The disclosure relates to electronic locks.
Electronic locks can often receive one or more commands from a user. For example, a user can press a button to activate or deactivate the lock.
US20110100762A1 describes a system with command buttons on, for example, a door trim. The command buttons can initiate commands for actions within a system.
In various embodiments, a command can be input into an electronic lock by holding a data carrier in range of a reader of the lock. The lock provides an indicator for one or more commands. An indicated command can be selected by a given gesture, for example, by removing the data carrier from the range of the reader.
In some embodiments, an electronic lock method comprises: detecting a first presence of a data carrier using a data-carrier reader of an electronic lock; communicating an indicator for a first command using an output device of the electronic lock; detecting a second presence of the data carrier using the data-carrier reader; communicating an indicator for a second command using the output device; detecting a confirmation of the data carrier with the data-carrier reader; and as a result of detecting the confirmation of the data carrier, selecting the second command with a computer-based control unit of the electronic lock. The confirmation of the data carrier can comprise an absence of the data carrier, or a continued presence of the data carrier. The data carrier can comprise a radio-frequency identification tag or an optical code. The second command can be an elevator installation command, an access control system command, or a command for a lock portion. The indicator for the first command can comprise an icon or a sound.
In further embodiments, an electronic lock comprises a data-carrier, an output device, and a computer-based control unit coupled to the data-carrier reader and to the output device, the computer-based control unit being programmed to perform a method, the method comprising, detecting a first presence of a data carrier using the data-carrier reader, communicating an indicator for a first electronic lock command using the output device, detecting a second presence of the data carrier using the data-carrier reader, communicating an indicator for a second electronic lock command using the output device, detecting a confirmation of the data carrier with the data-carrier reader, and as a result of detecting the confirmation of the data carrier, selecting the second electronic lock command. The control unit can also be coupled to an elevator system, an access control system and/or a lock portion.
Further embodiments comprise a computer-based device configured to perform one or more of the disclosed methods.
At least some embodiments of the disclosed methods can be implemented using a computer or computer-based device that performs one or more method acts, the computer or computer-based device having read instructions for performing the method acts from one or more computer-readable storage media. The computer-readable storage media can comprise, for example, one or more optical disks, volatile memory components (such as dynamic random-access memory (DRAM) or static random-access memory (SRAM) and/or nonvolatile memory components (such as hard drives, Flash random-access memory (RAM) or read-only memory (ROM)). The computer-readable storage media do not cover pure transitory signals. The methods disclosed herein are not performed solely in the human mind.
The disclosure refers to the following figures:
In some cases, one or more components of the system 100 are communicatively coupled by a network (not shown) to additional components.
In particular embodiments, at least some of the components of the lock system 100 are contained in a lock housing 150. The lock housing 150 can, for example, be positioned in or on a door that is locked or unlocked by the lock system 100. The lock housing 150 can also be positioned remotely from the door, or near (but outside of) the door.
In various embodiments, the lock system 210 can be coupled to an elevator system 230, to an access control system 240, and/or to another system. The lock system 210 can also be coupled to a database 250. The database 250 can store information about, for example, users, user permissions, access times for areas of a building and/or other types of information.
Generally, such an indicator can be a visual indicator, such as a graphic, an icon, an animation, a color, a number and/or text. The indicator can also be a sound, such as a tone, a voice, a click, music or another sound. In some cases, the indicator is a combination of a visual indicator and a sound.
If the user wishes to select the first command, then the user can move the data carrier outside of the range of the reader. The lock system would then interpret this action as selection of the first command. However, if the user wishes to select another command, the user can leave the data carrier in range of the reader. Then, in a method act 330, the user receives an indicator for a second command from the output device of the lock system. In a method act 340, the user moves the data carrier out of range of the reader to show that the user wishes to select the second command.
In various embodiments, different numbers of commands are available for selection by the user. For example, the lock system could offer two, three, four, five, ten or another number of commands. In some cases, once the lock system has communicated an indicator for the last of the commands, the system can repeat the indicators for the commands until the user selects a command. Thus, the user can “cycle through” the available commands.
How long a data carrier must remain within range of a reader (after the reader displays a command) to cause the reader to display a next indicator can vary by embodiment. In some cases, the amount of time is, for example, 0.5 seconds, 1 second, 2 seconds, 3 seconds, or another amount of time.
The commands that can be input by the user vary according to the particular embodiment. Possible commands include, for example: lock a door; unlock a door; call an elevator to pick up the user; open a door for a visitor; send an elevator to pick up a visitor; and/or other commands.
In a method step or act 510, the lock system detects a data carrier using the data-carrier reader. As a result of detecting the presence of the data carrier, the lock system indicates a command using the lock output device in a method act 520. In a method act 530, the lock system detects the absence of the data carrier using the reader. As a result of no longer detecting the data carrier, the lock system selects the indicated command in a method act 540.
In further embodiments of the method 500, the lock system also sends the selected command to another system. For example, if the selected command is an elevator command (e.g., call the elevator), the lock system sends the command to the elevator system. If the selected command is an access control command (e.g., unlock a door for a visitor), the lock system sends the command to the access control system.
In a method step or act 610, the lock system detects a data carrier using the data-carrier reader. As a result of detecting the presence of the data carrier, the lock system indicates a first command using the lock output device in a method act 620. While displaying the indicator for the first command, the lock system again detects that the data carrier is within range of the reader in a method act 630. As a result of further detecting the data carrier, the lock system indicates a second command using the lock output device in a method act 640. In a method act 650, the lock system detects a confirmation of the indicated second command. Accordingly, the lock system interprets this to mean that the second command is the command desired by the user. In a method act 660, the lock system selects the second command.
