`
`1111111111111111111111111111111111111111111111111111111111111
`US00905721 OB2
`
`c12) United States Patent
`Dumas et al.
`
`(10) Patent No.:
`(45) Date of Patent:
`
`US 9,057,210 B2
`Jun.16,2015
`
`(54) WIRELESS ACCESS CONTROL SYSTEMAND
`RELATED METHODS
`(71) Applicant: Unikey Technologies, Inc., Orlando, FL
`(US)
`Inventors: Philip C. Dumas, Orlando, FL (US);
`Thomas Bennett, Maitland, FL (US)
`
`(72)
`
`(73) Assignee: Unikey Technologies, Inc., Orlando, FL
`(US)
`
`( *) Notice:
`
`Subject to any disclaimer, the term of this
`patent is extended or adjusted under 35
`U.S.C. 154(b) by 106 days.
`(21) Appl. No.: 13/734,671
`
`Filed:
`
`(22)
`(65)
`
`Jan. 4, 2013
`Prior Publication Data
`US 2013/0176107 Al
`Jul. 11, 2013
`Related U.S. Application Data
`(63) Continuation-in-part of application No. 13/415,365,
`filed on Mar. 8, 2012.
`(60) Provisional application No. 61/453,737, filed on Mar.
`17,2011.
`
`(51)
`
`Int. Cl.
`GOSB 23100
`B60R 25100
`
`(2006.01)
`(2013.01)
`(Continued)
`
`(52) U.S. Cl.
`CPC ............ EOSB 47100 (2013.01); G07C 9100309
`(2013.01); G07C 9100103 (2013.01);
`(Continued)
`(58) Field of Classification Search
`CPC ................. G07C 2009/00793; G07C 2209/04;
`G07C 2209/64; G07C 9/00571; G07C
`9/00174; G07C 2209/08; G07C 2209/62;
`G07C 9/00309; G07C 2009/00365; G07C
`2009/64; G07C 9/0057; G07C 2009/00507;
`G07C 9/00103; G07C 9/00087; G07C
`9/00182; G07C 9/00563; G07C 2209/63;
`
`G07C 9/00904; G07C 9/0018; G07C
`2009/00785; G07C 2009/00825; G07C
`2009/00865; G07C 9/00023; G07C 9/00111;
`G07C 2209/00365; G07B 15/063; G07B
`15/00; H04W 12/00; H04W 12/06; B65D
`90/023; B65D 90/024; E04H 7/30; H01H
`85/10; B62H 5/14; B62H 5/20; E05B 15/101;
`E05B 47/0002; E05B 47/00; H04L 63/0428;
`H04L 63/0492
`USPC ......... 340/5.61, 10.3, 10.33, 10.34, 5.1, 5.72,
`340/539.21, 539.23, 5.27, 5.64, 5.71, 5.2,
`340/426.28, 539.11, 542, 825.31, 572.9;
`455/343,404.1,414.1, 556.1;
`70/279.1, 224, 278.2, 277, 9, 21,
`70/278.1; 726/17, 19
`See application file for complete search history.
`References Cited
`
`U.S. PATENT DOCUMENTS
`6,072,402 A * 6/2000 Kniffin et al ................. 340/5.28
`6,236,333 B1
`5/2001 King
`(Continued)
`
`FOREIGN PATENT DOCUMENTS
`
`(56)
`
`CN
`JP
`
`9/2009
`101532353
`5/2000
`2000145222
`(Continued)
`OTHER PUBLICATIONS
`International Search Report of corresponding PCT/US2013/059699.
`(Continued)
`
`Primary Examiner- Mirza Alam
`(74) Attorney, Agent, or Firm- Allen, Dyer, Doppelt,
`Milbrath & Gilchrist, P.A.
`ABSTRACT
`(57)
`A wireless access control system includes a remote access
`device and an electronic lock. The electronic lock communi-
`cates with the remote access device. The electronic lock con-
`trols the ability to lock and unlock a door in which the elec-
`tronic lock is disposed. The electronic lock determines when
`the remote access device is at a distance less than or equal to
`a predetermined distance from the lock to enable the lock to
`be unlocked.
`
`45 Claims, 15 Drawing Sheets
`
`~
`))))))))
`~11
`
`iApartments Ex. 1009
`
`Page 1 of 28
`
`
`
`US 9,057,210 B2
`Page 2
`
`(51)
`
`Int. Cl.
