WO2007092623A2 - Multiple wireless access points for wireless locksets - Google Patents

Multiple wireless access points for wireless locksets Download PDF

Info

Publication number
WO2007092623A2
WO2007092623A2 PCT/US2007/003583 US2007003583W WO2007092623A2 WO 2007092623 A2 WO2007092623 A2 WO 2007092623A2 US 2007003583 W US2007003583 W US 2007003583W WO 2007092623 A2 WO2007092623 A2 WO 2007092623A2
Authority
WO
WIPO (PCT)
Prior art keywords
wireless
access control
access
access point
wireless access
Prior art date
Application number
PCT/US2007/003583
Other languages
French (fr)
Other versions
WO2007092623A3 (en
Inventor
Mike Wolpert
Ray Bernard
Don Sturgis
David Kimmich
Original Assignee
Bnw Investments, Llc
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Bnw Investments, Llc filed Critical Bnw Investments, Llc
Publication of WO2007092623A2 publication Critical patent/WO2007092623A2/en
Publication of WO2007092623A3 publication Critical patent/WO2007092623A3/en

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W48/00Access restriction; Network selection; Access point selection
    • H04W48/16Discovering, processing access restriction or access information
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/20Individual registration on entry or exit involving the use of a pass
    • G07C9/27Individual registration on entry or exit involving the use of a pass with central registration
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W24/00Supervisory, monitoring or testing arrangements
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W74/00Wireless channel access, e.g. scheduled or random access
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W8/00Network data management
    • H04W8/26Network addressing or numbering for mobility support
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W88/00Devices specially adapted for wireless communication networks, e.g. terminals, base stations or access point devices
    • H04W88/08Access point devices

