two parts.
The example door handle 115 of
The positioning of the example fingerprint reader 150 on the example rear side 140 of the example door handle 115 in a position of relative obscurity advantageously avoids visually informing a prospective user of the example door 102 of the ability of the example door handle 115 to read the user's fingerprint if the user naturally engages the example door handle 115 to open the example door 102. For instance, in the example of
Additionally, positioning of the example fingerprint reader 150 on the example rear side 140 of the example door handle 115 avoids changing an overall appearance of the example door 102.
In some examples, more than half of the example rear side 140 of the example door handle 115 includes the example fingerprint reader 150. In other examples, half or less than half of the example rear side 140 of the example door handle 115 includes the example fingerprint reader 150. In some examples, the example fingerprint reader 150 is continuous. In some examples, the example fingerprint reader 150 is discontinuous, being disposed in a number of different positions along the example rear side 140 of the example door handle 115. The positioning of the example fingerprint reader 150 on the example rear side 140 of the example door handle 115 may vary to accommodate a geometry of a particular style of example door handle 115 so as to enhance an ability of the example fingerprint reader 150 to obtain a fingerprint of a user when the user engages the example door handle 115 during normal operation.
The example fingerprint reader 150 is an electronic device used to capture a digital representation (e.g., a digital image, etc.) of a user's fingerprint(s), such a fingerprint includes one or more unique patterns of physical characteristics such as ridge geometries and minutia points (e.g., ridge end, ridge bifurcation, island, spur, delta, etc.). In a training mode, an authorized user grasps the handle so that their fingerprint(a) are read by the example fingerprint reader 150 and processed to create fingerprint data for the user. The fingerprint data includes a collection of extracted features or constructs representing the physical characteristics of the fingerprint(s). The fingerprint data for the authorized user is then stored and later made available for comparison (e.g., via pattern matching and/or minutiae point matching, etc.) to a fingerprint read during use of the example door access device 100 when the authorized user naturally engages (e.g., grasps) the example door handle 115 and, thus, touches the example rear side 140 of the example door handle 115 (e.g., to unlock the example lock 160 of the example door 102 to enter into, or exit from, the restricted area, etc.).
In some examples, the example fingerprint reader 150 includes a capacitive sensor using an array of capacitor plates (e.g., 300-600, or more, capacitor plates per inch, etc.) to image the fingerprint(s) based on different characteristic capacitive coupling between the ridges (e.g., a higher capacitance closer to the capacitor plate, etc.) and the valleys (e.g., a lower capacitance further from the capacitor plate, etc.) of the fingerprint(s). The example capacitive sensor array may be symmetric or asymmetric. A resolution of the example capacitive sensor array may include any resolution sufficient to resolve the physical characteristics (e.g., ridges, valleys, etc.) of the fingerprint(s). In some examples, the fingerprint reader 150 applies a small voltage to the user's skin to enhance the signal and contrast.
In some examples, the example fingerprint reader 150 includes an optical sensor array, or other imaging device, to image the fingerprint(s). For example, an optical sensor array may include a charge coupled device (CCD) or complementary metal-oxide-semiconductor (CMOS) device, having an array of photosensitive pixels (e.g., 300-600 photosensitive pixels per inch, etc.). In such example fingerprint reader 150, the fingerprint(s) are optically scanned (e.g., light from a light source is directed at the finger and is reflected to the CCD or CMOS sensor) to form a pixel map of the fingerprint(s) with differing degrees of dark and light corresponding to the fingerprint(s) ridges and valleys. The example optical sensor array may be symmetric or asymmetric. A resolution of the example optical sensor array may include any resolution sufficient to resolve the physical characteristics (e.g., ridges, valleys, etc.) of the fingerprint(s). For an example fingerprint reader 150 including an optical sensor array, the example fingerprint reader 150 protective glass cover, substrate, coating, or film is transparent at least at the frequency of light used to obtain the data.
