This disclosure relates to an electromechanical lock, and in particular a bezel of an electromechanical lock providing touch and wireless capabilities to lock and unlock a door.
Door locks can include a deadbolt as a locking mechanism. For example, the door lock can include a lock cylinder with a key slot on one side of the cylinder. The other side of the cylinder can include a paddle, or a twist knob. The rotation of the cylinder using the key (inserted into the key slot and rotated) or the paddle (moved or rotated to another position) can result in the deadbolt of the lock to retract (e.g., to unlock the door) or extend (e.g., to lock the door). However, some homeowners find it cumbersome to be limited to locking or unlocking the door lock of a door using the key or the paddle.
Some of the subject matter described herein includes an electromechanical smart lock to lock and unlock a door of a building, comprising: a housing having a bezel defining an exterior surface of the electromechanical smart lock; a touch sensor circuitry configured to determine presence of a finger upon the bezel, and determine characteristics of the finger upon the determination of the presence of the finger upon the bezel; a deadbolt configured to travel along a linear path between the electromechanical smart lock and a deadbolt slot of a door jamb; a motor configured to retract the deadbolt into the electromechanical lock to operate in an unlock state, and configured to extend the deadbolt into the deadbolt slot in a lock state; and a controller circuit configured to operate the motor to retract or extend the deadbolt based on the characteristics of the finger.
Some of the subject matter described herein also includes an electromechanical lock, comprising: a bezel defining an exterior surface of the electromechanical smart lock; a deadbolt configured to retract to be in an unlock state, and configured to extend to be in a lock state; and a controller circuit configured to determine characteristics of a finger disposed upon the bezel, and configured to adjust the deadbolt between the lock state and the unlock state based on the characteristics of the finger.
Some of the subject matter described herein also includes a method comprising: determining, by a processor, that a finger is placed upon an electromechanical lock; determining, by the processor, characteristics of the finger; and adjusting a position of a deadbolt based on the characteristics of the finger.
This disclosure describes devices and techniques for an electromechanical lock. In one example, an electromechanical lock can be a “smart” lock that can lock or unlock a door by receiving instructions from a wireless electronic device such as a smartphone, tablet, smartwatch, etc. The electromechanical lock can include an accelerometer positioned upon a component (e.g., a throw arm) that rotates along an arc, or curved or non-linear path, as the deadbolt of the electromechanical lock retracts away from or extends along a linear path into a deadbolt slot of the door jamb having a deadbolt strike plate to unlock or lock the door, respectively. For example, as the key or the paddle of the electromechanical lock is rotated, this can result in the component that the accelerometer is positioned upon to also rotate. Additionally, the electromechanical lock can receive data from a smartphone requesting that it lock or unlock the door. In this case, it can use a motor to retract or extract the deadbolt, which also causes the component that the accelerometer is positioned upon to rotate. As a result, the accelerometer can also rotate as the electromechanical lock transitions between locked and unlocked states.
Each position along the arc can have a corresponding unique gravity vector in comparison to other positions that can be determined by the accelerometer. For example, the gravity vector corresponding to the deadbolt in the unlocked state (e.g., fully retracted, or at one end of its travel range) can be different than the gravity vector corresponding to the deadbolt in the locked state (e.g., fully extended, or it has reached the other end of its travel range) because the accelerometer would be upon different places along the arc and, therefore, at different inclinations. The other positions in between the unlocked state and locked state, for example corresponding to a ten percent extended deadbolt, a fifty percent extended deadbolt, an eighty percent extended deadbolt, etc. can each also have unique gravity vectors. Thus, the accelerometer can provide the gravity vector to a controller circuit which can use the gravity vector to determine the position of the deadbolt.
Determining the linear position of the deadbolt (e.g., along a path between the electromechanical lock and the deadbolt slot) using a gravity vector as determined by an accelerometer that rotates along an arc (e.g., along a curved or non-linear path) with a component of the electromechanical lock can allow for a precise determination of the position of the deadbolt. Additionally, an accelerometer can use significantly lower power than other types of sensors. Therefore, the electromechanical lock can operate more often while not draining its battery as quickly as electromechanical locks using different types of sensors.