`B60R 25110
`EOSB 49100
`EOSB 47100
`G07C9/00
`(52) U.S. Cl.
`CPC .. G07C9/00571 (2013.01); G07C 2009/00793
`(2013.01); G07C 2209/04 (2013.01); G07C
`2209/64 (2013.01)
`
`(2013.01)
`(2006.01)
`(2006.01)
`(2006.01)
`
`(56)
`
`References Cited
`U.S. PATENT DOCUMENTS
`
`7,173,516 B2
`7,701,331 B2 *
`2002/0013909 A1
`2003/02227 58 A1
`2006/0164208 A1
`2008/0018437 A1
`2008/0117176 A1
`2008/0231433 A1
`2008/0238610 A1
`2009/0002153 A1 *
`2009/0066476 A1 *
`2010/0052931 A1
`
`2/2007 Mullet eta!.
`4/2010 Tran ........................... 340/539.1
`112002 Baumeister eta!.
`12/2003 Willats et al.
`7/2006 Schaffzin et al.
`112008 Reichling eta!.
`5/2008 Ko eta!.
`9/2008 McBride et a!.
`10/2008 Rosenberg
`112009 Berstis eta!. ............ 340/539.11
`3/2009 Raheman ..................... 340/5.64
`3/2010 Kolpasky et al.
`
`3/2010 Thomas et a!.
`2010/0059231 A1
`712010 Sharma eta!.
`2010/0164683 A1
`2010/0201536 A1 * 8/2010 Robertson eta!. ......... 340/686.6
`2010/0245038 A1
`9/2010 Ghabra eta!.
`2010/0306549 A1
`12/2010 Ullmann
`201110223868 A1
`9/2011 Kojima eta!.
`2012/0234058 A1
`9/2012 Neil eta!.
`2012/0258681 A1
`10/2012 Hanover
`2012/0280783 A1 * 1112012 Gerhardt et a!. ............... 340/5.6
`2013/0241694 A1
`9/2013 Sharma eta!.
`
`FOREIGN PATENT DOCUMENTS
`
`JP
`KR
`KR
`KR
`KR
`KR
`wo
`wo
`
`2003262072
`9/2003
`1020030083538
`10/2003
`20040093937 A
`1112004
`20050005786 A
`1/2005
`1020080086623
`9/2008
`2020100001206
`2/2010
`W02011159921 A1 *
`12/2011
`5/2012
`2012064263
`OTHER PUBLICATIONS
`
`Written Opinion and International Search Report of PCT /US20 13/
`059695.
`* cited by examiner
`
`iApartments Ex. 1009
`
`Page 2 of 28
`
`
`
`""""' = = N
`\C = u.
`
`'N
`-....l
`
`rJl
`d
`
`'-34
`
`25...-
`
`.... Ul
`0 .....
`....
`.....
`rFJ =- ('D
`
`('D
`
`N
`~Cl\
`
`0 .... Ul
`:= ....
`2'
`
`~ = ~
`
`~
`~
`~
`•
`00
`~
`
`/
`~
`
`Ethernet
`
`17
`
`15
`
`Remote Access Device
`
`30
`
`Wireless Access System
`
`FIG. I
`
`32
`
`'
`33
`
`Deadbolt
`
`Lock
`
`10\
`
`14
`
`11
`
`iApartments Ex. 1009
`
`Page 3 of 28
`
`
`
`U.S. Patent
`
`Jun.16,2015
`
`Sheet 2 of 15
`
`US 9,057,210 B2
`
`FIG. 2a
`
`14
`
`13
`
`FIG. 2b
`
`13'
`
`12'
`
`14'
`
`-
`
`iApartments Ex. 1009
`
`Page 4 of 28
`
`
`
`U.S. Patent
`
`Jun. 16, 2015
`
`Sheet 3 of 15
`
`US 9,057,210 B2
`
`FIG. 3a
`
`FIG. 3b
`
`15'--\
`
`0=
`
`7'
`1
`
`0000
`0000
`l_/
`0000
`00-----
`0000
`@
`
`iApartments Ex. 1009
`
`Page 5 of 28
`
`
`
`U.S. Patent
`
`Jun.16,2015
`
`Sheet4 ofJS
`
`US 9,057,210 B2
`
`___ _)
