TECHNICAL FIELDThe present disclosure pertains generally to methods of gaining access to a controlled space and more particularly to methods of using mobile devices in gaining access to a controlled space.
BACKGROUNDA number of buildings include rooms, areas or spaces to which there is a desire to limit access. Traditional access systems require a user to provide some form of identification to an access system, and the access system then determines whether the user is authorized to access a particular room, area or space. A traditional access system may, for example, include an electronic lock that can be selectively locked or unlocked in order to prevent or provide access through a door into a space. The traditional access system may include a card reader or other device for identifying a user, and may include a card reader or other device on each side of the door. The card reader(s) and electronic lock(s) of a building are typically wired to a central access controller, wherein the central access controller stores access control policies for each user and each door. Access control decisions are typically made by the central access controller and/or card reader(s) in real or near real-time. A need remains for a simplified access system.
SUMMARYThe disclosure relates generally to methods and systems for controlling access to a controlled space using a user's mobile device to make at least part of a decision as to whether a particular user is authorized to gain access to a particular space in a building at a particular time. An example of the disclosure includes a method for controlling access through a door having a door lock that can be electrically locked and unlocked. The door lock is operably coupled to a reader that is configured to establish local communication with a user's mobile device and to establish non-local communication with a remote server. The example method further includes storing a user's digital identity and a user's access policy in a memory of the user's mobile device and the user's mobile device using the stored user's digital identity and the stored user's access policy to determine whether or not the user is authorized for access through the door and to make an access decision of YES or NO. The access decision may be communicated to the reader along with the user's digital identity and the reader may store the communicated access decision and user's digital identity for subsequent communication to the remote server. When the access decision is YES, the door lock is unlocked so that the user is free to pass through the door and when the access decision is NO, the door lock is not unlocked.
Another example of the disclosure may be found in a mobile device that is configured to selectively grant access to a space within a facility having a door restricting access to the space within the facility. The example mobile device may include a memory that is configured to store a user's digital identity as well as a user's access policies. A controller may be operably coupled to the memory and may be configured to access the user's digital identity and the user's access policies from the memory and to use the user's digital identity and the user's access policies to determine whether the user is authorized to access the space to which the door restricts access. An output may be operably coupled to the controller and may be configured to communicate with a reader that is associated with the door in order to unlock a lock apparatus of the door when the controller determines that the user is authorized to access the space to which the door restricts access.
Another example of the disclosure can be found in a non-transient computer-readable medium having instructions stored thereon that are executable by a processor of a mobile device. When the instructions are executed, the mobile device may store a user's digital identity and a user's access policy and to identify an identity of a locked door that the user wants to enter. The mobile device may then uses the user's digital identity, the user's access policy and the identity of the locked door to determine, via a controller of the mobile device, whether the user is authorized to access the locked door. When the determination is made by the controller of the mobile device that the user is authorized to access the locked door, the mobile device may be instructed to transmit instructions to unlock the locked door.
The preceding summary is provided to facilitate an understanding of some of the features of the present disclosure and is not intended to be a full description. A full appreciation of the disclosure can be gained by taking the entire specification, claims, drawings, and abstract as a whole.
BRIEF DESCRIPTION OF THE DRAWINGSThe disclosure may be more completely understood in consideration of the following description of various illustrative embodiments of the disclosure in connection with the accompanying drawings, in which:
FIG. 1 is a schematic block diagram of an illustrative access control system;
FIG. 2 is a schematic diagram of an illustrative access control system;
FIG. 3 is a schematic block diagram of an illustrative mobile device usable with the access control systems ofFIGS. 1 and 2;
FIG. 4 is a schematic diagram of an illustrative policy execution flow that may be carried out by the access control systems ofFIGS. 1 and 2;
FIG. 5 is a flow diagram showing an illustrative method of controlling access through a door;
FIG. 6 is a flow diagram showing an illustrative method of controlling access through a door;
FIG. 7 is a flow diagram showing an illustrative method of controlling access through a door;
FIG. 8 is a flow diagram showing an illustrative use of user context information;
FIG. 9 is a flow diagram showing an illustrative method of controlling access through a door; and
FIG. 10 is a flow diagram showing an illustrative method of controlling access through a door;
While the disclosure is amenable to various modifications and alternative forms, specifics thereof have been shown by way of example in the drawings and will be described in detail. It should be understood, however, that the intention is not to limit aspects of the disclosure to the particular illustrative embodiments described. On the contrary, the intention is to cover all modifications, equivalents, and alternatives falling within the spirit and scope of the disclosure.