This disclosure also describes touch and wireless capabilities of the electromechanical lock. For example, a capacitive touch sensor of the electromechanical lock can determine the presence of a human finger upon the bezel (or surface) of the electromechanical lock. The presence of that human finger, or a movement of that human finger upon the bezel, can be used to lock or unlock the door. In another implementation, a fingerprint can be recognized and used to lock or unlock the door. Moreover, a near-field communication (NFC) capability can be implemented to allow a smartphone to lock or unlock the door using a smartphone in close proximity with the electromechanical lock.
In more detail,
Electromechanical lock 110 can be a “smart” lock having a variety of functionality including computing devices having wireless communications capabilities that allow it to communicate with other computing devices. For example, the homeowner of the home that door 105 provides access to might have a smartphone that can wirelessly communicate with electromechanical lock 110 via one of the Institute of Electrical and Electronics Engineers (IEEE) 802.11 standards, Bluetooth®, Zigbee, Z-Wave, or other wireless communication techniques. In some implementations, electromechanical lock 110 can access a network such as the Internet via the smartphone. In other implementations, electromechanical lock 110 can access another network on its own without the smartphone as an intermediary. Thus, electromechanical lock 110 and the homeowner's smartphone can exchange data amongst themselves. For example, electromechanical lock 110 can provide data regarding the state of electromechanical lock 110 to the smartphone so that the homeowner knows whether door 105 is fully locked in a secure state, is unlocked, or other characteristics regarding door 105, or characteristics of or operation of electromechanical lock 110. Electromechanical lock 110 can also receive data from the smartphone via wireless communications providing an instruction to unlock or lock door 105. For example, electromechanical lock 110 can include a motor that can be activated (e.g., turned on) to retract or extract deadbolt 114 without having the homeowner manually use a key or paddle 112.
In
The position of deadbolt 114 can be determined by using accelerometer 140 of electromechanical lock 110 as a sensor. Accelerometer 140 can be a device (e.g., a microelectromechanical systems (MEMS)-based sensor and related circuitry) that can measure the acceleration or tilt (or inclination) of an object that it is positioned upon. In
For example,
Therefore, accelerometer 140 can move along a path that can be represented by an arc. As the accelerometer moves along that arc, the position of deadbolt 114 can change. That is, as accelerometer 140 moves along a curved path such as an arc, deadbolt 114 can move along a linear path as it extends from electromechanical lock 110 and into deadbolt slot 115 in the door jamb. The movement from the beginning to end of the arc can therefore represent the full travel range of deadbolt 114 from being fully retracted (e.g., causing door 105 to unlock) to being fully extended (e.g., causing door 105 to be locked) and positions in between. Accelerometer 140 can determine the gravity vector at the different positions. The gravity vector can be used to determine the position of deadbolt 114.
For example, in
At position 125, paddle 112 is rotated from the initial position of position 120 to begin locking door 105. Thus, in
Next, at position 130 paddle 112 might be in a final position such that it cannot be moved further along its current path. This results in deadbolt 114 being fully extended from electromechanical lock 110 and occupying a significant amount of space within deadbolt slot 115 (e.g., more space than at positions 125, 120, or other positions along arc 135). This results in door 105 being in a “fully” locked state. Prior positions along arc 135 might have resulted in door 105 being locked (e.g., deadbolt 114 might not occupy as much space within deadbolt slot 115 but door 105 is still locked), but not as secure as in position 130. As indicated in
The different positions along arc 135 can cause accelerometer 140 to determine or sense different gravity vectors. As accelerometer 140 moves along arc 135, gravity vector information 145 can be provided to controller 150 of electromechanical lock 110. Controller 150 can use the gravity vector information to determine the position of deadbolt 114. For example, because each different gravity vector is the result of accelerometer being at a different positions along arc 135, the different gravity vectors correspond go to different positions of deadbolt 114. Thus, if the gravity vector matches or is similar to a gravity vector stored in memory and accessible by controller 150 for a position associated with position 120, then controller 150 can determine that deadbolt 114 is in a fully retracted position and door 105 is fully unlocked and can be easily opened. If the gravity vector matches or is similar to a gravity vector associated with position 130, then controller 150 can determine that deadbolt 114 is in a fully extended position and door 105 is fully and securely locked and, therefore cannot be easily opened.