In some examples, the example fingerprint reader 150 includes an array of pressure sensors (e.g., a conductive membrane over a thin film transistor (TFT) sensor or CMOS chip, etc.), with each pressure sensor in the array providing a corresponding pressure reading from the physical features of the fingerprint(s) at that point in the array (e.g., ridges exerting a first pressure, valleys exerting a second pressure less than the first pressure or no pressure, etc.) to capture the fingerprint(s). In some examples, the example fingerprint reader 150 includes an array of radio frequency (RF) sensors. An RF signal is projected toward the finger and a resulting field, reproducing the fingerprint(s) ridges and valleys, is received by the array of RF sensors. In some examples, the example fingerprint reader 150 includes an array of ultrasonic sensors. Ultrasonic signals are projected toward the finger and the reflected waveforms captured by the array of ultrasonic sensors to collect the fingerprint(s) ridges and valleys.
In some examples, a glass cover, silicon substrate, coating, or film protecting the example fingerprint reader 150 is tinted or colored to approximate a color of a door handle to which the example fingerprint reader 150 is matched to further enhance obscurement of the fingerprint reader 150 from view from a vantage of the user attempting to operate (e.g., open or close) the door 102. For example, an example fingerprint reader 150 (e.g., an ultrasonic fingerprint reader, a capacitive fingerprint reader, etc.) disposed on an example rear side 140 of an example door handle 115 that is antique bronze in color may be provided with a glass cover that is tinted or colored to approximate the antique bronze color of the door handle 115. Likewise, an example fingerprint reader 150 (e.g., an ultrasonic fingerprint reader, a capacitive fingerprint reader, etc.) disposed on an example rear side 140 of an example door handle 115 that is silver in color may be provided with a glass cover that is tinted or colored to approximate the silver color of the example door handle 115.
In some examples, the example rear side 140 of the example door handle 115 includes an example button 155 as an input device to the example door access device 100. In some examples, the example button 155 may include a push-button or a touch-button (e.g., an optical touch button, a capacitive touch button, etc.). In some examples, operation of the example button 155 activates a training mode for the example door access device 100.
The example door access device 100 of
In the example of
In some examples, more than half of the example rear side 140 of the example door handle 115 includes the example fingerprint reader 150. For example, the example fingerprint reader 150 may be disposed in an arc covering about 240°-300°of a bottom portion and side portions of an example rear side 140 of an example door handle 115 having an example rotating knob 180. In other examples, half or less than half of the example rear side 140 of the example door handle 115 includes the fingerprint reader 150. In some examples, the example fingerprint reader 150 is unitary (e.g., a single 360° arc, as shown in the example
The first example door access device 100 of
The example identifier 210 is to identify a user of the example door access device 100 and to take action based on a determination that the user is an authorized user or a determination that the user is not an authorized user.
The example database 220 is located in the memory 225 and includes information used to identify a user. This information may include, for example, fingerprint data for the user, biometric data for the user (e.g., vocalization data, facial recognition data, retinal/iris data, etc.) and/or example personal electronic device 175 data for the user (e.g., a smart phone Unique Device ID (UDID), media access control address (MAC address), etc.). The example memory 225 of
The example actuator 230 is disposed in the example door 102 to act on the example lock 160 and/or the example latch 125 to change a state of the example lock 160 and/or the example latch 125 to permit retraction of the example latch 125 from engagement with a door frame strike plate. The actuator 230 is responsive to depression of the example thumb piece 120 (e.g.,
The example battery 235 provides power to the electronics in the door access device 100. The example battery 235 may include, for example, a battery pack (e.g., lithium ion batteries, a Li-ion polymer batteries, lithium polymer (LiPo) batteries, etc.), one or more CR 123A lithium batteries, one or more 18650 batteries, one or more 9V batteries, or one or more AA batteries. In some examples, the example battery 235 provides power to the example fingerprint reader 150, the example button 155, the example communication device 201, the example identifier 210, the example display 240, the example speaker 245, the example electronic device sensor 250, the example proximity sensor 252 and/or the example biometric sensor 255. In some examples, one or more solar cells are provided to provide power to the example fingerprint reader 150, the example button 155, the example communication device 201, the example identifier 210, the example battery 235, the example display 240, the example speaker 245, the example electronic device sensor 250, the example proximity sensor 252 and/or the example biometric sensor 255.
The example display 240 includes, in some examples, a liquid crystal display (LCD) or a thin film transistor (TFT) display, and may include a touch screen. In some examples, the example display 240 is disposed on the example door handle assembly 110, on the example door 102, or adjacent the example door 102 to provide information to a user of the example door access device 100 and/or receive inputs from the user. In some examples, the example display 240 is disposed within a restricted area regulated by the example door access device 100 and serves to display information (e.g., an image of a person at the door, etc.) to an authorized user within the restricted area.