In some embodiments, the user holds the data carrier within range of the reader until the desired command is indicated. Then, to confirm the desired command, the user removes the data carrier from the range of the reader.
In further embodiments, the user places the data carrier within range of the reader for a short period of time (e.g., 0.5 seconds, 1 second, 2 seconds, or another amount of time), removes the data carrier from the reader range for a short period of time, and then returns the data carrier to the reader range. The user repeats this process to cause the lock system to successively indicate different possible commands. To confirm an indicated command, the user holds the data carrier within range of the reader.
In other cases, additional gestures can be used to confirm an indicated command.
In further embodiments of the method 600, the lock system also sends the selected command to another system.
In various embodiments, a data signal is sent by the data carrier in response to a signal that is first sent by the reader (sometimes called an “interrogation signal”). This can be the case if, for example, the data carrier is a passive RFID tag. For clarity, such additional signals sent by the reader are not shown in
In any of the disclosed embodiments, an identification feature can be used. For example, the lock system can compare data read from the data carrier with a list of data for authorized users to determine if the user associated with the data carrier is authorized to perform a given command. Alternatively, the lock system can first require that a user input authorization information, possibly using an additional data carrier.
At least some of the disclosed embodiments can allow additional ways for a user to input a command into an electronic lock. Such embodiments can be helpful to, for example, a user who cannot operate buttons or other types of user interfaces, possibly due to a handicap. Physically touching the electronic lock can also be avoided, which can help avoid the transmission of dirt or disease.
In one non-limiting example, a user lives in a high-rise apartment building. The user's apartment door has an electronic lock, which is contained in a lock housing. Three commands can be input into the lock: lock/unlock the door; call an elevator car to the floor of the user's apartment; and send an elevator car to the building lobby to pick up a guest and bring the guest to the user's floor. The user knows that a guest has just arrived in the lobby, and the user wishes to send the elevator to pick up the guest. The user holds a credit-card-sized RFID card within a few centimeters of the lock housing, which contains an RFID reader. Upon detecting the card, the lock displays a first icon, which is associated with the command to lock/unlock the door. The user continues to hold the card near the reader, so after 1 second, the lock displays a second icon, which is associated with the command to call an elevator car to the user's floor. The user still continues to hold the card near the reader, so after another second, the lock displays a third icon, which is associated with the command to send an elevator car to the building lobby to pick up a guest. This is the user's desired command, so upon seeing the icon, the user moves the RFID card out of range of the lock's reader. The lock interprets this action as meaning that the user wishes to input the command of the third icon. Accordingly, the lock sends this command to the elevator system. The elevator system then sends a car to the lobby to pick up the guest and bring the guest to the user's floor.
In another non-limiting example, a user approaches an electronic door lock with a key fob that contains an RFID tag. The user places the fob in range of the reader, and then moves the key fob away from the lock (so that it is no longer in range of the reader). The user repeats this action several times. Each time the user places the fob in range of the reader and then removes it, the lock displays an indicator for a different command. Once the lock displays an indicator for the fourth command, the user holds the fob within range of the reader for two seconds, thus confirming to the lock that this is the user's desired command. The lock then executes the fourth command.
Although some embodiments of the various methods disclosed herein are described as comprising a certain number of method acts, further embodiments of a given method can comprise more or fewer method acts than are explicitly disclosed herein. In additional embodiments, method acts are performed in an order other than as disclosed herein. In some cases, two or more method acts can be combined into one method act and/or one method act can be divided into two or more method acts.
As used herein, a “user” can be a person, a group of persons, a machine and/or an animal.
Having illustrated and described the principles of the disclosed technologies, it will be apparent to those skilled in the art that the disclosed embodiments can be modified in arrangement and detail without departing from such principles. In view of the many possible embodiments to which the principles of the disclosed technologies can be applied, it should be recognized that the illustrated embodiments are only examples of the technologies and should not be taken as limiting the scope of the invention.
In accordance with the provisions of the patent statutes, the present invention has been described in what is considered to represent its preferred embodiment. However, it should be noted that the invention can be practiced otherwise than as specifically illustrated and described without departing from its spirit or scope.
Number | Date | Country | Kind |
---|---|---|---|
12182606 | Aug 2012 | EP | regional |
Filing Document | Filing Date | Country | Kind |
---|---|---|---|
PCT/EP2013/065304 | 7/19/2013 | WO | 00 |
Publishing Document | Publishing Date | Country | Kind |
---|---|---|---|
WO2014/032854 | 3/6/2014 | WO | A |
Number | Name | Date | Kind |
---|---|---|---|
4979594 | Begle et al. | Dec 1990 | A |
5929769 | Garnault | Jul 1999 | A |
7446644 | Schaffzin | Nov 2008 | B2 |
7664464 | Gerstenkorn | Feb 2010 | B2 |
20110100762 | Gerstenkorn et al. | May 2011 | A1 |
20120031711 | Gerstenkorn et al. | Feb 2012 | A1 |
20120037458 | Gerstenkorn | Feb 2012 | A1 |
20120234058 | Neil | Sep 2012 | A1 |
Number | Date | Country |
---|---|---|
1283503 | Dec 2003 | EP |
1970265 | Sep 2008 | EP |
2010000332 | Jan 2010 | WO |
2010066866 | Jun 2010 | WO |
Entry |
---|
PCT/EP2013/065304, Written Opinion of the International Search Authority, Feb. 28, 2015. |
Number | Date | Country | |
---|---|---|---|
20150221148 A1 | Aug 2015 | US |