As discussed later herein, upon determining the position of deadbolt 114, controller 150 can perform a variety of functionalities. For example, controller 150 can provide information to the homeowner's smartphone to provide an indication as to whether door 105 is locked, unlocked, or even in a partially locked or unlocked state (e.g., not at positions 120 or 130). Controller 150 can also perform other functionalities, for example, it can retract and then extend deadbolt 114 again upon determining that the position is not appropriate. Additionally, controller 150 can instruct the motor of electromechanical lock 110 to cease operation upon a determination that the position of the deadbolt along its liner path corresponds to one of the endpoints of the non-linear path (e.g., the beginning or end) of the accelerometer because those endpoints would have different gravity vectors.
Using accelerometer 140 to determine the gravity vector and having controller 150 correlate that with the position of deadbolt 114 can provide a lower power solution. For example, accelerometers can use lower power than other types of sensors (e.g., hall effect sensors, rotary encoders, etc.). Additionally, accelerometers can occupy less space and, therefore, can easily fit within the limited space of electromechanical lock 110.
When the homeowner installs electromechanical lock 110 within door 105, a calibration process can be performed. For example, the homeowner can be requested (e.g., via the smartphone) to switch electromechanical lock from the unlocked state or locked state several times (e.g., by using paddle 112 or a key) such that the gravity vectors at positions 120 and 130 can be determined. That is, electromechanical lock 110 can be installed and then calibrated to determine the gravity vectors for position 120 and position 130 in
The controller can then receive the gravity vector information (220). Based on the gravity vector, the position of the deadbolt can then be determined (225). For example, in
The operation of the electromechanical lock can also be adjusted based on the position of the deadbolt (235). For example, in
Additional sensors of electromechanical lock 110 can also be used.
Using the information regarding the current being used by motor 305 and the gravity vector information 145 obtained from accelerometer 140, controller 150 can perform a variety of functionalities. For example, controller 150 can determine the position of deadbolt 114 and how much current is being used by motor 305 to position deadbolt 114. If the current being used by motor 305 is above a threshold current for the position that deadbolt 114 is currently at, this might indicate that there is some obstruction between deadbolt 114 and deadbolt slot 115, deadbolt 114 might not be properly aligned with deadbolt slot 115, etc. For example, an increase in friction can result in motor 305 needing to use more power (e.g., draw more current) to keep extending deadbolt 114 into deadbolt slot 115. If there is too much friction, then this might be the result of some obstruction, alignment issue, or other problem. Thus, controller 150 might then instruct motor 305 to retract deadbolt 114 and then extend it again. In another implementation, controller 150 might then instruct motor 305 to retract deadbolt 114 (e.g., to position 120 in
Other characteristic regarding the usage of the battery by the motor can also be used when determining how to operate motor 305. For example, the voltage provided by the battery can also be considered. Additionally, other characteristics regarding electromechanical lock 110 can be considered. For example, the ambient temperature, the temperature within electromechanical lock 110, humidity or other characteristics of the environment, etc. can also be considered. In one example, if it is determined by controller 150 that the temperature and/or humidity are within a threshold range (e.g., too hot or too humid) then this might be indicative of some potential expansion of the door, door jamb, etc. and therefore there might be an increase in friction or resistance as deadbolt 114 retracts or extracts. Thus, controller 150 can operate motor 305 to use more current such that it has more power to position deadbolt 114. This can allow for electromechanical lock 105 to compensate for the change in environment.
