throbber
WIRELESS ACCESS CONTROL SYSTEM AND RELATED METHODS
`
`Field of the Invention
`
`[0001]
`
`The present invention generally relates to access
`
`control systems, and more particularly, to wireless access
`
`control systems.
`
`Background
`
`[0002]
`
`A passive keyless entry (PKE) system offers an
`
`increased level of convenience over a standard lock and key, for
`
`example, by providing the ability to access a secure building or
`
`device without having to find, insert, and turn a traditional
`
`key. A user may simply approach a locked PKE lock and with
`
`little if any pause, the lock grants this user access if they
`
`are carrying an authorized token.
`
`[0003]
`
`A PKE system is currently used in an automotive
`
`application and may offer increased convenience by identifying
`
`drivers and unlocking the car as they approach. Automotive
`
`access is traditionally given by inserting a key into the lock
`
`or by pushing buttons on a traditional remote keyless entry
`
`(RKE) system.
`
`In contrast, a PKE system grants access with
`
`reduced user interaction through the use of a token carried by
`
`the driver.
`
`1
`
`1
`
`ASSA 1003
`
`

`
`[0004]
`
`Several technical challenges have been encountered
`
`during the engineering of a radio frequency (RF) PKE system, for
`
`example, for use in a residential lock. The desired basic
`
`perceived behavior of the PKE system in a residential
`
`application may be as follows: 1) the user approaches and
`
`touches the lock; 2) the lock authenticates the user with a
`
`reduced delay; 3) the lock unlocks; 4) the lock may not operate
`
`if the authorized user is outside a desired range and the lock
`
`is touched by another, unauthorized, user; 5) the lock may not
`
`operate if the authorized user is on the inside of the house,
`
`and the lock is touched on the outside by an unauthorized user;
`
`and 6) when an authorized user revokes a key from another user,
`
`it may be revoked and confirmed within a few seconds.
`
`[0005]
`
`Indeed, as will be appreciated by those skilled in the
`
`art, with respect to the above desired basic perceived behavior
`
`of the PKE system in a residential application, primary
`
`challenges to be addressed include items 2 (speed), 4
`
`(distance), 5 (location), and 6 (timely revocation).
`
`Accordingly, it may be desirable to improve authentication
`
`speed, proximity measurement, and power consumption, for
`
`example.
`
`Brief Description Of The Drawings
`
`[0006]
`
`FIG. 1 is a schematic block diagram of a wireless
`
`access system according to the present invention.
`
`[0007]
`
`FIG. 2a is a diagram of a lock of the wireless access
`
`system as shown in FIG. 1.
`
`[0008]
`
`FIG. 2b is a diagram of another lock embodiment as may
`
`be used in the system of FIG. 1.
`
`[0009]
`
`FIG. 3a is a remote access device of the wireless
`
`access system as shown in FIG. 1.
`
`2
`
`2
`
`

`
`[0010]
`
`FIG. 3b is a diagram of another remote access device
`
`embodiment as may be used in the system of FIG. 1.
`
`[0011]
`
`FIG. 4 is a diagram of a home-connect plugin of the
`
`wireless access system as shown in FIG. 1.
`
`[0012]
`
`FIG. 5 is a schematic diagram of a typical residential
`
`system layout for the wireless access system as shown in FIG. 1.
`
`[0013]
`
`FIG. 6 is a flow chart of operation of the wireless
`
`access system as shown in FIG. 1.
`
`Detai1ed Description
`
`[0014]
`
`The present description is made with reference to the
`
`accompanying drawings, in which various embodiments are shown.
`
`However, many different embodiments may be used, and thus the
`
`description should not be construed as limited to the
`
`embodiments set forth herein. Rather, these embodiments are
`
`provided so that this disclosure will be thorough and complete.
`
`Like numbers refer to like elements throughout, and prime
`
`notation is used to indicate similar elements or steps in
`
`alternative embodiments.
`
`[0015]
`
`Referring to FIGS. 1, 2a, and 2b, a wireless access
`
`system 10, for example, a PKE system, includes a lock 11. The
`
`lock 11 may be installed in a standard deadbolt hole and may be
`
`battery powered, for example. The lock 11 may be a human
`
`controlled lock, for example (FIG. 2a). The lock 11 includes an
`
`outer cylinder 12 that rotates freely around a standard key
`
`cylinder 13. When engaged, the cylinder 13 is linked to a
`
`deadbolt 14, thus giving the user control to extend or retract
`
`the deadbolt.
`
`[0016]
`
`Alternatively, in another embodiment, the lock 11' may
`
`be motor powered (FIG. 2b). When a user touches anywhere on the
`
`lock 11', the deadbolt 14' is driven. Of course, the lock 11
`
`3
`
`3
`
`

