throbber
(19) United States
`(12) Patent Application Publication (10) Pub. No.: US 2010/0148921 A1
`(43) Pub. Date:
`Jun. 17, 2010
`Bliding et al.
`
`US 20100l48921A1
`
`(54) LOCK ACTUATING DEVICE FOR A LOCK
`MECHANISM OF A LOCK, AND A METHOD
`OF PROVIDING WIRELESS CONTROL OF A
`LOCK
`
`(76)
`
`Inventors:
`
`Olle Bliding, Halmstad (SE);
`Johan Hiirberg, Halmstad (SE)
`
`Correspondence Address:
`HARNESS, DICKEY & PIERCE, P.L.C.
`P.O. BOX 8910
`
`RESTON, VA 20195 (US)
`
`(21) Appl. No.:
`
`12/659,056
`
`(22)
`
`Filed:
`
`Feb. 24, 2010
`
`Related U.S. Application Data
`
`(63) Continuation of application No. 11/886,527, filed on
`Sep. 17, 2007, filed as application No. PCT/SE2006/
`000345 on Mar. 17, 2006.
`
`(30)
`
`Foreign Application Priority Data
`
`Mar. 18, 2005
`
`(SE) .................................. .. 0500616-8
`Publication Classification
`
`(51)
`
`Int. Cl.
`(2006.01)
`G06F 7/04
`(2006.01)
`H04Q 5/22
`(52) U.S. Cl. ..................................... .. 340/5.7; 340/1033
`
`(57)
`
`ABSTRACT
`
`In one embodiment of the present invention, a lock actuating
`device for a lock mechanism of a lock has a transceiver
`capable of interaction with a wireless key device, a controller
`coupled to the transceiver and capable of generating a control
`signal, and a lock actuator adapted for actuation of the lock
`mechanism upon receipt of the control signal from the con-
`troller. The controller has a sleep mode and an operational
`mode. The lock actuating device also has a wake-up arrange-
`ment including a sensor and associated circuitry. The sensor
`is positioned to detect the presence of a user in a vicinity ofthe
`lock actuating device. The circuitry is adapted to generate a
`wake-up control signal to the controller upon detection ofthe
`user, so as to cause the controller to switch from sleep mode
`to operational mode.
`
` (LD)
`
`(30
`
`Lock device
`
`p CO
`Key device
`
`(KB)
`
`\<;o3
`
`
`
`L29
`1 nternet
`
`
`
`. System DB
`
`ASSA 1014
`
`1
`
`ASSA 1014
`
`

`
`Patent Application Publication
`
`Jun. 17, 2010 Sheet 1 of 5
`
`US 2010/0148921 A1
`
`(LD)
`
`_.
`
`,—,—
`
`Lock device
`
`Ke device
`(KD)
`
`1 03
`
`108
`Administrator‘
`y (ADM)
`
` Mobile tele-
`
`
`
`communications
`
`network
`
`
`
`
`
`1_2Q'
`Internet
`
`2
`
`

`
`Patent Application Publication
`
`Jun. 17, 2010 Sheet 2 of 5
`
`US 2010/0148921 A1
`
`' 303
`
` Motor
`
`
`
`-
`
`controller
`
`30 '
`
`310
`
`T Radio
`Module
`Antenna
`.
`Buzzer '
`
`326
`§ LED indicator
`___________________'_________
`
`g
`
`. _ >
`E 324 %
`E §__O_Wake-up
`
`g
`
`311
`311
`a
`"""""""""K"
`
`- Flash memory
`
`SRAM
`311b
`
`313
`
`CPU
`
`2a
`
`312b
`
`3120
`
`. .....................--
`
`EEPROM
`3110
`
`304
`
`305
`
`me
`
`
`
`3
`
`

`
`Patent Application Publication
`
`Jun. 17, 2010 Sheet 3 of 5
`
`US 2010/0148921 A1
`
`4
`
`