`
`__ ___/
`
`iApartments Ex. 1009
`
`Page 6 of 28
`
`
`
`U.S. Patent
`
`Jun.16,2015
`
`Sheet 5 of 15
`
`US 9,057,210 B2
`
`FIG.5
`
`10 )
`
`iApartments Ex. 1009
`
`Page 7 of 28
`
`
`
`U.S. Patent
`
`Jun.16,2015
`
`Sheet 6 of 15
`
`US 9,057,210 B2
`
`FIG. 6a
`
`101
`
`Lock Low Power broadcast
`Mode (Looking for Remote
`Access Devices
`
`r-------------------------~----------~c
`102
`
`User Touches the Lock
`(Lock Wakes Up)
`
`103
`
`Listen lor broadcasts !rom
`Fob and increase broadcast
`rate to as last as possible
`
`104
`
`105
`
`Phone C<~nnectable
`
`111
`
`iApartments Ex. 1009
`
`Page 8 of 28
`
`
`
`U.S. Patent
`
`Jun.16,2015
`
`Sheet 7 of 15
`
`US 9,057,210 B2
`
`A
`
`FIG. 6b
`
`8
`
`113
`
`Lock Door
`
`Gather ext a rnal and
`Internal antenna ASS I and
`run through location +
`Poslllon algorithm
`
`Lock!Unlcck Door
`(Opposite ol current stale)
`
`120
`
`Disconnect from FOB
`
`iApartments Ex. 1009
`
`Page 9 of 28
`
`
`
`U.S. Patent
`
`Jun.16,2015
`
`Sheet 8 of 15
`
`US 9,057,210 B2
`
`C-------,
`
`FIG. 6c
`
`121
`
`Phone in
`ranga • Respondas
`to lock broadcast
`
`Connect to
`phGne • Challenge
`Resrmnsa (lock to phone)
`
`125
`
`Gather external and
`internal antenna HSSI and
`run lhrough localion
`atgrolthm
`
`12B
`
`D
`
`iApartments Ex. 1009
`
`Page 10 of 28
`
`
`
`U.S. Patent
`
`Jun.16,2015
`
`Sheet 9 of 15
`
`US 9,057,210 B2
`
`FIG. 6d
`
`0
`
`Delete Key
`from Dalabasa
`
`iApartments Ex. 1009
`
`Page 11 of 28
`
`
`
`U.S. Patent
`
`Jun. 16, 2015
`
`Sheet 10 of 15
`
`US 9,057,210 B2
`
`FIG. 7a
`
`52
`
`\
`
`i4
`
`50 \
`))))))))
`~11
`
`\
`
`"\
`
`~\J~
`~\ )'··..
`' ..
`
`\.
`
`_,...z
`
`'•'
`
`i5
`
`iApartments Ex. 1009
`
`Page 12 of 28
`
`
`
`U.S. Patent
`
`Jun.16,2015
`
`Sheet 11 of 15
`
`US 9,057,210 B2
`
`FIG. 7b
`
`90
`
`Door
`
`92
`
`) lnsignal Range (Not Active
`
`\___11
`
`Activation Range:~ 3 feet away
`In-signal range: Maximum distance for communication
`
`iApartments Ex. 1009
`
`Page 13 of 28
`
`
`
`U.S. Patent
`
`Jun.16,2015
`
`Sheet 12 of 15
`
`US 9,057,210 B2
`
`FIG.8
`
`User 1
`
`User 2
`
`15'
`
`uu 11 nn
`
`36
`
`~ 30
`
`iApartments Ex. 1009
`
`Page 14 of 28
`
`
`
`U.S. Patent
`
`Jun.16,2015
`
`Sheet 13 of 15
`
`US 9,057,210 B2
`
`t')
`
`lO )
`
`0\
`•
`1\J
`~ c:
`c
`c:
`Q)
`~
`
`<:{
`
`0
`~
`a:
`
`'-
`j1
`
`e
`c
`+-'
`0
`0
`
`/
`lO
`,...-_
`OJ
`
`iApartments Ex. 1009
`
`Page 15 of 28
`
`
`
`""""' = = N
`\C = u.
`
`'N
`-....l
`
`rJl
`d
`
`.... Ul
`0 .....
`....
`.....
`rFJ =- ('D
`
`.j;o.
`
`('D
`
`0 .... Ul
`:= ....
