The present invention generally relates to an electronic lock, and more particularly, but not exclusively, to a wireless access control for the electronic lock.
Various systems may be employed for enabling access control for or providing setup updates to an electronic lock. Some existing systems have various shortcomings relative to certain applications. Accordingly, there remains a need for further contributions in this area of technology.
One embodiment of the present invention is a unique access control of an electronic lock. Other embodiments include apparatuses, systems, devices, hardware, methods, and combinations for implementing access control. Further embodiments, forms, features, aspects, benefits, and advantages of the present application shall become apparent from the description and figures provided herewith.
For the purposes of promoting an understanding of the principles of the invention, reference will now be made to the embodiments illustrated in the drawings and specific language will be used to describe the same. It will nevertheless be understood that no limitation on the scope of the invention is hereby intended. Any alterations and further modifications in the described embodiments, and any further applications of the principles of the invention as described herein are contemplated as would normally occur to one skilled in the art to which the invention relates.
The electronic locks are incorporated in doors or other restricted access devices. The cellular telephones can be configured to wirelessly communicate with the network cloud and the electronic locks. The cellular telephones can each include a memory. The electronic locks can be configured to transmit data real time back to the network cloud. The cellular telephones are configured to implement “viral data,” which as used herein is data that does not pertain to a particular user.
In another embodiment, when updates need to be transmitted to a particular lock, the host controller, for example the network cloud, can transport the update to all users or cellular telephones that have access privileges to the door incorporating the lock. When the data is delivered by one of these devices, the cellular telephone reports back to the network cloud to verify the data is transferred, and then other devices can once again be updated to remove that particular update. This is expansible to any number of doors.
In a further embodiment, any alarms or audit trails from a particular lock can be transmitted immediately when someone visits the door. To ensure the data is successfully delivered to the host controller, data can be transmitted multiple times until the lock receives an update that the latest data was received at the host controller.
In another embodiment, the memory of the cellular telephone stores access privileges, and audit history data can be transported from the lock to the host controller via the cellular telephone. Each credential holder thus has virtually unlimited memory for access privileges and audit history data.
In another embodiment, data can be transmitted from the lock to the host controller immediately, providing near real-time performance.
In a further embodiment, viral data from the locks can be delivered to the network cloud immediately and viral data for the locks can be delivered to each user who has access to that lock immediately so the next user to approach the lock will deliver that data to the lock.
The access control system further provides real time control of off line locks and eliminates the need to tour the locks to provide updates to the locks or gather audit history from the locks.
While the invention has been illustrated and described in detail in the drawings and foregoing description, the same is to be considered as illustrative and not restrictive in character, it being understood that only the preferred embodiments have been shown and described and that all changes and modifications that come within the spirit of the inventions are desired to be protected.
It should be understood that while the use of words such as preferable, preferably, preferred or more preferred utilized in the description above indicate that the feature so described may be more desirable, it nonetheless may not be necessary and embodiments lacking the same may be contemplated as within the scope of the invention, the scope being defined by the claims that follow. In reading the claims, it is intended that when words such as “a,” “an,” “at least one,” or “at least one portion” are used there is no intention to limit the claim to only one item unless specifically stated to the contrary in the claim. When the language “at least a portion” and/or “a portion” is used the item can include a portion and/or the entire item unless specifically stated to the contrary.
The present application claims the benefit of U.S. Provisional Patent Application No. 61/684,128 filed on Aug. 16, 2012, the contents of which are incorporated herein by reference in their entirety.
Number | Date | Country | |
---|---|---|---|
61684128 | Aug 2012 | US |