`
`Patent Application Publication
`
`Jun. 17, 2010 Sheet 4 of 5
`
`US 2010/0148921 A1
`
`5J2
`Optional
`initial
`wake-up
`stage
`
`
`
`Q;
`Check for BT-
`enabled KD within
`range of LD
`
`
`
`
`
`
`No
`
`__
`Timeout?
`
`No
`
`'
`F19 6
`
`_
`
`F.
`lg
`‘_>.(
`5_4Q
`Second
`authenti-
`cation
`stage
`
`
`
`
`
`
`
`
`
`
`KD BT
`33%???
`
`640
`
`
`
`
`
`
`link between KD
`aPPF°Ved.
`
`and LD
`current time
`
`
`not in
`512.
`stage—1
`
`time slot
`R9°elVe data
`
`f'°"‘ KD
`"_'_.';'_'_.
`§4_4
`Extract KD
`
`verification data
`
`from received data
`
`
`
`
`
`
`
`6—.2—0-
`authggdsgation
`Stage
`F th
`
`Yes
`
`T
`§2_8_
`Detect KD B
`address, and
`
`
`current time
`
`
`
`
`
`
`
`
`
`
`
`
`
`§?&
`Perform check in
`LD's local DB using
`(KD BT address,
`current time)
`
`
`
`
`
`iOther actionk er
`l
`I
`'£e—'g—'—Ala-rT)—‘
`
`KD BT address
`. fully approved,
`current time within
`stage-1 ti e slot
`
`
`
`__
`
`'
`Unlock Door
`
`.
`(F’g 7)
`f
`:———6—é—8-—-I
`I Esfifiish I
`:
`31- link,
`3
`lreceive data:
`I
`from KD i
`—————— — —‘
`
`
`
`P rf
`53%.
`k’
`e orm c ec In
`LD's local DB using
`Ktgfigll
`V
`(KD BT address.
`' ' proved?
`current time, KD
`
`verification data)
`
`
`
`
`_fl)_
`Unlock Door
`
`Y
`
`9
`
`5
`
`

`
`Patent Application Publication
`
`Jun. 17, 2010 Sheet 5 of 5
`
`US 2010/0148921 A1
`
`I
`check'IBTLD DB _
`I
`‘ updating information In *
`I
`.
`I
`I data receIved from KD ,
`
`I'"'"7'13,““:
`/’712‘*~-..
`\\‘~—Y
`P rform DB
`’/ Updating
`"~\ information /’ es":
`e
`.
`.
`'
`‘ - cxists?, » ’
`|§¥.n.9Er9n'Zat'°ni
`2..-:u—
`
` I
`
`E
`Co|IEc—:t_and
`:
`‘generate statistics/I
`I
`log file data from [
`I
`LD DB
`I
`
`.
`
`I
`I
`:/1_8
`I
`I
`I Transmit
`I
`{ data to KD '
`I
`
`6
`
`