`2'
`
`N
`~Cl\
`
`~ = ~
`
`~
`~
`~
`•
`00
`~
`
`26
`
`27
`
`•
`54\
`
`1002\
`
`55
`
`Batteries
`
`Controller
`
`Electronic Lock
`
`50\52\
`
`FIG.JO
`
`Radio
`
`22\
`
`21
`
`14\
`
`1011\
`
`I\
`
`1000
`
`-
`-
`
`iApartments Ex. 1009
`
`Page 16 of 28
`
`
`
`U.S. Patent
`
`Jun.16,2015
`
`Sheet 15 of 15
`
`US 9,057,210 B2
`
`J-?JG.ll
`
`'
`'
`
`I
`
`'
`
`I
`
`I
`I
`
`'
`'
`' ' I ' '
`
`'
`
`iApartments Ex. 1009
`
`Page 17 of 28
`
`
`
`1
`WIRELESS ACCESS CONTROL SYSTEM AND
`RELATED METHODS
`
`US 9,057,210 B2
`
`2
`A wireless access control system includes a remote access
`device for authorizing access control to a lock when the user
`possessing the authorized remote access device is within an
`activation range of the lock and door. If the authorized user is
`outside of activation range, signal range, or inside the lock
`and door, the remote access device will not be enabled to lock
`or unlock the door.
`A wireless control system includes a remote access device
`for accessing a lock. The remote access device includes a
`controller and radio signal generator. A battery powers the
`controller and radio signal generator. An accelerometer pro-
`vides an acceleration signal to the controller in response to
`sensed acceleration. The radio signal generator outputting a
`radio signal for a predetermined time period in response to an
`15 acceleration signal via the controller. In a preferred embodi-
`ment, an authentication circuit provides an input to the con-
`troller for encryption and authentication purposes which are
`carried by the radio signal to the lock.
`In another embodiment, the remote access device can be a
`20 Smartphone. In another embodiment, additional haptic feed-
`back can be utilized to control the electronic lock. A user can
`tap the remote access device if within activation range to
`cause a larger acceleration trigger which can be captured by
`the controller and sent to the lock via a radio signal to lock or
`unlock the electronic lock in response.
`In another embodiment, a lock includes a controller and
`radio signal transceiver to communicate with an electronic
`lock for controlling the electronic lock in response to the
`signal from the remote access device. The lock includes an
`accelerometer for determining movement, such as a knock or
`the door opening, in which the lock is disposed and control-
`ling the radio or the electronic lock via the controller as a
`function of the acceleration signal.
`In another embodiment, a real time clock provides a clock
`input to the controller, the controller allowing for config-
`urable access control of the electronic lock as a function of the
`time indicated by a signal from the real time clock. The
`controller operating on the real time clock signal can permit
`anytime, limited time, recurring time windows, or one-time
`use access for example.
`In another embodiment, a proximity detector which detects
`the presence of a user at or near the lock provides a proximity
`detection signal to the controller and radio for permitting
`control of the electronic lock in response to a signal from a
`remote access device when the proximity of a user is detected.
`In one embodiment, the proximity detector may be a touch
`sensor disposed within the lock or a trip light detector. In one
`embodiment, the trip light detector is located at the bottom of
`a deadbolt lock facing downwards towards the handle so
`when a user grabs the handle of the door the light detector is
`tripped and the deadbolt controller can initiate the desired
`action, for example unlocking the deadbolt.
`In another embodiment, the proximity detector can be
`intentionally triggered "n" times in a row within a predeter-
`mined time period, or be continuously held for a predeter-
`mined time period (the time period preferably being ten or
`fewer seconds) to trigger a lock event without a remote access
`device being present.
`In another embodiment, the proximity detector which
`60 detects the presence of a user at or near the lock provides a
`proximity detection signal to the controller and radio to tum
`on or change the state of the radio in order to make a connec-
`tion with an authorized remote access device and lock or
`unlock the electronic lock. In a preferred embodiment, the
`65 proximity detection activates the radio into a listening state
`for a limited period of time to listen for remote access devices
`advertisements. This listening state requires more power
`
`CROSS REFERENCE TO RELATED
`APPLICATION(S)
`
`This application is a continuation-in-part of copending
`U.S. application Ser. No. 13/415,365, filed Mar. 8, 2012,
`which claims the benefit of Provisional Patent Application
`No. 61/453,737, filed Mar. 17, 2011, in its entirety and is
`hereby incorporated by reference.
`
`FIELD OF THE INVENTION
`
`The present invention generally relates to access control
`systems, and more particularly, to wireless access control
`systems for door locks.