The controller can then determine characteristics of the door, electromechanical lock, or deadbolt based on the position of the deadbolt and/or current used by the motor. For example, in
Many of the examples described herein include using the gravity vector as determined by an accelerometer. However, the same or different accelerometer can also provide other types of data. For example, an accelerometer can also provide information regarding acceleration of the component that it is placed upon. As a result, the accelerometer can determine the acceleration (or even merely the presence of acceleration) of the door as it swings towards an open state (after being unlocked) or closed state (to be locked). This information can be provided to a controller and the controller can then retract the deadbolt so that it does not hit the door jamb. This can prevent damage to the door jamb, door, and/or electromechanical lock and also provide a more comfortable homeowner experience if the homeowner uses the smartphone to lock the door while it is swinging.
In some implementations, the components described herein providing the various functionalities can be installed within an existing door lock bezel. That is, a user might have an ornamental design of a door lock bezel that they like and, therefore, the electromechanical lock described herein can be installed within or between the existing bezels. However, in some implementations, the bezels can be replaced. In
In
In some implementations, front bezel 905 can tap a doorbell wiring to tap a power source and provide charge to the components within front bezel 905 or back bezel 910. That is, the wiring that is used to wire a doorbell on or close to the door can also be used to power the functionality described herein. For example, the wiring can be routed to and coupled with both the doorbell and front bezel 905 or back bezel 910 to power the various components described herein. As a result, the doorbell wiring can provide a power source to provide electric power to the touch sensor circuitry, the motor, the controller circuit, and other components of the electromechanical lock. This can reduce or eliminate the use of a battery within the electromechanical lock, saving costs and reducing the size of the electromechanical lock.
In some implementations, front bezel 905 can include capacitive touch capabilities to lock or unlock the door. For example, a capacitive touch sense circuit can be installed on a flex or printed circuit board (PCB) within front bezel 905 to determine that a human finger has touched front bezel 905. If a human finger is detected, then the door can be unlocked (e.g., the deadbolt can be retracted). In some implementations, the fingerprint of the finger can be detected and imaged, and if that imaged fingerprint is determined to be an authorized fingerprint (e.g., of the homeowner who previously registered his or her fingerprints) then the door can be unlocked.
In one example of detecting touch to lock or unlock a door, a homeowner can swipe, or move a finger, along the surface of front bezel 905 or back bezel 910 to lock or unlock the door by adjusting the position of the deadbolt along the linear path, as previously discussed, in response to the movement of the finger.
In
In some implementations, the movement along circular path 1010 might be in different directions to lock or unlock the door. For example, moving finger 1005 in a clockwise direction might result in the deadbolt to be extended to lock the door, and moving finger 1005 in a counter-clockwise direction might result in the deadbolt to be retracted to unlock the door. In some implementations, the touch of finger 1005 and moving along circular path 1010 might be designated to be along a fixed location, for example, a fixed start and end point for finger 1005 to move along to extend or retract the deadbolt. However, in other implementations, finger 1005 can be initially disposed upon many or any part of front bezel 905 and moved for the particular threshold distance to extend or retract the deadbolt. For example, at a first time, finger 1005 can be swiped along the top part of front bezel 905 above key slot 915, and at a second time, finger 1005 can be swiped along the bottom part of front bezel 905 below key slot 915. In another example, finger 1005 can be placed on a different part of front bezel 905, for example, along circular path 1015 on a part of front bezel 905 that is facing the person using the electromechanical lock rather than around key slot 915. Additionally, back bezel 910 can also include similar touch capabilities to lock or unlock the door from the interior of the building.
Next, characteristics of the finger can be determined (1110). For example, in
Though some of the prior examples describe recognition of a touch and swipe of a finger as the determined characteristics to adjust the deadbolt, other characteristics can be used. For example, merely the touch of a finger can be determined. In another example, a fingerprint reader can be implemented within the electromechanical lock and a person can place a finger upon a front bezel 905 to lock or unlock the door based on the fingerprint of the finger being recognized as an authorized fingerprint. In some implementations, a door can be locked by any fingerprint, but unlocked upon an authorized fingerprint. This can allow for a guest in the home to lock the door, but prevents the door from being unknowingly unlocked for the homeowner.