`
`US 2010/0148921 A1
`
`Jun. 17, 2010
`
`LOCK ACTUATING DEVICE FOR A LOCK
`MECHANISM OF A LOCK, AND A METHOD
`OF PROVIDING WIRELESS CONTROL OF A
`LOCK
`
`PRIORITY STATEMENT
`
`[0001] The present application is a continuation and claims
`priority under 35 USC §l20 ofpending prior U.S. application
`Ser. No. 11/886,527 filed on Sep. 17, 2007, which is the
`national phase under 35 U.S.C. §37l of PCT International
`Application No. PCT/SE2006/000345 which has an Interna-
`tional filing date of Mar. 17, 2006, which designates the
`United States ofAmerica, and which claims priority on Swed-
`ish patent application number SE 0500616-8 filed Mar. 18,
`2005, the entire contents of each of which are hereby incor-
`porated herein by reference.
`
`TECHNICAL FIELD
`
`[0002] The present invention generally relates to access
`control, and more specifically to a lock actuating device for a
`lock mechanism of a lock. The invention also relates to a
`
`method of providing wireless control of a lock.
`
`BACKGROUND OF THE INVENTION
`
`[0003] The most common way to lock and unlock an
`access-controlling object such as a door is probably by using
`a mechanical key. This solution is cost efficient and easy to
`use, and a sophisticated mechanical lock is hard to force.
`However, there are two drawbacks with this solution: the user
`always has to bring the key and the key does not have any
`restrictions, i.e. it always works.
`[0004] These drawbacks might seem like minor disadvan-
`tages, which might be true in situations with one user and one
`door, but in situations with a large number ofusers and a large
`number of doors the drawbacks are of considerable impor-
`tance. In more particular, if a large number ofusers must have
`access to a large number of doors, a large number of keys has
`to be made for the different doors. This is not only unhandy
`but also a considerable security risk and costly.
`[0005]
`Firstly, in order to reduce the security risk, some sort
`of key administration is necessary. This type of administra-
`tion is costly.
`[0006]
`Secondly, a user who receives a key might abuse it,
`and even if the user is a responsible person, the key might be
`stolen or lost. Since there are no built-in restrictions in a
`
`mechanical key the security risk becomes significant. Conse-
`quently, handing out a large number of keys is a security risk.
`[0007] Thirdly, if one of the keys is lost or stolen the cor-
`responding lock has to be substituted, as well as all the other
`corresponding keys, in order to maintain the security. The
`administration costs, locksmith costs and all interruptions
`due to these key substitutions imply considerable costs for a
`lost key.
`[0008] A mechanical key system is hence not suitable for
`situations with a large number of users and a large number of
`doors. An example of such a situation is the elderly home
`care, where the domestic help personnel has a key to each of
`the caretakers. In order to solve this problem another type of
`locking system is necessary.
`[0009]
`In WO 02/31778 A1 a wireless lock system is pre-
`sented. When the lock of the system detects a nearby elec-
`tronic key carried by a user, a random signal is generated. The
`key encrypts the signal and returns it to the lock. The lock
`
`decrypts the signal and compares it to the original to deter-
`mine if the lock should be unlocked.
`
`In order to function, the wireless lock system men-
`[0010]
`tioned above must always establish a two-way wireless com-
`munication link between the key and the lock. This is a
`drawback, since the establishment of a two-way communica-
`tion link is not made instantly. Hence, a user has to wait for a
`period of time until the establishment of the two-way com-
`munication link is completed, and thereafter the user has to
`wait until the comparison is completed. The present inventors
`have realized that ifthe wireless lock system in WO 02/3 l 778
`Al is to be implemented with the de facto standard for short-
`range wireless data communication for mobile devices,
`namely RF communication in accordance with the Blue-
`toothTM standard on e.g. the 2.45 GHZ ISM band, one must
`expect at least about 10 seconds, and possibly up to as much
`as 30 seconds, for the establishment of the two-way Blue-
`toothTM link alone; to this one must add the time required for
`performing the data exchange and comparison. Another
`drawback with the approach described in WO 02/3 l 778 Al is
`that the key will have to be implemented as a rather advanced,
`programmable wireless communication device, such as a
`high-end mobile telephone.
`[0011] Users who are used to mechanical keys are not used
`to wait at the door, which will make the aforementioned
`waiting period into a source of irritation. In addition, if a large
`number of doors is to be opened every day the unlocking
`process must be smooth and easy.
`[0012] Hence, it must be regarded as a qualified technical
`problem to reduce the time that lapses from the lock’s detec-
`tion of a nearby electronic key until the unlocking ofthe lock,
`or more particularly the delay that a user may experience
`waiting in front of the lock for it to unlock.
`[0013] A natural way for the skilled person to solve this
`problem would be to increase the transmission power of the
`BluetoothTM transceivers in the lock and key, since this would
`broaden the operating range thereof and allow earlier detec-
`tion of an approaching key by the lock (such that the key will
`be detected already when the approaching user is at e.g. a 20
`meter distance from the lock instead of e.g. a 10 meter dis-
`tance), wherein the two-way link establishment may be ini-
`tiated sooner and possibly be completed at the time when the
`user has reached the lock.
`
`[0014] However, this solution has two pronounced draw-
`backs. First of all, the increased transmission power has an
`immediate penalty in the form of an increase in electric power
`consumption, which is particularly disadvantageous for bat-
`tery-powered locks and keys. Secondly, the broadened oper-
`ating range invites also other locks than the intended one to
`detect and interact with the key—in other words, the risk of
`cross-talk is increased.
`
`In summary, there is a need for a flexible lock system
`[0015]
`arranged to work in situations with many users and many
`doors, and with a faster unlocking process.
`
`SUMMARY OF THE INVENTION
`
`In view of the above, an objective of the invention is
`[0016]
`to solve or at least reduce one or more of the problems dis-
`cussed above.
`
`[0017] This is generally achieved by the attached indepen-
`dent patent claims.
`[0018] A first aspect of the invention is a lock actuating
`device for a lock mechanism of a lock, the lock actuating
`device comprising:
`
`7
`
`

