FIELD OF THE INVENTION
[0001] This disclosure relates to a lock assembly, to a housing for a rotatable member,
in particular for a cylinder of a cylinder lock, and to a lock case.
BACKGROUND OF THE INVENTION
[0002] Keyless entry systems conveniently allow a person to access an area, such as his
home, without having to insert a key into a lock. Remotely controlled locks are known
in the art that may be unlocked by a user pressing a button on a transponder, the
transponder transmitting a signal to the lock wherein the signal triggers an electronic
motor for unlocking the mechanical lock mechanism.
[0003] Modifying an existing, conventional lock so that it can be opened without the insertion
of a key into the lock, i.e. to implement a "keyless functionality" into an existing
lock, may be cumbersome. Typically, keyless lock systems require a wired electrical
connection between a power supply or controller on one side of the door and an electrical
device, such as an antenna for receiving wireless signals from a transponder, on another
side of the door. Hence, if a home owner wants to implement a keyless functionality
into an existing lock, he will have to drill a hole through the door for forming a
passage through the door for electrical wiring.
[0004] Hence, from the above, it follows that there is a need in the art for technology
that facilitates implementing a keyless functionality into an existing lock.
SUMMARY
[0005] One aspect of this disclosure relates to a lock assembly comprising a lock case comprising
a through-hole, the lock assembly further comprising a housing accommodating a rotatable
member, wherein the housing is mated to and mounted in the through-hole, and wherein
at least one of the housing and the through-hole provide a channel through the lock
case.
[0006] Advantageously, the lock assembly provides a channel through the lock when the lock
assembly is mounted on a door, which obviates the need to drill an additional hole
through the door when a keyless functionality is to be implemented into an existing
lock.
[0007] In one embodiment, the rotatable member is a cylinder of a cylinder lock.
[0008] In one embodiment, the housing provides the channel through the lock case.
[0009] In one embodiment, the housing comprises a recess running along a length of the housing.
[0010] In one embodiment, the recess is located in a bottom part of the housing.
[0011] In one embodiment, the channel provides a passage for electrical wiring.
[0012] In one embodiment, the through-hole is shaped in accordance with a standardized lock
profile.
[0013] In one embodiment, the through-hole is shaped in accordance with the Euro Profile
lock standard, for example in accordance with the standard as disclosed by at least
one of the documents DIN 18250, DIN 18251 and DIN 18252 published by the Deutsches
Institut fur Normung (German Institute for Standardization).
[0014] In one embodiment, the through-hole is shaped in accordance with an Oval lock standard,
such as a UK Oval lock standard, Scandinavian Oval lock standard or Australian Oval
lock standard.
[0015] In one embodiment, the through-hole is shaped in accordance with the Swiss profile
lock standard.
[0016] In one embodiment, the through-hole is shaped in accordance with the KIK lock standard.
[0017] In one embodiment, a front face of the housing does not comprise an opening for receiving
a mechanical key.
[0018] One aspect of this disclosure relates to housing for accommodating a rotatable member,
the housing being mated to a through-hole in a lock case, wherein the housing is configured
to provide a channel through the lock case when the housing is mounted in the through-hole.
[0019] In one embodiment, the housing comprises a recess running along the length of the
housing.
[0020] One aspect of this disclosure relates to a lock case for use in a lock assembly.
The lock case comprises a through-hole mated to a housing, wherein the through-hole
is configured to provide a channel through the lock case when the housing is mounted
in the through-hole.
[0021] In an aspect, the invention relates to a module for controlling an electronic lock,
the module being configured to unlock the lock in at least two phases, a first phase
and a second phase; wherein the module may comprise: an electric motor configured
to drive a mechanical locking mechanism for unlocking the lock; a controller that
is configured to control the electric motor and to receive one or more wireless signals
from an electronic key; a user interface connected to the controller configured to
detect a user interaction; wherein the controller is further configured to: determine
on the basis of the one or more wireless signals that the electronic key is within
a predetermined distance from the lock and in response initiate the first phase comprising
controlling the electric motor to drive the mechanical locking mechanism to partially
unlock the lock; detect interaction with the user interface of the lock; and, after
completion of the first phase, initiate on the basis of the detected user interaction
the second phase, comprising controlling the electric motor to drive the mechanical
locking mechanism to fully unlock the lock.
[0022] In a further aspect, the invention relates to a method for controlling an electronic
lock to unlock in at least two phases, a first phase and a second phase, the method
comprising: controlling an electronic motor driving a mechanical locking mechanism
and receiving one or more wireless signals from an electronic key; determining on
the basis of the one or more wireless signals that the electronic key is within a
predetermined distance from the lock and in response initiating the first phase comprising
controlling the electric motor to drive the mechanical locking mechanism to partially
unlock the lock; detecting interaction with a user interface of the lock; after completion
of the first phase, initiating on the basis of the detected user interaction the second
phase, comprising controlling the electric motor to drive the mechanical locking mechanism
to fully unlock the lock.
[0023] In a further aspect, the invention relates to a controller for a module as describe
above, the controller comprising: a computer readable storage medium having computer
readable program code embodied therewith, and, a processor, preferably a microprocessor,
coupled to the computer readable storage medium, wherein responsive to executing the
computer readable program code, the processor is configured to perform executable
operations comprising the method steps as described above.