The example speaker 245 includes, in some examples, a micro-speaker or a piezo audio speaker to provide information to a user of the example door access device 100. In some examples, the example speaker 245 is disposed within a restricted area regulated by the example door access device 100 and serves to output audio information (e.g., a tone, a message, a voice, etc.) to/from an authorized user within the restricted area.
In some examples, the example electronic device sensor 250 serves as a wireless access point (WAP) for the example personal electronic device 175 (e.g., a client device, etc.). In some examples, the example electronic device sensor 250 is paired with an example proximity sensor 252 to activate the example electronic device sensor 250 when a user approaches the example door 102. When activated, the example electronic device sensor 250 scans for wireless devices, connects to a sensed wireless device (e.g., the example personal electronic device 175) via an example wireless communication pathway 176 and authenticates the sensed wireless device, such as through a keyed authentication, an open authentication, a shared key authentication, Bluetooth connection, or the like. In some examples, the example personal electronic device 175 is set to automatically recognize and connect to the example electronic device sensor 250.
The example biometric sensor 255 is separate from the example fingerprint reader 150. In the example of
In some examples, two displays 240 and two speakers 245 are employed to enable communication with a user of the door, with one speaker and display in or in the vicinity of the door access device 100 and the other speaker and display disposed in a restricted area (e.g., home, business, apartment, etc.) to provide access to a user of the restricted area. In another example, the example display 240 and the example speaker 245 are implemented by a display and an internal speaker of an example personal electronic device 175 (e.g., a smart phone, etc.) carried by a person controlling access to the restricted area (e.g., an owner or designee, etc.) to provide notification of the presence of and/or identity of the user.
The example database manager 300 is to operate as an interface between the user, or requesting application programs (e.g., a smart phone application on the example personal electronic device 175, etc.), and the example database 220. The example database manager 300 is to ensure that data is organized and accessible to the example identifier 210.
The example fingerprint matcher 315 attempts to match a fingerprint read by the example fingerprint reader 150 of the example door access device 100 with a fingerprint in the example fingerprint data 360 of the example database 220. The example fingerprint data 360 includes, for each authorized user, fingerprint data for one or more fingers stored by the authorized user during enrollment via the example fingerprint reader 150 or via another electronic device (e.g., a fingerprint imaging application on the example personal electronic device 175, etc.). The example fingerprint data 360 includes, for example, image data or features (minutiae) contextually extracted from the image data permitting the example fingerprint matcher 315 to validate a later read fingerprint using a pattern-based matching (e.g., pixel by pixel comparison of a fingerprint in relation to the fingerprint data, adjusted for positional errors or displacement) and/or a minutiae-based matching (e.g., a comparison of a location and direction of minutiae extracted from the fingerprint and a location and direction of minutiae of the fingerprint data). In some examples, the example fingerprint matcher 315 comports with one or more of past, present or future standards or formats for fingerprint image-based data interchange (e.g., finger pattern based interchange format, finger minutiae format for data interchange, etc.).
The example biometric matcher 320 attempts to match biometric data of a user of the example door access device 100 sensed by the example biometric sensor 255 with example biometric data in the example biometric data 361 of the example database 220. The example biometric data 361 includes, for each authorized user, biometric data (e.g., facial recognition data, iris/retinal data, vocalization data, etc.) stored during enrollment of the authorized user data into the example database 220. The biometric data includes data or data constructs of characteristics (e.g., physical facial landmarks, relative positions or sizes/shapes of the physical facial landmarks, vocal patterns, etc.) from which later comparisons can be made. In some examples, the example biometric matcher 320 uses an imaging device (e.g., camera 254) to obtain an image of the authorized user, to which image facial recognition techniques may be applied. In some examples, a facial recognition algorithm includes a geometric recognition algorithm to analyze physical landmarks or a photometric algorithm to distill image data from the example biometric sensor 255 into values that can be compared to corresponding values in the example biometric data 361 to determine variances. In some examples, the example biometric matcher 320 uses eigenfaces, discriminant analysis (DA), linear discriminant analysis, recursive Fisher linear discriminant, principal component analysis (PCA), independent component analysis (ICA), kernel methods, or hidden Markov models (HMM).