`
`US 2010/0148921 A1
`
`Jun. 17, 2010
`
`a transceiver capable of interaction with a wireless
`[0019]
`key device,
`[0020]
`a controller coupled to the transceiver and capable
`of generating a control signal, and
`[0021]
`a lock actuator adapted for actuation of the lock
`mechanism upon receipt of the control signal from the con-
`troller.
`
`[0022] The controller has a sleep mode and an operational
`mode.
`
`[0023] The lock actuating device further comprises a wake-
`up arrangement including a sensor and associated circuitry,
`the sensor being positioned to detect the presence of a user in
`a vicinity of the lock actuating device, and the circuitry being
`adapted to generate a wake-up control signal to the controller
`upon detection of said user, so as to cause the controller to
`switch from sleep mode to operational mode.
`[0024] A second aspect of the invention is a method of
`providing wireless control of a lock, the method involving:
`[0025]
`providing a battery-powered, wirelessly control-
`lable lock device as a stand-alone installation at a lock;
`[0026]
`operating said lock device in a sleep mode with
`negligible power consumption during periods of inactivity;
`[0027]
`detecting the presence of a user in a vicinity of said
`lock device;
`[0028]
`in response to said detecting, exiting the sleep mode
`and entering an operational mode for said lock device; and
`[0029]
`in said operational mode, interacting with a wireless
`key device within operative range of said lock device to cause
`unlocking of said lock.
`[0030] Other objectives, features and advantages of the
`present invention will appear from the following detailed
`disclosure, from the attached dependent claims as well as
`from the drawings.
`[0031] Generally, all terms used in the claims are to be
`interpreted according to their ordinary meaning in the tech-
`nical field, unless explicitly defined otherwise herein. All
`references to “a/an/the [element, device, component, means,
`step, etc]” are to be interpreted openly as referring to at least
`one instance of said element, device, component, means, step,
`etc., unless explicitly stated otherwise. The steps of any
`method disclosed herein do not have to be performed in the
`exact order disclosed, unless explicitly stated.
`
`BRIEF DESCRIPTION OF THE DRAWINGS
`
`[0032] The above, as well as additional objectives, features
`and advantages of the present invention, will be better under-
`stood through the following illustrative and non-limiting
`detailed description of embodiments ofthe present invention,
`with reference to the appended drawings, where the same
`reference numerals will be used for similar elements.
`
`FIG. 1 is a schematic illustration of a telecommuni-
`[0033]
`cation system, including a wireless key device implemented
`by a mobile terminal, an embodiment of a wireless lock
`device for a lock in a door, a wireless administrator device
`implemented by a mobile terminal, an administrator server, a
`mobile telecommunications network and a couple of other
`elements, as an example of an environment in which the
`present invention may be applied.
`[0034]
`FIG. 2 is a schematic front view illustrating the
`wireless key device of FIG. 1, and in particular some external
`components that are part of a user interface towards a user of
`the wireless key device.
`
`FIG. 3 is a schematic block diagram illustrating
`[0035]
`internal components and modules of the embodiment of the
`wireless lock device shown in FIG. 1.
`
`FIG. 4 is a perspective sectional view of the lock
`[0036]
`device of FIG. 1, mounted to the door of FIG. 1.
`[0037]
`FIG. 5 is a perspective and exploded view ofthe lock
`device of FIG. 4.
`
`FIGS. 6 and 7 are flowchart diagrams of a method
`[0038]
`performed by the lock device for unlocking the lock by actu-
`ating a lock mechanism thereof.
`
`DETAILED DESCRIPTION OF EMBODIMENTS
`
`invention is advantageously imple-
`[0039] The present
`mented in a mobile telecommunications system, one example
`ofwhich is illustrated in FIG. 1. Central elements in FIG. 1 are
`
`a wireless key device (KD) 100 and a wireless lock device
`(LD) 140. The purpose of the lock device 140 is to control
`some sort of lock mechanism in a lock, which in the illus-
`trated example is a door lock on a door 150. In turn, the lock
`device 140 is operated by the key device when brought in the
`vicinity of the lock device. In more particular, both the key
`device 100 and the lock device 140 are enabled for short-
`
`range wireless data communication in compliance with a
`communication standard. In the preferred embodiment, this
`communication standard is BluetoothTM. Having been the de
`facto standard for short-range wireless data communication
`for mobile devices during several years already, BluetoothTM
`is believed to be very well known to the skilled person, and no
`particulars about BluetoothTM as such are consequently given
`herein.
`
`[0040] As with most other contemporary mobile telecom-
`munications systems, the system of FIG. 1 provides various
`telecommunications services such as voice calls, data calls,
`facsimile transmissions, music transmissions, still
`image
`transmissions, video transmissions, electronic message trans-
`missions and electronic commerce for mobile terminals in the
`
`system, such as aforementioned mobile terminal 1 00, another
`mobile terminal 106, personal digital assistants (PDA) or
`portable computers. It is to be noticed that these various
`telecommunications services are not central to the invention,
`and for different embodiments, different ones ofthe telecom-
`munications services may or may not be available.
`[0041]
`In FIG. 1, the key device 100 is implemented by any
`commercially available, BluetoothTM-enabled mobile termi-
`nal 100, one embodiment 200 ofwhich is shown in FIG. 2.As
`seen in FIG. 2, and as is well known in the art, the mobile
`terminal 200 comprises an apparatus housing 201, a loud-
`speaker 202, a display 203, an input device 204a-c, and a
`microphone 205. In the disclosed embodiment, the input
`device 204a-c includes a set of keys 204a arranged in a
`keypad of common ITU-T type (alpha-numerical keypad), a
`pair of soft keys or function keys 204b, and a biometrical data
`reader 204c in the form of a fingerprint sensor. Hence, a
`graphical user interface 206 is provided, which may be used
`by a user of the mobile terminal 200 to control the terminal’s
`functionality and get access to any ofthe telecommunications
`services referred to above, or to any other software applica-
`tion executing in the mobile terminal. With particular refer-
`ence to one embodiment of the present invention, the keypad
`204a may be used for entering a PIN code to be used for
`authenticating the key device 100 in the lock device 140 in
`order to decide whether or not to unlock the lock controlled by
`the lock device. In another embodiment, the biometrical data
`reader 204c is used correspondingly to produce a digital
`
`8
`
`