[0024] Mechanical locking mechanisms, in particular mechanical locking mechanism such as
the European cylinder door lock mechanisms, exist wherein the cylinder has to turn
multiple times, e.g. over 960 degrees, before the lock is unlocked. When trying to
implement a keyless entry system on the basis of such mechanical locking mechanism
fully unlocking the lock may take considerable time after the user has pressed the
button of the transponder. As a result, the user may experience an undesirable waiting
time before he can actually open a door. This waiting time may even get worse as a
result of some conflicting requirements of an electronic lock.
[0025] On one hand, an electric motor of a lock is preferably small. Small motors namely
tend to be more energy efficient, which is important because frequent change of batteries
is undesired. In addition, small motors can be elegantly integrated with existing
locks and can be conveniently mounted on doors. On the other hand, an electric motor
must be able to deliver a certain threshold force or torque in order to drive the
mechanical lock mechanism, which may include a cylinder of a cylinder lock. In principle,
larger electric motors are able to deliver higher forces.
[0026] One way to address these conflicting requirements is to implement gearing. Gearing
enables to amplify an input force or torque delivered by the electric motor to the
gearing system. The amplified output torque may then be sufficient to drive the mechanical
parts of the lock. Hence, a small electric motor can indeed cause a force or torque
of sufficient magnitude for driving mechanical parts of the lock. However, as known,
amplifying a torque by means of gearing is associated with a reduction in velocity,
for example a reduction in the angular velocity of a cylinder of a cylinder lock.
[0027] As a result, once a user has indicated that he wants to open an electronic lock known
from the prior art, he typically has to wait for considerable time before the lock
has completely unlocked. For example, if a small electric motor were to drive mechanical
locking mechanisms such as the European cylinder door lock mechanisms, aided by appropriate
gearing, the user may have to wait ten seconds before he can open the door.
[0028] The module, method and controller disclosed herein enable improved keyless entry
systems that at least reduce the waiting time for a user that intends to unlock a
lock, for example a lock on a door of the user's home. Hereto, the module is configured
to unlock the lock in two phases. The first phase is initiated by the controller in
response to determining that an electronic key, and presumably a person holding the
key, is within a predetermined distance of the lock. As will be understood, an appropriately
chosen distance allows the controller to already initiate the first phase while the
user is approaching and has not yet reached the lock. Hence, the lock will have already
partially unlocked when the user arrives at the lock. If the user then indicates that
he indeed intends to unlock, the controller will initiate the second phase and further
unlock, e.g. completely unlock so that the user can access a house, locker, etc. The
second phase may only start once a user has interacted with the lock, for example
touching the lock, therefore the risk of unintentionally completely unlocking the
lock is avoided.
[0029] The electronic key may be associated with the lock and/or may comprise a smartphone
or any other portable device that can transmit wireless signals. The controller may
be configured to control the transceiver module to transmit and receive messages from
the key.
[0030] The mere reception of the signal from the key may be sufficient for the controller
to determine that the key is within the predetermined distance from the lock.
[0031] The predetermined distance may be a distance in the range of 2-50 meters, preferably
3-30 meters, more preferably 5-15 meters.
[0032] Measures may be taken to neglect an electronic key if it is within the predetermined
distance from the lock, yet already in the area for which access controlled, the "inside"
area, e.g. already in the house. Such measures may comprise at least one of the electronic
key and the controller determining that the electronic key is in the "inside" area
on the basis of Wifi and/or geofencing.
[0033] The user interaction may be indicative of an intention of the user to unlock the
lock.
[0034] In embodiments of the module, method and controller one or more wireless signals
comprise an identifier of the electronic key and/or an authentication code. In these
embodiments, the controller is configured for, and the method comprises, enabling
on the basis of the received identifier and/or on the basis of the authentication
code initiation of the first phase. This embodiment provides convenient security measures
for opening the lock.
[0035] In one embodiment the module comprises a rotatable member, such as a rotatable cylinder,
coupled to the electric motor, the rotatable member being configured to drive the
mechanical locking mechanism of the lock by rotating. In embodiments of the module
and/or of the method, the controller is configured for, and the method comprises,
controlling the electric motor to rotate the member in the first phase over a first
angular distance from a first angular position to an intermediate angular position
and controlling the electric motor to rotate the member in the second phase over a
second angular distance from the intermediate angular position to a second angular
position. These embodiments are advantageous because they enable that existing cylinder
locks can be conveniently controlled.
[0036] The direction of said respective rotations in the first and second phase may be the
same. Also, the second angular distance may be smaller than the first angular distance.
[0037] In one embodiment the mechanical locking mechanism comprises a dead bolt and a latch
bolt. In embodiments, the controller is configured for, and/or the method comprises,
retracting the deadbolt in the first phase and retracting the latch bolt in the second
phase.
[0038] These embodiments allow easy calibration of the module, because the end of the first
phase is clearly recognizable. At the end of the first phase, the dead bolt may namely
be fully retracted, whereas the latch bolt may have not retracted at all.
[0039] In one embodiment the user interface comprises a touch sensitive surface and the
interaction comprises the user touching the touch sensitive surface.
[0040] The touch surface may be, when the module is mounted on the lock for controlling
the lock, at the outside of the door.
[0041] In embodiments, the controller is configured for, and/or the method comprises, establishing
a secure connection with the electronic key. The secure connection may be established
using techniques known in the art.
