The present invention generally relates to an access system including a wireless user device and a proximity verification device. More particularly, the present invention pertains to an access system which receives a request for access from a mobile phone over a data network.
In the United States alone there are more than 4.5 million hotel rooms available to travelers. Currently, these hotel rooms have an industry-wide occupancy rate of just over 60%, with the occupancy rates of various geographic areas and individual hotels varying wildly. This occupancy rate often drastically affects the bottom line of a hotel or hotel chain. To increase their occupancy rate, and thus their profitability, hotels make every attempt to please their guests in order to encourage them to return. In order to please their guests, and lure new ones, hotels have continuously added amenities, such as on-site spas, restaurants, fitness centers, and in-room coffee machines or mini-bars.
In addition to these additional amenities, hotels have adopted a variety of different check-in procedures to minimize the time required for a guest to check-in. These procedures include adopting electronic key cards as opposed to mechanical keys, which enhances guest security and allows the hotel to change to a new room key, alleviating the need for the guest to return the keys to the front desk at check-out. However, even these procedures still present a distracting delay to a hotel's most valuable customers, business travelers. To increase loyalty amongst these frequent travelers, among others, most major hotel chains have invested tremendous assets in developing rewards programs, such as the Hilton HHonors® Program. The goal of these programs is to allow hotel chains to better understand the needs of travelers and make their stay as streamlined as possible. For instance, some hotels provide express check-in for a select set of their guests, while others provide check-in/check-out over the Internet or via a computer kiosk located in the hotel lobby. While these advances have certainly increased the occupancy rates of the various major hotel chains, they have not yet solved the problem of fully automating the guest check-in/check-out process, thereby allowing a guest to arrive at their hotel and enter their room without any additional time-consuming steps.
For the purposes of promoting and understanding of the principles of the invention, reference will now be made to the embodiment illustrated in the drawings and specific language will be used to describe the same. It will nevertheless be understood that no limitation of the scope of the invention is thereby intended. Any alterations and further modifications in the described embodiments, and any further applications of the principles of the invention as described herein are contemplated as would normally occur to one skilled in the art to which the invention relates.
Currently, systems exist, such as the Signature RFID/NFC system from VingCard, which provide a user access to a hotel room using their mobile phone. However, such systems all require a specialized transceiver within the door of the hotel room and the user's mobile phone such that the two may communicate using a short-range wireless technology. Retrofitting each of the guest room doors in a hotel can be very expensive and ultimately cost prohibitive. In addition, only a slight fraction of existing mobile phones are currently capable of being used with such systems, and it may be quite some time before such technology is common, if ever.
Other technologies exist for remotely allowing a user to monitor and control the open or closed state of an entryway, such as a garage door, using a cell phone connected to a controller over the Internet. However, these technologies do not provide sufficient security as they are designed for purposes other than secure access control. For example, these systems allow a user to send a command to open a door from any location where they have Internet access. As such, many problems exist in the prior art which are solved by the secure access system of the present invention.
As shown in
In addition, as explained later, access system 20 may also provide the user with various features including, but not limited to, automated check-in/check-out via an electronic kiosk or their wireless device, access to restricted members-only areas or lounges, and the like. Other features of access system 20 include the ability to request various reports on activity relating to the entry of various structures. Illustratively, some embodiments of the access system 20 allow the system to provide an activity log that reports the access requests during a specified period of time or for a specified user.
As shown in
Illustratively, in some embodiments, the access system 20 is operably coupled to data network 12. Data network 12 is preferably the Internet, which is a TCP/IP based global network; however, the user of the term “Internet” herein shall be understood to refer to at least a portion of any interconnected electronic network which interchanges data by packet-switching or some other technology.
More specifically, access system 20 utilizes cellular phone network 11 and data network 12 to interface with a wireless device 24, such as cell phone 22. Cellular phone network 11 may comprise a variety of communication networks, including without limitation the universal mobile telecommunications system (UTMS), global system for mobile communication (GSM), and a code division of multiple access (CDMA) network, or similar technology. Cellular phone network 11 utilizes cell tower 26 to establish a wireless bi-directional transmission link between data network 12 and cell phone 22, which may comprise a wireless data link, such as the Evolution-Data Optimized (EVDO), Enhanced Data rates for GSM Evolution (EDGE), 3G, 4G, LTE, WiMax, or other wireless data connection. Similarly, other wireless appliances 28, such as Palm, Samsung, and Motorola smartphones or other portable wireless appliances such an the iPod Touch or Microsoft Zune may be configured to connect to access system 20 through data network 12 to allow a user to access their hotel room.