Definitions

  • the invention relates generally to wireless access control systems and, more particularly, to systems and methods for controlling and/or providing multiple wireless access points for wireless locksets.
  • a lockset e.g., keypad, card reader, etc.
  • Known wired lockets are expensive and complex to install because of a need to physically connect each lockset to a remote device by wiring. As such, there is a need for a more cost-effective and versatile access control system, such as a wireless access control system.
  • aspects of the present invention respectively are directed to a wireless access control system and methods of providing and/or controlling the same.
  • a wireless access control system includes: a switch; a plurality of wireless access points coupled to the switch and including a first wireless access point including a first wireless transceiver and a second wireless access point including a second wireless transceiver, the first wireless transceiver adapted to define a first coverage area, and the second wireless transceiver adapted to define a second coverage area; and a wireless device located within the first and second coverage area and having an identity code adapted to uniquely and wirelessly identify the wireless device to the plurality of wireless access points.
  • the wireless device rates the quality of the connection to the access control computer system and the wireless access points and downloads access control information from the first or second wireless access point based on the connection quality ratings.
  • the switch may be adapted to allow the wireless device to communicate wirelessly with the first wireless access point when the wireless device is located within the first coverage area.
  • the first wireless access point may be a primary access point of the wireless device.
  • the switch may be adapted to allow the wireless device to communicate wirelessly with the first wireless access point while the wireless device is moved from the second coverage area to the first coverage area.
  • the wireless device may be a wireless lockset.
  • the wireless lockset may be a self-contained battery-operated assembly adapted to be mounted to a door.
  • the self-contained battery-operated assembly may include a latching solenoid adapted to remain in one of a locked position or an unlocked position in an unpowered state.
  • the wireless lockset may include at least one of a magnetic stripe card reader, a smart card reader, or a proximity card reader.
  • the plurality of wireless access points may further include a third wireless access point including a third wireless transceiver adapted to define a third coverage area, the third coverage area overlapping a portion of the first coverage area and a portion of the second coverage area.
  • the wireless device may also be located within the third coverage area.
  • the switch may be coupled with each of the wireless access points via an Ethernet cable.
  • the wireless device may be a wireless portal controller coupled with at least one of an external magnetic stripe card reader or an external proximity card reader.
  • the wireless device may be a wireless input/output module coupled with a plurality of monitor contacts of a door, the wireless input/out module being adapted to notify one of the wireless access points upon closing and opening of the door.
  • a wireless access control system includes: a switch; a plurality of wireless access points coupled to the switch and including a first wireless access point including a first wireless transceiver and a second wireless access point including a second wireless transceiver, the first wireless transceiver adapted to define a first coverage area, and the second wireless transceiver adapted to define a second coverage area; and a wireless device located within the second coverage area and having an identity code adapted to uniquely and wirelessly identify the wireless device to the plurality of wireless access points.
  • the switch is adapted to allow the wireless device to communicate wirelessly with the first wireless access point when the wireless device is located within the first coverage area.
  • a wireless access control system includes: a switch; a plurality of wireless access points coupled to the switch and including a first wireless access point including a first wireless transceiver and a second wireless access point including a second wireless transceiver, the first wireless transceiver adapted to define a first coverage area, and the second wireless transceiver adapted to define a second coverage area; and a wireless device located within the second coverage area and having an identity code adapted to uniquely and wirelessly identify the wireless device to the plurality of wireless access points.
  • the switch is adapted to allow, the- wireless device to communicate wirelessly with the first wireless access point while the wireless device is moved from the second coverage area to the first coverage area.
  • a method for operating a wireless access control system including: a switch; a plurality of wireless access points coupled to the switch and including a first wireless access point including a first wireless transceiver and a second wireless access point including a second wireless transceiver, the first wireless transceiver adapted to define a first coverage area, and the second wireless transceiver adapted to define a second coverage area overlapping a portion of the first coverage area; and a wireless device located within the overlapped portion of the first coverage area and having an identity code adapted to uniquely and wirelessly identify the wireless device to the plurality of wireless access points.
  • the method includes: receiving at the first wireless access point a first signal from the wireless device; receiving at the second wireless access point a second signal from the wireless device; measuring at the first wireless access point a first signal strength of the first signal; measuring at the second wireless access point a second signal strength of the second signal; sending the first signal strength by the first wireless access point to the second wireless access point; sending the second signal strength by the second wireless access point to the first wireless access point; determining at the first wireless access point and the second wireless access point a stronger signal strength of the first signal strength and the second signal strength; selecting, if the first signal strength is determined to be the stronger signal strength, (e.g., by the first wireless access point) the first wireless access point as a primary access point corresponding to the wireless device; and selecting, if the second signal strength is determined to be the stronger signal strength, (e.g., by the second wireless access point) the second wireless access point as a primary access point corresponding to the wireless device.
  • a method for operating a wireless access control system including: a switch; a plurality of wireless access points coupled to the switch and including a first wireless access point including a first wireless transceiver and a second wireless access point including a second wireless transceiver, the first wireless transceiver adapted to define a first coverage area, and the second wireless transceiver adapted to define a second coverage area overlapping a portion of the first coverage area; and a wireless device located within the overlapped portion of the first coverage area and having an identity code adapted to uniquely and wirelessly identify the wireless device to the plurality of wireless access points.
  • the method includes: receiving at the wireless device a first signal from the first wireless access point; receiving at the wireless device a second signal from the second wireless access point; measuring at the wireless device a first signal strength of the first signal; measuring at the wireless device a second signal strength of the second signal; determining at the wireless device a stronger signal strength of the first signal strength and the second signal strength; selecting, if the first signal strength is determined to be the stronger signal strength, the first wireless access point as a primary access point corresponding to the wireless device; and selecting, if the second signal strength is determined to be the stronger signal strength, the second wireless access point as a primary access point corresponding to the wireless device.
  • FIG. 1 shows an embodiment of a wireless access control system.
  • FIG. 2 shows another embodiment of a wireless access control system.
  • FIG. 3 is a block diagram of a wireless access control system according to an embodiment of the present invention.
  • FIG. 4 shows the unsecured side of a battery powered wireless lockset of a wireless access control system according to an embodiment of the present invention.
  • FIG. 4A shows a block diagram of a wireless lockset of a wireless access control system according to an embodiment of the present invention.
  • FIG. 5 shows a cylindrical lockset of a wireless access control system according to an embodiment of the present invention.
  • FIG. 6 shows a mortise lockset of a wireless access control system according to an embodiment of the present invention.
  • FIG. 7 is a block diagram of a wireless portal controller of a wireless access control system according to an embodiment of the present invention.
  • FIG. 8 is a block diagram of a wireless input/output module of a wireless access control system according to an embodiment of the present invention.
  • a wireless access control system is referred to as an access control system that utilizes suitable wireless techniques as the communication path to enable one or more wireless access points to send and receive data and commands to and from a multiplicity of wireless locksets (e.g., battery operated wireless locksets).
  • Each of the locksets may contain a magnetic stripe, proximity card reader such as an RPID reader, smart card reader, or other "what you have” detector, a biometric reader or other physical identification (“who you are”) detector, a twelve-key keypad or other input device for entry of knowledge based data or code (what you know"), or some combination of these readers and input devices.
  • a wireless access point is connected to a Local Area Network (LAN) in order to communicate with a suitable remote device, e.g., a computer on the same LAN.
  • LAN Local Area Network
  • the LAN is either wired (e.g., Ethernet) or wireless (WLAN) (e.g., 802.1 Ig) or a combination of wired and wireless network links, hi other embodiments, other types of secure networks are used.
  • the computer can interface with the wireless access point via a web browser, such as Microsoft Internet Explorer, thereby eliminating the need to install any custom software on the computer.
  • access control software in accordance with an embodiment of the present invention resides in the wireless access point. This access control software should look like and operate like a website so that only minimal training is required to use the system.
  • the system includes an access control database.
  • the access control database includes entries for each individual that is allowed access by the access control system, each location that is secured by the access control system, and each access point and each lockset in the access control system.
  • entries for individuals in the access control database may include any of the following information: first and last name, title, access card identification numbers, locations the person has access to, individual locksets the person can unlock, times/days during which the person should have access to the location/lockset, the person's work schedule, and any other parameter that is necessary or helpful to the access control system.
  • Entries for locations may include, for example, which locksets control access to the location and from what other location do the locksets control access.
  • one strategically located wireless access point 100 can communicate with a plurality of wireless devices 101 (e.g., wireless locksets) through a wireless connection 104.
  • the wireless data connection 104 is an RF connection that is encrypted with a proprietary encryption code.
  • the wireless data connection 104 is a known type of wireless data connection, such as 802.1 Ix, or future developed type of wireless connection.
  • the wireless data connection 104 is secured by commercially available encryption, proprietary encryption or other security method.
  • the wireless access point 100 also communicates with other wireless devices (not shown) that are part of the access control system. Additionally, the wireless access points may be connected by conventional wiring to non-wireless locksets or other access control system devices.
  • a wireless portal controller is supplied that provides an interface between legacy locksets and/or access devices.
  • the wireless portal controller communicates with the access point in the same basic way as the wireless access point except that it does not include a locking mechanism.
  • the ⁇ wireless portal controller includes an interface connected, typically wired, to the legacy device; the interface receives data received by the legacy device (such as a card reader) and passes it to the wireless portal controller for processing (e.g., making an access decision); the interface then receives access decision instructions from the wireless portal controller and sends those instructions to the legacy device (such as an electronic lock).
  • the legacy device may be a unitary device (e.g., combination reader and lockset) or it may consist of separate physical devices (e.g., separate reader and lockset).
  • the wireless access point 100 is connected to a computer 102 that coordinates the access control system by an Ethernet connection 103.
  • the wireless access point 100 may be connected to the computer 102 by any other secure network connection, such as a secure wireless connection, serial connection such as an RS -232 or RS-485 connection.
  • computer 102 and wireless access noint 100 each are connected to wireless transceivers (not shown) through a wired connection and computer 102 and wireless access point 100 communicate using the wireless connection between the wireless transceivers.
  • the wireless transceivers and the wireless access points are powered using uninterruptible power supplies or other form of temporary power supply in the case of the loss of main power.
  • additional access points 200 are connected to the system, including the coordination computer 202, via a secure network (e.g., commercially available Ethernet switch 204 in the embodiment shown). These additional access points 200 communicate with additional wireless locksets 201 located in other areas of a building.
  • a secure network e.g., commercially available Ethernet switch 204 in the embodiment shown.
  • a wireless access point 100, 200 stores all or part of the access control database and utilizes any suitable wireless methods as the communication path to send and receive data and commands to and from a multiplicity of battery operated wireless locksets 101, 201.
  • the wireless access point 100, 200 communicates with a maximum of 64 wireless locksets 101, 201 within a radius of approximately 150 feet.
  • the maximum number of wireless locksets 101, 201 is 128 or some higher limit.
  • the maximum number of locksets 101, 201 is affected by hardware power, software limitations, wireless bandwidth limitations, or other system or environmental constraints.
  • the range between the access point 100, 200 and the locksets 101, 201 is 750 feet.
  • the range between the access point 100, 200 and the locksets 101, 201 is higher than 750 feet, depending on factors such as wall and/or another obstruction density, new or different wireless technology, interference levels, and other system and environmental factors.
  • Access control software resides in the wireless access point 100, 200 and can be connected to a Local Area Network (LAN) to communicate with any computer on the same LAN. In some embodiments, this software interfaces with a computer through a web browser which eliminates the need for installing any custom software on the computer.
  • LAN Local Area Network
  • This software feels, looks, and operates like a website so that only minimal training is required to use the system. A protected password or any other security measure can be used to prohibit unauthorized access to the data.
  • the access control software provides the ability to access the entries in the access control database, such as identifying each cardholder by first and last name, the individual wireless locksets 101, 201 and all other parameters by user defined names.
  • Wireless lockset door actions and cardholder transactions e.g., who went where when
  • the access point 100, 200 stores a plurality of transactions received from the locksets 101, 201. The oldest transactions can be overwritten when the transaction storage becomes full.
  • the software of the access point 100, 200 should be capable of printing listings of all suitable database files, e.g., cardholder files, lockset files, etc.
  • the wireless access point 100, 200 can store a plurality of cardholder records and distribute these records to the appropriate wireless locksets as required. As such, the access point 100, 200 operates in concert with the wireless locksets to control access of secure regions.
  • the design of a plurality of wireless access points 200 enables multiple access points to operate in the same system.
  • this design accomplishes its task by identifying one access point as the master and the others as slaves. That is, an operator, via the browser, can communicate with the master only.
  • the master downloads the access control database files to the slaves through an Ethernet switch 204 as depicted in FIG. 2 or possibly via the wireless network when wireless access points 200 are within wireless range of each other.
  • the slaves then send all lockset door actions and cardholder transactions received from their communicating wireless locksets 201 to the master access point.
  • the computer 202 acts as the master and all of the access points 200 act as slaves to the computer 202.
  • one of the access points 200 acts as the master with respect to some functionality (e.g., coordination of communication between wireless devices 201 in range of multiple access points 200, discussed below) and the computer 202 acts as the master with respect to some other functionality (e.g., central storage and distribution of access control database information):
  • the access points 200 operate in a peer-to-peer arrangement with the computer 202 managing communication with operators and assisting coordination of the access points 200.
  • multiple access points 200 can operate in an adaptive mode. That is, the access points 200 automatically compensate for changes in the wireless environment by sampling the signal strength from each lockset 201. If two access points 200 are receiving signals from the same lockset 201, the access point 200 receiving the stronger signal makes it a part of its lockset list and informs the other access point 200 of its action. This technique will help simplify the system installation since it informs the installer of communication problems. Using this information the installer may be able to relocate a wireless access point 200 to acquire stronger signals from some locksets.
  • FIG. 3 is a block diagram of a wireless access control system according to an embodiment of the present invention.
  • the wireless access control system includes a plurality of wireless access points 315 and a switch 319.
  • Each of the wireless access points 315 is for wirelessly connecting to one or more wireless devices 312, for example, one or more wireless locksets. Exemplary embodiments of locksets that can be used as the wireless devices 312 of FIG. 3 will be described in more detail below.
  • a wireless device 312 includes an identity code that uniquely identifies the wireless device 312 to the wireless access points 315.
  • Each wireless access point 315 includes a wireless transceiver 314 that defines a geographical coverage area.
  • the wireless access points 315 handle radio-channel setup and frequency hopping to provide further security.
  • the switch 319 acts like a normal switching node, and can additionally provide all the functionality needed to handle wireless access points 315.
  • one access point 315 is identified as the master and the others as slaves. That is, an operator, via the browser, can communicate with the master only.
  • the master downloads the access control database files to the slaves through an Ethernet switch 319 as depicted in FIG. 3.
  • the slaves send all lockset door actions and cardholder transactions received from their communicating wireless locksets 312 to the master access point.
  • coverage areas 320A, 320B are shown for the two shown wireless access points 315 as solid circles.
  • a third coverage area 320C shown as a dashed circle.
  • the dashed coverage area 320C is for a third access point (not shown) whose coverage area overlaps the coverage areas of the shown access points such that some wireless devices 312 are within the coverage areas of two or more access points 315.
  • the system coordinates and identifies, for each of the wireless devices 312 within the coverage areas of two or more access points 315, which of the access points 315 will communicate with the wireless device 312.
  • the first, second, and third coverage areas partially overlap with each other, in many implementations, there may be a number of wireless access points with coverage areas that do not overlap with the coverage areas of any other wireless access points.
  • The' determination of which wireless access point 315 should be the master is initiated and/or controlled by either the wireless device 312 or the access points 315.