[0042] In embodiments, the controller is configured for, and/or the method comprises, determining
a power of the one or more wireless signals as received, determining that the power
as received exceeds a threshold value and in response determining that the key is
within the predetermined distance from the lock.
[0043] The controller may be configured to determine, or calibrate, the threshold value
on the basis of an indication of a power of the signal as transmitted by the electronic
key. If for example the key transmits signals of lower power, the threshold value
may be lower, whereas the threshold value may be higher if the key transmits signals
of higher power. The controller may additionally or alternatively be configured to
calculate a round-trip time of a signal. The controller may be configured to determine
that the electronic key is within the predetermined distance on the basis of the calculated
round-trip time, for example on the basis of the calculated round-trip time being
shorter than a predetermined time.
[0044] In embodiments, the controller is configured for, and/or the method comprises, establishing
a wireless connection with the electronic key; and for monitoring a quality of the
connection and determining on the basis of the quality of the connection that the
electronic key is within the predetermined distance.
[0045] The controller may be configured to repeatedly measure the quality of the connection,
for example by measuring a power of the signal as received, such as an RSSI (Received
Signal Strength Indicator). Also, the key may be configured to determine the quality
of the connection, for example by measuring a power of a further signal as received
by the key, wherein the further signal is transmitted by the transceiver module to
the key. The key may then transmit the quality as measured by the key to the module.
[0046] In one embodiments, controller is configured for, and/or the method comprises, receiving
a second wireless signal from the key and determining, prior to initiation of the
second phase, on the basis of the received second signal that the key is within a
predetermined second distance from the lock and in response enabling initiating the
second phase, preferably the second distance being smaller than the predetermined
distance.
[0047] This embodiment is advantageous because it prevents that a door can be opened by
a malicious person when the first phase has completed, although the owner holding
the key does not (yet) intend to unlock the door, for example because he is still
sitting in his car near the lock.
[0048] It should be understood that in this embodiment the controller may thus be configured
to only open the lock if at least two conditions i) and ii) are satisfied, namely
i) the detector has detected an action of the user and ii) the key is within the predetermined
second distance of the lock.
[0049] The second distance may be in the range of 0-5 meters, preferably 0-2 meters, more
preferably 0-1 meter.
[0050] In one embodiment the module is mountable on a lock.
[0051] In one embodiment, the lock in locked state is configured to secure a member, such
as a door, for restricting access to an area and in these embodiments the module further
comprises a sensor that is configured to generate a position signal that is indicative
of a position of the member. In embodiments, the controller is configured for, and/or
the method comprises, controlling the lock to lock itself on the basis of the position
signal.
[0052] This embodiment enables that the lock automatically locks a door once the door is
closed again after it has been opened.
[0053] The controller may be configured to determine on the basis of the position signal
that the member has moved from a position in which the member provides access to the
area to be accessed to a position in which the member restricts access and in response
control the lock to lock itself.
[0054] The sensor may comprise a magnetic sensor that is configured to measure a magnetic
field strength for example a magnetic field strength caused by a (permanent) magnet
mounted on a door and/or a magnetic field strength of the earth's magnetic field.
In the latter case the sensor may be understood to comprise a compass. A compass mounted
on for example a door enables the controller to determine the orientation of the door
which allows to determine whether the door is open or shut.
[0055] In embodiments, the controller is configured for, and/or the method comprises, controlling
the lock to fully lock after the first phase has completed in response to at least
one of:
- the controller determining that an established connection between the electronic key
and the transceiver module has terminated;
- the controller determining that a first time period since completion of the first
phase has passed without determining that the key is in the second area;
- the controller determining that a second time period has passed since determining
that the key is in the second area.
[0056] These embodiments provide additional security measures in the sense that the lock
will not be partially unlocked for a long time.
[0057] The first time period may for 20-60 seconds, preferably for 25-35 seconds. The second
time period may last for 5-30 seconds, preferably 10-20 seconds.
[0058] In one embodiment a module is provided according to claim 13.
[0059] As will be appreciated by one skilled in the art, aspects of the present invention
may be embodied as a system, a method or a computer program product. Accordingly,
aspects of the present invention may take the form of an entirely hardware embodiment,
an entirely software embodiment (including firmware, resident software, micro-code,
etc.) or an embodiment combining software and hardware aspects that may all generally
be referred to herein as a "circuit," "module" or "system." Functions described in
this disclosure may be implemented as an algorithm executed by a processor/microprocessor
of a computer. Furthermore, aspects of the present invention may take the form of
a computer program product embodied in one or more computer readable medium(s) having
computer readable program code embodied, e.g., stored, thereon.
[0060] Any combination of one or more computer readable medium(s) may be utilized. The computer
readable medium may be a computer readable signal medium or a computer readable storage
medium. A computer readable storage medium may be, for example, but not limited to,
an electronic, magnetic, optical, electromagnetic, infrared, or semiconductor system,
apparatus, or device, or any suitable combination of the foregoing. More specific
examples of a computer readable storage medium may include, but are not limited to,
the following: an electrical connection having one or more wires, a portable computer
diskette, a hard disk, a random access memory (RAM), a read-only memory (ROM), an
erasable programmable read-only memory (EPROM or Flash memory), an optical fiber,
a portable compact disc read-only memory (CD-ROM), an optical storage device, a magnetic
storage device, or any suitable combination of the foregoing. In the context of the
present invention, a computer readable storage medium may be any tangible medium that
can contain, or store, a program for use by or in connection with an instruction execution
system, apparatus, or device.
