Login| Sign Up| Help| Contact|

Patent Searching and Data


Title:
A LOCK SYSTEM AND METHOD OF REQUESTING A LOCK-EVENT OF A NETWORK OF LOCKS
Document Type and Number:
WIPO Patent Application WO/2019/014516
Kind Code:
A1
Abstract:
A method of requesting a lock-event utilizing a regional lock-state system is configured to request a lock-event by sending a lock-event request from a mobile device to a control arrangement. Upon receipt, the lock-event request is recorded by the control arrangement. An administrator notification is then sent to an administrator device for alerting an administrator. The lock-event command is initiated by the administrator via the administrator device. A lock event directive is then sent to the mobile device. Upon receipt, a lock-event command is sent from the mobile device to a lock assembly.

Inventors:
KUENZI ADAM (US)
HARKEMA JONAH J (US)
MENON SMITA (US)
Application Number:
PCT/US2018/041938
Publication Date:
January 17, 2019
Filing Date:
July 13, 2018
Export Citation:
Click for automatic bibliography generation   Help
Assignee:
CARRIER CORP (US)
International Classes:
G07C9/00
Foreign References:
US20160232774A12016-08-11
US20150339913A12015-11-26
US20160055692A12016-02-25
US20150204109A12015-07-23
Other References:
None
Attorney, Agent or Firm:
BURNS, David (US)
Download PDF:
Claims:
What is claimed is:

1. A method of requesting a lock-event utilizing a regional lock-state system and an administrator, the method comprising:

requesting a lock-event by sending a lock-event request from a mobile device to a control arrangement;

recording the lock-event request by the control arrangement;

sending an administrator notification to an administrator device for alerting the administrator; and

initiating a lock-event command by the administrator via the administrator device.

2. The method set forth in claim 1, further comprising:

sending a lock-event directive to the mobile device after initiation of the lock- event command; and

sending a lock-event command from the mobile device to a lock assembly.

3. The method set forth in claim 2, wherein the mobile device is a plurality of mobile devices.

4. The method set forth in claim 3, wherein the lock assembly is a plurality of lock assemblies.

5. The method set forth in claim 1, wherein the administrator device is a local controller of the control arrangement.

6. The method set forth in claim 1, wherein the administrator device is a mobile device of the plurality of mobile devices.

7. The method set forth in claim 1, wherein the lock-event is a lockdown.

8. The method set forth in claim 2, further comprising:

sending a resolution notification from the control arrangement to the mobile device after resolution of the lock-event.

9. The method set forth in claim 2, further comprising:

sending a resolution command from the administrator device to the control arrangement after resolution of the lock-event.

10. The method set forth in claim 2, further comprising:

sending a request information notification to a second mobile device from the control arrangement, and after receipt of the lock-event request.

11. The method set forth in claim 10, wherein the user of the second mobile device confirms the need for the lock-event to the administrator device.

12. The method set forth in claim 4, wherein recording of the lock-event request includes information relative to the associated mobile device of the plurality of mobile devices.

13. The method set forth in claim 4, wherein the lock-event directive and the lock- event command are sent wirelessly.

14. The method set forth in claim 1, wherein the mobile device is configured to recognize a gunshot noise, and the lock-event request is automatically triggered by the mobile device upon recognition of the gunshot noise.

15. The method set forth in claim 13, further comprising:

transmitting an advertisement by each one of the plurality of lock assemblies, wherein each advertisement includes an address and the lock-state of the respective lock assembly.

16. The method set forth in claim 15, further comprising:

scanning for the advertisement by the plurality of mobile devices.

17. The method set forth in claim 16, further comprising:

sending a status message to the control arrangement indicative of the scanned advertisements by the plurality of mobile devices.

18. The method set forth in claim 17, wherein the lock-state directive is sent over a cellular network and the lock-state command is sent over a short range communication protocol.