`
`BACKGROUND
`
`10
`
`A passive keyless entry (PKE) system offers an increased
`level of convenience over a standard lock and key, for
`example, by providing the ability to access a secure building
`or device without having to find, insert, and turn a traditional
`key. A user may simply approach and touch a locked PKE
`lock and with little if any pause, the lock grants this user 25
`access if they are carrying an authorized token.
`A PKE system is currently used in an automotive applica-
`tion and may offer increased convenience by identifying driv-
`ers and unlocking the car as they approach and grab the
`handle. Automotive access is traditionally given by inserting 30
`a key into the lock or by pushing buttons on a traditional
`remote keyless entry (RKE) system. In contrast, a PKE sys-
`tem grants access with reduced user interaction through the
`use of a hands free token carried by the driver.
`Several technical challenges have been encountered during 35
`the engineering of a radio frequency (RF) PKE system, for
`example, for use in a residential lock. The desired basic
`perceived behavior of the PKE system in a residential appli-
`cation may be as follows: 1) the user approaches and touches
`the lock; 2) the lock authenticates the user with a minimally 40
`perceived delay; 3) the lock unlocks; 4) the lock may not
`operate if the authorized user is outside a desired range and
`the lock is touched by another, unauthorized, user; 5) the lock
`may not operate if the authorized user is on the inside of the
`house, and the lock is touched on the outside by an unautho- 45
`rized user; and 6) the battery powered lock needs several
`months or more worth of battery life to prevent inconvenient
`and costly battery changes. 7) if a PKE fob is used, battery
`power needs to be over a year. 8) the lock can provide any-
`time, or configurable limited time, access control. 9) the lock 50
`has the ability to be locked without a remote access device
`Indeed, as will be appreciated by those skilled in the art,
`with respect to the above desired basic perceived behavior of
`the PKE system in a residential application, primary chal-
`lenges to be addressed include items 1 (Simplicity), 2 (speed), 55
`4 (distance), 5 (location), 6-7 (battery life), and 8-9 ( conve-
`nience). Accordingly, it may be desirable to improve authen-
`tication speed, proximity measurement, location determina-
`tion, decrease power consumption, and increase convenience
`for example.
`
`SUMMARY OF THE INVENTION
`
`A wireless access control system includes a remote access
`device for authorizing access control to a lock when present
`on a user who touches, or triggers a proximity detector, of the
`lock.
`
`iApartments Ex. 1009
`
`Page 18 of 28
`
`
`
`US 9,057,210 B2
`
`3
`there for it is desirable to only go into this state for a limited
`period of time upon user detection.
`In another embodiment, the lock is already communicating
`with an authorized remote access device and the proximity
`detector which detects the presence of a user at or near the
`lock provides a proximity detection signal to the controller to
`lock or unlock the electronic lock.
`
`BRIEF DESCRIPTION OF THE DRAWINGS
`
`4
`deadbolt utilizing their key. The lock 11 includes a controller
`21 or processor and wireless communication circuitry 22 for
`wireless communication which as will be discussed below,
`enable remote access device 15 to operate lock 11.
`Alternatively, in another embodiment, the lock 11' may be
`motor powered (FIG. 2b ). When a user is in sufficiently close
`vicinity or touches anywhere on the lock, or in proximity of
`the lock, 11', the deadbolt 14' is driven by the motor (not
`shown) to open the lock for authorized users having the
`10 remote access device 15. Of course, the lock 11 may be
`another type of lock or locking mechanism and may be
`installed in any access point, for example.
`Lock 11 includes a proximity detector 27 for detecting the
`presence of a user. Proximity detector 27 outputs a presence
`15 signal in response to detecting a user. As discussed below,
`proximity detector 27 may be a capacitance touch sensor, a
`button, a trip light circuit, a near field detector, a radio fre-
`quency signal strength detector, an audio switch (which actu-
`ates upon receipt of audio signals of a set frequency), or the
`20 like. Proximity detector 27 outputs the presence signal to
`controller 21.
`In one non-limiting exemplary embodiment, lock 11 is in a
`hibernation or low power level state. Upon triggering a prox-
`imity detector 27 outputting the presence signal by a users
`25 touch for example, controller21 causes system 10 to wake up
`and start listening for remote access devices 15 advertise-
`ments. Upon finding a remote access device 15, the lock 11
`communicates with (connects) to the remote access device
`15, determines if the device 15 is an authorized user via an
`30 encrypted key exchange, then determines if the remote access
`device 15 is in range to control the lock 11, and ultimately
`provides access to an authorized user; all within a short or
`small perceived delayed time (ten seconds or less) if all the
`criteria is met.