[0061] A computer readable signal medium may include a propagated data signal with computer
readable program code embodied therein, for example, in baseband or as part of a carrier
wave. Such a propagated signal may take any of a variety of forms, including, but
not limited to, electromagnetic, optical, or any suitable combination thereof. A computer
readable signal medium may be any computer readable medium that is not a computer
readable storage medium and that can communicate, propagate, or transport a program
for use by or in connection with an instruction execution system, apparatus, or device.
[0062] Program code embodied on a computer readable medium may be transmitted using any
appropriate medium, including but not limited to wireless, wireline, optical fiber,
cable, RF, etc., or any suitable combination of the foregoing. Computer program code
for carrying out operations for aspects of the present invention may be written in
any combination of one or more programming languages, including an object oriented
programming language such as Java(TM), Smalltalk, C++ or the like and conventional
procedural programming languages, such as the "C" programming language or similar
programming languages. The program code may execute entirely on the user's computer,
partly on the user's computer, as a stand-alone software package, partly on the user's
computer and partly on a remote computer, or entirely on the remote computer or server.
In the latter scenario, the remote computer may be connected to the user's computer
through any type of network, including a local area network (LAN) or a wide area network
(WAN), or the connection may be made to an external computer (for example, through
the Internet using an Internet Service Provider).
[0063] Aspects of the present invention are described below with reference to flowchart
illustrations and/or block diagrams of methods, apparatus (systems), and computer
program products according to embodiments of the present invention. It will be understood
that each block of the flowchart illustrations and/or block diagrams, and combinations
of blocks in the flowchart illustrations and/or block diagrams, can be implemented
by computer program instructions. These computer program instructions may be provided
to a processor, in particular a microprocessor or a central processing unit (CPU),
of a general purpose computer, special purpose computer, or other programmable data
processing apparatus to produce a machine, such that the instructions, which execute
via the processor of the computer, other programmable data processing apparatus, or
other devices create means for implementing the functions/acts specified in the flowchart
and/or block diagram block or blocks.
[0064] These computer program instructions may also be stored in a computer readable medium
that can direct a computer, other programmable data processing apparatus, or other
devices to function in a particular manner, such that the instructions stored in the
computer readable medium produce an article of manufacture including instructions
which implement the function/act specified in the flowchart and/or block diagram block
or blocks.
[0065] The computer program instructions may also be loaded onto a computer, other programmable
data processing apparatus, or other devices to cause a series of operational steps
to be performed on the computer, other programmable apparatus or other devices to
produce a computer implemented process such that the instructions which execute on
the computer or other programmable apparatus provide processes for implementing the
functions/acts specified in the flowchart and/or block diagram block or blocks.
[0066] The flowchart and block diagrams in the figures illustrate the architecture, functionality,
and operation of possible implementations of systems, methods and computer program
products according to various embodiments of the present invention. In this regard,
each block in the flowchart or block diagrams may represent a module, segment, or
portion of code, which comprises one or more executable instructions for implementing
the specified logical function(s). It should also be noted that, in some alternative
implementations, the functions noted in the blocks may occur out of the order noted
in the figures. For example, two blocks shown in succession may, in fact, be executed
substantially concurrently, or the blocks may sometimes be executed in the reverse
order, depending upon the functionality involved. It will also be noted that each
block of the block diagrams and/or flowchart illustrations, and combinations of blocks
in the block diagrams and/or flowchart illustrations, can be implemented by special
purpose hardware-based systems that perform the specified functions or acts, or combinations
of special purpose hardware and computer instructions.
[0067] In one aspect, embodiments of the present invention may relate to a computer-implemented
method for controlling a lock.
[0068] Moreover, a computer program for carrying out the methods described herein, as well
as a non-transitory computer readable storage-medium storing the computer program
are provided. A computer program may, for example, be downloaded (updated) to the
existing controller (e.g. to the existing or be stored upon manufacturing of these
systems.
[0069] Embodiments of the present invention will be further illustrated with reference to
the attached drawings, which schematically will show embodiments according to the
invention. It will be understood that the present invention is not in any way restricted
to these specific embodiments.
BRIEF DESCRIPTION OF THE DRAWINGS
[0070] Aspects of this disclosure will be explained in greater detail by reference to exemplary
embodiments shown in the drawings in which:
Fig. 1 schematically shows a system for controlling an electronic lock according to
an embodiment of the invention;
Fig. 2 depicts a flow diagram of a method for controlling the electronic lock according
to an embodiment of the invention;
Fig. 3 is an exploded view of one embodiment;
Fig. 4 shows an assembly of a lock, module and door according to one embodiment;
Fig. 5-7 show in detail a cylinder and housing according to an embodiment;
Figs. 8A-C depicts various flow diagrams of methods for controlling the electronic
lock according to various embodiments of the invention;
Fig. 9 depicts a block diagram illustrating an exemplary data processing system that
may be used in a controller or electronic key.
DETAILED DESCRIPTION OF THE DRAWINGS
[0071] Fig. 1 schematically shows a system for controlling an electronic lock according
to an embodiment of the invention. In particular, Fig. 1 depicts a system for controlling
an electronic lock comprising a module 2 for controlling an electronic lock and an
electronic key that is configured to wirelessly communicate with the electronic lock.