`
`US 2010/0148921 A1
`
`Jun. 17, 2010
`
`fingerprint sample from the user, said fingerprint sample
`being used for authenticating the key device 100 in the lock
`device 140 by matching with prestored fingerprint templates.
`[0042]
`In addition, but not shown in FIG. 2, the mobile
`terminal 200 of course comprises various internal hardware
`and software components, such as a main controller (imple-
`mented e. g. by any commercially available Central Process-
`ing Unit (CPU), Digital Signal Processor (DSP) or any other
`electronic programmable logic device); associated memory,
`such as RAM memory, ROM memory, EEPROM memory,
`flash memory, hard disk, or any combination thereof; various
`software stored in the memory, such as a real-time operating
`system, a man-machine or user interface, device drivers, and
`one or more various software applications, such as a tele-
`phone call application, a contacts application, a messaging
`application, a calendar application, a control panel applica-
`tion, a camera application, a mediaplayer, a video game, a
`notepad application, etc; various I/O devices other than the
`ones shown in FIG. 2, such as a vibrator, a ringtone generator,
`an LED indicator, volume controls, etc; an RF interface
`including an internal or extemal antenna as well as appropri-
`ate radio circuitry for establishing and maintaining an RF link
`to a base station; aforementioned BluetoothTM interface
`including a BluetoothTM transceiver; other wireless interfaces
`such as WLAN, HomeRF or IrDA; and a SIM card with an
`associated reader.
`
`[0043] The mobile terminals 100, 106 are connected to a
`mobile telecommunications network 110 through RF links
`103, 108 via base stations 104, 109. The mobile telecommu-
`nications network 110 may be in compliance with any com-
`mercially available mobile telecommunications standard,
`such as GSM, UMTS, D-AMPS or CDMA2000.
`[0044] The mobile telecommunications network 110 is
`operatively connected to a wide area network 120, which may
`be Internet or a part thereof Various client computers and
`server computers, including a system server 122, may be
`connected to the wide area network 120.
`
`[0045] A public switched telephone network (PSTN) 130 is
`connected to the mobile telecommunications network 110 in
`
`a familiar manner. Various telephone terminals, including a
`stationary telephone 132, may be connected to the PSTN 130.
`[0046] Referring now to FIGS. 3-5, the lock device 140 will
`be described in more detail. In FIG. 4, the door 150 is shown
`in more detail. In a well-known manner the door has a lock
`160 which includes an internal lock mechanism and which is
`
`only schematically indicated in FIG. 4. A door handle 161, a
`lock knob 162 and a lock catch 163 are also provided. The
`lock knob 162 is mounted to one end of a rotatable axle 164
`
`which is coupled to or engages with the internal lock mecha-
`nism ofthe lock 160. The lock device 140 is mounted to a base
`
`plate 154 which is attached to the door leaf 152 next to the
`lock 160.
`
`[0047] A user may manually unlock the door lock 160,
`from the inside of the premises which are protected by the
`door 150, by turning the lock knob 162. This will cause
`rotation of the axle 164, actuation ofthe internal lock mecha-
`nism of the lock 160, and, ultimately, retraction of the lock
`catch 163 from its extended locking position in FIG. 4 to a
`retracted releasing position.
`[0048]
`In addition to this, and in accordance with the inven-
`tion, the door lock 160 may also be automatically unlocked by
`the lock device 140 by the following arrangements. To this
`end, a first gear wheel 166 is provided for actuation of the
`rotatable axle 164 via disengageable carrier means (not