DESCRIPTIONThe following description should be read with reference to the drawings wherein like reference numerals indicate like elements. The drawings, which are not necessarily to scale, are not intended to limit the scope of the disclosure. In some of the figures, elements not believed necessary to an understanding of relationships among illustrated components may have been omitted for clarity.
All numbers are herein assumed to be modified by the term “about”, unless the content clearly dictates otherwise. The recitation of numerical ranges by endpoints includes all numbers subsumed within that range (e.g., 1 to 5 includes 1, 1.5, 2, 2.75, 3, 3.80, 4, and 5).
As used in this specification and the appended claims, the singular forms “a”, “an”, and “the” include the plural referents unless the content clearly dictates otherwise. As used in this specification and the appended claims, the term “or” is generally employed in its sense including “and/or” unless the content clearly dictates otherwise.
It is noted that references in the specification to “an embodiment”, “some embodiments”, “other embodiments”, etc., indicate that the embodiment described may include a particular feature, structure, or characteristic, but every embodiment may not necessarily include the particular feature, structure, or characteristic. Moreover, such phrases are not necessarily referring to the same embodiment. Further, when a particular feature, structure, or characteristic is described in connection with an embodiment, it is contemplated that the feature, structure, or characteristic may be applied to other embodiments whether or not explicitly described unless clearly stated to the contrary.
FIG. 1 is a schematic block diagram of an illustrativeaccess control system10. Theaccess control system10 includes adoor lock12 that may be positioned to selectively lock and unlock a door (not illustrated). Thedoor lock12 may be an electronically controlled lock such as a magnetic door lock, but other electronically controlled locks are contemplated. Areader14 may be configured to control operation of thedoor lock12. For example, thereader14 may instruct thedoor lock12 to change from a locked configuration to an unlocked configuration. Alternatively or additionally, thereader14 may instruct thedoor lock12 to change from an unlocked configuration to a locked configuration. In the example shown, thereader14 may be communicatively coupled with agateway16. Thegateway16 may include a modem or router, for example, and may itself be configured to communicate with aremote server18. Accordingly, thereader14 may communicate with theremote server18 via thegateway16. This communication may be two-way communication, meaning that not only can thereader14 receive information from theremote server18, but that thereader14 can also transmit information to theremote server18. Theremote server18 may in some cases be a cloud server, but this is not required in all cases.
As an example, theremote server18 may include information related to which doors a particular user has access to, and which doors a particular user is not authorized to pass through. This information, which may include a user's access policy, may be communicated to the particular user'smobile device20. In some cases, the user's access policy may additionally be transmitted to thereader14 via thegateway16 so that thereader14 may provide an updated user's access policy to themobile device20, for example. The user's access policy may include detailed information as to which spaces the particular user is authorized to access, the conditions under which the user is authorized to access the space, time and date periods during which the user is authorized to access the space, and so on. A lower level employee may have access to their workspace and the lunchroom, but not have access to various labs and other spaces. The lower level employee may be limited to accessing their authorized spaces during certain time periods, such as Monday through Friday, 8 AM to 6 PM, and thus would not be permitted to pass at 7 AM on a Monday, or anytime on a Saturday or Sunday. An intermediate level employee may have access to the same spaces, but may be authorized to access these spaces seven days a week,24 hours a day. A higher level employee may have access to all spaces and at all times. These are just examples.
This information may also include a facility policy that may be communicated from theremote server18 to thereader14 via thegateway16. A facility policy may not be limited to a particular individual, but instead may describe limitations that apply to many or even all employees. An example might be that a particular door is to remain unlocked every weekday Monday through Friday, from 7 AM to 7 PM. Another example might be that a particular door is to remain locked, with no access available, all day on Saturdays and Sundays, regardless of the employee. These are just examples.