In another implementation, force or pressure sensitive sensors can be used to determine an amount of force or pressure applied to front bezel 905. The characteristics of the finger can further be based on the amount of force or pressure applied. For example, a certain amount of pressure can be applied and the increase in amount of pressure can result in the deadbolt to extend along the linear path to lock the door.
In some implementations, near-field communication (NFC) can also be implemented by circuitry within front bezel 905. For example, a homeowner can tap front bezel 905 with a smartphone. Using NFC, the smartphone can be recognized by the circuitry that it belongs to the homeowner, for example, by exchanging an identifier of the smartphone. Upon that determination, the door can be unlocked from the locked state, or vice versa. In some implementations, the antenna for the NFC can be housed within front bezel 905. For example, it can be looped around the interior of a circular front bezel 905 such that it is behind the face of front bezel 905. In other implementations, the antenna can be placed on the exterior of front bezel 905. For example, it can be disposed around key slot 915. In another implementation, the antenna can be embedded within or around key slot 915. For example, the cylinder that houses key slot 915 and rotates as the key rotates can include the antenna wrapped around it.
In some implementations, front bezel 905 can also include a camera, a microphone, motion sensor, or a doorbell.
For example, camera 1205 can record and provide visual images regarding activities occurring in front of front bezel 905. This can be used to alert a homeowner regarding who is at the door that is secured via electromechanical lock 110. In some implementations, the visual images can be still images, a series of still images, video, etc. that can be provided and viewed via a smartphone.
Microphone 1210 can record audio content regarding activities occurring in front of front bezel 905. For example, microphone 1210 can be used to record audio for the video provided using camera 1205.
Speaker 1225 can be used to provide audio output for a person in front of electromechanical lock 110. For example, using a smartphone, a homeowner inside can have an audio conversation with a person outside. In another example, the speaker can provide an audio output in the form of speech indicating whether the door is locked or unlocked. In another example, the homeowner can ask the door lock whether it is locked or unlocked (e.g., ask for its state). This can be picked up by microphone 1210, the state of the lock can be determined, and then the audio output indicating the state can be provided using speaker 1225.
Motion sensor 1215 can be used to determine that activity is occurring (e.g., due to the movement of objects detected) and then used to activate camera 11205 and/or microphone 1210 to record content. Motion sensor 1215 can also be used to active other components (e.g., lock components 720) described herein. Thus, when components are not activated, the components can be in a low-power state or even powered off. When motion sensor 1215 detects motion, these components can be activated, or switched from a low-power state to a higher-power state in which more functionalities are enabled, or powered on to enable functionalities.
Doorbell 1220 can also be implemented by electromechanical lock 110. For example, a button can be disposed upon front bezel 905. The button can implement part of a doorbell, which, when pressed, can generate a signal received by processors 705 and used to activate a doorbell chime inside the building. In some implementations, a speaker can be implemented upon back bezel 910 and a doorbell chime can be generated as an audio output using the speaker.
The processor 705 may be, for example, a microprocessor circuit such as an Intel Pentium microprocessor or Motorola power PC microprocessor. One of skill in the relevant art will recognize that the terms “machine-readable (storage) medium” or “computer-readable (storage) medium” include any type of device that is accessible by the processor. Processor 705 can also be circuitry such as an application specific integrated circuits (ASICs), complex programmable logic devices (CPLDs), field programmable gate arrays (FPGAs), structured ASICs, etc.
The memory is coupled to the processor by, for example, a bus. The memory can include, by way of example but not limitation, random access memory (RAM), such as dynamic RAM (DRAM) and static RAM (SRAM). The memory can be local, remote, or distributed.
The bus also couples the processor to the non-volatile memory and drive unit. The non-volatile memory is often a magnetic floppy or hard disk; a magnetic-optical disk; an optical disk; a read-only memory (ROM) such as a CD-ROM, EPROM, or EEPROM; a magnetic or optical card; or another form of storage for large amounts of data. Some of this data is often written, by a direct memory access process, into memory during the execution of software in the computer. The non-volatile storage can be local, remote or distributed. The non-volatile memory is optional because systems can be created with all applicable data available in memory. A typical computer system will usually include at least a processor, memory, and a device (e.g., a bus) coupling the memory to the processor.