`
`shown in FIG. 5). The first gear wheel 166 engages with a
`second, smaller gear wheel 308b which in turn is fixedly
`mounted to a rotatable axle 308a of an electric motor 308
`
`inside a protective casing 144 of the lock device 140. A motor
`controller 307 (FIG. 3) is coupled to the motor 308 and is
`adapted to provide a control signal 307b for engaging or
`disengaging the motor 308 and the aforementioned carrier
`means.
`
`In turn, the motor controller 307 is controlled by a
`[0049]
`control signal 307a from a CPU 313 in the lock device 140.
`An encoder 306 is provided to assist the CPU 313 in moni-
`toring the current angular position ofthe gear wheel 166 so as
`to select appropriate duration of the control signal 307a and
`achieve sufficient retraction of the lock catch 163 by the
`mechanical power provided by the motor 308 and translated
`into turning of the rotatable axle 164 via the first and second
`gear wheels 166, 308b and the carrier means. Thus, these
`elements form a lock actuator 170 which is controllable by the
`motor controller 307 and CPU 313.
`
`[0050] The CPU 313 is programmed to read and execute
`program instructions stored in a memory 311 so as to perform
`a method for wireless automatic unlocking of the lock 160 in
`response to the appearance and proper authentication of the
`key device 100. An embodiment of this method is illustrated
`in FIGS. 6 and 7 and will be described in more detail later.
`
`[0051] The lock device 140 is a stand-alone, autonomously
`operating device which requires no wire-based installations,
`neither for communication nor for power supply. Instead, the
`lock device 140 is powered solely by a local battery power
`unit 303 and interacts with the key device, as already men-
`tioned, by BluetoothTM-based activities. To this end, the lock
`device 140 has a BluetoothTM radio module 309 with an
`antenna 310.
`
`[0052] The lock device 140 of the present embodiment
`further includes a real-time clock 304 capable of providing
`the CPU 313 which an accurate value of the current time. A
`
`detector 312b is positioned to detect that the door 150 is in a
`properly closed position, so that the CPU 313 may command
`locking of the lock 160 a certain time after a user has opened
`the door through the key device 100 and passed therethrough.
`The detector 312b may be a conventional magnetic switch
`having a small magnet mounted to the door frame and a
`magnetic sensor mounted at a corresponding position on the
`door leaf 152.
`
`[0053] At the same time, preferably, the carrier means is
`disengaged, so that the lock knob 162 may be actuated manu-
`ally from the inside of the premises to lock or unlock the door
`lock 160 without mechanical resistance from the electrome-
`chanical elements of the lock actuator 170. In an alternative
`
`embodiment, these elements may be replaced by an electric
`step motor positioned and adapted to actuate the axle 164
`directly. Thus, in such an embodiment, on condition that the
`electric step motor provides only little mechanical resistance,
`the aforesaid carrier means may be dispensed with.
`[0054] The lock device 140 may have a simple user inter-
`face involving button(s) 305, a buzzer 312a and LED indica-
`tor(s) 312c. In some embodiments, an authorized administra-
`tor (ADM) may configure the lock device 140 through this
`user interface. In other embodiments, though, configuration
`of the lock device 140—including updating the contents of a
`local database (LD-DB) 142 stored in memory 311 and con-
`taining i.a. key device authentication data—occurs wirelessly
`either directly from a proximate mobile terminal 106 over a
`BluetoothTM link 116, or by supplying a key device, for
`
`9
`
`