Access system 20 additionally comprises a mechanical lock 34 operably coupled to a lock control unit 42 via connection 38 for locking and unlocking a structure 40 (partially shown). In the illustrated embodiment, a user gains access to the structure 40 via door 32. In the illustrative embodiment, mechanical lock 34 is a simple mechanical door lock, which includes a locking mechanism similar to a common entry or exterior lock, but is further capable of self-unlocking in response to a signal sent from a remote source. For purposes of non-limiting example, mechanical lock 34 may include a cam lock, rotary latch, electromechanical lock, magnetic lock, or the like. According to the preferred form, lock 34 unlocks in response to an electrical signal sent from a control. In one form, the electrical signal is sent wirelessly. In a further preferred form, the lock 34 returns to a locked state following the passage of a predetermined time period or a user opening and closing the door following the receipt of an unlock signal. In some additional forms, door 40 or lock 34 may also include a mechanical key slot, key card, or other entry permitting authentication means 36 in addition to, or as backup for, that described herein with respect to lock 34. In addition, it shall be appreciated that system 20 may be applied to access restrictions other than locks including, for example, an elevator control system providing limited access, a garage door, or others access barriers, as described later.
Lock control unit 42 is preferably a remote lock control device connected to one or more locks, such as hotel door locks, for allowing an authorized user to remotely unlock a selected hotel door. In the illustrated embodiment, lock control unit 42 is connected to lock 34, among others, to provide access to structure 40. Among other features, in some embodiments, lock control unit 42 comprises, for example, microprocessors, computers, microcontrollers, state machines, FPGA's, or other programmable logic devices. Some embodiments of lock control unit 42 also include logic units, static and dynamic memories, ROM, RAM, and flash. Likewise, lock control unit 42 may include memory systems: SRAM; DRAM; SDRAM; RAM BUS; flash; hard drives; CD drives; floppy drives; and other similar means of providing for memory access and storage. Other embodiments of lock control unit 42 comprise various I/O, networking and user interfaces including touch pads, means for data entry, display, display interfaces, networking interfaces, timers, clocks, internal clocks, counters, interrupt controllers, key generation peripherals, and communication ports as would be understood by those skilled in the art. In yet other embodiments, lock control unit 42 is a PC, laptop PC, or other programmable electrical machine. In alternate forms, lock control unit 42 may be a separate interface coupled to an existing dedicated remote locking/unlocking device or system, such as a hotel management system.
Illustratively, in some embodiments, lock control unit 42 is attached to a network interface 52 for connecting to various data network systems (including data network 12), to accept electronic unlock requests from an authorized server 60. Likewise, server 60 may be either operably coupled to network interface 52 or directly coupled to data network connection 12. These electronic requests are preferably received in addition to requests input via the standard user interface of lock control unit 42. Example network connections include: phone lines; cellular network; cable networks; wireless networks; DSL networks; satellite systems; Ethernet networks; and optical networks. It will be understood that some embodiments of data network 12 comprise the telephone system. Potential data network connections include interfaces to wireless, wired, or optical networks. In an alternate form, lock control network interface 52 may be integrated within lock control unit 42. Still other embodiments of lock control unit 42 may include an interface to hotel management systems. Likewise, in some embodiments, control unit 42 is integrated into a hotel management system. In addition, in some embodiments, antenna 66 of control unit 42 may be used to operably couple the lock control unit 42 to lock 34 or data network 12.
According to the illustrated embodiment, server 60 operates to receive unlock requests from wireless devices 24 over data network 12. In one form, the server 60 serves to authenticate the request or a portion thereof, while in another form, the wireless device performs the authentication. Server 60 processes each request to communicate a corresponding unlock request to lock control unit 42, which then issues an electronic signal to the specified lock, permitting access to the structure. While server 60 is described and illustrated as being a server, it should be understood that server 60 may be any computer, including a client server arrangement. Server 60 may interface with lock control unit 42 by either a wireless or hardwired interconnection. Preferably, the connection is a secured connection. A non-limiting example list of potential interfaces includes IR, optical, RF, serial port, IP network, and USB. Additionally, server 60 and lock control unit 42 may be located at two different geographic locations.
Yet another feature of access system 20 further includes a server application. This allows an authorized user to interface with access system 20 by logging onto server 60 attached to data network 12. The server acts as an interface to lock control unit 42. The server application comprises, among other features, a user interface comprising unlock command functions which enable a remote service to transmit unlock requests to lock control unit 42.
Illustratively, in at least one embodiment, the server function runs on a remote server (not shown) connected to network 12. The user contacts the server by utilizing an automated web service or by directing a web browser to a web site comprising a user interface with a login prompt. Upon logging into the server, the server provides the user with a user interface to a specified access system 20.