The software can be stored in the non-volatile memory and/or the drive unit. Indeed, storing an entire large program in memory may not even be possible.
Nevertheless, it should be understood that for software to run, it may be necessary to move the software to a computer-readable location appropriate for processing, and, for illustrative purposes, that location is referred to as memory in this application. Even when software is moved to memory for execution, the processor will typically make use of hardware registers to store values associated with the software and make use of a local cache that, ideally, serves to accelerate execution. As used herein, a software program is can be stored at any known or convenient location (from non-volatile storage to hardware registers).
The bus also couples the processor to the network interface device. The interface can include one or more of a modem or network interface. Those skilled in the art will appreciate that a modem or network interface can be considered to be part of the computer system. The interface can include an analog modem, an ISDN modem, a cable modem, a token ring interface, a satellite transmission interface (e.g., “direct PC”), or other interface for coupling a computer system to other computer systems. The interface can include one or more input and/or output devices. The input and/or output devices can include, by way of example but not limitation, a keyboard, a mouse or other pointing device, disk drives, printers, a scanner, and other input and/or output devices, including a display device. The display device can include, by way of example but not limitation, a cathode ray tube (CRT), a liquid crystal display (LCD), or some other applicable known or convenient display device.
In operation, the assistant device can be controlled by operating system software that includes a file management system, such as a disk operating system. The file management system is typically stored in the non-volatile memory and/or drive unit and causes the processor to execute the various acts required by the operating system to input and output data, and to store data in the memory, including storing files on the non-volatile memory and/or drive unit.
Some items of the detailed description may be presented in terms of algorithms and symbolic representations of operations on data bits within a computer memory. These algorithmic descriptions and representations are the means used by those skilled in the data processing arts to most effectively convey the substance of their work to others skilled in the art. An algorithm is here, and generally, conceived to be a self-consistent sequence of operations leading to a desired result. The operations are those requiring physical manipulations of physical quantities. Usually, though not necessarily, these quantities take the form of electronic or magnetic signals capable of being stored, transferred, combined, compared, and/or otherwise manipulated. It has proven convenient at times, principally for reasons of common usage, to refer to these signals as bits, values, elements, symbols, characters, terms, numbers, or the like.
It should be borne in mind, however, that all of these and similar terms are to be associated with the appropriate physical quantities and are merely convenient labels applied to these quantities. Unless specifically stated otherwise, as apparent from the following discussion, those skilled in the art will appreciate that throughout the description, discussions utilizing terms such as “processing” or “computing” or “calculating” or “determining” or “displaying” or “generating” or the like refer to the action and processes of a computer system or similar electronic computing device that manipulates and transforms data represented as physical (electronic) quantities within the computer system's registers and memories into other data similarly represented as physical quantities within the computer system's memories or registers or other such information storage, transmission, or display devices.
The algorithms and displays presented herein are not inherently related to any particular computer or other apparatus. Various general-purpose systems may be used with programs in accordance with the teachings herein, or it may prove convenient to construct more specialized apparatuses to perform the methods of some embodiments. The required structure for a variety of these systems will be apparent from the description below. In addition, the techniques are not described with reference to any particular programming language, and various embodiments may thus be implemented using a variety of programming languages.
In further embodiments, the assistant device operates as a standalone device or may be connected (e.g., networked) to other machines. In a networked deployment, the assistant device may operate in the capacity of a server or of a client machine in a client-server network environment or may operate as a peer machine in a peer-to-peer (or distributed) network environment.