In some cases, an exception policy may be communicated from theremote server18 to thereader14 via thegateway16. An exception policy may specify, for example, that a particular space will be closed for a period of time for cleaning, or remodeling. An exception policy may specify that a particular door or set of doors is to remain unlocked for a particular period of time corresponding to an event. For example, particular doors may remain unlocked during a scheduled open house. Another example of an exception policy may be that a particular user may not have an updated or current user access policy. In some cases, the exception policy may be part of the facility policy, while in other cases, it may be separate. It will be appreciated that theaccess control system10 may be configured to permit periodic updates to the user access policies, the facility policy and the exception policies to be communicated from theremote server18 to thereader14 via thegateway16. Periodic updates may be scheduled, for example, or may occur when network connectivity permits communication between thereader14 and thegateway16, and/or between thegateway16 and theremote server18.
Amobile device20 may be configured to communicate with thereader14. Themobile device20 may be a smartphone, for example, but may be any other suitable mobile device that can be carried by the user. Themobile device20 may communicate with thereader14 via WiFi, Bluetooth™, infrared (e.g. IrDA), or any other suitable wireless or wired communication path. When themobile device20 establishes wireless communication with thereader14, any policy updates stored in the reader14 (previously received from theremote server18 via the gateway16) may be communicated to themobile device20. In some cases, the policy updates (e.g. user's access policy updates) may be communicated to themobile device20 via a separate wireless communication path, such as cellular, Wifi or other communication path. Policy updates need not be communicated to themobile device20 for the user to gain access through a door. Instead, policy updates may be obtained when themobile device20 has communication available with thereader14 and/orremote server18.
In some cases, thereader14 may communicate a location to themobile device20, such that themobile device20 knows which door that themobile device20 is proximate to. Alternatively, themobile device20 may receive a signal from one or more wireless beacons in the building (not shown) that identifies a particular door. In some cases, the user of themobile device20 may use themobile device20 to take a picture or otherwise scan an image displayed proximate the door, which can be decoded to inform themobile device20 as to the location of a particular door. The image may be a barcode or a QR code, for example. In some cases, the user may select a particular door via a user interface of the mobile device. These are just examples.
Once themobile device20 has been informed of which door the user wishes to access, themobile device20 may be configured to use information stored within themobile device20 to determine whether the user is authorized to gain access through that particular door at this particular point in time. Themobile device20 may rely upon the user's digital identity (stored within the mobile device20) and the user's access control policy (also stored within the mobile device20). The user's digital identity may include information that identifies the user. This may include an ID number such as a company ID number, a driver's license number or a social security number, for example. In some cases, the user's digital identity may include biometric information of the user. In some cases, the user's digital identity may include a confirmation by themobile device20 of certain biometric information of the user, such a positive retinal or finger print scan. In some case, the positive retinal or finger print scan may be used to unlock the mobile device by the user.
Themobile device20 may also rely upon one or more of a facility policy, an exception policy and a user's context information. Examples of the user's context information may include a history of which doors the user has previously accessed, and when. Based on some or all of this information, themobile device20 may determine whether the user is authorized to gain access to the particular door, or not. Themobile device20 may then transmit the decision, which may for example be a YES decision or a NO decision, to thereader14.
Thereader14 may directly communicate an instruction to thedoor lock12, such as instructions to lock or unlock thedoor lock12. If the access control decision communicated to thereader14 is YES, for example, thereader14 may instruct thedoor lock12 to unlock temporarily. In some instances, particularly if thereader14 has a policy such as a facility policy or an exception policy that is updated relative to the same policy stored in themobile device20, thereader14 may override the decision made by themobile device20, regardless of whether the updated policy stored in thereader14 disagrees with the policy currently stored in themobile device20. In some instances, if the user access policy was previously transmitted to thereader14, it is contemplated that thereader14 may use such an updated user access policy to override the decision made by themobile device20 only when the updated policy stored in thereader14 disagrees with the policy currently stored in themobile device20. In some cases, thereader14 may immediately communicate any policy updates to themobile device20 to reduce or eliminate subsequent policy disagreements. Alternatively, the mobile device will need to connect to theremote server18 and obtain the updates from theremote server18 before access is granted. These are just examples.