`
`US 2010/0148921A1
`
`Jun. 17, 2010
`
`instance key device 100, with authentication data updating
`information from a system database 124 at the system server
`122 over the mobile telecommunications network 110.
`
`device replace the entire circuitry 322, such that the wake-up
`control signal 326 is generated directly from a door bell
`button switch.
`
`Since the lock device 140 is a stand-alone, battery-
`[0055]
`powered installation which is intended to be operative for
`long time periods without maintenance, it is important to keep
`power consumption at a minimum. Therefore, the present
`embodiment is designed to put itself in a sleep mode after a
`certain period of inactivity. In the sleep mode, the elements of
`the lock device 140 are inactive and consume negligible
`power. The way to exit the sleep mode and enter operational
`mode is by applying a wake-up control signal 326 on a par-
`ticular control input on the CPU 313. To this end, the lock
`device 140 is provided with a wake-up arrangement 320
`having a proximity sensor 324 and associated circuitry 322.
`[0056] The proximity sensor 324 is positioned to detect the
`presence of a user in a vicinity of the lock device 140, and in
`response the circuitry 322 is adapted to generate the wake-up
`control signal 326. The proximity sensor 324 may for
`instance be an IR (Infra-Red) sensor, an ultra-sound sensor,
`an optical sensor, an RF (Radio Frequency) sensor or a pres-
`sure sensor. Such types of sensors are all well known to the
`skilled person and are commercially available. For instance,
`when the proximity sensor 324 is an RF sensor, it may advan-
`tageously be adapted to detect mobile telecommunications
`trafiic, such as GSM trafiic, to or from the mobile terminal
`which implements the key device 100. Thus, in this case the
`proximity sensor 324 does not detect the user himself but the
`key device 100 he carries. When the proximity sensor 324 is
`a pressure sensor, it may advantageously be located at floor
`level somewhere near the door 150, so as to detect pressure
`variations caused by the user when stepping on the floor.
`[0057] Alternatively,
`the proximity sensor 324 may be
`positioned on or at the door handle 161 and be adapted to
`generate a detection signal by electrically detecting interac-
`tion from the user on the door handle, for instance by capaci-
`tive means or by detecting the closure of an electric circuit.
`[0058]
`In one embodiment, the wake-up arrangement 320
`has an acoustic or vibration sensor 324 which is adapted to
`detect door knocks on the door leaf 152. Such a sensor may be
`provided in the form of a microphone which is attached via a
`spacer to the door leaf 152. The spacer will transfer vibrations
`caused by door knocks to the microphone. The circuitry 322
`may be programmed or designed to apply predetermined
`wake-up criteria when decided whether or not to generate the
`wake-up control signal 326. Such wake-up criteria may for
`instance be the detection of more than one door knock within
`
`a certain time frame. This may prevent an accidental wake-up
`because of a spurious detection of a non-related sound from
`the environment. Even more advanced wake-up criteria may
`be used, such as a given sequence of short and long door
`knocks, much like a code of Morse signals.
`[0059]
`In one embodiment, a door bell device is integrated
`with the lock device 140. Making use of the real-time clock
`304, the CPU 313 may determine whether or not an acoustic
`door bell sound is to be generated (for instance during mom-
`ing, day and evening times) or not (for instance during night
`time) when a door bell button of the door bell device is
`pressed. In addition, the door bell device may be used as the
`sensor 324 of the wake-up arrangement 320, such that an
`input signal is supplied to the circuitry 322 when the door bell
`button is pressed. It is alternatively possible to let the doorbell
`
`[0060] Additionally, means such as a depressible button
`may be provided on or at the door 150 on the inside of the
`premises in question. The user may avail himself of such
`means to cause forced unlocking ofthe door lock 160 when he
`desires to leave the premises. To this end, such means will be
`coupled to the CPU 313, and the latter will be adapted to
`perform the forced unlocking of the door lock 160 by gener-
`ating the control signal 307b to the motor controller 307 so as
`to control the motor 308 in the manner previously described.
`[0061] Referring now to FIGS. 6 and 7, an operational
`method performed by the lock device 140 for wireless auto-
`matic unlocking of the lock 160 will now be described in
`detail.
`
`[0062] On a general level, the method consists of two main
`authentication stages 620 and 640, and,
`in the present
`embodiment but optionally, an initial wake-up stage 610. The
`first authentication stage 620 is designed to be fast and there-
`fore does not involve any establishment of a two-way Blue-
`toothTM communication link between lock device and key
`device, in contrast to the prior art approach described in the
`introductory section of this document. Experiments have
`indicated that the first authentication stage, resulting in the
`opening of a door, may be completed in as little time as 2-4
`seconds, which is considerably faster than in the prior art.
`[0063]
`In the first authentication stage, authorization is
`based solely on the key device’s BluetoothTM address and the
`current time, both of which are detected automatically by the
`lock device 140 and require no interaction from the user
`(other than bringing the key device 100 near the door 150).
`Certain prioritized users are entrusted to unlock the door 150
`simply through this first authentication stage 620, whereas
`other users must be authorized during the following, second
`and more extensive authentication stage 640 which requires
`establishment of a two-way BluetoothTM communication link
`and involves additional verification data from the key device
`100—in the form of a PIN code in the present embodiment.
`[0064] The lock device 140 bases its operation upon the
`authentication data stored in LD-DB 142. In the present
`embodiment, the record structure of the LD-DB 142 includes
`the following data fields for authentication data:
`
`Field
`LD ID
`User name
`Bluetooth TM ID
`Stage-1 time slot (1)
`Stage-1 time slot (2)
`
`Stage-1 time slot (n)
`Stage-2 time slot -
`single
`Stage-2 time slot -
`scheduled
`code
`Administrator
`
`Contents example #1
`121
`Olle
`0x00223af3
`2005-03-24: 19-22
`Mon-Fri: 07-15
`
`Contents example #1
`121
`Johan
`0x002e5af4
`
`00-24
`****
`No
`
`Sat-Sun: 10-18
`****
`No
`
`In the example given above, it is thus configured that
`[0065]
`user Olle is authorized to open the door 150, through the lock
`device 140 having ID 121, by using his key device 100 having
`BluetoothTM ID 0x00223af3 by fast stage-1 authentication
`during working days between 07:00 and 15:00. He is also
`
`10
`
`10
`
`