  • the access points 315 automatically compensate for changes in the wireless environment by sampling the signal strength from each wireless device 312. That is, if two access points 315 are receiving signals from the same wireless device 312, the access point 315 receiving the stronger signal is determined to be the primary access point for the wireless device 312 and that access point makes it a part of its wireless device list (e.g., its lockset list) and informs the other access point 315 of its action.
  • the wireless device 312 scans the broadcast control channels of a plurality of neighboring wireless access points 315, and forms a list of best access point candidates for being a possible primary access point, based on the received signal strength. This information may be periodically passed back to the wireless access points 315 to determine when a handover should take place.
  • the access point 315 that has the strongest signal with a particular wireless device 312 may not result in the fastest response to the wireless device 312 if the access point 315 with the strongest signal is the primary access point for many more wireless devices 312 than another access point 315 that has only a slightly weaker signal to the wireless device 312.
  • the system e.g., the coordination computer 330 or the master access point
  • the determination of which access point 315 to connect to is determined by the wireless device 312.
  • the wireless device rather than making a choice between several access points as to which access point to connect to, the wireless device simply connects to the first access point that it finds when searching for wireless signals from access points. If the' wireless device cannot connect to this access point, or if it loses it connection to the access point, the wireless device searches for another access point and repeats the process by connecting to the first access point that is then finds.
  • the wireless device 312 is a mobile device (e.g., a proximity reader or an RFID reader) that can be moved from one geographical area to another geographical area.
  • the wireless access points 315 also handle handovers of wireless access points 315 as the mobile device 312 moves from one access point's coverage area (e.g., 320A) to another access point's coverage area (e.g., 320B).
  • a handover (or handoff) mechanism is a mechanism for switching an ongoing communication session on a mobile device (e.g., wireless device 312) from one access point (e.g., access point 315) to another access point.
  • Handovers can be initiated and/or controlled by either the mobile device or the wireless access points 315 (as a means of traffic load balancing).
  • the mobile device e.g., wireless device 312 scans the broadcast control channels of a plurality of neighboring wireless access points 315, and forms a list of best access point candidates for possible handover, based on the received signal strength. This information may be periodically passed back to the wireless access points 315 to determine when a handover should take place.
  • a handover technique (whether initiated and/or controlled by either the mobile device 312 or the wireless access points 315) is used to determine which should be the secondary wireless access point 315 in case the primary access point 315 fails or otherwise loses its connection to the wireless device 312.
  • the wireless lockset is a self-contained battery-operated assembly 400 that will mount on a door with standard mortise or cylindrical lock cutouts.
  • the assembly does not require any additional drilling or modifications Io the door for mounting and no wires or other physical connections are required outside the assembly.
  • the wireless assembly can have a portion of the unit on the secure side of the door as long as it does not require any modifications to the existing door cutouts.
  • FIG. 4A A block diagram of the various components of a wireless lockset 400 according to some embodiments of the invention is shown in FIG. 4A.
  • locksets are typically provided in two basic configurations: cylindrical locksets (where the lockset is inserted in a cylindrical hole through the door) (see, for example, lockset 500 in FIG. 5) and mortise locksets (where the lockset is inserted in a hole cut into or mortised in the edge of the door) (see, for example, lockset 600 in FIG. 6).
  • the wireless lockset provides an electromechanical mechanism 409 to unlock the door. In existing card reader controlled locksets this is accomplished by a low power solenoid or by a spring and a miniature motor (e.g., a motor used with electronically controlled model airplanes). Typically, the goal is to select the method that consumes the least amount of power, thereby maximizing life of battery 403.
  • the door monitor and unlock electronics 407 detect and report that:
  • This module controls the release of the locking mechanism. Relocking of the mechanism may be programmed by the user to:
  • a switch 408 or some other technique is provided to detect when the wireless lockset housing is being opened or tampered with. An access point message is created indicating this breach.
  • the lockset can accommodate a reader 401 such as a magnetic stripe card reader, smart card reader or a proximity card reader.
  • a reader 401 such as a magnetic stripe card reader, smart card reader or a proximity card reader.
  • Magnetic stripe reader cartridges are available from manufacturers specifically for integrating into an original equipment manufacturer's (OEM) product. They are available as swipe or insertion readers. Smart card readers are similarly available.
  • a proximity card, such as RFID cards, can be a "proximity reader on a chip" for use by
  • the processor and memory 405 provide the control center for the wireless lockset.
  • the processor interfaces with the other elements of the wireless lockset to coordinate each operation.
  • reader 401 is connected to processor and memory 405 through reader interface 404.
  • Processor and memory 405 are connected to wireless electronics and antenna 402 to communicate wirelessly with other wireless components of the system, such as wireless access points.
  • all or some of the. wireless electronics are included in the processor and memory 405.
  • a keypad 406 is connected to the processor and memory 405
  • the lockset should have sufficient memory capacity to store the access information from the access control database (e.g., card number, PIN, time access privileges) for a plurality of cards requiring access to the door.
  • the lockset makes the access decision for a card presented to the lockset based on the access information stored in the lockset memory for that card.
  • the data for all cards in the system is initially downloaded in bulk from the primary access point for the lockset. The same bulk download is performed for each of the locksets in the entire system. Accordingly, in this system architecture, the access control database, or at least substantial portions of it, resides simultaneously at the coordination computer, the access points and the wireless locksets.
  • the lockset does not communicate with the access point after each access decision (e.g., card swipe), but rather only communicates at periodic intervals.
  • the transaction history since the last communication is uploaded to the access point and updates to the access control database or other system information may be downloaded to the lockset.
  • This system architecture has several advantages. First, it reduces power consumption by the lockset because the lockset does not turn on its wireless transceiver when it makes access decisions based on the access control database entries stored in its memory. This is of particular importance because the typical lockset is a battery powered wireless lockset. Second, because the locksets generally only communicate with the access points for the periodic communication, the load on both the access ooint's wireless network bandwidth and the access point's processor are reduced. Last, the lockset can inake an access decision faster because its processor makes the access decision rather than forwarding an access decision request to an access point and wait for the access point to return an access decision command to the lockset.
  • the access control database is simultaneously located in three separate areas of the system: a central computer (or network of computers), the wireless access points, and the local wireless devices such as the wireless locksets.
  • the entire access control database is not stored together in any of the access points, but collectively the access points contain the entire access control database and each individual access point contains the entire portion of the access control database needed for all of the access control devices communicating with that access point.
  • the access points have information regarding what portions of the access control database is located on other access points and an identification or pointer to the access points that store these portions of the access control database.
  • each access point or at least one access point contains the entire access control database.
  • the entire access control database is not stored together in any of the individual access control devices (e.g., a wireless lockset), but collectively the various access control devices contain the entire access control database and each individual access control device contains the portion of the access control database needed for the decisions that need to be made by the access control devices. In other embodiments, each access control device or at least one access control device contains the entire access control database.
  • a feature of this three tiered database architecture is that any of the tiers can operate without compromise independently even if one or both of the other tiers is not operational of losses communication with one or both of the other tiers.
  • One example of many instances of losses of communication is in the case of a loss nfnmi/w either the central computer or one or more of the wireless access points.
  • the lockset will then update its access control information with the access control information sent by the access point and makes an access decision in the same way as if the lockset had not had to update the access control information. If updated access control information for the new individual was not in the access point, the lockset would process the access request based on the access control information it has (e.g., deny access in this example).
  • the lockset immediately sends an access decision request to the access point and waits for a response.
  • the access point when it receives such a request, immediately checks its access control database and sends an access control decision to the lockset, which unlocks or does not unlock the lockset according to the received access control decision.
  • the access point will transmit to the lockset the current access control database information for the individual that has just sought access from the lockset.
  • this update to the lockset access control information is done after the lockset has resolved the individual's access request and as a separate transaction from to the access request process.
  • the- wireless locksets and any other battery powered device in the system can monitor their battery power. If a device monitors that its battery power is below a certain level, it immediately sends a signal to an access point, which relays the warning to the central computer or network so that a system operator is notified and action can be taken.
  • the access control information stored in individual lockset must be periodically updated. This is accomplished by the locksets having a "learn mode.” As discussed above, in some embodiments, the access control database is initially downloaded in bulk to each of the locksets.
  • only a portion of the access control database is downloaded or stored in" the lockset, based on the likelihood that particular access control information will be needed by that lockset.
  • initially the lockset has no access control information (card information) stored in its memory.
  • the lockset when a card is first presented to the lockset's reader or a card is presented to the lockset's reader that is-not in the access control information stored in the lockset's memory, the lockset sends the card's number and PIN entry, if required, to the wireless access point.
  • the access point searches its memory to see if that card is authorized for access at this lockset at this time.
  • the access point then returns to the lockset a "Grant Access” or "Deny Access” response along with all access information for that card.
  • the access point After the access point returns the "Grant Access” or “Deny Access” response to the lockset, giving the lockset enough time to act on the access response, the access point sends a separate communication to the lockset with the access control information for the card.
  • the access decision response and access control information for the card are sent in the same communication to the lockset.
  • the lockset stores the access control information for this card data so that it can make all future access decisions for that card.
  • a lockset populates its memory with new card data each time a "first time" card is presented.
  • the memory contains card data for only those cards that "need" to have access and not data for cards that have access but have never appeared.
  • the lockset when a card is first presented to the lockset's reader or a card is presented to the lockset's reader that is not in the access control information stored in the lockset's memory, the lockset sends the card's number to a wireless access point.
  • the access point searches its memory to see if it has access control information for that card. If it does, it sends the information to the lockset.
  • the lockset stores the access control information for this card and makes an immediate access decision. The access control information is then used for future access decisions for that card until the access control information is updated as described above with respect to various other embodiments.
  • the Learn Mode described above offers the lockset the ability to appear to accommodate more cards than the memory can hold. If the lockset card memory is full to capacity (e.g., 5000 cards, but this number can vary based on the amount of memory installed in the lockset) and a "first time" card is presented, the learning process, as described above, will follow, hi this case, the lockset grants or denies access as instructed by the access point but ignores the card data since there is no place to store it. This card will remain a "first time” card and the access point will continue to make the access decisions for this and any other "first time” cards until the lockset card memory is below full capacity.
  • the lockset card memory is full to capacity (e.g., 5000 cards, but this number can vary based on the amount of memory installed in the lockset) and a "first time” card is presented, the learning process, as described above, will follow, hi this case, the lockset grants or denies access as instructed by the access point but ignores the card data since there is no place to store it. This
  • the lockset when an individual seeks access from a lockset and the access control information stored in the lockset's memory results in an access denial, the lockset still sends the card's number and PIN entry, if required, to the wireless access point to confirm the denial of access. This is done because the access control information for the individual stored in the lockset memory may be out of date and more current information in the access point would allow entry.
  • the lockset does not send an access request to the access point when its local access control information indicates a denial of entry until access has been requested and denied for an individual a predetermined number of times.
  • Another way to handle the memory-full situation or otherwise reduce the size of the access control information stored in a lockset is by means of a "least recently used" method. For example, when the lockset receives data for a "first time” card it locates a card stored in the card file memory that has not been used for a long time - "least recently used”. The data for this card is deleted and is replaced with the data for the current card. The "old” card becomes a "first time” card the next time it appears at the lockset.
  • a "fallback" access control method may be employed when a lockset temporarily loses transmission with the wireless access point and is unable to receive data on a "first time” card.
  • the lockset senses that it has lost communications with the access point it can be instructed to read only a prearranged subset of characters, e.g., a facility code, from "first time” cards. This facility code is identical on all cards for a facility. So, during lost communications, the lockset will grant access to any "first time” card that has the system's facility code.
  • a facility uses a number of facility codes.
  • the lockset can be programmed with multiple (e.g., 8) facility codes, so that the cards of related facilities will also operate the lockset in this manner.
  • the battery powered lockset is equipped with a latching solenoid.
  • the latching solenoid does not have a "default" state that it automatically goes into when power is not supplied, but rather may remain in either the locked or unlocked position without application of power. In the latching solenoid, the application of power switches the lockset between the locked and unlocked state and power does not need to be applied to the solenoid to maintain the lockset in either the locked or unlocked states.
  • a "card transaction message" (what card was granted/denied access and time of transaction) can be stored in local transaction memory and transmitted, on request, to the wireless access point for reporting purposes. This same memory can also store all other events that have occurred unrelated to card transactions.
  • the lockset memory can store a plurality of transactions.
  • the lockset processor can send a message to the access point indicating when the transaction memory becomes 80% full. This can cause the access point to request the transactions from the lockset.
  • the wireless electronics and antenna are made to be an integral part of the wireless lockset.
  • any suitable batteries e.g., AA size batteries
  • the batteries for the wireless lockset provide sufficient power for approximately 500,000 unlocking operations. The number of batteries required will be established during the design phase.
  • a battery compartment door on the lockset secured by a security screw, provides a method for replacing (changing) the batteries without removing the lockset from the door.
  • a switch or some other technique is provided to detect when the battery compartment door has been opened or the battery compartment has been removed. An battery tamper message is created indicating this breach.
  • the basic design concept for the wireless lockset offers the ability to provide two ancillary products that will expand the functionality of the basic system with minimal additional design effort. Each of these is described below.
  • portal installations where a lockset simply will not work — glass doors, turnstiles, pedestrian and vehicle sates. Or a facility may already have some doors equipped with a card reader and an electric strike or electromagnetic lock. In these cases a wireless portal controller can be used.
  • the wireless portal controller 700 can be composed of a subset of components from the wireless lockset.
  • the reader 701 is now an external device; however, it still provides the same electrical signals as the reader modules described above.
  • the reader 701 connects to the processor and memory 706 through reader interface electronics 705.
  • Wireless electronics and antenna 704 and tamper switch 707 similar to wireless electronics and antenna 402 and switch 408 are also included. .
  • the commercial lockset and the electromechanical lock release mechanism have been removed.
  • Unlocking of the portal is controlled by a set of relay contacts 708 provided by the door monitor and unlock electronics 702. When the portal is to be unlocked these contacts merely provide a closed circuit (or open circuit depending on the design of the external locking device) with an external source of power to the external locking device.
  • the door monitor and exit request functions are external contact closures 703 similar to commercial lockset contacts.
  • the controller 700 can be housed in a simple electronic enclosure with no limiting size restrictions. Since the external reader 701 and portal locking device require power to operate, the rechargeable batteries can be eliminated and replaced with an external power source 709.
  • the wireless input/output module 800 can provide a set of relay contacts 801 that would provide a closed circuit (or .open circuit depending on the design of the external locking device) between an external power source and the door locking device. This same module could also monitor the "open” and "closed” state of the door by means of door monitor contacts mounted on the door. [0099] Since there are no requirements for interfacing to a reader, the wireless input/output module is an even simpler module than the portal controller 700. In other respects, processor and memory 804, wifeless electronics and antenna 803, and tamper switch 806 are similar to their respective components in portal controller 700.
  • the module 800 has two sets of relay contacts 801 and accommodates two sets of remote contact closures 802, connected to processor and memory 804 through output relays and contact monitors 805. In many embodiments four (4) sets of each or more. are included.
  • the input/output module 800 can be housed in the same electronic enclosure used for the portal controller 700.
  • the rechargeable batteries can be eliminated and replaced with an external power source.