In some embodiments, the assistant devices include a machine-readable medium. While the machine-readable medium or machine-readable storage medium is shown in an exemplary embodiment to be a single medium, the term “machine-readable medium” and “machine-readable storage medium” should be taken to include a single medium or multiple media (e.g., a centralized or distributed database and/or associated caches and servers) that store the one or more sets of instructions. The term “machine-readable medium” and “machine-readable storage medium” should also be taken to include any medium that is capable of storing, encoding, or carrying a set of instructions for execution by the machine, and which causes the machine to perform any one or more of the methodologies or modules of the presently disclosed technique and innovation.
In general, the routines executed to implement the embodiments of the disclosure may be implemented as part of an operating system or a specific application, component, program, object, module, or sequence of instructions referred to as “computer programs.” The computer programs typically comprise one or more instructions set at various times in various memory and storage devices in a computer that, when read and executed by one or more processing units or processors in a computer, cause the computer to perform operations to execute elements involving various aspects of the disclosure.
Moreover, while embodiments have been described in the context of fully functioning computers and computer systems, those skilled in the art will appreciate that the various embodiments are capable of being distributed as a program product in a variety of forms, and that the disclosure applies equally, regardless of the particular type of machine- or computer-readable media used to actually effect the distribution.
Further examples of machine-readable storage media, machine-readable media, or computer-readable (storage) media include, but are not limited to, recordable type media such as volatile and non-volatile memory devices, floppy and other removable disks, hard disk drives, optical disks (e.g., Compact Disc Read-Only Memory (CD-ROMS), Digital Versatile Discs, (DVDs), etc.), among others, and transmission type media such as digital and analog communication links.
In some circumstances, operation of a memory device, such as a change in state from a binary one to a binary zero or vice-versa, for example, may comprise a transformation, such as a physical transformation. With particular types of memory devices, such a physical transformation may comprise a physical transformation of an article to a different state or thing. For example, but without limitation, for some types of memory devices, a change in state may involve an accumulation and storage of charge or a release of stored charge. Likewise, in other memory devices, a change of state may comprise a physical change or transformation in magnetic orientation or a physical change or transformation in molecular structure, such as from crystalline to amorphous or vice-versa. The foregoing is not intended to be an exhaustive list in which a change in state for a binary one to a binary zero or vice-versa in a memory device may comprise a transformation, such as a physical transformation. Rather, the foregoing is intended as illustrative examples.
A storage medium may typically be non-transitory or comprise a non-transitory device. In this context, a non-transitory storage medium may include a device that is tangible, meaning that the device has a concrete physical form, although the device may change its physical state. Thus, for example, non-transitory refers to a device remaining tangible despite this change in state.
The foregoing description of various embodiments of the claimed subject matter has been provided for the purposes of illustration and description. It is not intended to be exhaustive or to limit the claimed subject matter to the precise forms disclosed. Many modifications and variations will be apparent to one skilled in the art. Embodiments were chosen and described in order to best describe certain principles and practical applications, thereby enabling others skilled in the relevant art to understand the subject matter, the various embodiments and the various modifications that are suited to the particular uses contemplated.
While embodiments have been described in the context of fully functioning computers and computer systems, those skilled in the art will appreciate that the various embodiments are capable of being distributed as a program product in a variety of forms and that the disclosure applies equally regardless of the particular type of machine- or computer-readable media used to actually effect the distribution.
Although the above Detailed Description describes certain embodiments and the best mode contemplated, no matter how detailed the above appears in text, the embodiments can be practiced in many ways. Details of the systems and methods may vary considerably in their implementation details while still being encompassed by the specification. As noted above, particular terminology used when describing certain features or aspects of various embodiments should not be taken to imply that the terminology is being redefined herein to be restricted to any specific characteristics, features, or aspects of the disclosed technique with which that terminology is associated. In general, the terms used in the following claims should not be construed to limit the disclosure to the specific embodiments disclosed in the specification, unless those terms are explicitly defined herein. Accordingly, the actual scope of the technique encompasses not only the disclosed embodiments but also all equivalent ways of practicing or implementing the embodiments under the claims.