Wireless access system 20 also includes wireless proximity node 50 which broadcasts a wireless signal. According to the illustrative embodiment, proximity node 50 broadcasts information which is linked to the location of the user device over a short-range wireless network, such as using RF. In the preferred form, proximity node 50 is a Bluetooth transmitter, positioned near the structure 40. However, in alternate forms, proximity node 50 may be any other short range wireless transmitter, such as one operating under 802.11, wireless USB, or some other similar technology. The location information broadcast by proximity node 50 is linked to the present/assigned location of the node. For example, a node on the fourth floor of a hotel in downtown Chicago may broadcast a unique hotel identifier coupled with an area code. Alternatively, the node may broadcast a single identifier which is then linked to its location by the wireless device 24 or server 60. In one form, proximity node 50 is fixed at a single position, but in an alternate form, proximity node 50 may be moveable, such as located within an elevator, and include a floor detector, so that the node may broadcast information linked to the appropriate floor upon which it is currently located. In a further form, a proximity node 50 is fixed within an elevator and connected to the elevator control system to allow the wireless device to communicate floor authorization information to node 50. As such, the wireless device 24 may broadcast a floor to which the user is authorized to access so that the user may select that floor. In a further form, the elevator may be automatically commanded to take the user to that floor by node 50. As such, the users is enabled to access the floor or may experience a touchless trip to the proper floor. In other alternate forms, cell tower 26 may serve as the wireless node by providing location information corresponding to the location of the user device, such as by using triangulation between multiple towers, assisted GPS, or some other localization technology, such as that accessible to the E911 system.
In still other embodiments, lock control unit 52 or lock 34 is operably coupled to an override switch (not shown) having an access disable state. Asserting the override switch prevents the access system 20 from permitting access to corresponding structure 40. As one non-limiting example, override switch may be asserted when a guest engages a deadbolt or bar latch within their hotel room. In some embodiments of the access system 20, the override switch is incorporated into an electronic control, not shown here, accessible to the user within structure 40.
A flowchart illustrating one set of steps performed in configuring a wireless device 24 for use in accessing a structure 40 according to one embodiment of the present invention is shown. The process involves a wireless device 24 and the various other components of access system 20. The following description is with continuing reference to access system 20 of
As shown in
Subsequent to receiving the confirmation information, a confirmation message is sent to the wireless device 24 of the user (stage 204). Preferably, a phone number or e-mail address corresponding to the user's wireless device is submitted along with the booking information. The confirmation message may be in the form of an e-mail, SMS, text message, or the like. The confirmation message includes a hotel identifier, user identifier, and a unique key or code. In the illustrated embodiment, the confirmation message is handled by an installable application on the user's wireless device 24 which is available for install to the user, such as via the hotel website, a third-party website, other application source, or download source indicated in the confirmation message. Preferably, the application is suitable for operation on various mobile operating systems including Microsoft Mobile, Symbian OS, Palm OS, Mobile Linux, Apple OSX (iPhone), and MXI. In other forms, the application used by wireless device 24 may be browser-based and/or embedded software, to name a few non-limiting examples.
In order to allow the user to access their room, a specific room must be assigned to the user. Traditionally, this has occurred either the day of check-in or during the check-in process. However, in the illustrative form, the user is assigned a specific room automatically upon arriving at the hotel. This occurs as a result of the wireless device 24 associated with the user transmitting a check-in request to server 60 (stage 206). The check-in request is preferably triggered by the user's wireless device 24 detecting a proximity node 50 within the hotel indicated by the hotel identifier of the confirmation message during the timeframe indicated by the check-in/checkout dates. Alternatively, the check-in request may be transmitted via an electronic kiosk in the hotel lobby, or an actual in-person check-in entered by a hotel representative. It is preferred that the check-in request be sent over data network 12 to server 60, however, it and others described herein may be sent through a local or private hotel network accessible by wireless device 24.
Upon receiving a check-in request, server 60 assigns a room matching the reservation of the user (stage 208). In the preferred form, this is accomplished by server 60 which interfaces with the hotel's management system. In addition, the server 60 associates the key code from the user's confirmation message with the assigned room. In an alternate form, step 208 may be omitted and the access system 20 may simply automatically assign a room to the user, as described above with respect to step 208, on the day of check-in absent an indication of the user's presence at the hotel or the like.