WhileFIG. 1 shows asingle door lock12 and asingle reader14, it will be appreciated that a facility will typically have a number of door locks12 and a corresponding number ofreaders14, with each door having asingle door lock12 and asingle reader14. Because thereader14 may communicate wirelessly with themobile device20, rather than through a line of sight form of communication, there is no need to have aseparate reader14 on each side of a particular door. Rather, asingle reader14 may be configured to receive an access decision from themobile device20, regardless of whether the user wishes to pass through the door to enter the space, or whether the user wishes to pass through the door to exit the space.
FIG. 2 is a schematic diagram of an illustrative access control system, such asaccess control system10 shown inFIG. 1. InFIG. 2, theaccess control system10 may be seen as including adoor22 and alocation identifier24 that is positioned proximate thedoor22 and that wirelessly provides the location of thedoor22 to themobile device20. Armed with this information, themobile device20 is able to use the user's digital identity and the user's access policy, optionally along with one or more of a facility policy, an exception policy and the user's context information, to determine whether the user is authorized to pass through thedoor22. In some cases, thelocation identifier24 may be a wireless beacon that is configured to communicate with themobile device20 via WiFi or Bluetooth™, for example. Alternatively, thelocation identifier24 may be a scannable image that may be photographed or otherwise scanned by themobile device20 in order to inform themobile device20 of the location (and other identifying features) of thedoor22.
In some cases, there is asingle location identifier24, such as for example a wireless beacon or a scannable image for both entry and egress through thedoor22. In some instances, there may be alocation identifier24 on an entry side of thedoor22 and anotherlocation identifier24 on an exit side of thedoor22. If the location identifier(s)24 are wireless beacons, thelocation identifier24 on the entry side of thedoor22 informs themobile device20 that the desired access is entry while thelocation identifier24 on the exit side of thedoor22 informs themobile device20 that the desired access is exit. Similarly, if the location identifier(s)24 are scannable images such as but not limited to QR codes, scanning the entry side QR code informs themobile device20 that the desired access is entry while scanning the exit side QR code informs themobile device20 that the desired access is exit.
As can be seen, aremote data entry26 may be communicatively coupled with theremote server18. In some cases, theremote data entry26 may represent a computer such as a laptop computer or a desktop computer. Theremote data entry26 may represent a mobile device such as a smartphone or a tablet. It will be appreciated that theremote data entry26 may be used for entering information pertaining to a user's access policy. Theremote data entry26 may be used for entering information pertaining to a facility policy and/or an exception policy. In some cases, theremote data entry26 may be used by security personnel in updating these policies. While described as being remote, it should be understood that this is relative to the location of thedoor22, as theremote data entry26 may be located within the facility housing thedoor22. In some cases, theremote data entry26 may be far away from the facility housing thedoor22.
FIG. 3 is a schematic block diagram of themobile device20. As noted, the mobile device may be configured to selectively grant access to a space within a facility having a door such as the door22 (FIG. 2) that restricts access to the space within the facility. Themobile device20 may include amemory30 that is configured to store a user's digital identity as well as storing the user's access policies. Acontroller32 is operably coupled to thememory30 and is configured to access the user's digital identity and the user's access policy from thememory30. Thecontroller32 may be configured to use the user's digital identity and the user's access policy to determine whether the user is authorized to access the space to which the door restricts access. It is themobile device20, therefore, that makes the determination as to whether access is authorized. Anoutput34 is operably coupled to thecontroller32 and is configured to communicate with a reader (such as the reader14) that is associated with the door (such as the door22) in order to unlock a lock apparatus of the door when thecontroller32 determines that the user is authorized to access the space to which the door restricts access.
In some instances, thecontroller32 may be configured to periodically receive updates to the user's access policies from a remote server. For example, thecontroller32 may periodically receive updates to the user's access policies from the remote server18 (FIG. 1) via the gateway16 (FIG. 1), cellular communication and/or any other suitable communication pathway. In some cases, thecontroller32 may receive updates to the user's access policies from the remote server18 (FIG. 1) via thereader14. Thecontroller32 may be configured to periodically receive updates to a facility level policy and/or exception policies from a remote server. In some instances, thecontroller32 may be configured to use the facility level policy and/or exception policies as well as the user's access policies and the user's digital identity in determining whether the user is authorized to access the space to which the door restricts access. Themobile device20 may be configured to establish wireless communications with the reader (such as the reader14) that is associated with a door in order to receive information identifying the door, and in some cases, updated user's access policies, facility level policies, and/or exception policies.