Abstract

A wireless access control system. In some embodiments, the system includes: a switch; a plurality of wireless access points coupled to the switch and including a first wireless access point including a first wireless transceiver and a second wireless access point including a second wireless transceiver, the first wireless transceiver adapted to define a first coverage area, and the second wireless transceiver adapted to define a second coverage area; and a wireless device located within the second coverage area and having an identity code adapted to uniquely and wirelessly identify the wireless device to the plurality of wireless access points. The wireless device rates the quality of the connection to the access control computer system and the wireless access points and downloads access control information from the first or second wireless access point based on the connection quality ratings.

Description

MULTIPLE WIRELESS ACCESS POINTS FOR WIRELESS LOCKSETS
CROSS-REFERENCE TO RELATED APPLICATION^)
[00011 This application claims priority to and the benefit of U.S. Provisional Patent Application Serial Number 60/772,176, filed on February 9, 2006, and U.S. Provisional Patent Application Serial Number 60/814,129, filed on June 16, 2006, the entire contents of which are incorporated herein by reference.
FIELD OF THE INVENTION
[0002] The invention relates generally to wireless access control systems and, more particularly, to systems and methods for controlling and/or providing multiple wireless access points for wireless locksets.
BACKGROUND OF THE INVENTION
[0003] It is known that a lockset (e.g., keypad, card reader, etc.) on a door can be used to control access to a secure region. Known wired lockets are expensive and complex to install because of a need to physically connect each lockset to a remote device by wiring. As such, there is a need for a more cost-effective and versatile access control system, such as a wireless access control system.
SUMMARY OF THE INVENTION
[0004] Aspects of the present invention respectively are directed to a wireless access control system and methods of providing and/or controlling the same.
[0005] In an embodiment of the present invention, a wireless access control system includes: a switch; a plurality of wireless access points coupled to the switch and including a first wireless access point including a first wireless transceiver and a second wireless access point including a second wireless transceiver, the first wireless transceiver adapted to define a first coverage area, and the second wireless transceiver adapted to define a second coverage area; and a wireless device located within the first and second coverage area and having an identity code adapted to uniquely and wirelessly identify the wireless device to the plurality of wireless access points. The wireless device rates the quality of the connection to the access control computer system and the wireless access points and downloads access control information from the first or second wireless access point based on the connection quality ratings.
[0006] The switch may be adapted to allow the wireless device to communicate wirelessly with the first wireless access point when the wireless device is located within the first coverage area.
[0007] The first wireless access point may be a primary access point of the wireless device.
[0008] The switch may be adapted to allow the wireless device to communicate wirelessly with the first wireless access point while the wireless device is moved from the second coverage area to the first coverage area.
[0009] The wireless device may be a wireless lockset.
[0010] The wireless lockset may be a self-contained battery-operated assembly adapted to be mounted to a door.
[0011] The self-contained battery-operated assembly may include a latching solenoid adapted to remain in one of a locked position or an unlocked position in an unpowered state.
[0012] The wireless lockset may include at least one of a magnetic stripe card reader, a smart card reader, or a proximity card reader.
[0013] The plurality of wireless access points may further include a third wireless access point including a third wireless transceiver adapted to define a third coverage area, the third coverage area overlapping a portion of the first coverage area and a portion of the second coverage area. The wireless device may also be located within the third coverage area. - [0014] The switch may be coupled with each of the wireless access points via an Ethernet cable.
[0015] The wireless device may be a wireless portal controller coupled with at least one of an external magnetic stripe card reader or an external proximity card reader.
[0016] The wireless device may be a wireless input/output module coupled with a plurality of monitor contacts of a door, the wireless input/out module being adapted to notify one of the wireless access points upon closing and opening of the door.
[0017] In other embodiments of the present invention, a wireless access control system includes: a switch; a plurality of wireless access points coupled to the switch and including a first wireless access point including a first wireless transceiver and a second wireless access point including a second wireless transceiver, the first wireless transceiver adapted to define a first coverage area, and the second wireless transceiver adapted to define a second coverage area; and a wireless device located within the second coverage area and having an identity code adapted to uniquely and wirelessly identify the wireless device to the plurality of wireless access points. The switch is adapted to allow the wireless device to communicate wirelessly with the first wireless access point when the wireless device is located within the first coverage area. [0018] In other embodiments of the present invention, a wireless access control system includes: a switch; a plurality of wireless access points coupled to the switch and including a first wireless access point including a first wireless transceiver and a second wireless access point including a second wireless transceiver, the first wireless transceiver adapted to define a first coverage area, and the second wireless transceiver adapted to define a second coverage area; and a wireless device located within the second coverage area and having an identity code adapted to uniquely and wirelessly identify the wireless device to the plurality of wireless access points. The switch is adapted to allow, the- wireless device to communicate wirelessly with the first wireless access point while the wireless device is moved from the second coverage area to the first coverage area.
[0019] In other embodiments of the present invention, a method is for operating a wireless access control system including: a switch; a plurality of wireless access points coupled to the switch and including a first wireless access point including a first wireless transceiver and a second wireless access point including a second wireless transceiver, the first wireless transceiver adapted to define a first coverage area, and the second wireless transceiver adapted to define a second coverage area overlapping a portion of the first coverage area; and a wireless device located within the overlapped portion of the first coverage area and having an identity code adapted to uniquely and wirelessly identify the wireless device to the plurality of wireless access points. The method includes: receiving at the first wireless access point a first signal from the wireless device; receiving at the second wireless access point a second signal from the wireless device; measuring at the first wireless access point a first signal strength of the first signal; measuring at the second wireless access point a second signal strength of the second signal; sending the first signal strength by the first wireless access point to the second wireless access point; sending the second signal strength by the second wireless access point to the first wireless access point; determining at the first wireless access point and the second wireless access point a stronger signal strength of the first signal strength and the second signal strength; selecting, if the first signal strength is determined to be the stronger signal strength, (e.g., by the first wireless access point) the first wireless access point as a primary access point corresponding to the wireless device; and selecting, if the second signal strength is determined to be the stronger signal strength, (e.g., by the second wireless access point) the second wireless access point as a primary access point corresponding to the wireless device.
[0020] In yet other embodiments of the present invention, a method is for operating a wireless access control system including: a switch; a plurality of wireless access points coupled to the switch and including a first wireless access point including a first wireless transceiver and a second wireless access point including a second wireless transceiver, the first wireless transceiver adapted to define a first coverage area, and the second wireless transceiver adapted to define a second coverage area overlapping a portion of the first coverage area; and a wireless device located within the overlapped portion of the first coverage area and having an identity code adapted to uniquely and wirelessly identify the wireless device to the plurality of wireless access points. The method includes: receiving at the wireless device a first signal from the first wireless access point; receiving at the wireless device a second signal from the second wireless access point; measuring at the wireless device a first signal strength of the first signal; measuring at the wireless device a second signal strength of the second signal; determining at the wireless device a stronger signal strength of the first signal strength and the second signal strength; selecting, if the first signal strength is determined to be the stronger signal strength, the first wireless access point as a primary access point corresponding to the wireless device; and selecting, if the second signal strength is determined to be the stronger signal strength, the second wireless access point as a primary access point corresponding to the wireless device.
BRIEF DESCRIPTION OF THE DRAWINGS
[0021] The accompanying drawings, together with the specification, illustrate exemplary embodiments of the present invention, and, together with the description, serve to explain the principles of the present invention.
[0022] FIG. 1 shows an embodiment of a wireless access control system.
[0023] FIG. 2 shows another embodiment of a wireless access control system.
[0024] FIG. 3 is a block diagram of a wireless access control system according to an embodiment of the present invention. [0025] FIG. 4 shows the unsecured side of a battery powered wireless lockset of a wireless access control system according to an embodiment of the present invention.
[0026] FIG. 4A shows a block diagram of a wireless lockset of a wireless access control system according to an embodiment of the present invention.
[0027] FIG. 5 shows a cylindrical lockset of a wireless access control system according to an embodiment of the present invention.
[0028] FIG. 6 shows a mortise lockset of a wireless access control system according to an embodiment of the present invention.
[0029] FIG. 7 is a block diagram of a wireless portal controller of a wireless access control system according to an embodiment of the present invention.
[0030] FIG. 8 is a block diagram of a wireless input/output module of a wireless access control system according to an embodiment of the present invention.
DETAILED DESCRIPTION OF THE INVENTION
[0031] In the following detailed description, certain exemplary embodiments of the present invention are shown and described, by way of illustration. As those skilled in the art would recognize, the described exemplary embodiments may be modified in various ways, all without departing from the spirit or scope of the present invention. Accordingly, the drawings and description are to be regarded as illustrative in nature, rather than restrictive. There may be parts shown in the drawings, or parts not shown in the drawings, that are not discussed in the specification as they are not essential to a complete understanding of the invention. [0032] In the present description, a wireless access control system is referred to as an access control system that utilizes suitable wireless techniques as the communication path to enable one or more wireless access points to send and receive data and commands to and from a multiplicity of wireless locksets (e.g., battery operated wireless locksets). Each of the locksets may contain a magnetic stripe, proximity card reader such as an RPID reader, smart card reader, or other "what you have" detector, a biometric reader or other physical identification ("who you are") detector, a twelve-key keypad or other input device for entry of knowledge based data or code (what you know"), or some combination of these readers and input devices.
[0033] In an embodiment of the present invention, a wireless access point is connected to a Local Area Network (LAN) in order to communicate with a suitable remote device, e.g., a computer on the same LAN. In alternate embodiments, the LAN is either wired (e.g., Ethernet) or wireless (WLAN) (e.g., 802.1 Ig) or a combination of wired and wireless network links, hi other embodiments, other types of secure networks are used. The computer can interface with the wireless access point via a web browser, such as Microsoft Internet Explorer, thereby eliminating the need to install any custom software on the computer. In addition, access control software in accordance with an embodiment of the present invention resides in the wireless access point. This access control software should look like and operate like a website so that only minimal training is required to use the system.
[0034] The system includes an access control database. The access control database includes entries for each individual that is allowed access by the access control system, each location that is secured by the access control system, and each access point and each lockset in the access control system. Depending on the embodiment, entries for individuals in the access control database may include any of the following information: first and last name, title, access card identification numbers, locations the person has access to, individual locksets the person can unlock, times/days during which the person should have access to the location/lockset, the person's work schedule, and any other parameter that is necessary or helpful to the access control system. Entries for locations may include, for example, which locksets control access to the location and from what other location do the locksets control access. [0035] Referring to the embodiment shown in FIG. 1, one strategically located wireless access point 100 can communicate with a plurality of wireless devices 101 (e.g., wireless locksets) through a wireless connection 104. In a preferred embodiment, the wireless data connection 104 is an RF connection that is encrypted with a proprietary encryption code. In other embodiments, the wireless data connection 104 is a known type of wireless data connection, such as 802.1 Ix, or future developed type of wireless connection. The wireless data connection 104 is secured by commercially available encryption, proprietary encryption or other security method. The wireless access point 100 also communicates with other wireless devices (not shown) that are part of the access control system. Additionally, the wireless access points may be connected by conventional wiring to non-wireless locksets or other access control system devices. Alternatively, a wireless portal controller is supplied that provides an interface between legacy locksets and/or access devices. The wireless portal controller communicates with the access point in the same basic way as the wireless access point except that it does not include a locking mechanism. Rather, the ^wireless portal controller includes an interface connected, typically wired, to the legacy device; the interface receives data received by the legacy device (such as a card reader) and passes it to the wireless portal controller for processing (e.g., making an access decision); the interface then receives access decision instructions from the wireless portal controller and sends those instructions to the legacy device (such as an electronic lock). In the example described of a wireless portal controller, the legacy device may be a unitary device (e.g., combination reader and lockset) or it may consist of separate physical devices (e.g., separate reader and lockset). The wireless access point 100 is connected to a computer 102 that coordinates the access control system by an Ethernet connection 103. Alternatively, the wireless access point 100 may be connected to the computer 102 by any other secure network connection, such as a secure wireless connection, serial connection such as an RS -232 or RS-485 connection. Li some embodiments, computer 102 and wireless access noint 100 each are connected to wireless transceivers (not shown) through a wired connection and computer 102 and wireless access point 100 communicate using the wireless connection between the wireless transceivers. .In some embodiments, the wireless transceivers and the wireless access points are powered using uninterruptible power supplies or other form of temporary power supply in the case of the loss of main power.
[0036] In the embodiment shown in FIG. 2, additional access points 200 are connected to the system, including the coordination computer 202, via a secure network (e.g., commercially available Ethernet switch 204 in the embodiment shown). These additional access points 200 communicate with additional wireless locksets 201 located in other areas of a building. [0037] The designs and implementations of the a) wireless access point 100, 200 and b) wireless lockset 101, 201 are described in more detail below.