`Additionally, the lock 11 may be advertising or listening
`(sending or sampling signals) at a low frequency rate in order
`to conserve battery power yet establish a commnnication link
`with the remote access device 15 in advance of a users touch.
`In this way, increasing the speed of the authentication process
`to create little if any perceived delay for the user.
`In another embodiment, once the lock 11 is touched by a
`user, the lock wireless communication circuitry 22 changes
`states and starts listening for a remote access device 15 adver-
`tisement. Once a connection is made authentication can be
`done upon connection, or upon lock or unlock request from
`remote access device 15. Once authenticated, the lock 11
`tracks the Received Signal Strength Indicator (RSSI) of the
`remote access device nntil the algorithm determines it is
`within a defined accessible range from lock 11. The lock 11
`50 gathers RSSI data and utilizes this data in an algorithm to
`determine the position of the remote access device 15. Once
`the remote access device 15 is within a pre-determined acces-
`sible distance (control range), the lock grants remote access
`device 15 access control to lock or unlock the lock 11. Addi-
`tiona! antennas may be used in some embodiments for more
`accurate position determining, and to increase authorized
`user capacity and overall speed of the wireless access system
`10,
`Alternatively, in another embodiment, the lock may be a
`doorknob lock, handle lock, or other style lock for example.
`Referring now additionally to FIG. 3, the wireless access
`system 10 includes a remote access device 15. The remote
`access device 15 is advantageously a key or token authorized
`to control the lock 11. In particular, the remote access device
`15 may be a standard key including a controller 16 for con-
`trolling lock 11 via remote wireless access electronics
`coupled thereto (FIG. 3a). Remote access device 15 also
`
`FIG. 1 is a schematic diagram of a wireless access system
`according to the present invention;
`FIG. 2a is a perspective view of a lock constructed in
`accordance with the invention;
`FIG. 2b is a perspective view of a lock constructed in
`accordance with another embodiment of the invention;
`FIG. 3a is a top plan view of a remote access device
`constructed in accordance with the invention as a key;
`FIG. 3b is a front plan view of a remote access device
`constructed in accordance with yet another embodiment of
`the invention as an application for a cell phone;
`FIG. 4 is a front plan view of a Router Plug-in Unit of the
`wireless access system constructed in accordance with the
`invention;
`FIG. 5 is a schematic diagram of the communication
`between the components of the wireless access system in a
`typical residential system layout in accordance with the
`invention;
`FIG. 6a-6d are a flow chart of operation of the wireless
`access system in accordance with the invention;
`FIG. 7a is a diagram of a system showing the local com-
`munication between the remote access and the lock in accor-
`dance with the invention;
`FIG. 7b is a diagram of a system showing range and loca-
`tion determination in accordance with the invention;
`FIG. 8 is a diagram of a system showing the method of
`sending access control authorization from one remote access
`device to another in accordance with the invention;
`FIG. 9 is a circuit diagram of a remote access device con-
`structed in accordance with still another embodiment of the 40
`invention;
`FIG. 10 is a circuit diagram of a PKE lock constructed in
`accordance with another embodiment of the invention; and
`FIG. 11 is a schematic diagram of a trip light circuit for
`sensing the presence of a user in accordance with the inven- 45
`tion.
`
`35
`
`DETAILED DESCRIPTION OF THE INVENTION
`
`The present description is made with reference to the
`accompanying drawings, in which various embodiments are
`shown. However, many different embodiments may be used,
`and thus the description should not be construed as limited to
`the embodiments set forth herein. Rather, these embodiments
`are provided so that this disclosure will be thorough and 55
`complete. Like numbers refer to like elements throughout,
`and prime notation is used to indicate similar elements or
`steps in alternative embodiments.
`Referring to FIGS. 1, 2a, 2b, 3a, 3b, and 4, a wireless
`access system 10, for example, a PKE system, includes a lock 60
`11. The lock 11 may be installed in a standard deadbolt hole
`and may be battery powered, for example. The lock 11 may be
`a human controlled (keyed) lock, for example (FIG. 2a ). The
`lock 11 includes an outer cylinder 12 that rotates freely
`around a standard key cylinder 13. When engaged, the cylin- 65
`der 13 is linked to a deadbolt14 (which may optionally be part
`oflock 11 ), thus giving the user control to extend or retract the
`
`iApartments Ex. 1009
`
`Page 19 of 28
`
`
`
`US 9,057,210 B2
`
`5
`6
`includes wireless communication circuitry radio 18 such as a
`still connected by determining whether communication has
`occurred within a predetermined time period in a Step 112.