FIG. 4 is a schematic diagram showing an illustrative policy execution flow. As illustrated, there is apolicy execution engine40 that is manifested within themobile device20 and apolicy execution engine42 that is manifested within thereader14. A number of data points may be used by thepolicy execution engine40, including but not limited toUSER level policies44,FACILITY level policies46,USER CURRENT CONTEXT48 and USER REQUESTEDACCESS50. Based on these inputs, thepolicy execution engine40 outputs amobile engine decision52 as well asadditional information54 to thepolicy execution engine42 within thereader14. Additional inputs to thepolicy execution engine42 includes FACILITY/SYSTEM orUSER EXCEPTION policies56. Thepolicy execution engine42 will output afinal decision58. In some cases, thefinal decision58 may match themobile engine decision52. In some instances, thefinal decision58 may contradict themobile engine decision52.
FIG. 5 is a schematic diagram showing an illustrative use of user context information. In this example, a second door is only allowed to open for a user when the user entered through a first door. InFIG. 5, auser60 approaches adoor62 with theirmobile device20 in hand. Themobile device20 communicates with areader64 and with a location identifier66. For purposes of this illustration, assume that themobile device20 decided that access was authorized, and that thereader64 did not contradict this decision, and thus thedoor62 is opened and theuser60 can pass through. As a result, the user's user context information stored in themobile device20 is updated to reflect that the user accessed thedoor62 at a certain time. Theuser60 next approaches thedoor68. Themobile device20 communicates with areader70 and with a location identifier72. Assuming that theuser60 is authorized to access the space beyond the door68 (as decided by themobile device20 and confirmed by the reader70), and the user's user context information correctly notes that the user passes through thedoor62, thereader70 will instruct thedoor68 to open. In this example, if the users had not already passed through door62 (sometimes within a predetermined period of time), the user would be denied access throughdoor68.
FIG. 6 is a flow diagram showing anillustrative method80 of controlling access through a door having a door lock that can be electrically locked and unlocked, the door lock operably coupled to a reader that is configured to establish local communication with a user's mobile device and to establish non-local communication with a remote server. As indicated atblock82, a user's digital identity and a user's access policy may be stored in memory of the user's mobile device. The user's mobile device may use the stored user's digital identity and the stored user's access policy to determine whether the user is authorized for access through the door and to make an access decision of YES or NO, as indicated atblock84. As noted atblock86, the access decision may be communicated to the reader along with the user's digital identity. The reader stores the communicated access decision and user's digital identity for subsequent communication to the remote server (e.g. log entry) as indicated atblock88. This may be referred to as an access log, for example. When the access decision is YES, as indicated atblock90, the door may be unlocked so that the user can pass through. In some cases, the door is unlocked so that the user is free to enter a space to which access is otherwise restricted by the door or so that the user is free to exit from a space to which egress is otherwise restricted by the door. Alternatively, when the access decision is NO, as indicated atblock92, the door is not unlocked. In some cases, the user's mobile device is configured to use the stored user's digital identity and the stored user's access policy to determine whether the user is authorized for access through the door and to make an access decision of YES or NO even when the user's mobile device is not connected to the remote server.
FIG. 7 is a flow diagram showing anillustrative method100 of controlling access through a door having a door lock that can be electrically locked and unlocked, the door lock operably coupled to a reader that is configured to establish local communication with a user's mobile device and to establish non-local communication with a remote server. As indicated atblock82, a user's digital identity and a user's access policy may be stored in memory of the user's mobile device. The memory may also store a facility policy, as indicated atblock102. The user's mobile device may use the stored facility policy as well as the stored user's digital identity and the stored user's access policy to determine whether the user is authorized for access through the door and to make an access decision of YES or NO, as indicated atblock104. As noted atblock86, the access decision may be communicated to the reader along with the user's digital identity. The reader stores the communicated access decision and user's digital identity for subsequent communication to the remote server (e.g. log entry) as indicated atblock88. When the access decision is YES, as indicated atblock90, the door may be unlocked so that the user can pass through. Alternatively, when the access decision is NO, as indicated atblock92, the door is not unlocked.