[0038] In some embodinients, a wireless access point 100, 200 stores all or part of the access control database and utilizes any suitable wireless methods as the communication path to send and receive data and commands to and from a multiplicity of battery operated wireless locksets 101, 201. In some embodiments, the wireless access point 100, 200 communicates with a maximum of 64 wireless locksets 101, 201 within a radius of approximately 150 feet. In other embodiments, the maximum number of wireless locksets 101, 201 is 128 or some higher limit. In many cases, the maximum number of locksets 101, 201 is affected by hardware power, software limitations, wireless bandwidth limitations, or other system or environmental constraints. Also, in other embodiments, the range between the access point 100, 200 and the locksets 101, 201 is 750 feet. In still other embodiments, the range between the access point 100, 200 and the locksets 101, 201 is higher than 750 feet, depending on factors such as wall and/or another obstruction density, new or different wireless technology, interference levels, and other system and environmental factors. [0039] Access control software resides in the wireless access point 100, 200 and can be connected to a Local Area Network (LAN) to communicate with any computer on the same LAN. In some embodiments, this software interfaces with a computer through a web browser which eliminates the need for installing any custom software on the computer.
[0040] This software feels, looks, and operates like a website so that only minimal training is required to use the system. A protected password or any other security measure can be used to prohibit unauthorized access to the data. The access control software provides the ability to access the entries in the access control database, such as identifying each cardholder by first and last name, the individual wireless locksets 101, 201 and all other parameters by user defined names. [0041] Wireless lockset door actions and cardholder transactions (e.g., who went where when) can be available by the access point 100, 200 for generating various reports. The access point 100, 200 stores a plurality of transactions received from the locksets 101, 201. The oldest transactions can be overwritten when the transaction storage becomes full. The software of the access point 100, 200 should be capable of printing listings of all suitable database files, e.g., cardholder files, lockset files, etc.
[0042] In addition, as described below, the wireless access point 100, 200 can store a plurality of cardholder records and distribute these records to the appropriate wireless locksets as required. As such, the access point 100, 200 operates in concert with the wireless locksets to control access of secure regions.
[0043] In some embodiments of the present invention, the design of a plurality of wireless access points 200 enables multiple access points to operate in the same system. In some embodiments, this design accomplishes its task by identifying one access point as the master and the others as slaves. That is, an operator, via the browser, can communicate with the master only. The master downloads the access control database files to the slaves through an Ethernet switch 204 as depicted in FIG. 2 or possibly via the wireless network when wireless access points 200 are within wireless range of each other. The slaves then send all lockset door actions and cardholder transactions received from their communicating wireless locksets 201 to the master access point. [0044] In an. alternate embodiment; the computer 202 acts as the master and all of the access points 200 act as slaves to the computer 202. In other embodiments, one of the access points 200 acts as the master with respect to some functionality (e.g., coordination of communication between wireless devices 201 in range of multiple access points 200, discussed below) and the computer 202 acts as the master with respect to some other functionality (e.g., central storage and distribution of access control database information): In yet other embodiments, the access points 200 operate in a peer-to-peer arrangement with the computer 202 managing communication with operators and assisting coordination of the access points 200.
[0045] In some embodiments of the present invention, multiple access points 200 can operate in an adaptive mode. That is, the access points 200 automatically compensate for changes in the wireless environment by sampling the signal strength from each lockset 201. If two access points 200 are receiving signals from the same lockset 201, the access point 200 receiving the stronger signal makes it a part of its lockset list and informs the other access point 200 of its action. This technique will help simplify the system installation since it informs the installer of communication problems. Using this information the installer may be able to relocate a wireless access point 200 to acquire stronger signals from some locksets.
[0046] In more detail, FIG. 3 is a block diagram of a wireless access control system according to an embodiment of the present invention. The wireless access control system includes a plurality of wireless access points 315 and a switch 319. Each of the wireless access points 315 is for wirelessly connecting to one or more wireless devices 312, for example, one or more wireless locksets. Exemplary embodiments of locksets that can be used as the wireless devices 312 of FIG. 3 will be described in more detail below.
[0047] In addition, to provide additional security, a wireless device 312 includes an identity code that uniquely identifies the wireless device 312 to the wireless access points 315. [0048] Each wireless access point 315 includes a wireless transceiver 314 that defines a geographical coverage area. In some embodiments of the present invention, the wireless access points 315 handle radio-channel setup and frequency hopping to provide further security. [0049] The switch 319 acts like a normal switching node, and can additionally provide all the functionality needed to handle wireless access points 315.
[0050] As discussed above, in some embodiments of the present invention, one access point 315 is identified as the master and the others as slaves. That is, an operator, via the browser, can communicate with the master only. The master downloads the access control database files to the slaves through an Ethernet switch 319 as depicted in FIG. 3. The slaves send all lockset door actions and cardholder transactions received from their communicating wireless locksets 312 to the master access point.
[0051] With reference to FIG. 3; coverage areas 320A, 320B are shown for the two shown wireless access points 315 as solid circles. Also shown in FIG. 3 is a third coverage area 320C, shown as a dashed circle. The dashed coverage area 320C is for a third access point (not shown) whose coverage area overlaps the coverage areas of the shown access points such that some wireless devices 312 are within the coverage areas of two or more access points 315. When this occurs, the system coordinates and identifies, for each of the wireless devices 312 within the coverage areas of two or more access points 315, which of the access points 315 will communicate with the wireless device 312. It should be recognized that although in the present discussion, the first, second, and third coverage areas partially overlap with each other, in many implementations, there may be a number of wireless access points with coverage areas that do not overlap with the coverage areas of any other wireless access points.
[0052] The' determination of which wireless access point 315 should be the master is initiated and/or controlled by either the wireless device 312 or the access points 315. In some embodiments of the present invention the access points 315 automatically compensate for changes in the wireless environment by sampling the signal strength from each wireless device 312. That is, if two access points 315 are receiving signals from the same wireless device 312, the access point 315 receiving the stronger signal is determined to be the primary access point for the wireless device 312 and that access point makes it a part of its wireless device list (e.g., its lockset list) and informs the other access point 315 of its action.
[0053] Alternatively, in other embodiments of the present invention, the wireless device 312 scans the broadcast control channels of a plurality of neighboring wireless access points 315, and forms a list of best access point candidates for being a possible primary access point, based on the received signal strength. This information may be periodically passed back to the wireless access points 315 to determine when a handover should take place.
[0054] In some situations, though, the access point 315 that has the strongest signal with a particular wireless device 312 may not result in the fastest response to the wireless device 312 if the access point 315 with the strongest signal is the primary access point for many more wireless devices 312 than another access point 315 that has only a slightly weaker signal to the wireless device 312. Accordingly, in some embodiments, the system (e.g., the coordination computer 330 or the master access point), evaluates not only the signal strength of the connections between access points 315 and wireless devices 312, but also the load on the different access points 315 in determining which access point 315 should be the primary access point for each wireless device 312. As the load on different access points may fluctuate more than the wireless signal, changes to primary access points may be more frequent in this embodiment.
[0055] In some embodiments, the determination of which access point 315 to connect to is determined by the wireless device 312. In some embodiments, rather than making a choice between several access points as to which access point to connect to, the wireless device simply connects to the first access point that it finds when searching for wireless signals from access points. If the' wireless device cannot connect to this access point, or if it loses it connection to the access point, the wireless device searches for another access point and repeats the process by connecting to the first access point that is then finds.
[0056] In addition, in some embodiments of the present invention, the wireless device 312 is a mobile device (e.g., a proximity reader or an RFID reader) that can be moved from one geographical area to another geographical area. As such, in this embodiment, the wireless access points 315 also handle handovers of wireless access points 315 as the mobile device 312 moves from one access point's coverage area (e.g., 320A) to another access point's coverage area (e.g., 320B).
[0057] The fact that the entire area covered by the wireless access control system is divided into coverage areas (e.g., 320A, 320B3 320C) (as defined by transceivers 314) necessitates an implementation of a handover (or handoff) mechanism.
[0058] Specifically, in the context of the present application, a handover (or handoff) mechanism is a mechanism for switching an ongoing communication session on a mobile device (e.g., wireless device 312) from one access point (e.g., access point 315) to another access point. [0059] Handovers can be initiated and/or controlled by either the mobile device or the wireless access points 315 (as a means of traffic load balancing).
[0060] In some embodiments, the mobile device (e.g., wireless device 312) scans the broadcast control channels of a plurality of neighboring wireless access points 315, and forms a list of best access point candidates for possible handover, based on the received signal strength. This information may be periodically passed back to the wireless access points 315 to determine when a handover should take place. There are two methods used to determine when a handover should take place. One method sets a minimum acceptable performance level and gives precedence to power control over handover control. That is, when the signal degrades beyond a certain level, the power level of the mobile device is increased first. If further power increases do not improve the signal, then a handover is made. The other method uses handover first to try to maintain or improve a certain level of signal quality at the same or lower power level. Thus, this method gives precedence to handover control over power control.
[0061] In addition, regardless of whether the wireless device 312 is a mobile device or a fixed device (e.g., a door lock), a handover technique (whether initiated and/or controlled by either the mobile device 312 or the wireless access points 315) is used to determine which should be the secondary wireless access point 315 in case the primary access point 315 fails or otherwise loses its connection to the wireless device 312.
[0062] hi reference to FIG. 4, in some embodiments of the present invention, the wireless lockset is a self-contained battery-operated assembly 400 that will mount on a door with standard mortise or cylindrical lock cutouts. The assembly does not require any additional drilling or modifications Io the door for mounting and no wires or other physical connections are required outside the assembly. In some embodiments, the wireless assembly can have a portion of the unit on the secure side of the door as long as it does not require any modifications to the existing door cutouts. A block diagram of the various components of a wireless lockset 400 according to some embodiments of the invention is shown in FIG. 4A.
[0063] The various elements for a fully functioning wireless lockset are described in more detail below.
[0064] Commercial locksets are available from a myriad of manufacturers. The design of the wireless lockset can be based on purchasing suitable locksets 410 from one or more manufacturers.
[0065] Commercial locksets are typically provided in two basic configurations: cylindrical locksets (where the lockset is inserted in a cylindrical hole through the door) (see, for example, lockset 500 in FIG. 5) and mortise locksets (where the lockset is inserted in a hole cut into or mortised in the edge of the door) (see, for example, lockset 600 in FIG. 6).
[0066] In secure areas doors are locked on the unsecured side (the handle will not move) and unlocked on the secure side (turning the handle allows the door to open providing free egress). Access is gained by the use of a key to unlock the door. Returning to FIG. 4A, the wireless lockset provides an electromechanical mechanism 409 to unlock the door. In existing card reader controlled locksets this is accomplished by a low power solenoid or by a spring and a miniature motor (e.g., a motor used with electronically controlled model airplanes). Typically, the goal is to select the method that consumes the least amount of power, thereby maximizing life of battery 403. [0067] The door monitor and unlock electronics 407 detect and report that:
1) the locking mechanism is "unlocked" or "locked";
2) the door is "open (ajar)" or "closed";
3) the latching mechanism is "extended" or "retracted"; and/or
4) the housing tamper switch is "open" or "closed".
[0068] This module controls the release of the locking mechanism. Relocking of the mechanism may be programmed by the user to:
1 ) relock when door is opened, or
2) relock at the end of an unlock time.
[0069] A switch 408 or some other technique is provided to detect when the wireless lockset housing is being opened or tampered with. An access point message is created indicating this breach.
[0070] The lockset can accommodate a reader 401 such as a magnetic stripe card reader, smart card reader or a proximity card reader. Magnetic stripe reader cartridges are available from manufacturers specifically for integrating into an original equipment manufacturer's (OEM) product. They are available as swipe or insertion readers. Smart card readers are similarly available. A proximity card, such as RFID cards, can be a "proximity reader on a chip" for use by
OEMs.
[0071] The processor and memory 405 provide the control center for the wireless lockset. The processor interfaces with the other elements of the wireless lockset to coordinate each operation. In many embodiments, reader 401 is connected to processor and memory 405 through reader interface 404. Processor and memory 405 are connected to wireless electronics and antenna 402 to communicate wirelessly with other wireless components of the system, such as wireless access points. In some embodiments, all or some of the. wireless electronics are included in the processor and memory 405. In some embodiments, such as the wireless lockset 400, a keypad 406 is connected to the processor and memory 405
[0072] The lockset should have sufficient memory capacity to store the access information from the access control database (e.g., card number, PIN, time access privileges) for a plurality of cards requiring access to the door. The lockset makes the access decision for a card presented to the lockset based on the access information stored in the lockset memory for that card. In some embodiments, the data for all cards in the system is initially downloaded in bulk from the primary access point for the lockset. The same bulk download is performed for each of the locksets in the entire system. Accordingly, in this system architecture, the access control database, or at least substantial portions of it, resides simultaneously at the coordination computer, the access points and the wireless locksets. In this system, the lockset does not communicate with the access point after each access decision (e.g., card swipe), but rather only communicates at periodic intervals. During the periodic communications, the transaction history since the last communication is uploaded to the access point and updates to the access control database or other system information may be downloaded to the lockset.