`radio in one non-limiting embodiment, for sending and
`If the fob 15 has not timed out, then in a Step 114 a lock 11
`receiving signals. In a preferred non-limiting example, the
`performs a challenge response verification process to authen-
`signal is a Bluetooth Low Energy signal.
`Alternatively, or additionally, the remote access device 15
`ticate the remote access device 15. If fob 15 is verified by
`may be a mobile wireless communications device, such as,
`comparing an identification portion of the advertisement sig-
`nal to information stored at system 10, lock 11 begins to
`for example, a Smartphone that may include the remote wire-
`gather and process location and positioning data of fob 15 in
`less access electronics described above cooperating with an
`application 17' stored in memory 17 (FIG. 3b ). The applica-
`a step 117 utilizing Received Signal Strength Indication
`tion 17' may be configured to send a signal to provide access
`10 (RSSI) by way of non-limiting example. Utilizing the loca-
`and control over the lock 11', for example. Of course, more
`tion and positioning algorithm in step 117, lock 11 can deter-
`than one remote access device 15' may be used and may be
`mine if the user is within activation range in step 118. If the
`user is in the activation range as determined in step 118, the
`another type of remote access wireless device, for example, a
`control oflock 11 is given to fob 15 and the lock 11 will lock
`wireless FOB without the mechanical key, as will be appre-
`15 orunlockas needed ina step 119, then thelock11 disconnects
`ciated by those skilled in the art.
`from fob 15 in a step 120 and returns to step 100 to its low
`Referring now additionally to FIG. 4, the wireless access
`system 10 also includes a Router Plug-in Unit (RPU) 30.
`power state 101.
`Connected to mains power via a power source plug-in 38 and
`If in Step 104 the advertisement from the fob 15 is not
`the Internet via a Ethernet port 37 to the home router. A
`received within a predetermined time window or the fob is not
`controller 32 controls operation of RPU 30. In one embodi-
`20 authorized as determined in Steps 107 and a Step 109 in
`ment, the RPU 30 includes a radio transceiver 33 to commu-
`which the signal is ignored, or the fob connection times out in
`nicate with lock 11 and/or remote access device 15, and
`a Step 112, or the challenge response in Step 115 is not an
`appropriate one, then the process returns to Step 100 to be
`utilizes a Bluetooth Low Energy communication protocol to
`communicate with the lock 11.
`repeated.
`The RPU 30 may link to an off-site web-based server 34 via 25
`In another embodiment, controller 21 can enable locking
`a communications network such as the internet 28, for
`the door without the use offob 15. If proximity detector 27,
`example. This advantageously enables RPU 30 to receive
`which may include a touch sensor, determines that lock 11
`was touched at least a second time within a time window,
`near real time updates for adding or removing users, one-time
`preferably measured in seconds, in a Step 106, then controller
`access, extended access or specific timed access, and other
`connectivity related updates and functions at lock 11, as will 30 21 determines whether lock 11 is unlocked in a step 108. If it
`is determined that lock 11 is in fact unlocked in Step 108, then
`be appreciated by those skilled in the art. In addition, the RPU
`it is determined whether or not or not the lock 11 is touched a
`30 can send lock 11 status and transaction updates via the
`Internet 28 to the server 34 which can be viewed on a remote
`third time within a predetermined time window measured in
`seconds or less, and if in fact the lock 11 is touched three times
`access device 15 or personal computer 25, for example. Addi-
`35 within the time window, then controller 21 causes lock 11 to
`tiona! services may be selectively provided via the Internet
`using the connectivity ofRPU 30 with server 34, for example.
`lock bolt 14 in a Step 113 and the process is returned to the
`While the RPU 30 is described herein as a plugin device, it
`beginning in Step 100 to monitor for another remote access
`device 15. If the deadbolt is not touched the prescribed num-
`will be appreciated by those skilled in the art that the func-
`tionality of the RPU 30 may be embodied in any of a number
`ber of times during the time window, in Steps 106 and 111, or
`40 is already in the locked state as determined in Step 108, then
`of form factors, for example, such as a mobile cellular based
`unit making use of cell network 35.
`the process returns to Step 100 to await connection with
`Referring now additionally to FIG. 5, a typical residential
`another remote access device. In this way, a door can be
`setup example of the wireless access system 10 is illustrated.