The example electronic device matcher 325 attempts to match data of the example personal electronic device 175 of an authorized user of the example door access device 100, received by the example electronic device sensor 250, with the example electronic device data 362 of the example database 220. The example electronic device data 362 includes, for each user, UDID data or MAC address data, or the like, from an authorized user's example personal electronic device 175.
The example time manager 330 attempts to determine if any time limitations have been imposed on an authorized user's access to or from the restricted area, via the example door access device 100. The example time restriction data 363 in the example memory 353 of the example database 220 includes any pertinent time restrictions imposed on a user. For example, a home owner (e.g., authorized user 1) stores in the example time restriction data 363 for a housekeeper (e.g., authorized user 4), a permissible access time starting at 11:00 AM on every Tuesday and ending at 4:00 PM on every Tuesday, to permit multiple entries by the housekeeper during the allotted time. If the housekeeper arrives at any time outside of the permissible access time set for the user in the example time restriction data 363, the example door access device 100 will not permit entry.
The example communicator 335 facilitates communication between the example identifier 210 and the example fingerprint reader 150, the example database 220, the example actuator 230, the example biometric sensor 255, and/or the example electronic device sensor 250. The communicator 335 may be implemented by, for example, a transceiver of any type.
The example lock activator 340 causes the example actuator 230 to unlock the example lock 160 following satisfaction of one or more conditions. In some examples, the example identifier 210 must identify a match between the fingerprint(s) read by the example fingerprint reader 150 and the fingerprint(s) stored in the example fingerprint data 360 to satisfy one such condition. In some examples, the example identifier 210 must identify a match between a time of attempted access and a set of authorized times for the user stored in the example time restriction data 363 to satisfy one such condition. In some examples, the example identifier 210 must identify a match between a biometric data read by the example biometric sensor 255 and the example biometric data 361 to satisfy one such condition. In some examples, the example identifier 210 must identify a match between the example personal electronic device 175 detected by the door access device 100 and an electronic device in the example electronic device data 362 to satisfy one such condition. In some examples, the one or more conditions required to cause the example lock activator 340 to unlock the example lock 160 via the example actuator 230 includes a combination of two or more of (e.g., all of) the above conditions.
The example lock activator 340 causes the example actuator 230 to change and/or enforce a state of the example lock 160 following satisfaction of one or more conditions or, alternatively, failure to satisfy one or more conditions. In some examples, the example lock activator 340 causes the example actuator 230 to lock the example lock 160 following a determination by the example identifier 210 that a match is not identified between a fingerprint read by the example fingerprint reader 150 and a fingerprint in the fingerprint data. In some examples, the example lock activator 340 causes the example actuator 230 to lock the example lock 160 following a determination by the example identifier 210 that a match is not identified between a time of attempted access and a set of authorized times for the user stored in the example time restriction data 363. In some examples, the example lock activator 340 causes the example actuator 230 to lock the example lock 160 following a determination by the example identifier 210 that a match is not identified between biometric data read by the example biometric sensor 255 and the example biometric data 361. In some examples, the example lock activator 340 causes the example actuator 230 to lock the example lock 160 following a determination by the example identifier 210 that a match is not identified between the example personal electronic device 175 detected by the door access device 100 and an electronic device in the example electronic device data 362.
In the example of
While an example manner of implementing the example identifier 210 is set forth in
An example flowchart representing example machine readable instructions for implementing the example identifier 210 of
As mentioned above, the example machine readable instructions shown in
The example program 400-800 of
At block 410, the example database manager 300 determines if a data entry mode is to be entered, such as a door access device 100 training mode in which a fingerprint detected at block 405 is to be stored in the example fingerprint data 360 of the example database 220. In some examples, an authorized user instructs the door access device 100 to enter a data entry mode via input of a data entry mode code in a door access device 100 setup application in the user's example personal electronic device 175, the code being communicated from the example personal electronic device 175 to the example communication device 201 of the example door access device 100 via the example communication pathway 176. If a data entry mode is not to be entered (block 410=“NO”), control passes back to block 415. If a data entry mode is to be entered (block 410=“YES”), control passes to example routine 500 of
At block 415, the example database manager 300 selects a fingerprint from the example fingerprint data 360 stored in the example memory 350 of the example database 220 to compare with the fingerprint detected at block 405.