[0072] The module 2 may be mounted on a door 1, which may be a door of a house, locker,
cabinet, etc. connected to lock 12 of the door 1. The lock 12 comprises at least one
mechanical part 14, i.e. a mechanical locking mechanism, which may comprise dead bolt
and/or latch bolt which may, when the door is in a closed position, be extended from
the door into a mortise in a doorjamb (not shown) in order to secure the door and
restrict access to the area behind the door 1. The module may also control locks of
other access restricting members, such as a hatch, lid, etc.
[0073] Module 2 may comprise an electric motor 6, a detector 10 and a transceiver module
8 which may be controlled by a controller 4. Further electric motor 4 is coupled to
the at least one mechanical part 14 and may thus set the mechanical part 14 in motion.
[0074] An electronic key 16 is configured to communicate with the controller of the electronic
lock. In particular, it may transmit one or more wireless signals to the module 2,
which may be detected by transceiver module 8 and relayed to the controller 4 for
further processing. The electronic key 16 may be implemented as a mobile device, e.g.
a transponder that is configured to wirelessly communicate with the lock or as an
software application on a mobile communication device such as a smart phone or the
like.
[0075] Fig. 1 shows that the electronic key is located at a predetermined distance 20 away
from the lock. Communication between the electronic key and the electronic lock may
be possible within an area which may be defined by an maximum communication distance
18 away from the lock 12. If distance between the electronic key and the electronic
lock is smaller than the maximum communication distance wireless communication between
the electronic key and the electronic lock is possible. The maximum communication
distance 18 may depend on the radio interface and the protocol that is used for establishing
a radio connection between the electronic key and the electronic lock. The maximum
communication distance be in the range 2-50 meters, preferably 3-30 meters, more preferably
5-15 meters.
[0076] Fig. 2 is a flow diagram illustrating a method for controlling the electronic lock
according to an embodiment of the invention. The method may be executed by the system
described with reference to Fig. 1.
[0077] In a first step 24, the module 2 repeatedly transmits, e.g. broadcasts, notification
messages comprising an identifier ID of the module 2. Once the electronic key 16 is
close enough to the transceiver module 8, the electronic key 16 will receive one or
more of these notification messages, one notification message indicated by arrow 24.
The electronic key 16 is "in reach" of the module 2, and in particular of transceiver
module 8. Once the electronic key 16 may receive notification message 24, the electronic
key 16 and the controller 4 may establish a wireless connection (step 26).
[0078] In an embodiment, the wireless connection may be a secure connection based on encryption
techniques known in the art, such as the Elliptic curve Diffie-Hellman algorithm part
of the Bluetooth 4.0 core spec. One precondition for establishing the connection 26
may be that the electronic key 16 is a so-called trusted device of the module 2.
[0079] It should be appreciated that the wireless connection and the signaling between the
module 2 and the electronic key 16 may be may be based on any suitable wireless protocol.
In an embodiment, a wireless protocol may be used that is configured to execute proximity
monitoring between the electronic key and the electronic lock, such as a Bluetooth
protocol, in particular the Bluetooth Proximity Profile. One version of this Proximity
Profile protocol is 1.0.1 adopted on 14 July 2015, the specification of which is incorporated
herein by reference in its entirety. The proximity monitoring process may provide
a measure for the distance between the electronic key and the electronic lock.
[0080] After the connection between electronic key 16 and controller 4 has been established,
an authentication procedure may be executed in which the controller authenticates
the electronic key 16. During the authentication, the controller may determine whether
the electronic key is registered with the controller. To that end, the controller
4 may use an identifier of the electronic key 16, that is transmitted to the controller.
The controller 4 may then verify whether electronic key 16 is allowed to unlock the
lock 12, for example by finding the identifier of the electronic key 16 in a database
comprising identifiers of electronic keys that are allowed to open the lock 12. Said
database may be stored in a memory of the controller. Additionally or alternatively,
said database may be stored on a remote server.
[0081] In one embodiment the controller 4 receives, for example via the connection 26, an
authentication code from the electronic key 16 and the controller 4 may be configured
to determine on the basis of this authentication code that the electronic key 16 is
allowed to open the lock 12.
[0082] In one embodiment, the controller 4 is configured to monitor the distance between
the electronic key 16 and the module 4. In an example, the controller 4 is configured
to monitor the distance by monitoring the connection 26, optionally in conformance
with a protocol such as the Bluetooth Proximity Profile protocol. In particular, the
controller 4 may be configured to repeatedly determine the power as received of the
signals, such as the RSSI, from the electronic key 16.
[0083] Step 32 depicts controller 4 determining that the electronic key is within a first
distance 18 (the maximum communication distance as described with reference to Fig.
1) of the lock 12 and/or module 2. Hereto, the controller 4 may be configured to compare
the monitored distance to the first distance, which may be stored in a memory of the
controller 4 and/or to compare a determined power of a signal as received from the
electronic key 16 with a threshold power.