`locked merely by activating proximity detector 27, a prede-
`As described above with respect to FIG. 4, the RPU 30 is
`termined number of times within a predetermined time
`45 period, or by continuously activating proximity detector 27
`typically plugged-in to the mains power via power source
`plug-in 38 and to the internet 28 via the home router though an
`for a predetermined time period.
`Ethernet cable and port 37, at a location near the home router.
`In another embodiment, the system may work without the
`RPU 30 may also communicate wirelessly to the lock 11,
`need to touch lock 11 in step 102. In this embodiment, lock 11
`and remote access device 15 determine that they are within
`which may be installed on the front door, for example.
`Operation of the wireless access system 10 will now be
`50 range of each other to begin processing without the need to
`initially touch lock 11. This allows for the control oflock 11
`described with reference additionally to the flowchart in FIG.
`6a-6d. The lock 11, may initially be in a low power mode in
`well ahead of being sufficient proximity of a door to touch
`a step 101 to conserve battery power, for example. The lock
`lock 11.
`11 is typically in a low power mode; searching for authorized
`In this preferred non-limiting embodiment, an in-range
`remote access devices 15', for example a Smartphone, at a 55
`remote access device 15', such as a Smartphone, responds in
`a Step 121 to a broadcast advertisement from the lock 11 in a
`lower frequency to conserve battery power, In one preferred
`Step 121 by controller 21. If the Smartphone 15' is authorized
`non-limiting embodiment, when a user triggers the proximity
`detector 27 by touch in a Step 102, or another method, the
`for access at that time as determined by controller21 in a Step
`lock 11 begins to listen for remote access devices 15 in a Step
`122, a connection is made in a Step 124 between a Smart-
`phone 15' and lock 11. If Smartphone 15' is authenticated
`103, more specifically fobs in this embodiment. At the same 60
`time, system 10 powers up and controller 2 increases its
`during a challenge response verification process in Step 125,
`lock 11 begins to gather and process location and positioning
`broadcast and listening rate.
`!flock 11 "sees" (receives) an advertisement from a fob 15
`data in a Step 127, utilizing RSSI or a signal from Global
`Positioning System (GPS) enabled Smartphone 15, for
`within a predetermined time period in a Step 104, and the fob
`15 is authorized for access at that time as determined by lock 65
`example. Utilizing the location and positioning algorithm in
`Step 127, the lock 11 can determine if the user is in activation
`11 in a step 107, a connection is made between fob 15 and
`range in a Step 129. In an optional Step 128, lock 11 may
`lock 11 in a step 110. It is then determined whether fob 15 is
`
`iApartments Ex. 1009
`
`Page 20 of 28
`
`
`
`US 9,057,210 B2
`
`7
`8
`determine whether lock 11 has been touched prior to deter-
`positioned within in-signal range 90. In this case, a wireless
`connection is made between the remote access device 15' and
`mining whether the user is in range in Step 129. If the user is
`the lock 11. The remote access device 15' is authorized to
`in activation range, lock 11 will lock or unlock (reverse state)
`control the lock 11.
`in a Step 130.
`In another embodiment, information about remote access
`In one non-limiting embodiment, when the user 70
`device 15' may be stored at any one of memory 55, and
`approaches, their position is determined by receiving signals
`from remote access device 15' at an exterior facing antenna
`memory associated with personal computer 25 or server 34.
`Remote access device 15 may have limited access to lock 11.
`52. Once user 10 is within activation range 91, and touches the
`By way of example, access may only be during predeter-
`lock 11, the lock 11 radio switches to an internal antenna 50
`mined time periods of a day, or for a limited number of times; 1 o
`to verify the user 70 is on the outside. If the calibrated RSSI,
`such as a one-time use key. If the remote access device 15',
`as determined by controller 21, or some other element of
`represents a one-time key as determined in Step 131, this key
`system 10, from one or more readings from the internal
`will be deleted from the memory or stored in the memory of
`antenna 50 is less than the external calibrated RSSI reading or
`system 10 as an invalid key in Step 132 to prevent further
`readings, user 70 is determined by controller 21 to be on the
`15 outside and the lock 11 will lock or unlock. If the calibrated
`access.
`As with touch process, in this proximity determination
`RSSI from the internal antenna 50 is greater than the RSSI
`process at any time controller 21 or 32 determines that the
`reading or readings from external antenna 52, user 70 is
`response is inappropriate (Step 125), or remote access device
`determined to be on the inside, within inside