At block 420, the example fingerprint matcher 315 compares the fingerprint detected at block 405 to the fingerprint selected from the example fingerprint data 360 of the example database 220 to determine if the detected fingerprint and the selected fingerprint match. As noted above, this comparison may use any manner of comparison of fingerprint data such as, but not limited to, a correlation-based or a pattern-based technique. If a match is not found between the detected fingerprint and the selected fingerprint (block 420=“NO”), control passes to block 425. If a match is found between the detected fingerprint and the selected fingerprint (block 420=“YES”), control passes to block 440.
At block 425, following an unsuccessful match between the fingerprint detected at block 405 and the fingerprint selected from the example fingerprint data 360 at block 420, the example database manager 300 determines whether the fingerprint previously selected at block 415 was the last fingerprint in the example fingerprint data 360. If the fingerprint selected at block 415 was not the last fingerprint in the example fingerprint data 360 (block 425=“NO”), control passes back to block 415 where a next fingerprint in the example fingerprint data 360 is selected for comparison to the detected fingerprint at block 420. If the selected fingerprint was the last fingerprint in the example fingerprint data 360 (block 425=“YES”), control passes to block 430.
At block 430, since no fingerprint in the example fingerprint data 360 was found to match the fingerprint detected at block 405, the detected fingerprint corresponds to an unauthorized user and the example lock activator 340 sends a control signal to the example actuator 230 to lock the example door 102 in response to the failure to match the fingerprint read by the fingerprint reader with a fingerprint in the fingerprint data. Thus, if a homeowner inadvertently leaves the front door to the home unlocked and an unauthorized user (e.g., a stranger) engages the example door handle 115 to open the unlocked front door, the door access device 100 will automatically lock the example lock 160 to prevent the unauthorized user from opening the door. Control then passes to block 435.
At block 435, the example communicator 335 notifies designated person(s) of the attempted entry. This notification can be sent to, for example, the personal electronic device 175, the speaker 245, the display 240 and/or the electronic assistant 280. Following such notification at block 435, control then passes back to block 405 for continued monitoring.
At block 440, following a successful match between the fingerprint detected at block 405 and the fingerprint selected from the example fingerprint data 360 at block 420, the identifier 210 then determines whether additional verification is required. At block 440, the identifier 210 determines whether a biometric verification is required. If a biometric verification is required (block 440=“YES”), control passes to the biometric matcher 320 as reflected in the routine 600 shown in
At block 445, the identifier 210 determines whether an electronic device verification is required. If an electronic device verification is required (block 445=“YES”), control passes to the example electronic device matcher 325 as shown in routine 700 shown in
At block 450, the time manager 330 determines whether a temporal limitation has been imposed on the now-validated user. If a time restriction has been imposed on the user (block 450=“YES”), control passes to the time manager 330 as shown in the example routine 800 of
At block 455, following validation of the detected fingerprint as belonging to an authorized user, via a matching of the detected fingerprint with a fingerprint in the example fingerprint data 360, and without other preconditions blocking passage (e.g., biometric verification at block 440, electronic device verification at block 445, or time restrictions imposed at block 450), the lock activator 340 then unlocks the example door 102. In some examples, the unlocking of the example door 102 is via actuation of the example actuator 230 to unlock the example lock 160 of the example door access device 100 in response to a match between the fingerprint read by the example fingerprint reader 150 and a fingerprint in the example fingerprint data 360. From block 455, control passes to block 460.
At block 460, the database manager 300 logs the passage of the user (e.g., an entry into an authorized area, an exit from an authorized area, etc.). In some examples, the entry or exit of the user is logged in the example data log 364 in the example database 220 along with a time and/or a date of occurrence. From block 460, control passes to block 465.
At block 465, the communicator 335 notifies designated person(s) of the entry or exit logged at block 460. This notification may be sent to, for example, the personal electronic device 175, the speaker 245, example display 240, or the electronic assistant 280. Following such notification at block 435, control passes back to block 405 for continued monitoring.
Turning to
At block 505, the example identifier 210 determines if the detected fingerprint from block 405 is to be added to the example fingerprint data 360 in example memory 350. If the result of block 505 is “YES,” the detected fingerprint is added to the example fingerprint data 360 (block 510). If the result of block 505 is “NO,” control passes to block 515.