[0084] Once the controller has determined that the electronic key 16 is within the first
distance 18, the controller 4 controls in step 34 the electric motor 6 to drive at
least one mechanical part 14 of the lock to partially unlock. It should be appreciated
that partially unlocking may comprise partially retracting a bolt, for example retracting
back into a door 1. In another example partially unlocking may comprise fully retracting
a bolt, such as a dead bolt, of the lock, yet without fully unlocking the lock because
another bolt, such as a latch bolt, is still extended, in an example extended from
a door 1 into a mortise of a door jamb, the latch bolt securing the door 1.
[0085] In step 38 the controller determines that the electronic key 16 is within a second
distance, indicated in Fig. 1 by reference numeral 22, of the lock and/or module 2.
It should be appreciated that any of the above described techniques may be used for
determining the distance between the electronic key 16 and the lock 12. In response,
the controller 4 may be configured to enable initiation of the second phase illustrated
in step 40. It should be appreciated that by default initiation of the second phase
is disabled and that the controller is configured, e.g. programmed, to only initiate
the second if at least the controller 4 has determined that the electronic key 16
is within a second distance 22 from the lock.
[0086] The controller 4 is configured to initiate the second phase on the basis of a detected
action of a user. In one embodiment the first phase must have been completed before
the second phase can be initiated. Step 42 illustrates that the module 2, in particular
the detector 10, detects the action of the user. In response, the controller 4 initiates
the second phase in step 44, in an example by controlling the electric motor 6 to
further unlock the lock 12, which is depicted by step 46. Preferably, the first phase
has completed prior to detection of the user action, so that upon detection of the
user action the second phase can be initiated without delay caused by the first phase
not having completed yet.
[0087] Fig. 3 is an exploded view of a lock assembly according to an embodiment of the invention.
The door 1 comprises a cavity 3 and two opposing holes 5 that provide an open connection
through the cavity 3 between the interior I on one side of the door and the exterior
E on another side of the door. When the lock assembly is mounted in the door 1 (as
shown in fig. 4), a lock case 12 comprising a through-hole 58 is mounted in the cavity
3. The through-hole 58 aligns with the two holes 5 in the door 1, as a result of which
an open connection between interior and exterior is provided. Then, a cylinder housing
54 accommodating a cylinder 52 is mounted in the open connection. The cylinder 52
comprises a cam 62 that upon rotation of the cylinder 52 drives mechanical components
in the lock case 12 for retracting into or extending from the lock case 12 a latch
bolt 14a and dead bolt 14b. As known, these bolts, when extended from the lock case
12, sit in a mortise in a door jamb (not shown) for securing the door 1.
[0088] In this embodiment, the cylinder housing 54 is configured to provide a channel through
the lock when it is mounted in the through-hole 58 in the sense that it comprises
a recess that runs along a length of the housing 54. The channel provides a passage
for electrical wiring, for example to electrically connect a detector 10 on the exterior
side E of the door to a power supply on the interior side I of the door 1. The power
supply (not shown) may be positioned inside housing 59. Advantageously, in this embodiment,
the lock case 12 may be a conventional lock case. Thus, when, someone wishes to implement
a keyless functionality into an existing lock assembly that comprises a conventional
lock case, he will not have to replace the lock case, nor will he have to drill an
additional hole through the door for electrical wiring.
[0089] Mounting plate 56 provides additional stability for a housing 59 when mounted on
door 1. Housing 59 may accommodate at least one of the electric motor, the transceiver
module 10 and controller 4 as described herein. A rotatable handle 60, such as a rotatable
door knob, may be mounted on the housing 59. The rotatable handle 60 is coupled to
the cylinder 52, so that a rotation of handle causes 60 a rotation of the cylinder
52. The handle 60 may be thus on the inside I of the door and may enable a user to
manually open the door. The lock may thus be both controllable by the module 2 and
by a handle on the inside according to mechanisms known in the art.
[0090] The assembly of elements depicted in Fig. 3 may be installed in a door 1. Door 1
may be a door of a house. The arrows I and E respectively indicate the inside area
and the outside area associated with the lock 12 and/or door 1. The inside area may
be an area to which access is to be controlled by means of the lock 12, such as the
inside of a home, the outside area may be a freely accessible area, such as a public
area. In the embodiment shown, a handle 50, when mounted, has a fixed position with
respect to the lock. The lock 12 may not be controllable by a handle on the outside
of the lock, which is typical for front doors of houses.
[0091] Detector 10 may comprise a display 11 and one or more buttons 13. The display 11
and/or the buttons 13 may comprise touch sensitive areas thus forming a user interface
for the electronic lock. The display 11, which may thus be a touch-sensitive display,
and the one or more buttons 13 enable a user to interact with the module 2. The detector
10 comprises electrical wiring 48 which can be connected to the controller 4 (not
shown) and/or a power supply of the module 2. The electrical wiring 48 enables data
communication between the controller and the detector 10. Power may also be provided
to the detector 10 through the electrical wiring 48.
[0092] In this embodiment,
Fig. 5 shows a housing 54 and cylinder 52 of a cylinder lock according to an embodiment
of the invention. In an embodiment, the housing and the cylinder may be configured
to cooperate with a standardized locking mechanism, such as the European cylinder
door lock mechanism.
[0093] The cylinder 52 may comprises at least one cam 62 that is configured to drive at
least one mechanical part of the lock 12, such as a sprocket-wheel. Cylinder 52 may
comprise a recess 53 along at least part of a length of the cylinder 52, the recess
53 enabling other parts to grasp the cylinder. Further, the front face of the housing
is closed and does not comprise an opening for receiving a mechanical key.