[0073] This system architecture has several advantages. First, it reduces power consumption by the lockset because the lockset does not turn on its wireless transceiver when it makes access decisions based on the access control database entries stored in its memory. This is of particular importance because the typical lockset is a battery powered wireless lockset. Second, because the locksets generally only communicate with the access points for the periodic communication, the load on both the access ooint's wireless network bandwidth and the access point's processor are reduced. Last, the lockset can inake an access decision faster because its processor makes the access decision rather than forwarding an access decision request to an access point and wait for the access point to return an access decision command to the lockset.
[0074] In general, as discussed above, the access control database is simultaneously located in three separate areas of the system: a central computer (or network of computers), the wireless access points, and the local wireless devices such as the wireless locksets. In some embodiments, the entire access control database is not stored together in any of the access points, but collectively the access points contain the entire access control database and each individual access point contains the entire portion of the access control database needed for all of the access control devices communicating with that access point. In many of these embodiments, though, the access points have information regarding what portions of the access control database is located on other access points and an identification or pointer to the access points that store these portions of the access control database. In other embodiments, each access point or at least one access point contains the entire access control database. Similarly, in some embodiments, the entire access control database is not stored together in any of the individual access control devices (e.g., a wireless lockset), but collectively the various access control devices contain the entire access control database and each individual access control device contains the portion of the access control database needed for the decisions that need to be made by the access control devices. In other embodiments, each access control device or at least one access control device contains the entire access control database.
[0075] A feature of this three tiered database architecture (central computer or network, access points, and access control devices) is that any of the tiers can operate without compromise independently even if one or both of the other tiers is not operational of losses communication with one or both of the other tiers. One example of many instances of losses of communication is in the case of a loss nfnmi/w
Figure imgf000019_0001
either the central computer or one or more of the wireless access points.
-IS- [0076] One situation that can result from this architecture is that at a particular moment, an update may have been made to the access control database that has not been downloaded yet to the lockset. At such a moment, an individual that has recently been given access for a lockset may request access from the lockset and the individual (or their card) is not in the lockset's access control information or the access control information in the lockset for the individual has not been updated. In some embodiments in such cases, the lockset immediately sends an access control information update request for the new individual. The access point, when it receives such a request, immediately checks its access control database and, if it has updated information in the access control database, sends the access control information for the individual to the lockset. The lockset will then update its access control information with the access control information sent by the access point and makes an access decision in the same way as if the lockset had not had to update the access control information. If updated access control information for the new individual was not in the access point, the lockset would process the access request based on the access control information it has (e.g., deny access in this example).
[0077J In other embodiments in such cases, the lockset immediately sends an access decision request to the access point and waits for a response. The access point, when it receives such a request, immediately checks its access control database and sends an access control decision to the lockset, which unlocks or does not unlock the lockset according to the received access control decision. At this point, as is discussed in more detail below, the access point will transmit to the lockset the current access control database information for the individual that has just sought access from the lockset. However, it is noted that this update to the lockset access control information is done after the lockset has resolved the individual's access request and as a separate transaction from to the access request process. This alternate embodiment allows for faster response to the access request by the lockset, but requires more wireless transmissions using more bandwidth and battery power. [0078] In many embodiments-, the- wireless locksets and any other battery powered device in the system can monitor their battery power. If a device monitors that its battery power is below a certain level, it immediately sends a signal to an access point, which relays the warning to the central computer or network so that a system operator is notified and action can be taken. [0079] As illustrated in the preceding scenario; in the distributed access control database architecture, the access control information stored in individual lockset must be periodically updated. This is accomplished by the locksets having a "learn mode." As discussed above, in some embodiments, the access control database is initially downloaded in bulk to each of the locksets. In an alternate embodiment, only a portion of the access control database is downloaded or stored in" the lockset, based on the likelihood that particular access control information will be needed by that lockset. In still other embodiments, initially the lockset has no access control information (card information) stored in its memory.
[0080] In some embodiments, when a card is first presented to the lockset's reader or a card is presented to the lockset's reader that is-not in the access control information stored in the lockset's memory, the lockset sends the card's number and PIN entry, if required, to the wireless access point. The access point searches its memory to see if that card is authorized for access at this lockset at this time. The access point then returns to the lockset a "Grant Access" or "Deny Access" response along with all access information for that card. After the access point returns the "Grant Access" or "Deny Access" response to the lockset, giving the lockset enough time to act on the access response, the access point sends a separate communication to the lockset with the access control information for the card. In some embodiments, the access decision response and access control information for the card are sent in the same communication to the lockset. The lockset stores the access control information for this card data so that it can make all future access decisions for that card. With this method a lockset populates its memory with new card data each time a "first time" card is presented. In the embodiment where locksets initially have no access control information stored in memory, the memory contains card data for only those cards that "need" to have access and not data for cards that have access but have never appeared. Card modifications and deletions would be made via individual transmissions as required. [0081] In some embodiments, when a card is first presented to the lockset's reader or a card is presented to the lockset's reader that is not in the access control information stored in the lockset's memory, the lockset sends the card's number to a wireless access point. The access point searches its memory to see if it has access control information for that card. If it does, it sends the information to the lockset. The lockset stores the access control information for this card and makes an immediate access decision. The access control information is then used for future access decisions for that card until the access control information is updated as described above with respect to various other embodiments. In some embodiments,
[0082] The Learn Mode described above offers the lockset the ability to appear to accommodate more cards than the memory can hold. If the lockset card memory is full to capacity (e.g., 5000 cards, but this number can vary based on the amount of memory installed in the lockset) and a "first time" card is presented, the learning process, as described above, will follow, hi this case, the lockset grants or denies access as instructed by the access point but ignores the card data since there is no place to store it. This card will remain a "first time" card and the access point will continue to make the access decisions for this and any other "first time" cards until the lockset card memory is below full capacity.
[0083] In an alternate embodiment, when an individual seeks access from a lockset and the access control information stored in the lockset's memory results in an access denial, the lockset still sends the card's number and PIN entry, if required, to the wireless access point to confirm the denial of access. This is done because the access control information for the individual stored in the lockset memory may be out of date and more current information in the access point would allow entry. In another alternative, the lockset does not send an access request to the access point when its local access control information indicates a denial of entry until access has been requested and denied for an individual a predetermined number of times.
[0084] Another way to handle the memory-full situation or otherwise reduce the size of the access control information stored in a lockset is by means of a "least recently used" method. For example, when the lockset receives data for a "first time" card it locates a card stored in the card file memory that has not been used for a long time - "least recently used". The data for this card is deleted and is replaced with the data for the current card. The "old" card becomes a "first time" card the next time it appears at the lockset.
[0085] A "fallback" access control method may be employed when a lockset temporarily loses transmission with the wireless access point and is unable to receive data on a "first time" card. When the lockset senses that it has lost communications with the access point it can be instructed to read only a prearranged subset of characters, e.g., a facility code, from "first time" cards. This facility code is identical on all cards for a facility. So, during lost communications, the lockset will grant access to any "first time" card that has the system's facility code. In some embodiments, a facility uses a number of facility codes. In an alternative embodiment, the lockset can be programmed with multiple (e.g., 8) facility codes, so that the cards of related facilities will also operate the lockset in this manner.
[0086] In certain circumstances, it may be desired to have a particular lockset remain unlocked for a period of time beyond the time needed for one entry. In the case of locksets that are not battery powered, this is not a terribly important issue. For a battery powered lockset, however, powering a unlocking solenoid for an extended period of time will quickly drain the battery. To accommodate such situations, the battery powered lockset is equipped with a latching solenoid. The latching solenoid does not have a "default" state that it automatically goes into when power is not supplied, but rather may remain in either the locked or unlocked position without application of power. In the latching solenoid, the application of power switches the lockset between the locked and unlocked state and power does not need to be applied to the solenoid to maintain the lockset in either the locked or unlocked states.
[0087] As each card transaction is processed a "card transaction message" (what card was granted/denied access and time of transaction) can be stored in local transaction memory and transmitted, on request, to the wireless access point for reporting purposes. This same memory can also store all other events that have occurred unrelated to card transactions. The lockset memory can store a plurality of transactions. The lockset processor can send a message to the access point indicating when the transaction memory becomes 80% full. This can cause the access point to request the transactions from the lockset.
[0088] In some embodiments, the wireless electronics and antenna are made to be an integral part of the wireless lockset.
[0089] Any suitable batteries (e.g., AA size batteries) can be used as the power source for the wireless lockset. In some embodiments, the batteries for the wireless lockset provide sufficient power for approximately 500,000 unlocking operations. The number of batteries required will be established during the design phase.
[0090] A battery compartment door on the lockset, secured by a security screw, provides a method for replacing (changing) the batteries without removing the lockset from the door. A switch or some other technique is provided to detect when the battery compartment door has been opened or the battery compartment has been removed. An battery tamper message is created indicating this breach.
[0091] The basic design concept for the wireless lockset offers the ability to provide two ancillary products that will expand the functionality of the basic system with minimal additional design effort. Each of these is described below.
[0092] There may be portal installations where a lockset simply will not work — glass doors, turnstiles, pedestrian and vehicle sates. Or a facility may already have some doors equipped with a card reader and an electric strike or electromagnetic lock. In these cases a wireless portal controller can be used.
[0093] With reference to FIG. 7, the wireless portal controller 700 can be composed of a subset of components from the wireless lockset. The reader 701 is now an external device; however, it still provides the same electrical signals as the reader modules described above. The reader 701 connects to the processor and memory 706 through reader interface electronics 705. Wireless electronics and antenna 704 and tamper switch 707 similar to wireless electronics and antenna 402 and switch 408 are also included. .The commercial lockset and the electromechanical lock release mechanism have been removed.
[0094] Unlocking of the portal is controlled by a set of relay contacts 708 provided by the door monitor and unlock electronics 702. When the portal is to be unlocked these contacts merely provide a closed circuit (or open circuit depending on the design of the external locking device) with an external source of power to the external locking device.
[0095] The door monitor and exit request functions are external contact closures 703 similar to commercial lockset contacts.
[0096] The controller 700 can be housed in a simple electronic enclosure with no limiting size restrictions. Since the external reader 701 and portal locking device require power to operate, the rechargeable batteries can be eliminated and replaced with an external power source 709.
[0097] There are occasions where there is a need to monitor or control a device that is not associated with a portal with a card reader. An example is an emergency fire exit. Typically these are doors that are always locked and have "panic hardware" (a push bar) that unlocks the door from the inside to allow free egress in case- of an emergency. If this door is provided with a set of monitor contacts they can be wired to a wireless input/output module 800 as shown in FIG. 8. This module would report to the wireless access point when this door has been opened and closed. [0098] In other cases there may be other doors that are normally locked to the outside but people may freely exit at any time. There may be times when this door needs to be unlocked. The wireless input/output module 800 can provide a set of relay contacts 801 that would provide a closed circuit (or .open circuit depending on the design of the external locking device) between an external power source and the door locking device. This same module could also monitor the "open" and "closed" state of the door by means of door monitor contacts mounted on the door. [0099] Since there are no requirements for interfacing to a reader, the wireless input/output module is an even simpler module than the portal controller 700. In other respects, processor and memory 804, wifeless electronics and antenna 803, and tamper switch 806 are similar to their respective components in portal controller 700.
[00100] In typical embodiments, at a minimum the module 800 has two sets of relay contacts 801 and accommodates two sets of remote contact closures 802, connected to processor and memory 804 through output relays and contact monitors 805. In many embodiments four (4) sets of each or more. are included.
[00101] The input/output module 800 can be housed in the same electronic enclosure used for the portal controller 700. The rechargeable batteries can be eliminated and replaced with an external power source.
[00102] While the present invention has been described in connection with certain exemplary embodiments, if is to be understood that the invention is not limited to the disclosed embodiments, but, on the contrary, is intended to cover various modifications and equivalent arrangements included within the spirit and scope of the appended claims, and equivalents thereof.