The language used in the specification has been principally selected for readability and instructional purposes, and it may not have been selected to delineate or circumscribe the inventive subject matter. It is therefore intended that the scope of the technique be limited not by this Detailed Description, but rather by any claims that issue on an application based hereon. Accordingly, the disclosure of various embodiments is intended to be illustrative, but not limiting, of the scope of the embodiments, which is set forth in the following claims.
From the foregoing, it will be appreciated that specific embodiments of the invention have been described herein for purposes of illustration, but that various modifications may be made without deviating from the scope of the invention. Accordingly, the invention is not limited except as by the appended claims.
This application claims benefit of U.S. Provisional Patent Application No. 62/597,890, entitled “Door Lock Bezel with Touch and Wireless Capabilities,” by Martin et al., and filed on Dec. 12, 2017. The content of the above-identified application is incorporated herein by reference in their entirety.
Number | Name | Date | Kind |
---|---|---|---|
6298147 | Ilan | Oct 2001 | B1 |
7239227 | Gupta | Jul 2007 | B1 |
7908896 | Olson et al. | Mar 2011 | B1 |
8006525 | Huang | Aug 2011 | B2 |
8079240 | Brown | Dec 2011 | B2 |
8284023 | Coutermarsh | Oct 2012 | B2 |
8589032 | Witte | Nov 2013 | B2 |
8593249 | Bliding | Nov 2013 | B2 |
8683833 | Marschalek | Apr 2014 | B2 |
8689591 | Elsner | Apr 2014 | B2 |
8876050 | Wentland | Nov 2014 | B2 |
9551168 | Dias | Jan 2017 | B2 |
9695616 | Johnson | Jul 2017 | B2 |
9836900 | Jun | Dec 2017 | B2 |
10125519 | Gengler | Nov 2018 | B1 |
10612272 | Wu | Apr 2020 | B2 |
10614645 | Tsai | Apr 2020 | B1 |
10672209 | Lee | Jun 2020 | B2 |
10692312 | Niranjayan | Jun 2020 | B1 |
10738504 | Uyeda | Aug 2020 | B2 |
10968660 | Maiga | Apr 2021 | B2 |
11021894 | Zastrow | Jun 2021 | B1 |
11450158 | Chong | Sep 2022 | B2 |
20030141959 | Keogh | Jul 2003 | A1 |
20040045330 | Moon et al. | Mar 2004 | A1 |
20090242699 | Wentland | Oct 2009 | A1 |
20100031714 | Brown | Feb 2010 | A1 |
20120011902 | Meekma | Jan 2012 | A1 |
20130192316 | McKibben | Aug 2013 | A1 |
20130192318 | Yanar | Aug 2013 | A1 |
20140157842 | Almomani | Jun 2014 | A1 |
20140292481 | Dumas | Oct 2014 | A1 |
20150022466 | Levesque | Jan 2015 | A1 |
20150027178 | Scalisi | Jan 2015 | A1 |
20150218850 | Uyeda et al. | Aug 2015 | A1 |
20150284986 | Wall | Oct 2015 | A1 |
20150332532 | Lee | Nov 2015 | A1 |
20150371469 | Scalisi | Dec 2015 | A1 |
20170180539 | Payack, Jr. | Jun 2017 | A1 |
20170193724 | Johnson | Jul 2017 | A1 |
20170204636 | Sack | Jul 2017 | A1 |
20170230509 | Lablans | Aug 2017 | A1 |
20170263067 | Scalisi | Sep 2017 | A1 |
20180135337 | Johnson | May 2018 | A1 |
20200242868 | Gengler | Jul 2020 | A1 |
20210005036 | Johnson | Jan 2021 | A1 |
Number | Date | Country |
---|---|---|
101806174 | Aug 2010 | CN |
103526991 | Jan 2014 | CN |
2017180688 | Oct 2017 | WO |
Entry |
---|
Authentec, Inc. , “TCS1/TCS2-TCD58E TouchChip Chipset Datasheet”, 2011, pp. i-46. |
Number | Date | Country | |
---|---|---|---|
20190178003 A1 | Jun 2019 | US |
Number | Date | Country | |
---|---|---|---|
62597890 | Dec 2017 | US |