[0094] In this embodiment, the housing comprises a recess 64 that runs along a length of
the housing. When the support structure 54 is mounted in through-hole 58 shown in
Fig. 1, the recess 64 provides a channel for electrical wiring 48.
[0095] Fig. 6 shows an exemplary shape of a through-hole 58a in a lock. In this example,
the shape is a standard shape of an Euro profile lock.
[0096] Fig. 7A shows a profile of a housing 54a associated with the shape shown in Fig.
6 according to one embodiment. In this embodiment the profile of the support structure
54a comprises a cutaway part 64 in the bottom part of the support structure 54a.
[0097] FIG. 7B shows a profile of a housing 54b according to one embodiment. The housing
54b is associated with the through hole 58a shown in FIG. 6. In this embodiment, the
housing comprises a through-hole 55, which provides the channel when the housing 54b
is mounted in through-hole 58a shown in FIG. 6.
[0098] FIG. 7C shows an embodiment wherein the through-hole 58c is configured to provide
a channel through the lock when the housing 54c is mounted in the through-hole. With
respect to a through-hole of a conventional lock case, such as depicted in FIG. 6,
through-hole 58c comprises an additional notch 65, that provides a through-hole through
the lock case when a conventional cylinder housing 54c is mounted in it.
[0099] FIGs. 6 and 7A, 7B and 7C illustrate that the housing 54 may be mated to the through-hole
58 and/or mated to the shape of the through-hole, in the sense that a profile of the
housing 54 has substantially the same shape as the through-hole and/or in the sense
that, when the housing is mounted in the through-hole, a shape of at least part of
the housing in the through-hole substantially corresponds to the shape of the through-hole
58 so that the housing tightly fits into the through-hole 58.
[0100] Figs. 8A-C depicts various flow diagrams of methods for controlling an electronic
lock according to various embodiments of the invention.
[0101] Fig. 8A depicts a flow diagram wherein in a first step 180 the lock may transmit
at a predetermined intervals a signal comprising lock identifier, which may be a unique
identifier. A wireless connection between the lock and an electronic (trusted) device,
the electronic key, may be formed when the trusted device receives the signal comprising
the lock identifier (step 182). In step 184 an authentication procedure may be executed
between the lock and the trusted device. The authentication procedure may comprise
exchanging identifiers and/or authentication codes. In a further step 186 the lock
may monitor the distance between lock and the trusted device. In an embodiment, the
connection may be terminated if the electronic key is out of range or the electronic
key is terminating the connection (step 188). In another embodiment, the connection
may be terminated if the distance between the lock and the electronic key is or remains
larger than a predetermined distance x (step 190).If the device is within a predetermined
distance the electronic motor is controlled for driving the mechanical locking mechanism,
wherein the driving retracting a deadbolt of the lock (step 192).
[0102] Fig. 8B depicts a flow diagram wherein in a first step, the electronic motor is controlled
for driving the mechanical locking mechanism, the driving retracting a deadbolt of
the lock (step 192). In step 194 the connection may be terminated if the electronic
key is out of range or the electronic key is terminating the connection. In that case,
the electronic motor may be controlled for driving the mechanical locking mechanism,
the driving returning the lock to a fully locked state by extending the deadbolt (step
196).
[0103] Alternatively, during the retracting of the deadbolt, the user interface of the lock
may detect an interaction, e.g. somebody touching the user interface, while the distance
between the lock and the device is larger than predetermined second distance Z. In
that case, the state of the lock does not change, because the controller does not
enable initiation of the second phase if the electronic key is not within the predetermined
second distance (step 200).
[0104] Alternatively, during the retracting of the deadbolt, the a predetermined time U
has passed in which the distance between the lock and the device has been larger than
predetermined second distance Z (step 202). In that case, the electronic motor may
be controlled for driving the mechanical locking mechanism, the driving returning
the lock to a fully locked state by extending the deadbolt (step 204).
[0105] Fig. 8C depicts a flow diagram wherein in a first step, the electronic motor is controlled
for driving the mechanical locking mechanism, the driving fully retracting a deadbolt
of the lock (step 192). The electronic lock may determine that the distance between
the lock and the device may be smaller than predetermined second distance Z (step
206).
[0106] In that case, if the user interface of the lock detects an interaction, e.g. a user
touching the user interface, (step 208), the electronic motor may be controlled for
driving the mechanical locking mechanism, the driving retracting a latch bolt (step
210), in order to fully open the lock (step 212).
[0107] Alternatively, if the deadbolt of the lock is fully retraced and the distance between
the lock and the device may be smaller than predetermined second distance Z and if
a predetermined time V has passed without the user interface detecting an interaction
(step 214), in that case, the electronic motor may be controlled for driving the mechanical
locking mechanism, the driving returning the lock to a fully locked state by extending
the deadbolt (step 216).
[0108] Fig. 9 depicts a block diagram illustrating an exemplary data processing system that
may be used in a computing system as described with reference to Fig. 2.
[0109] As shown in Fig. 9, the data processing system 100 may include at least one processor
102 coupled to memory elements 104 through a system bus 106. As such, the data processing
system may store program code within memory elements 104. Further, the processor 102
may execute the program code accessed from the memory elements 104 via a system bus
106. In one aspect, the data processing system may be implemented as a computer that
is suitable for storing and/or executing program code. It should be appreciated, however,
that the data processing system 100 may be implemented in the form of any system including
a processor and a memory that is capable of performing the functions described within
this specification.