In some instances, when the facility policy stored in the memory of the user's mobile device does not match a facility policy stored in the reader, the reader may be configured to use the facility policy stored in the reader to override the access decision made by the user's mobile device when the facility policy stored in the reader disagrees with the access decision made by the user's mobile device. In some instances, the reader may also store an exception policy. The reader may use the exception policy to override the access decision made by the user's mobile device when the exception policy disagrees with the access decision made by the user's mobile device.
FIG. 8 is a flow diagram showing anillustrative method110 of controlling access through a door having a door lock that can be electrically locked and unlocked, the door lock operably coupled to a reader that is configured to establish local communication with a user's mobile device and to establish non-local communication with a remote server. As indicated atblock82, a user's digital identity and a user's access policy may be stored in memory of the user's mobile device. In some cases, the user's mobile device may store user context information as noted atblock112. The user context information may include an access history of which of a plurality of doors of a facility the user has previously accessed, and sometimes other information such as a corresponding time stamp. In some cases, obtaining an access decision of YES for a particular door requires that the user to have previously passed through a different one of the plurality of doors.
The user's mobile device may use the stored user context information in combination with the stored user's digital identity and the stored user's access policy to determine whether the user is authorized for access through the door and to make an access decision of YES or NO, as indicated atblock114. As noted atblock86, the access decision may be communicated to the reader along with the user's digital identity. The reader stores the communicated access decision and user's digital identity for subsequent communication to the remote server (e.g. log entry) as indicated atblock88. This may be referred to as an access log, for example. When the access decision is YES, as indicated atblock90, the door may be unlocked so that the user can pass through. Alternatively, when the access decision is NO, as indicated atblock92, the door is not unlocked.
FIG. 9 is a flow diagram showing anillustrative method120 of controlling access through a door having a door lock that can be electrically locked and unlocked, the door lock operably coupled to a reader that is configured to establish local communication with a user's mobile device and to establish non-local communication with a remote server. As indicated atblock82, a user's digital identity and a user's access policy may be stored in memory of the user's mobile device. A reader ID of the reader may be identified as indicated atblock122. In some cases, the reader ID is read from the reader. In some instances, the reader ID is inferred from a location of the user's mobile device.
The user's mobile device may use the stored user's digital identity, the stored user's access policy and the reader ID to determine whether the user is authorized for access through the door and to make an access decision of YES or NO, as indicated atblock124. As noted atblock86, the access decision may be communicated to the reader along with the user's digital identity. The reader stores the communicated access decision and user's digital identity for subsequent communication to the remote server (e.g. log entry) as indicated atblock88. This may be referred to as an access log, for example. When the access decision is YES, as indicated atblock90, the door may be unlocked so that the user can pass through. In some cases, the door is unlocked so that the user is free to enter a space to which access is otherwise restricted by the door or so that the user is free to exit from a space to which egress is otherwise restricted by the door.
FIG. 10 is a flow diagram of anillustrative method130 that may be carried out by a mobile device when executing executable instructions. As indicated atblock132, the mobile device may be caused to store a user's digital identity and a user's access policy. As indicated atblock134, the mobile device may be caused to identify an identity of a locked door that the user wants to enter. For example, the mobile device may be configured to identify the locked door by scanning an image disposed proximate the locked door or by wirelessly communicating with a beacon that is disposed proximate the locked door. As indicated atblock136, the mobile device may be caused to use the user's digital identity, the user's access policy and the identity of the locked door to determine, via a controller of the mobile device, whether the user is authorized to access the locked door. As indicated atblock138, when the determination is made by the controller of the mobile device that the user is authorized to access the locked door, the mobile device is caused to transmit instructions to unlock the locked door. In some instances, as indicated atblock140, the mobile device may be caused to periodically download updates to the user's access policy and/or a facility access policy.
Those skilled in the art will recognize that the present disclosure may be manifested in a variety of forms other than the specific embodiments described and contemplated herein. Accordingly, departure in form and detail may be made without departing from the scope and spirit of the present disclosure as described in the appended claims.