`
`US 2010/0148921A1
`
`Jun. 17, 2010
`
`granted a temporary stage-1 authority on 24 Mar. 2005
`between 19:00 and 22:00. If he arrives at the door outside of
`
`these stage-1 time slots, he may still access the door 150 at
`any time (00-24), but in such a case he must go through a more
`complex stage-2 authentication which involves additional
`authorization, namely by providing a PIN code from the key
`device 100 and having it communicated to the lock device 140
`over a two-way BluetoothTM communication link. Stage-2
`authentication requires a special software in the key device
`100, since data exchange is involved. Therefore, if mobile
`terminals are used as key devices, they are preferably of an
`advanced model provided with a suitable operating system,
`such as Symbian, at least for users that require stage-2 authen-
`tication. As regards the PIN code, it may eitherbe prestored in
`memory in the key device 100 and fetched by the software
`therein upon communication to the lock device, or the soft-
`ware may invite the user

This document is available on Docket Alarm but you must sign up to view it.


Or .

Accessing this document will incur an additional charge of $.

After purchase, you can access this document again without charge.

Accept $ Charge
throbber

Still Working On It

This document is taking longer than usual to download. This can happen if we need to contact the court directly to obtain the document and their servers are running slowly.

Give it another minute or two to complete, and then try the refresh button.

throbber

A few More Minutes ... Still Working

It can take up to 5 minutes for us to download a document if the court servers are running slowly.

Thank you for your continued patience.

This document could not be displayed.

We could not find this document within its docket. Please go back to the docket page and check the link. If that does not work, go back to the docket and refresh it to pull the newest information.

Your account does not support viewing this document.

You need a Paid Account to view this document. Click here to change your account type.

Your account does not support viewing this document.

Set your membership status to view this document.

With a Docket Alarm membership, you'll get a whole lot more, including:

  • Up-to-date information for this case.
  • Email alerts whenever there is an update.
  • Full text search for other cases.
  • Get email alerts whenever a new case matches your search.

Become a Member

One Moment Please

The filing “” is large (MB) and is being downloaded.

Please refresh this page in a few minutes to see if the filing has been downloaded. The filing will also be emailed to you when the download completes.

Your document is on its way!

If you do not receive the document in five minutes, contact support at support@docketalarm.com.

Sealed Document

We are unable to display this document, it may be under a court ordered seal.

If you have proper credentials to access the file, you may proceed directly to the court's system using your government issued username and password.


Access Government Site

We are redirecting you
to a mobile optimized page.





Document Unreadable or Corrupt

Refresh this Document
Go to the Docket

We are unable to display this document.

Refresh this Document
Go to the Docket