The instant application claims priority to Malaysia Patent Application Ser. No. PI 2017703168 filed Aug. 28, 2017, the entire specification of which is expressly incorporated herein by reference.
The invention relates to a door access system. More particularly, the invention relates to a wireless door access system using mobile device and method thereof.
Over the years, traditional lock system or digital lock system has been applied for high security areas or in locker rooms for buildings. Drawbacks were found within these systems whereby the buildings are not perfectly secured. With the advancements of technology, RFID cards were introduced to replace the traditional keys. This system requires the users to wear or carry identification badges for building access, which are either inspected by security guard or are read by machines installed at the access doors. Nevertheless, these cards were not effective enough due to the possibility of getting lost, stolen and forgotten.
There are a few patented technologies regarding the aforementioned door access system. Of interest in respect to a wireless access control system is disclosed in US 2013/0237193, this patent provides guidance on a wireless access control system includes a remote access device. A plugin device communicates with the remote access device. A lock controls the ability to lock and unlock a door in which the lock is disposed. The lock is in communication with the plug in device. The plug in device determines a distance between the remote access device and the lock and causes the lock to communicate with the remote access device when the remote access device is at a distance less than or equal to a predetermined distance from the lock to enable the lock to be unlocked. Nonetheless, the disclosed invention does not include security features such as password during the unlock operation.
Besides, U.S. Pat. No. 9,353,551 discloses a wireless door locking system including a door lock having a locking device, a sensor and a microcontroller. The system also includes a mobile computing device having a display and a mobile application, wherein the mobile computing device is place proximate to the door lock. The system includes a server in communication with the mobile computing device. The mobile application may generate a code such as a light pattern in response to communication with the server and transmits the light pattern from the display. The controller of the door lock disengages the locking device in response to the sensor receiving the generated code communicated from the mobile computing device and determining that the generated code includes correct data to disengage the locking device of the door lock. However, the drawback of this system is that the accessibility of user is not updateable in real time such that certain user can only grant access at a predetermined time.
In a nut shell, it is essential to provide a door access control system which can overcome the aforementioned drawbacks. This invention provides such a system and method.
The main objective of the invention is to provide users a system for controlling the operation of door entrance wirelessly and also to enhance the security protection of the door entrance. To achieve this objective, the invention provides a control system for door lock comprising a server, a controller for unlocking the door and a mobile device having an application for user to trigger a door unlocking process, means for collecting biometric information of the user, a BLUETOOTH module to establish a BLUETOOTH communication link between the mobile device and the controller, wherein the controller is linked to the server to receive updates on user access credentials, and wherein door unlocking process includes the mobile device firstly performs a biometric authentication to verify the user and then transmit an instruction to the controller via the BLUETOOTH communication link and the controller upon receiving the instruction, performs a second authentication to verify the user's accessibility based on the received user access credentials and then unlock the door based on the outcomes of the authentications.
By BLUETOOTH, as that term is used herein, it is meant to include, without limitation, any wireless technology standard for exchanging data over short distances using short-wavelength UHF radio waves in the ISM band from 2.4 to 2.485 GHz) from fixed and mobile telecommunication devices, and building personal area networks (PANs).
Preferably, the updates of user access credentials include user ID, date, time and controller pairing code.
Preferably, the controller performs the second authentication by checking the user's ID within a timeframe with the pre-stored authorized users' ID list before the door access could be granted.
Preferably, the server stores the user's access credentials.
Preferably, the server further processes the user's access credentials for the door unlocking process.
Alternately, the controller couples with an electronic door system and sensors for controlling the operation of the door.
Preferably, the controller tracks and reports door status to the server.
Preferably, the mobile device application receives user's access credentials from the server to perform local authentication.
Alternately, the biometric data collecting means is in the form of fingerprint sensor, face recognition sensor, iris sensor, body posture sensor or in any combination thereof.
One skilled in the art will readily appreciate that the invention is well adapted to carry out the objects and obtain the ends and advantages mentioned, as well as those inherent therein. The embodiments described herein are not intended as limitations on the scope of the invention.
For the purpose of facilitating an understanding of the invention, there is illustrated in the accompanying drawing the preferred embodiments from an inspection of which when considered in connection with the following description, the invention, its construction and operation and many of its advantages would be readily understood and appreciated.
The invention will now be described in greater detail, by way of example, with reference to the drawings.
Preferably, the mobile device 160 includes a display unit, biometric sensors and a transceiver. The mobile application downloads user's access credential data from cloud base server 110, wherein the user's access credential data includes user's authentication data, user's door entrance accessibility, and accessible date and time. The application further processes the data and reflects the doors allow to access on handheld device's display unit to alert the user. The application installed on the handheld device 160 allows the user to send user ID, date, time and controller 140 pairing code to the controller 140 via BLUETOOTH connection 150. The controller 140 validates the data by internal memory (current date, time and user ID) as second security layer. The controller 140 then sends signal to unlock door when data is validated. All the entry-exit records will be sent to the cloud base server 110 by the controller 140 via internet connection. Preferably, the controller 140 is connected to a network router or modem 130 for internet accessibility with the cloud base server 110.
The system 100 operations in different embodiment of operation. One of the embodiment discloses the administrator operation as shown in
Another embodiment of the system 100 as illustrated in
On the other hand, the BLUETOOTH access controller 140 broadcasts its device ID via BLUETOOTH link 150 to the mobile device 160 such that the users are no longer required to activate the application in the mobile device before approaching the BLUETOOTH access controller 140. When a user with the mobile device 160 comes into the broadcasting range, the application captures the device ID and starts to compute the accessibility. The computing process can be referred in step 303 of
Furthermore, the BLUETOOTH access controller also includes security feature as shown in
On the other hand, the use of second layer of authentication in the controller 140, where the controller 140 performs checking on the user ID, date and time before the door access could be granted had minor the possibility of hijacking. In case system administrator restrict the user to access any door, but the user does not update the data in his mobile device 160. However, the changes already applied to all controllers 140, by removing the selected user ID to block access. This stops the user to access even his application in mobile device grant him access. When comes to access time control, user can change date and time of the mobile device 160. Thus, the controller 140 validates the date and time sent by the application in mobile device 160, to ensure time is synced.
The present disclosure includes as contained in the appended claims, as well as that of the foregoing description. Although this invention has been described in its preferred form with a degree of particularity, it is understood that the present disclosure of the preferred form has been made only by way of example and that numerous changes in the details of construction and the combination and arrangements of parts may be resorted to without departing from the scope of the invention.
Number | Date | Country | Kind |
---|---|---|---|
PI 2017703168 | Aug 2017 | MY | national |