`
`may be another type of lock or locking mechanism and may be
`
`installed in any access point, for example. The lock 11'
`
`includes a controller 21 or processor and wireless communication
`
`circuitry 29 for wireless communication.
`
`[0017]
`
`Referring now additionally to FIG. 3, the wireless
`
`access system 10 includes a remote access device 15. The remote
`
`access device 15 is advantageously a key or token configured to
`
`control the lock 11.
`
`In particular, the remote access device 15
`
`may be a standard key including a remote controller 16 and
`
`remote wireless access electronics coupled thereto (FIG. 3a).
`
`Alternatively, or additionally, the remote access device 15 may
`
`be a mobile wireless communications device, such as, for
`
`example, a mobile telephone that may include the remote wireless
`
`access electronics cooperating with an application 17' (stored
`
`in memory)
`
`(FIG. 3b). The application 17' may be configured to
`
`provide access and control over the lock 11', for example. Of
`
`course, more than one remote access device 15' may be used and
`
`may be another type of remote access wireless device, for
`
`example, a wireless FOB without the mechanical key, as will be
`
`appreciated by those skilled in the art.
`
`[0018]
`
`Referring now additionally to FIG. 4, the wireless
`
`access system 10 also includes a home-connect plugin 30. A
`
`typical mains power outlet 31 is shown, with the home-connect
`
`plugin 30 plugged-into it. The home-connect plugin 30 includes
`
`a home-connect controller 32 and associated wireless
`
`communication circuitry 33 cooperating therewith and configured
`
`to communicate with the lock 11, and the remote access device
`
`15.
`
`[0019]
`
`The home-connect plugin 30 also has wireless local
`
`area network (WLAN) connectivity, for example, Wi-Fi
`
`connectivity, to link it to an off-site web-based server 34, for
`
`4
`
`4
`
`

`
`example. This advantageously enables the lock 11 to receive
`
`near real time updates for adding or removing users, one-time
`
`access, extended access or specific timed access, and other
`
`connectivity related updates and functions, as will be
`
`appreciated by those skilled in the art. Additional services
`
`may be selectively provided via the Internet using the WLAN
`
`connectivity, for example. While the home-connect plugin 30 is
`
`described herein as a plugin device, it will be appreciated by
`
`those skilled in the art that the functionality of the home(cid:173)
`
`connect plugin 30 may be embodied in any of a number of form
`
`factors, for example.
`
`[0020]
`
`Referring now additionally to FIG. 5, a typical
`
`residential setup example of the wireless access system 10 is
`
`illustrated.
`
`As described above with respect to FIG. 4, the
`
`home connect plugin 30 is typically plugged-in to the mains
`
`power outlet 31, at a location, in relatively close proximity to
`
`the lock 11, which may be installed on the front door, for
`
`example. The remote access device 15 approaches from the
`
`outside of the home. Both the home-connect plugin 30 and lock
`
`11 are configured to communicate with the remote access device
`
`15 independently or simultaneously, as will be appreciated by
`
`those skilled in the art.
`
`[0021]
`
`The home-connect plugin 30 may be configured to
`
`approximately determine the position of the remote access device
`
`15 with a received signal strength indication (RSSI). For
`
`example, when an algorithm of the home-connect plugin 30
`
`determines that the remote access device 15 is approaching and
`
`is within a defined range, the home-connect plugin may send a
`
`wakeup signal to the lock 11. The home-connect plugin 30 may
`
`also configured to have an extended range capability, for
`
`example, 100 or more meters. The lock 11 has a smaller range,
`
`5
`
`5
`
`

