The technical field generally relates to an electronic lock authentication method and system, and more particularly, but not exclusively, relates to electronic lock authentication via a network and a cellular telephone.
Authentication systems may include an access control panel (ACP) which makes an access control decision. The authentication may be between a controller and the ACP. Some existing systems have various shortcomings relative to certain applications. Accordingly, there remains a need for further contributions in this area of technology.
One embodiment of the present invention is a unique electronic lock authentication system. Other embodiments include apparatuses, systems, devices, hardware, methods, and combinations for electronic lock authentication. Further embodiments, forms, features, aspects, benefits, and advantages of the present application shall become apparent from the description and figures provided herewith.
For the purposes of promoting an understanding of the principles of the invention, reference will now be made to the embodiments illustrated in the drawings and specific language will be used to describe the same. It will nevertheless be understood that no limitation on the scope of the invention is hereby intended. Any alterations and further modifications in the described embodiments, and any further applications of the principles of the invention as described herein are contemplated as would normally occur to one skilled in the art to which the invention relates.
With reference to
The lock advertises its presence, for example, while in a low power sleep state. The lock may perform such advertising, for example, once every ‘x’ amount of time. The cellular telephone scans for devices in its range, which may occur, for example, when the cellular telephone is in a low power scan mode. When a lock is in range, the cellular telephone initiates communication with the lock. The lock, in turn, transmits its encrypted Lock ID to the cellular telephone. The cellular telephone then transmits the encrypted Lock ID and its Phone ID to the network cloud.
The network cloud makes a decision, which in one embodiment may be in real time, as to whether the cellular telephone is permitted access to the door based on the Lock ID and the Phone ID.
The network cloud then transmits an encrypted grant or deny message to the cellular telephone, which in turn transmits the encrypted grant or deny message to the lock.
The lock advertises its presence, for example, while in a low power sleep state. The lock may perform such advertising, for example, once every ‘x’ amount of time. The cellular telephone scans for devices in its range, which may occur, for example, when the cellular telephone is in a low power scan mode. When a lock is in range, the cellular telephone initiates communication with the lock. The lock, in turn, transmits its encrypted Lock ID to the cellular telephone. The cellular telephone then transmits the encrypted Lock ID and its Phone ID to the network cloud.
The network cloud makes a decision, which in one embodiment may be in real time, as to whether the cellular telephone is permitted access to the door based on the Lock ID and the Phone ID.
In the
The network cloud then makes a decision, which in one embodiment may be in real time, as to whether the additional credential information is correct.
The network cloud then transmits an encrypted grant or deny message to the cellular telephone, which in turn transmits the encrypted grant or deny message to the lock.
In one embodiment, the system architecture allows the major communication pipeline to be between the cellular telephone and the cloud, which in turn allows the electronics resident on the door to be a much simpler and smaller form factor design.
In one embodiment, the system architecture provides ways to provide additional credential information to the network cloud which may take the form of for example a “phone+additional credential information” application.
In one embodiment, real time access control verification allows for no wires to be needed in an installation. Further, the electronic lock may be battery powered and have the ability to “go online” through the cellular telephone's interne connection. In one embodiment, the cellular telephone would provide the communication path between the lock and the network cloud, allowing a real time access control decision, without a hardwired connection for the lock.
While the invention has been illustrated and described in detail in the drawings and foregoing description, the same is to be considered as illustrative and not restrictive in character, it being understood that only the preferred embodiments have been shown and described and that all changes and modifications that come within the spirit of the inventions are desired to be protected.
It should be understood that while the use of words such as preferable, preferably, preferred or more preferred utilized in the description above indicate that the feature so described may be more desirable, it nonetheless may not be necessary and embodiments lacking the same may be contemplated as within the scope of the invention, the scope being defined by the claims that follow. In reading the claims, it is intended that when words such as “a,” “an,” “at least one,” or “at least one portion” are used there is no intention to limit the claim to only one item unless specifically stated to the contrary in the claim. When the language “at least a portion” and/or “a portion” is used the item can include a portion and/or the entire item unless specifically stated to the contrary.
The present application claims the benefit of U.S. Provisional Patent Application No. 61/684,114 filed on Aug. 16, 2012, the contents of which are incorporated herein by reference in their entirety.
Number | Name | Date | Kind |
---|---|---|---|
5046084 | Barrett et al. | Sep 1991 | A |
5654696 | Barrett et al. | Aug 1997 | A |
6133847 | Yang | Oct 2000 | A |
6407779 | Herz | Jun 2002 | B1 |
6937140 | Outslay et al. | Aug 2005 | B1 |
6968153 | Heinonen et al. | Nov 2005 | B1 |
7933945 | Krzyzanowski et al. | Apr 2011 | B2 |
7933968 | Zimmerman | Apr 2011 | B1 |
8037511 | Lundy | Oct 2011 | B1 |
8922334 | Hale et al. | Dec 2014 | B2 |
20020002507 | Hatakeyama | Jan 2002 | A1 |
20040119894 | Higgins et al. | Jun 2004 | A1 |
20060072755 | Oskari | Apr 2006 | A1 |
20060170533 | Chioiu et al. | Aug 2006 | A1 |
20070050259 | Wesley | Mar 2007 | A1 |
20070130476 | Mohanty | Jun 2007 | A1 |
20070290789 | Segev et al. | Dec 2007 | A1 |
20080261560 | Ruckart | Oct 2008 | A1 |
20090259957 | Slocum et al. | Oct 2009 | A1 |
20100017736 | Kim | Jan 2010 | A1 |
20100138764 | Hatambeiki et al. | Jun 2010 | A1 |
20100229194 | Blanchard et al. | Sep 2010 | A1 |
20100283579 | Kraus | Nov 2010 | A1 |
20100298032 | Lee et al. | Nov 2010 | A1 |
20110202415 | Casares et al. | Aug 2011 | A1 |
20110246904 | Pinto et al. | Oct 2011 | A1 |
20110311052 | Myers | Dec 2011 | A1 |
20120068817 | Fisher | Mar 2012 | A1 |
20120072944 | Felt et al. | Mar 2012 | A1 |
20120095791 | Stefik et al. | Apr 2012 | A1 |
20120100868 | Kim | Apr 2012 | A1 |
20120157080 | Metivier | Jun 2012 | A1 |
20120280790 | Gerhardt et al. | Nov 2012 | A1 |
20120287058 | Lee | Nov 2012 | A1 |
20130031261 | Suggs | Jan 2013 | A1 |
20130165180 | Fukuda Kelley et al. | Jun 2013 | A1 |
20130324237 | Adiraju | Dec 2013 | A1 |
20140007222 | Qureshi et al. | Jan 2014 | A1 |
20140049362 | Ahearn | Feb 2014 | A1 |
20140049363 | Ahearn et al. | Feb 2014 | A1 |
20140049364 | Ahearn et al. | Feb 2014 | A1 |
20140049365 | Ahearn et al. | Feb 2014 | A1 |
20140049366 | Vasquez | Feb 2014 | A1 |
Number | Date | Country |
---|---|---|
2009019423 | Jan 2009 | JP |
Entry |
---|
European Extended Search Report; European Patent Office; European Patent Application No. 13829433.5; Mar. 24, 2016; 17 pages. |
Number | Date | Country | |
---|---|---|---|
20140049362 A1 | Feb 2014 | US |
Number | Date | Country | |
---|---|---|---|
61684114 | Aug 2012 | US |