Claims

WHAT IS CLAIMED IS:
1. A wireless access control system comprising: an access control computer system; a plurality of wireless access points communicatively connected to the access control computer system including a first wireless access point comprising a first wireless transceiver and a second wireless access point comprising a second wireless transceiver, the first wireless transceiver adapted to define a first coverage area and the second wireless transceiver adapted to define a second coverage area; and a wireless access control device controller located within the first coverage area and the second coverage area and having an identity code adapted to uniquely and wirelessly identify the wireless access control device controller to the plurality of wireless access points, wherein the wireless access control device controller is configured to: communicate wirelessly to the first wireless access point and the second wireless access point, to rate the quality of the connection to the access control computer system and the plurality of wireless access points using each of the first and second wireless access points, and download access control information from the first wireless access point or the second wireless access point based on the connection quality ratings.
2. The system of Claim 1 , wherein the wireless access control device controller is not in a fixed location and is movable within and without the first and second coverage areas.
3. The system of Claim 1, further comprising a wireless lockset that comprises the wireless access control device controller.
4. The system of Claim 3, wherein the wireless lockset is a self-contained battery- operated assembly adapted to be mounted to a door.
5. The system of Claim 4, wherein the self-contained battery-operated assembly comprises a latching solenoid adapted to remain in one of a locked position or an unlocked position in an unpowered state.
6. The system of Claim 3, wherein the wireless lockset comprises at least one of the group of: a magnetic stripe card reader, a smart card reader, and a proximity card reader.
7. The system of Claim 1, wherein the wireless access control device controller is a wireless portal controller coupled with at least one of the group of: an external magnetic stripe card reader, and an external proximity card reader.
8. The system of Claim 1, wherein the wireless access control device controller is connected to a wireless input/output module coupled with a plurality of monitor contacts of a door, the wireless input/out module being adapted to notify one of the wireless access points upon closing and opening of the door.
9. An access control system comprising: an access control computer system comprising a central database of information for making access control decisions; at least one wireless access point including a WAP database of information for making access control decisions and communicatively connected to the access control computer system, wherein the information for making access control decisions in the WAP database is a proper subset of the information for making access control decisions in the central database; and a plurality of wireless access control device controllers, each including a controller database of information for making access control decisions and each wirelessly communicatively connected, at least occasionally, to at least one wireless access point; wherein the plurality of wireless access control device controllers includes a plurality of first wireless access control devices, wherein the information for making access control decisions in the controller database of each of the first wireless access control device controllers is a proper subset of the information for making access control decisions in the WAP database of at least one wireless access point wirelessly communicatively connected, at least occasionally, to such first wireless access controller.
10. The system of Claim 9, further comprising a plurality of wireless locksets, each comprising at least one of the plurality of wireless access control device controllers.
1 1. The system of Claim 10, wherein a plurality of the wireless locksets are self- contained battery-operated assemblies adapted to be mounted to a door.
12. The system of Claim 10, wherein a plurality of the self-contained battery-operated assemblies comprises a latching solenoid adapted to remain in one of a locked position or an unlocked position .in an unpowered state.
13. The system of Claim 10, wherein a plurality of the wireless locksets comprises at least one of the group of: a magnetic stripe card reader, a smart card reader, and a proximity card reader.
14. The system of Claim 9, wherein a plurality of the wireless access control device controllers are wireless portal controllers coupled to at least one of the group of: an external magnetic stripe card reader, and an external proximity card reader.
15. The system of Claim 9, wherein a plurality of the wireless access control device controllers are connected to a wireless input/output module coupled with a plurality of monitor contacts of a door, the wireless input/out module being adapted to notify one of the wireless access points upon closing and opening of the door.
16. An access control device controller comprising: a memory storing a database of access control information; an input; a wireless transceiver that communicates with a central access control system; and a connection with an access control device; wherein the access control device controller is configured to: receive an access request from the input; determine an access control decision for the access request using the database of access control information when the database of access control information includes information sufficient to make an access control decision for the access request, transmit at least a portion of the access request to the central access control system using the wireless transceiver when the database of access control information does not include information sufficient to make an access control decision for the access request and then receive an access control decision for the access request from the central access control system; and supply an access control signal to the access control device based on the access control decision for the access request.
17. The access control device controller of Claim 16 wherein the access control device controller is further configured to add information from the access request and the access control decision to the database of access control information when the database of access control information does not include information sufficient to make an access control decision for the access request when the access request is received.
18. The access control device controller of Claim 17 wherein the access control device controller is further configured to remove information from the database of access control information when information is added to the database of access control information from the access request and the access control decision and the size of the database of access control information exceeds a predetermined size.
19. The access control device controller of Claim 16 wherein the access control device controller is further configured to: determine a special access control decision for the access request using the database of access control information when the access control device controller is not able to transmit the at least a portion of the access request to the central access control system or an access control decision is not received from the central access control system within a predetermined length of time after the at least a portion of the access request is transmitted to the central access control system using the wireless transceiver; and when a special access control decision is determined, supplying the access control signal to the access control device based on the special access control decision for the access request rather than based on the access control decision for the access request.
20. A method for operating a wireless access control system including: a switch; a plurality of wireless access points coupled to the switch and including a first wireless access point including a first wireless transceiver and a second wireless access point including a second wireless transceiver, the first wireless transceiver adapted to define a first coverage area, and the second wireless transceiver adapted to define a second coverage area overlapping a portion of the first coverage area; and a wireless device located within the overlapped portion of the first coverage area and having an identity code adapted to uniquely and wirelessly identify the wireless device to the plurality of wireless access points, the method comprising: receiving at the first wireless access point a first signal from the wireless device; receiving at the second wireless access point a second signal from the wireless device; measuring at the first wireless access point a first signal strength of the first signal; measuring at the second wireless access point a second signal strength of the second signal; sending the first signal strength by the first wireless access point to the second wireless access point; sending the second signal strength by the second wireless access point to the first wireless access point; determining at the first wireless access point and the second wireless access point a stronger signal strength of the first signal strength and the second signal strength; selecting, if the first signal strength is determined to be the stronger signal strength, the first wireless access point as a primary access point corresponding to the wireless device; and selecting, if the second signal strength is determined to be the stronger signal strength, the second wireless access point as a primary access point corresponding to the wireless device.
21. The method of Claim 20, wherein the wireless device is a wireless lockset.
22. A method for operating a wireless access control system including: a switch; a plurality of wireless access points coupled to the switch and including a first wireless access point including a first wireless transceiver and a second wireless access point including a second wireless transceiver, the first wireless transceiver adapted to define a first coverage area, and. the second wireless transceiver adapted to define a second coverage area overlapping a portion of the first coverage area; and a wireless device located within the overlapped portion of the first coverage area and having an identity code adapted to uniquely and wirelessly identify the wireless device to the plurality of wireless access points, the method comprising: receiving at the wireless device a first signal from the first wireless access point; receiving at the wireless device a second signal from the second wireless access point; measuring at the wireless device a first signal strength of the first signal; measuring at the wireless device a second signal strength of the second signal; determining at the wireless device a stronger signal strength of the first signal strength and the second signal strength; selecting, if the first signal strength is determined to be the stronger signal strength, the first wireless access point as a primary access point corresponding to the wireless device; and selecting, if the second signal strength is determined to be the stronger signal strength, the second wireless access point as a primary access point corresponding to the wireless device.
23. The method of Claim 22, wherein the wireless device is a wireless lockset.
24. An access control system comprising: an access control computer system comprising a central database of information for making access control decisions; a wireless access point, including a WAP database of information for making access control decisions; a first communication link communicatively connecting the wireless access point to the control computer system allowing transfer of information between the central database and the WAP database; a plurality of wireless access control device controllers, each including a controller database of information for making access control decisions; and a plurality of second communication links, each communicatively connecting one of the wireless access control devices controllers to the wireless access point allowing transfer of information between the WAP database and the controller database of the one of the wireless access control devices controllers; wherein the plurality of wireless access control device controllers are configured to, when their second communication link is functional and when their second communication link is not functional, make access control decisions; wherein the wireless access point is configured to, when the first communication link is functional and when the first communication link is not functional: receive access control requests from the wireless access control device controllers and return access control decisions using one of the second communication links; and transfer information between the WAP database and the controller databases.
PCT/US2007/003583 2006-02-09 2007-02-09 Multiple wireless access points for wireless locksets WO2007092623A2 (en)

Applications Claiming Priority (4)