`
`for example, of about 10 meters, but may be greater in some
`
`cases. Therefore, the home-connect plugin 30 may corrununicate
`
`with the remote access device 15 before the lock 11. Thus, the
`
`home-connect plugin 30 may send a signal to the lock 11 to wake
`
`up and start corrununicating with the remote access device 15 to
`
`save battery life, for example.
`
`[0022]
`
`Additionally, the home-connect plugin 30 may establish
`
`a communication link with the remote access device 15 in
`
`advance, for example, thus increasing the speed of the
`
`authentication process to create little if any perceived delay
`
`for the user. Once the lock 11 is woken up by the home-connect
`
`plugin 30 and connected to the remote access device 15, both the
`
`home-connect plugin and the lock track the RSSI of the remote
`
`access device until the algorithm determines it is within a
`
`defined accessible range from the lock. Both the home-connect
`
`plugin 30 and the lock 11 gathering RSSI data together may
`
`utilize this data in an algorithm to determine the position of
`
`the remote access device 15 with greater accuracy than either
`
`the home-connect plugin or the lock alone. Once the remote
`
`access device 15 is within the determined accessible distance,
`
`the home-connect plugin 30 grants the remote access device
`
`access control to the lock 11. More than one home-connect
`
`plugin 30 may be used in some embodiments for more accurate
`
`position determining, and to increase authorized user capacity
`
`and overall speed of the wireless access system 10.
`
`[0023]
`
`Operation of the wireless access system 10 will now be
`
`described with reference additionally to the flowchart in FIG.
`
`6. The lock 11, may initially be in a sleep mode to conserve
`
`battery power, for example. The home-connect plugin 30 is
`
`typically powered on and searching for authorized remote access
`
`devices, i.e. token(s), the standard key, and/or the mobile
`
`6
`
`6
`
`

`
`wireless communications device, in range. Once the home-connect
`
`plugin 30 finds an authorized remote access device 15 in range,
`
`it establishes an ACL connection and begins to monitor the RSSI
`
`of the remote access device 15 to estimate its position. Once
`
`the home-connect plugin 30 estimates that the remote access
`
`device 15 has entered the defined wake-up range, it sends a
`
`wake-up and connection signal to the lock 11. Once the lock 11
`
`wakes up, it also establishes an ACL connection with the remote
`
`access device 15, and begins to monitor the RSSI of the remote
`
`access device 15 or devices if there are more than one. Both
`
`the home-connect plugin 30 and the lock 11 are monitoring RSSI
`
`to more accurately determine the position of the remote access
`
`device 15. This computing may be performed by a processor or
`
`controller 33 included within the home-connect plugin 30, the
`
`lock 11, or both. When the home-connect plugin 30 and the lock
`
`11 determine that the remote access device is within the
`
`determined accessible distance, the user is granted
`
`authorization to the lock 11, and the deadbolt 14 becomes
`
`controllable, either extending or retracting per the user's
`
`action.
`
`[0024]
`
`Additional and/or alternative functions of the
`
`wireless access system 10 will now be described. For example,
`
`with respect to an independent function, if the home-connect
`
`plugin 30 loses power or goes offline, the lock 11 may be
`
`configured to be woken up by a user's touch and approximately
`
`determine the position of the user by itself, as well as
`
`authenticate the user. The home-connect plugin 30 may also
`
`request the user to verify their access control request by
`
`prompting them on their remote access device 15, for example,
`
`via a display on their mobile wireless communications device.
`
`7
`
`7
`
`

`
`[0025]
`
`The wireless access system 10 may include a
`
`calibration feature. More particularly, a connection between
`
`the home-connect plugin 30 and the lock 11 may be used by the
`
`algorithm to calibrate the RSSI input to adjust for changes in
`
`environmental conditions, for example.
`
`[0026]
`
`In a process to revoke a key, once a user decides to
`
`revoke a key code, the user may send a termination request.
`
`If
`
`there is no response, the request is broadcast to users, for
`
`example, all users, in the "approved 0 network (i.e. users
`
`enrolled in the same lock) . Then when any authorized user is in
`
`range of the lock 11, the key code is revoked from the lock,
`
`denying access to the revoked user.
`
`[0027]
`
`The wireless access system 10 may also include a
`
`computing device 25, for example, a personal computer at the
`
`user's residence for use in the revocation process. The
`
`computing device 25 may include circuitry for wirelessly
`
`communicating with the home-connect plugin 30, remote access
`
`device 15, and/or lock 11 for revoking the permission. For
`
`example, the computing device 25 may include Bluetooth
`
`communications circuitry, for example. Other devices and
`
`communications protocols may be used in the revocation process.
`
`(0028]
`
`While the wireless access system 10 is described
`
`herein with respect to a door, the wireless access system may be
`
`used for access control or protection of, but not limited to,
`
`appliances, heavy machinery, factory equipment, power tools, pad
`
`locks, real estate lock-boxes, garage door openers, etc., for
`
`example. Alternative remote access device 15 embodiments may
`
`include a pen, watch, jewelry, headset, PDA, laptop, etc., for
`
`example. The wireless access system 10 may be used to protect
`
`other devices or areas where it may be desired to restrict
`
`access.
`
`8
`
`8
`
`