The details of the assigned room, including its number and location, are then sent in a return message to the user's wireless device 24 by server 60 (stage 210). This enables the user to send an electronic request for access to the hotel room using wireless device 24. In one form, an IP address is provided for sending the access request to. This address may be that of either server 60 or the lock control unit 42. The process ends at end point 212. It shall be appreciated that this process may be modified to accommodate more than one authorized hotel guest per room, such as having two wireless devices authorized to enter the same hotel room, or allowing a current guest to authorize the wireless device of another to access the hotel room for any portion of their remaining stay.
In continuing the description of the embodiment described with respect to
As shown in
Depending upon the application, structure 40 may be within the broadcast range of wireless node 50, or the node 50 may be only located nearby, such as near the main elevator, stairway, hallway, or other essential entranceway. In the event structure 40 is not within the range of wireless node 50, the detection of wireless node 50 by user device 24 within a predetermined time period may be used to establish its proximity to structure 40. In a further form, the wireless node 50 is hidden and broadcasts encrypted information. The wireless device 24 is only able to identify and interpret the location information transmitted using access information transmitted to the user device by server 60 in conjunction with the confirmation or check-in information.
In an alternate configuration, the location information received by wireless device 24 is positional information sent by cell tower 26 over cellular network 11. This location information may be based upon assisted GPS, triangulation, or other known techniques, such as those accessible to the E911 system. In yet another configuration, GPS data obtained from a GPS device onboard wireless device 24, or some other location identifying source, such the XPS positioning system available from Skyhook Wireless of Boston, Mass.
Once the current position of the wireless device 24 is determined, such as its general location, the wireless device 24 transmits an unlock request to the IP address specified, such as server 60 (stage 304). In the illustrated embodiment, this request is sent through cell network 12, but it shall be appreciated that the message may also be sent through another wireless network, such as 802.11 or another similar technology. The unlock request may include any of the following: hotel ID, room number, location information, user name, reservation number, check-in/check-out dates. In addition, other information may be included in the request. According to one form, the application installed upon wireless device 24 determines that the user device is currently located in proximity to structure 40 prior to enabling an unlock request to be sent. This is accomplished by having authorized zones transmitted to the application during check-in. For example, a listing of wireless node identifiers or a range of GPS coordinates may be included. In an alternate form, the wireless device 24 is able to send an unlock request to server 60 after check-in, however, the unlock request includes the current location information received by wireless device 24, which is then authorized to determine the user's proximity to the structure 40 prior to acting upon it, as described below.
Once an unlock request is received by server 60, server 60 identifies the appropriate lock control unit and lock (such as lock control unit 42 and lock 34) and transmits and unlock command to the lock control unit (step 306). Upon receiving the unlock request, the lock control unit transmits an electronic signal to the appropriate lock which then unlocks the structure and enables the user operating wireless device 24 to enter. The process ends at end point 308.
Turning to
In another form, access system 20 additionally comprises a parking access device (not shown) such as a garage door or parking gate coupled to lock control unit 42 selectively permitting access to a parking lot or structure (not shown). In this illustrated embodiment, a user is able to gain access to the parking area via the garage door or parking gate. According to the preferred form, the parking access device permits a user's vehicle access to the parking area in response to an electrical signal sent from a control device. In one form, the electrical signal is sent wirelessly.
In further systems, a proximity node, similar to node 50, may be included in other areas so as to permit a user to access structures, such as a hotel parking garage, based upon the confirmation information sent to their wireless device or other information as described herein. As such, the user's parking duration could be easily calculated and charged to their hotel bill.
In still further systems, a notification process may be executed by server 60 such that upon detecting a current hotel guest has left the hotel, a request for hospitality and cleaning services may be generated. In one form, the server 60 may detect a hotel guest leaving as a message sent from the user's wireless device upon passing by a proximity node located near the user's assigned room and another proximity node at one of the various exits to the hotel. Alternatively, the user opening the exit of the parking garage using their wireless device may trigger such a notification.
In yet another system, the wireless device may transmit information to server 60 upon passing a proximity node which indicates the user's entrance into the hotel or the area of their assigned hotel room. This information may trigger the in-room temperature to be raised to a user-specified or standard level or it may trigger the lights to be turned on, as described in U.S. patent application Ser. No. 10/126,486 to Sunyich entitled “Personalized Smart Room”, which is hereby incorporated by reference to the extent not inconsistent.
While the invention has been illustrated and described in detail in the drawings and foregoing description, the same is to be considered as illustrative and not restrictive in character, it being understood that only the preferred embodiment has been shown and described and that all equivalents, changes, and modifications that come within the spirit of the inventions as described herein and/or by the following claims are desired to be protected.
Hence, the proper scope of the present invention should be determined only by the broadest interpretation of the appended claims so as to encompass all such modifications as well as all relationships equivalent to those illustrated in the drawings and described in the specification.