At block 515, the identifier 210 determines if biometric data is to be added to the example biometric data 361 in the example memory 351. If the result of block 515 is “YES,” the biometric data is obtained using the example biometric sensor 255 and the biometric data is added to the example biometric data 361 in example memory 351 (block 520). If the result of block 515 is “NO,” control passes to block 525.
At block 525, the example routine 500 determines if time restriction data is to be added to the example time restriction data 363 in the example memory 353 responsive to a user instruction to the example door access device 100 via the example personal electronic device 175 or other input device. If the result of block 525 is “YES,” time restriction data is entered by the user via a data input device of the example personal electronic device 175 or computer used to access the example routine via the example communication device(s) 200, 270 and stored in the example time restriction data 363 at block 530. For example, if a housekeeper has a fingerprint stored in the example fingerprint data 360, but is to be rescheduled from a first day and/or time to a second day and/or time, the user (e.g., the homeowner, etc.) can selectively alter the time restriction data for the housekeeper to correspond to the second day and/or time. If the result of block 525 is “NO,” control passes to block 535.
At block 535, the example identifier 210 determines if electronic device data is to be added to the example electronic device data 362 in the example memory 352. If the result of block 535 is “YES,” electronic device data is entered by the user via a data input device of the example personal electronic device 175 or computer and stored in the example electronic device data 362 (block 540). If the result of block 535 is “NO,” control passes to block 415 of example routine 400.
Example routine 600 in
If the result of block 605 is “YES,” control passes to block 610 where a next biometric data in the example biometric data 361 is selected for comparison to the detected biometric data.
At block 615, the biometric matcher 320 determines if there is a match between the selected biometric data from the example biometric data 361 and the detected biometric data. In some examples, the selected biometric data includes facial recognition data and the detected biometric data includes facial landmarks of a user at the example door 102 seeking to open the example door 102. For example, the example biometric matcher 320 uses a geometric recognition algorithm to analyze correspondence between the physical landmarks in the detected biometric data and physical landmarks in the selected biometric data from the example biometric data 361. If there is a match between the selected biometric data from the example biometric data 361 and the detected biometric data (block 615=“YES”), control passes to block 445 of
If the selected biometric data from the example biometric data 361 does not match the detected biometric data (block 615=“NO”), control passes to block 620. At block 620, the biometric matcher 320 determines if the selected biometric data was the last biometric data in the example biometric data 361. If the selected biometric data was the last biometric data in the example biometric data 361 (block 620=“YES”), control passes to block 430 of
Example routine 700 in
At block 715, the electronic device matcher 325 determines if there is a match between the selected electronic device data from the example electronic device data 362 and the detected electronic device data. For example, the example electronic device sensor 250 obtains UDID data or MAC address data, or the like, from the example personal electronic device 175 and the electronic device matcher 325 compares that sensed electronic device data to the selected electronic device data from the example electronic device data 362. If there is a match between the selected electronic device data and the detected electronic device data (block 715=“YES”), control passes to block 450 of
If the selected electronic device data from the example electronic device data 362 does not match the detected example personal electronic device 175 data (block 715=“NO”), control passes to block 720. At block 720, the electronic device matcher 325 determines if the selected electronic device data was the last electronic device data in the example electronic device data 362. If the selected electronic device data was the last electronic device data in the example electronic device data 362 (block 720=“YES”), control passes to block 430 of
Example routine 800 in
At block 810, the time manager 330 determines if a time at which the user engages the example door access device 100 is denoted as a restricted time for the user. If the result of block 810 is “NO,” control passes to block 455 of
To illustrate an example use of example time restriction data 363, a parent caring for a toddler may set time restriction data 363 for their toddler, an authorized user, to ensure that they do not leave the house unsupervised between a designated start time and end time. If the toddler engages the example door handle 115 on an interior side of the example door 102 during that designated time, the example door access device 100 would read the fingerprint of the toddler using the example fingerprint reader 150 on the example rear surface 140 of the example door handle 115 on the interior side of the example door 102, match the read fingerprint(s) to the toddler's fingerprint data in the example fingerprint data 360 using the example identifier 210, and engage the example lock activator 340 to lock the example door 102 to prevent the unsupervised exit of the toddler. Additionally, via block 435 of
As noted above,
The processor platform 900 of the illustrated example includes a processor 912. The processor 912 of the illustrated example is hardware. For example, the processor 912 can be implemented by integrated circuits, logic circuits, microprocessors or controllers from any desired family or manufacturer. In the example of
The processor 912 of the illustrated example includes a local memory 913 (e.g., a cache). The processor 912 of the illustrated example is in communication with a main memory including a volatile memory 914 and a non-volatile memory 916 via a bus 918. The volatile memory 914 may be implemented by Synchronous Dynamic Random Access Memory (SDRAM), Dynamic Random Access Memory (DRAM), RAMBUS Dynamic Random Access Memory (RDRAM) and/or any other type of random access memory device. The non-volatile memory 916 may be implemented by flash memory and/or any other desired type of memory device. Access to the main memory (e.g., 914, 916) is controlled by a memory controller.