`
`[0029]
`
`With respect to power conservation and increased
`
`security methods for the remote access device 15, and more
`
`particularly, a mobile wireless communications device, for
`
`example, that may include the remote access application and a
`
`global positioning system (GPS) receiver 23, the GPS receiver
`
`may be used to track the location relative to the lock's
`
`position and enable communication only when within range.
`
`If
`
`the remote access device 15, i.e. mobile wireless communications
`
`device is outside the range, as determined by the GPS receiver
`
`23, it may go into sleep mode or turn off. Additionally, or
`
`alternatively, the location of the remote access device 15 may
`
`be determined via triangulation with wireless service provider
`
`base stations or towers, for example.
`
`[0030]
`
`Alternatively, or additionally, the remote access
`
`device 15 or mobile wireless communications device may wake up,
`
`determine a position, calculate a fastest time a user could be
`
`within range of the lock 11, then wake up again at that time and
`
`recalculate. When the user is within the range, it may enable
`
`the remote access application 17, and, thus communication for
`
`authentication or other purposes.
`
`[0031]
`
`The wireless access system 10 may be used to augment
`
`multi-factor authentication, e.g. use with a biometric
`
`identifier, personal identification number (PIN) code, key card,
`
`etc. The wireless access system 10 may also allow simultaneous
`
`multiple authentication of remote access device, for example,
`
`mobile wireless communications devices. More particularly, the
`
`wireless access system 10 may require a threshold number of
`
`authorized remote access devices 15 to be present at a same time
`
`for authentication to succeed.
`
`[0032]
`
`The wireless access system 10 advantageously may
`
`provide increased security, for example. More particularly, the
`
`9
`
`9
`
`

`
`wireless access system 10 may force the user to authenticate via
`
`the remote access device 15 before the door can be opened. For
`
`example, the remote access device 15 may include an
`
`authentication device 24 for authentication via a biometric,
`
`password, PIN, shake pattern, connect-the-dots, or combination
`
`thereof, for example, prior to accessing the lock 11.
`
`In the
`
`case of the remote access application 17 on a mobile wireless
`
`communications device, for example, the application may have
`
`multiple security levels to enable these features, as will be
`
`appreciated by those skilled in the art.
`
`[0033]
`
`With respect to security features, the wireless access
`
`system 10 may indicate whether a user locked the door, for
`
`example. When a user locks the door, for example, the remote
`
`access application 17 may log "Lock" with a time stamp so that
`
`it may be tracked and checked on the remote access device 15,
`
`i.e. the mobile wireless communications device, for example.
`
`The wireless access system 10 may include a sensing device 26
`
`for example, an accelerometer to track door openings, for
`
`example. Based upon the accelerometer, data may be provided
`
`through the application or via the Internet or other network,
`
`for example. The sensing device 26 may be another type of
`
`device, for example, a touch sensor.
`
`[0034]
`
`In one advantageous security feature, when the door is
`
`opened, or an attempt is made to open the door, which may be
`
`detected by the accelerometer 26 or other door opening
`
`determining methods, as will be appreciated by those skilled in
`
`the art, known, and even previously revoked, remote access
`
`devices 15 in range and/or discoverable devices, may be recorded
`
`along with a time stamp. This may capture an unauthorized user,
`
`for example.
`
`10
`
`10
`
`