Application Number Priority Date Filing Date Title
US77217606P 2006-02-09 2006-02-09
US60/772,176 2006-02-09
US81412906P 2006-06-16 2006-06-16
US60/814,129 2006-06-16

Publications (2)

Publication Number Publication Date
WO2007092623A2 true WO2007092623A2 (en) 2007-08-16
WO2007092623A3 WO2007092623A3 (en) 2008-09-12

Family

ID=38345843

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/US2007/003583 WO2007092623A2 (en) 2006-02-09 2007-02-09 Multiple wireless access points for wireless locksets

Country Status (2)

Country Link
US (1) US20080174403A1 (en)
WO (1) WO2007092623A2 (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20140075011A1 (en) * 2012-09-13 2014-03-13 Motorola Mobility Llc Providing a mobile access point
US9438642B2 (en) 2012-05-01 2016-09-06 Google Technology Holdings LLC Methods for coordinating communications between a plurality of communication devices of a user

Families Citing this family (22)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US8902042B2 (en) * 2006-05-16 2014-12-02 Lpd, L.L.C. Methods of controlling access to real estate properties
US8165034B2 (en) * 2007-03-16 2012-04-24 Jon Buchwald Configurable zone-based location detection
ES2340754A1 (en) * 2008-10-06 2010-06-08 Talleres De Escoriaza, S.A Programmable electronic access control system with "on line" updating without cables
US8354913B2 (en) * 2009-07-23 2013-01-15 Chargepoint, Inc. Authorization in a networked electric vehicle charging system
US10250678B2 (en) * 2010-07-07 2019-04-02 Qualcomm Incorporated Hybrid modes for peer discovery
US8467361B2 (en) 2010-11-04 2013-06-18 At&T Mobility Ii, Llc Intelligent wireless access point notification
US9125152B2 (en) 2011-08-16 2015-09-01 Utc Fire & Security Corporation Beacon synchronization in wifi based systems
WO2013048424A1 (en) * 2011-09-30 2013-04-04 Hewlett-Packard Development Company, L.P. Method and apparatus for maintaining wireless network devices in wireless networks
US20140078303A1 (en) * 2012-09-17 2014-03-20 Jeremy Keith MATTERN System and Method for Implementing Pass Control using an Automated Installation Entry Device
KR101566690B1 (en) * 2014-05-14 2015-11-09 (주)다보링크 Wireless access point and control method thereof, communication apparatus communicating the wireless access point and control method thereof, and recording medium for recording program for executing the control method
LU92491B1 (en) * 2014-06-30 2015-12-31 Or Bm Sa MEANS OF ACCESS CONTROL
US20170228953A1 (en) * 2014-08-07 2017-08-10 8857911 Canada Inc. Proximity access control devices, systems and related methods
US10135833B2 (en) 2015-05-29 2018-11-20 Schlage Lock Company Llc Credential driving an automatic lock update
DE102015110139A1 (en) * 2015-06-24 2016-12-29 Emka Beschlagteile Gmbh & Co. Kg Access control system for a variety of closures
US9524601B1 (en) 2015-12-28 2016-12-20 Unikey Technologies Inc. Wireless access control system including door position based lock switching and related methods
US9721413B2 (en) 2015-10-13 2017-08-01 Unikey Technologies Inc. Wireless access control system operating in automatic calibration mode and including door position based lock switching and related methods
US9697658B1 (en) 2015-12-28 2017-07-04 Unikey Technologies Inc. Wireless access control system including closed door position and interior area remote access wireless communications device based lock switching and related methods
US9697661B1 (en) 2015-12-28 2017-07-04 Unikey Technologies Inc. Wireless access control system including closed door position and exterior area remote access wireless communications device based lock switching and related methods
CN108884687A (en) * 2016-03-31 2018-11-23 品谱股份有限公司 Locking device with multiple authentication devices
US10453279B2 (en) * 2017-10-31 2019-10-22 Schlage Lock Company Llc Credential updates in an offline system
US10863400B1 (en) * 2019-09-27 2020-12-08 Juniper Networks, Inc. Wireless terminal roaming
US11900739B2 (en) * 2021-06-09 2024-02-13 Luxer Corporation Communication protocol for non-internet-enabled devices

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6072402A (en) * 1992-01-09 2000-06-06 Slc Technologies, Inc. Secure entry system with radio communications
US20040174247A1 (en) * 1999-03-12 2004-09-09 Rodenbeck Robert Wilmer Wireless security control system
US20050138178A1 (en) * 2003-12-19 2005-06-23 Shaun Astarabadi Wireless mobility manager
US20050242948A1 (en) * 2004-04-30 2005-11-03 Jeff Tarr Alarm system

Family Cites Families (31)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US4218690A (en) * 1978-02-01 1980-08-19 A-T-O, Inc. Self-contained programmable terminal for security systems
US4816658A (en) * 1983-01-10 1989-03-28 Casi-Rusco, Inc. Card reader for security system
US6822553B1 (en) * 1985-10-16 2004-11-23 Ge Interlogix, Inc. Secure entry system with radio reprogramming
US5475375A (en) * 1985-10-16 1995-12-12 Supra Products, Inc. Electronic access control systems
GB2259737B (en) * 1991-09-19 1996-02-07 Klidi Technology Corp Remotely-operated self-contained electronic lock security system assembly
US5933086A (en) * 1991-09-19 1999-08-03 Schlage Lock Company Remotely-operated self-contained electronic lock security system assembly
DE69221165T2 (en) * 1992-01-09 1997-11-27 Supra Prod Inc SECURE ACCESS SYSTEM WITH RADIO CONNECTION
US5493722A (en) * 1994-01-24 1996-02-20 Ingersoll-Rand Company Method for controlling data transmissions on a single channel radio frequency network
US5923264A (en) * 1995-12-22 1999-07-13 Harrow Products, Inc. Multiple access electronic lock system
US5936544A (en) * 1997-09-30 1999-08-10 Pittway Corporation Wireless access system
US6535136B1 (en) * 1998-02-26 2003-03-18 Best Lock Corporation Proximity card detection system
US6476708B1 (en) * 1998-03-20 2002-11-05 Hid Corporation Detection of an RFID device by an RF reader unit operating in a reduced power state
US6876293B2 (en) * 1998-04-03 2005-04-05 Harrow Products, Llc Multiple access electronic lock system
US6285295B1 (en) * 1998-12-14 2001-09-04 Martin S. Casden Passive remote programmer for induction type RFID readers
US6828902B2 (en) * 1998-12-14 2004-12-07 Soundcraft, Inc. Wireless data input to RFID reader
US6714118B1 (en) * 2000-05-08 2004-03-30 Harrow Products, Inc. Modular electronic door security system
US7289764B2 (en) * 2001-09-30 2007-10-30 Harrow Products, Llc Cardholder interface for an access control system
US7248836B2 (en) * 2001-09-30 2007-07-24 Schlage Lock Company RF channel linking method and system
US7065323B2 (en) * 2001-09-30 2006-06-20 Harrow Products, Inc. RF dynamic channel switching method
US20030096607A1 (en) * 2001-09-30 2003-05-22 Ronald Taylor Maintenance/trouble signals for a RF wireless locking system
US7113073B2 (en) * 2001-09-30 2006-09-26 Harrow Products, Llc System management interface for radio frequency access control
US20030074936A1 (en) * 2001-09-30 2003-04-24 Fred Conforti Door wireless access control system including reader, lock, and wireless access control electronics including wireless transceiver
US20030098780A1 (en) * 2001-09-30 2003-05-29 Ronald Taylor General access control features for a RF access control system
US20030103472A1 (en) * 2001-09-30 2003-06-05 Ronald Taylor RF wireless access control for locking system
US7006799B2 (en) * 2001-09-30 2006-02-28 Harrow Products Llc Energy saving motor-driven locking subsystem
US7346331B2 (en) * 2001-09-30 2008-03-18 Harrow Products, Llc Power management for locking system
US7096698B2 (en) * 2003-03-11 2006-08-29 Harrow Products Llc Override assembly for door lock systems having a clutch mechanism
US7007526B2 (en) * 2003-09-08 2006-03-07 Harrow Products, Inc. Electronic clutch assembly for a lock system
US7747286B2 (en) * 2004-01-20 2010-06-29 Harrow Products Llc Wireless access control system with energy-saving piezo-electric locking
WO2005073929A1 (en) * 2004-01-20 2005-08-11 Harrow Products Llc Access control system with energy-saving optical token presence sensor system
US7501930B2 (en) * 2004-02-17 2009-03-10 Harrow Products, Inc. Lock control system with lock-down feature

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6072402A (en) * 1992-01-09 2000-06-06 Slc Technologies, Inc. Secure entry system with radio communications
US20040174247A1 (en) * 1999-03-12 2004-09-09 Rodenbeck Robert Wilmer Wireless security control system
US20050138178A1 (en) * 2003-12-19 2005-06-23 Shaun Astarabadi Wireless mobility manager
US20050242948A1 (en) * 2004-04-30 2005-11-03 Jeff Tarr Alarm system

Cited By (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US9438642B2 (en) 2012-05-01 2016-09-06 Google Technology Holdings LLC Methods for coordinating communications between a plurality of communication devices of a user
US9930125B2 (en) 2012-05-01 2018-03-27 Google Technology Holdings LLC Methods for coordinating communications between a plurality of communication devices of a user
US20140075011A1 (en) * 2012-09-13 2014-03-13 Motorola Mobility Llc Providing a mobile access point
WO2014042814A1 (en) * 2012-09-13 2014-03-20 Motorola Mobility Llc Providing a mobile access point
US9560108B2 (en) 2012-09-13 2017-01-31 Google Technology Holdings LLC Providing a mobile access point

Also Published As

Publication number Publication date
WO2007092623A3 (en) 2008-09-12
US20080174403A1 (en) 2008-07-24

Similar Documents

Publication Publication Date Title
US20080174403A1 (en) Multiple wireless access points for wireless locksets
AU2008202754B2 (en) Integrated online door via electronic door handle
EP3437077B1 (en) Safety device for holding and sharing a key
US11158144B2 (en) Access control system having automatic status update
US6720861B1 (en) Wireless security control system
US10453286B2 (en) Bi-directional access control system
RU2503063C2 (en) Method and apparatus for managing access control
US8063734B2 (en) Access control system wherein the remote device is automatically updated with a central user list from the central station upon use of the remote device
JP4569820B2 (en) Method and system for granting local operation release authority during remote operation
US20130139561A1 (en) Wireless controlled electromechanical cylinder
US20070290789A1 (en) Intelligent Interactive Lock and Locking System
CA2827516C (en) Wireless lock with lockdown
US20040061591A1 (en) Remote code authorization for access control systems
EP1336938B1 (en) Vehicle-mounted device communication controller
WO2017207476A1 (en) Door system
US11008776B2 (en) Security device for holding and sharing a key
EP3570255A1 (en) Lock assembly system and method of control
WO2018046790A1 (en) Arrangement and method of saving a key inside a vehicle
WO2020086045A2 (en) A device for operating existing door locks automatically
CN112053475B (en) Intelligent door lock and control method thereof
US20230287711A1 (en) Multi-unit access control and information management system

Legal Events

Date Code Title Description
NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 07763392

Country of ref document: EP

Kind code of ref document: A2