The processor platform 900 of the illustrated example also includes an interface circuit 920. The interface circuit 920 may be implemented by any type of interface standard, such as an Ethernet interface, a universal serial bus (USB), and/or a PCI express interface.
In the illustrated example, input device(s) 922 are connected to the interface circuit 920. The input device(s) 922 permit(s) a user to enter data and commands into the processor 912. The input device(s) can be implemented by, for example, an audio sensor, a microphone, a camera (still or video) (see, e.g., camera 254 in
One or more output devices 924 are also connected to the interface circuit 920 of the illustrated example. The output devices 924 can be implemented, for example, by display devices (e.g., a light emitting diode (LED), an organic light emitting diode (OLED), a liquid crystal display, a cathode ray tube display (CRT), a touchscreen, a tactile output device, a printer, speakers, etc.). In some examples, the interface circuit 920 includes a graphics driver card, a graphics driver chip or a graphics driver processor.
The interface circuit 920 of the illustrated example also includes a communication device 335 such as a transmitter, a receiver, a transceiver, a modem and/or network interface card to facilitate exchange of data with external machines (e.g., computing devices of any kind) via a network 926 (e.g., an Ethernet connection, a digital subscriber line (DSL), a telephone line, coaxial cable, a cellular telephone system, etc.).
The processor platform 900 of the illustrated example also includes mass storage devices 928 for storing software and/or data. Examples of such mass storage devices 928 include floppy disk drives, hard drive disks, compact disk drives, Blu-ray disk drives, RAID systems, and digital versatile disk (DVD) drives.
The coded instructions 932 of
The processor platform 900 of the illustrated example also includes an example clock 934. In some examples, the example clock 934 is to operatively associate a time of each interaction between a user and the example door access device 100 in the example data log 364. In some examples, the example clock 934 is to provide time data to the example time manager 330 to enable the example time manager 330 to compare a time of an access attempt to the example time restriction data 363, if any, associated with the identified user in example memory 353.
The example door access device 100 permits authorized users, such as homeowners, to preselect all authorized users (e.g., family, friends, housekeepers, caretakers for pets, etc.) for door access to the premises and to control and/or monitor ingress and egress of the authorized users without the need for physical keys. If a person who is an unauthorized user needs access to the restricted area (e.g., the homeowner's home), the unauthorized user can send their fingerprint data to the authorized user to enter into the example fingerprint data 360. In another example, a homeowner may remotely open the example door 102 for an unauthorized user using a fingerprint reading application on the user's example personal electronic device 175. A fingerprint of the unauthorized person obtained via the example door access device 100 may then be stored in the example fingerprint data 360 as an authorized user.
The example door access device 100 permits authorized users, such as homeowners, to open the front door of their home through natural movements to engage the door handle of the front door. No keys are required. No juggling of carried items is required. There is no risk of being inadvertently locked out of the house if keys are misplaced.
In some examples, the example fingerprint reader 150 is integrated into a door bell, or other hardware of the example door 102, rather than on an example rear surface 140 of an example door handle 115.
In some examples, the example door access device 100 is built into the example door handle 115. In some examples, the example door access device 100 is an add-on device installable in and/or on existing example door handle assemblies 110.
Although certain example methods, apparatus and articles of manufacture have been disclosed herein, the scope of coverage of this patent is not limited thereto. On the contrary, this patent covers all methods, apparatus and articles of manufacture fairly falling within the scope of the claims of this patent.
Filing Document | Filing Date | Country | Kind |
---|---|---|---|
PCT/US2017/018389 | 2/17/2017 | WO | 00 |