`
`[0035]
`
`Another advantageous feature of the wireless access
`
`system 10 may allow authorized visits, for example. More
`
`particularly, an authorized visit may be enabled by a 911
`
`dispatcher or other authorized user to allow special or
`
`temporary access, for example. The wireless access system 10
`
`may keep a log/audit trail. Approval may be granted by trusted
`
`a friend or special authority, for example, emergency medical
`
`services, a fire department, or a police department.
`
`[0036]
`
`The wireless access system 10 may also include a
`
`security feature whereby when a threshold time has elapsed, the
`
`wireless access system may ignore a remote access device 15 in
`
`range. The advantageously reduces or may prevent unauthorized
`
`access that may occur from leaving a remote access device 15
`
`that is authorized inside near the door. A timeout function
`
`(via a timer, not shown) may additionally be used in other
`
`undesired entry scenarios. The wireless access system 10 may
`
`also log all rejected pairing attempts, as will be appreciated
`
`by those skilled in the art.
`
`[0037]
`
`The wireless access system 10 may also include a
`
`revocable key security feature. For example, the wireless
`
`access system 10 may include both revocable and non-revocable
`
`keys.
`
`If, for example, the wireless access system 10 is unable
`
`to access the server 34 to verify keys, for example, the
`
`wireless access system may force the application 17 on the
`
`remote access device 15, for example, to check the servers.
`
`If
`
`the wireless access system 10 is unable to connect or verify the
`
`keys, access is denied.
`
`[0038]
`
`For example, the revocable key feature may be
`
`particularly advantageous to keep an old boyfriend, for example,
`
`who is aware that his key is being revoked from being able to
`
`turn off his remote access device 15 so that the key is not
`
`11
`
`11
`
`

`
`deleted. However, a wireless connection for the remote access
`
`device 15 may a prerequisite to access in some instances.
`
`[0039]
`
`As will be appreciated by those skilled in the art,
`
`the wireless access system 10 has the ability to transfer a key
`
`from one remote access device 15 to another with the remote
`
`access application 17 1 for example.
`
`It may be desired that
`
`these keys be revocable in some configurations. However, if the
`
`remote access device 15 with the key to be revoked is not
`
`accessible via the network 27, then revocation may not be
`
`guaranteed if the lock 11 is offline 1 for example. The wireless
`
`access system 10 advantageously addresses these challenges.
`
`[0040]
`
`A proximity detection feature may be included in the
`
`wireless access system 10, and more particularly, the remote
`
`access device 15 may use a magnetic field sensor 39, such as,
`
`for example, a compass in mobile wireless communications device,
`
`as a proximity sensor to obtain a more uniform
`
`approach/departure distance calibration. A magnetic pulse or
`
`pulse sequence may be used in the lock 11 to illuminate a
`
`magnetic flux sensor in the remote access device 15 to establish
`
`proximity.
`
`[0041]
`
`Additionally, the remote device 15, for example, a
`
`mobile wireless communications device or mobile telephone, may
`
`be qualified using both radio frequency (RF) and audio, for
`
`example. The remote access device 15 may be a source or sink of
`
`audio to help qualify proximity.
`
`[0042]
`
`In another embodiment, as an alternative to a human
`
`driven lock, as noted above, a turn-tab (not shown) may be
`
`included that will ''flip out" of the front of the lock 11 when
`
`pressed to allow the user to turn the lock on an un-powered
`
`deadbolt 14.
`
`It may be desirable that the surface area be no
`
`larger than a standard key, for example. The user pushes the
`
`12
`
`12
`
`