[0110] The memory elements 104 may include one or more physical memory devices such as,
for example, local memory 108 and one or more bulk storage devices 110. The local
memory may refer to random access memory or other non-persistent memory device(s)
generally used during actual execution of the program code. A bulk storage device
may be implemented as a hard drive or other persistent data storage device. The processing
system 100 may also include one or more cache memories (not shown) that provide temporary
storage of at least some program code in order to reduce the number of times program
code must be retrieved from the bulk storage device 110 during execution.
[0111] Input/output (I/O) devices depicted as an input device 112 and an output device 114
optionally can be coupled to the data processing system. Examples of input devices
may include, but are not limited to, a keyboard, a pointing device such as a mouse,
or the like. Examples of output devices may include, but are not limited to, a monitor
or a display, speakers, or the like. Input and/or output devices may be coupled to
the data processing system either directly or through intervening I/O controllers.
[0112] In an embodiment, the input and the output devices may be implemented as a combined
input/output device (illustrated in Fig. 9 with a dashed line surrounding the input
device 112 and the output device 114). An example of such a combined device is a touch
sensitive display, also sometimes referred to as a "touch screen display" or simply
"touch screen". In such an embodiment, input to the device may be provided by a movement
of a physical object, such as e.g. a stylus or a finger of a user, on or near the
touch screen display.
[0113] A network adapter 116 may also be coupled to the data processing system to enable
it to become coupled to other systems, computer systems, remote network devices, and/or
remote storage devices through intervening private or public networks. The network
adapter may comprise a data receiver for receiving data that is transmitted by said
systems, devices and/or networks to the data processing system 100, and a data transmitter
for transmitting data from the data processing system 100 to said systems, devices
and/or networks. Modems, cable modems, and Ethernet cards are examples of different
types of network adapter that may be used with the data processing system 100.
[0114] As pictured in Fig. 9, the memory elements 104 may store an application 118. In various
embodiments, the application 118 may be stored in the local memory 108, the one or
more bulk storage devices 110, or apart from the local memory and the bulk storage
devices. It should be appreciated that the data processing system 100 may further
execute an operating system (not shown in Fig. 9) that can facilitate execution of
the application 118. The application 118, being implemented in the form of executable
program code, can be executed by the data processing system 100, e.g., by the processor
102. Responsive to executing the application, the data processing system 100 may be
configured to perform one or more operations or method steps described herein.
[0115] In one aspect of the present invention, the data processing system 100 may represent
a controller as described herein. In one aspect of the present invention, the data
processing system 100 may represent an electronic key as described herein.
[0116] In another aspect, the data processing system 100 may represent a client data processing
system. In that case, the application 118 may represent a client application that,
when executed, configures the data processing system 100 to perform the various functions
described herein with reference to a "client". Examples of a client can include, but
are not limited to, a personal computer, a portable computer, a mobile phone, or the
like.
[0117] In yet another aspect, the data processing system x00 may represent a server. For
example, the data processing system may represent an (HTTP) server, in which case
the application x18, when executed, may configure the data processing system to perform
(HTTP) server operations.
[0118] Various embodiments of the invention may be implemented as a program product for
use with a computer system, where the program(s) of the program product define functions
of the embodiments (including the methods described herein). In one embodiment, the
program(s) can be contained on a variety of non-transitory computer-readable storage
media, where, as used herein, the expression "non-transitory computer readable storage
media" comprises all computer-readable media, with the sole exception being a transitory,
propagating signal. In another embodiment, the program(s) can be contained on a variety
of transitory computer-readable storage media. Illustrative computer-readable storage
media include, but are not limited to: (i) non-writable storage media (e.g., read-only
memory devices within a computer such as CD-ROM disks readable by a CD-ROM drive,
ROM chips or any type of solid-state non-volatile semiconductor memory) on which information
is permanently stored; and (ii) writable storage media (e.g., flash memory, floppy
disks within a diskette drive or hard-disk drive or any type of solid-state random-access
semiconductor memory) on which alterable information is stored. The computer program
may be run on the processor 102 described herein.
[0119] The terminology used herein is for the purpose of describing particular embodiments
only and is not intended to be limiting of the invention. As used herein, the singular
forms "a," "an," and "the" are intended to include the plural forms as well, unless
the context clearly indicates otherwise. It will be further understood that the terms
"comprises" and/or "comprising," when used in this specification, specify the presence
of stated features, integers, steps, operations, elements, and/or components, but
do not preclude the presence or addition of one or more other features, integers,
steps, operations, elements, components, and/or groups thereof.
[0120] The corresponding structures, materials, acts, and equivalents of all means or step
plus function elements in the claims below are intended to include any structure,
material, or act for performing the function in combination with other claimed elements
as specifically claimed. The description of embodiments of the present invention has
been presented for purposes of illustration, but is not intended to be exhaustive
or limited to the implementations in the form disclosed. Many modifications and variations
will be apparent to those of ordinary skill in the art without departing from the
scope and spirit of the present invention. The embodiments were chosen and described
in order to best explain the principles and some practical applications of the present
invention, and to enable others of ordinary skill in the art to understand the present
invention for various embodiments with various modifications as are suited to the
particular use contemplated.