`
`turn-tab back into the lock face when done. The turn-tab may
`
`alternatively be spring loaded, for example.
`
`[0043)
`
`In another embodiment, the turn-tab (not shown) may be
`
`added to a powered lock, for example the lock 11 described
`
`above. This is may be useful to help force 'sticky' locks, for
`
`example, as will be appreciated by those skilled in the art.
`
`This may also allow the user to give a manual assist to the
`
`motor in case of a strike/deadbolt 14 misalignment. This may
`
`also allow for operation in a low battery situation, for
`
`example. The turn-tab may be particularly useful in other
`
`situations.
`
`(0044]
`
`Additionally, one of the deadbolts may have a
`
`traditional key backup as it may be needed for emergencies, for
`
`example, while the remaining deadbolts on a house may be
`
`keyless. This may eliminate the need to match physical keys on
`
`multiple deadbolts, and may reduce the cost for additional
`
`deadbolts.
`
`(0045]
`
`The wireless access system 10 may also include an
`
`additional access feature. For example, with the home-connect
`
`plugin 30 connected to the Internet, for example, it may be
`
`possible to have the lock 11 unlock via a command from the
`
`wireless access system.
`
`In other words, the lock 11 could be
`
`opened for users who don 1 t have a remote access device 15. More
`
`particularly, they could call a call center or service that
`
`could unlock the lock 11 via the Internet 27, for example, or
`
`via other wireless communications protocol. Also, an authorized
`
`user could provide this action as well. Additionally,
`
`fire/police could gain access by this method if the lock owner
`
`opts-in to this service. As will be appreciated by those
`
`skilled in the art, alternatively, a command could be sent from
`
`the remote access device 15.
`
`13
`
`13
`
`

`
`[0046]
`
`The wireless access system 10 may also include an
`
`activation indication. For example, the remote access device 15
`
`can signal the operator via an auditory tone, vibration or other
`
`indication when the lock is activated. This may help
`
`communicate actions to the user to reduce any confusion.
`
`[0047]
`
`The wireless access system 10 may also include an
`
`additional security feature. For example, the wireless access
`
`system 10 may use an additional authentication channel, for
`
`example, via a WLAN, WiFi, or other communication protocol,
`
`either wired or wireless, with the remote access device 15.
`
`This may improve authentication and make spoofing considerably
`
`more difficult, as will be appreciated by those skilled in the
`
`art.
`
`[0048]
`
`As another security feature of the wireless access
`
`system 10, if cell service and data service, for example, if the
`
`remote access device 15 is a mobile phone, are turned off,
`
`remote access application may consider this a threat related to
`
`key revocation and authentication may not be approved. Also,
`
`the lock 11 may include a radar device, or a radar device may be
`
`coupled adjacent the lock to attempt to resolve inside/outside
`
`ambiguity, for example. The radar may be enabled when the lock
`
`11 is woken up by the home-connect plugin 30 to conserve power.
`
`[0049]
`
`A mechanical or zero/low-power tilt sensor may be
`
`configured to detect break-in events, for example to the lock
`
`11. Based upon a detected break-in, the lock 11 activate and
`
`thereafter communicate to home-connect plugin 30 to report an
`
`intruder alert. The lock 11 may also store information, in a
`
`memory, for example, if home-connect plugin is off-line.
`
`[0050]
`
`Radar or other motion detector device (not shown) may
`
`also be added to the home-connect plugin 30 to assist with
`
`inside/outside determination and break-in monitoring. The radar
`
`14
`
`14
`
`

`
`or other motion detector may be used in conjunction with an
`
`alarm system, as will be appreciated by those skilled in the
`
`art.
`
`[0051]
`
`Indeed, while the different components of the wireless
`
`access system 10 have been described with respect to a wireless
`
`protocol, it will be appreciated by those skilled in the art
`
`that the components may communicate via a wired network and
`
`protocols or a combination of wired and wireless networks.
`
`Additionally, while Bluetooth and WLAN (i.e. WiFi) has been
`
`described herein as wireless protocols of particular merit,
`
`other wireless protocols may be used, for example, Zywave,
`
`ZigBee, near field communication (NFC), and other wireless
`
`protocols.
`
`[0052]
`
`Many modifications and other embodiments of the
`
`invention will come to the mind of one skilled in the art having
`
`the benefit of the teachings presented in the foregoing
`
`descriptions and the associated drawings. Therefore, it is
`
`understood that the invention is not to be limited to the
`
`specific embodiments disclosed, and that modifications and
`
`embodiments are intended to be included within the invention.
`
`15
`
`15
`
`

`
`~ Remote Access
`
`Application
`
`Memory
`
`Circuitry
`
`Communication
`
`Wireless
`
`kl
`
`Deadbolt I~ Controller
`
`17
`
`I _.,,---
`
`I
`
`I Remote Access Device
`
`I
`
`ome-Connect Plugin
`
`Lock
`
`15
`
`Wireless Access System
`
`33
`
`32
`
`~
`
`10
`
`11
`
`I
`
`---..j__
`
`26
`
`I
`
`I
`
`22 ---L
`
`I
`
`--L_
`
`21
`
`I I
`
`14 _____j_
`
`24
`
`-.
`
`39
`
`_A--
`
`I
`
`Device
`
`Authentication
`
`I I
`
`Detector
`Proximity
`
`Circuitry
`
`Communication
`
`Wireless
`
`Receiver
`Positioning
`
`Satellite
`
`I~
`FIG. 1
`
`34
`
`application)
`
`Server(s) (processor,
`
`{Internet)
`Network
`
`Computer
`Personal
`
`/
`
`"\
`Communication ~ /
`
`touch sensor)
`(accelerometer,
`Sensing Device
`
`Circuitry
`
`Wireless
`
`:t
`
`Controller
`
`25
`
`27
`
`16
`
`

`
`11
`
`141=
`
`12
`
`11'
`
`13'
`
`14'
`
`13
`
`FIG. 2a
`
`FIG. 2b
`
`17
`
`

`
`15
`
`\
`
`15'
`
`\
`
`17'
`
`FIG. 3a
`
`FIG. 3b
`
`18
`
`

`
`31
`
`30
`
`FIG. 4
`l-} /Jg
`
`19
`
`

`
`10
`
`30
`
`15
`
`11
`
`FIG. 5
`5~
`
`20
`
`

`
`No
`
`Lock goes back to sleep
`
`Home-connect plugin
`searches for authorized
`remote access device.
`Lock is in sleep mode to
`conserve power
`
`No
`
`Authorized
`lock enters home(cid:173)
`connect plugin
`ranae
`
`Home-connect plugin
`establishes AGL conn. with
`remote access device &
`begins to monitor RSSI to
`approx. position of remote
`access device
`
`Home-connect p/ugin
`calculates remote
`access device is
`approaching & enters
`lock wake-up range
`
`Home-connect plugin
`sends wake-up signal to
`lock
`
`No
`
`No
`
`Lock wakes-up and
`sends confirmation
`to home-connect
`plugin
`
`Yes
`
`Lock establishes AGL
`connection with home(cid:173)
`connect plugin & monitors
`RSSI to approx. position
`
`Remote access
`device remains
`in wake-up range
`
`No
`
`Both home-connect
`p!ugin and lock
`carcu/ate remote
`access device is
`within control range
`
`Yes
`
`User possessing
`authorized remote access
`device has ability to
`control lock
`
`FIG. 6
`&L<tt
`
`21

This document is available on Docket Alarm but you must sign up to view it.


Or .

Accessing this document will incur an additional charge of $.

After purchase, you can access this document again without charge.

Accept $ Charge
throbber

Still Working On It

This document is taking longer than usual to download. This can happen if we need to contact the court directly to obtain the document and their servers are running slowly.

Give it another minute or two to complete, and then try the refresh button.

throbber

A few More Minutes ... Still Working

It can take up to 5 minutes for us to download a document if the court servers are running slowly.

Thank you for your continued patience.

This document could not be displayed.

We could not find this document within its docket. Please go back to the docket page and check the link. If that does not work, go back to the docket and refresh it to pull the newest information.

Your account does not support viewing this document.

You need a Paid Account to view this document. Click here to change your account type.

Your account does not support viewing this document.

Set your membership status to view this document.

With a Docket Alarm membership, you'll get a whole lot more, including:

  • Up-to-date information for this case.
  • Email alerts whenever there is an update.
  • Full text search for other cases.
  • Get email alerts whenever a new case matches your search.

Become a Member

One Moment Please

The filing “” is large (MB) and is being downloaded.

Please refresh this page in a few minutes to see if the filing has been downloaded. The filing will also be emailed to you when the download completes.

Your document is on its way!

If you do not receive the document in five minutes, contact support at support@docketalarm.com.

Sealed Document

We are unable to display this document, it may be under a court ordered seal.

If you have proper credentials to access the file, you may proceed directly to the court's system using your government issued username and password.


Access Government Site

We are redirecting you
to a mobile optimized page.





Document Unreadable or Corrupt

Refresh this Document
Go to the Docket

We are unable to display this document.

Refresh this Document
Go to the Docket