19. A regional lock-state control system monitored by an administrator, operating within a region, utilizing at least one mobile device, and communicating with and controlling at least one lock assembly, the regional lock-state control system comprising:

a control arrangement;

a mobile device module configured to be executed by the mobile device, and configured to send a lock-event request to the control arrangement, wherein the control arrangement is configured to record the lock-event request; and

an administrator device configured to receive an administrator notification, wherein the administrator initiates a lock-event command associated with the lock-event request and received by the control arrangement.

20. The regional lock-state control system set forth in claim 19, wherein the lock- event request is a lockdown request, the mobile device is a smartphone, the control arrangement is configured to send a lock-event directive associated with the lock-event command to the mobile device module, and the mobile device module is configured to send a lock-event command associated with the lock-event directive to the at least one lock assembly.

Description:
A LOCK SYSTEM AND METHOD OF REQUESTING A LOCK-EVENT OF A

NETWORK OF LOCKS

BACKGROUND

[0001] The present disclosure relates to lock system, and more particularly, to a regional lock-state control system generally operable within a predefined region, and method of requesting a lock-event of the system.

[0002] Traditionally, regional lock-state control systems, such as a lockdown system, may be used in predefined areas. Examples of such areas may be buildings, college campuses, and others. Upon a predefined event, all locks (e.g., door locks) that are part of the lockdown system may be automatically locked via a central controller. Unfortunately, efficiently and timely advancing the need for a lockdown event to a central location may be cumbersome and/or difficult.

BRIEF DESCRIPTION

[0003] A method of requesting a lock-event utilizing a regional lock-state system and an administrator according to one, non-limiting, embodiment of the present disclosure includes requesting a lock-event by sending a lock-event request from a mobile device to a control arrangement; recording the lock-event request by the control arrangement; sending an administrator notification to an administrator device for alerting the administrator; and initiating a lock-event command by the administrator via the administrator device.

[0004] Additionally to the foregoing embodiment, the method includes sending a lock-event directive to the mobile device after initiation of the lock-event command; and sending a lock-event command from the mobile device to a lock assembly.

[0005] In the alternative or additionally thereto, in the foregoing embodiment, the mobile device is a plurality of mobile devices.

[0006] In the alternative or additionally thereto, in the foregoing embodiment, the lock assembly is a plurality of lock assemblies.

[0007] In the alternative or additionally thereto, in the foregoing embodiment, the administrator device is a local controller of the control arrangement.

[0008] In the alternative or additionally thereto, in the foregoing embodiment, the administrator device is a mobile device of the plurality of mobile devices.

[0009] In the alternative or additionally thereto, in the foregoing embodiment, the lock-event is a lockdown. [0010] In the alternative or additionally thereto, in the foregoing embodiment, the method includes sending a resolution notification from the control arrangement to the mobile device after resolution of the lock-event.

[0011] In the alternative or additionally thereto, in the foregoing embodiment, the method includes sending a resolution command from the administrator device to the control arrangement after resolution of the lock-event.

[0012] In the alternative or additionally thereto, in the foregoing embodiment, the method includes sending a request information notification to a second mobile device from the control arrangement, and after receipt of the lock-event request.

[0013] In the alternative or additionally thereto, in the foregoing embodiment, the user of the second mobile device confirms the need for the lock-event to the administrator device.

[0014] In the alternative or additionally thereto, in the foregoing embodiment, recording of the lock-event request includes information relative to the associated mobile device of the plurality of mobile devices.

[0015] In the alternative or additionally thereto, in the foregoing embodiment, the lock-event directive and the lock-event command are sent wirelessly.

[0016] In the alternative or additionally thereto, in the foregoing embodiment, the mobile device is configured to recognize a gunshot noise, and the lock-event request is automatically triggered by the mobile device upon recognition of the gunshot noise.

[0017] In the alternative or additionally thereto, in the foregoing embodiment, the method includes transmitting an advertisement by each one of the plurality of lock assemblies, wherein each advertisement includes an address and the lock-state of the respective lock assembly.

[0018] In the alternative or additionally thereto, in the foregoing embodiment, the method includes scanning for the advertisement by the plurality of mobile devices.

[0019] In the alternative or additionally thereto, in the foregoing embodiment, the method includes sending a status message to the control arrangement indicative of the scanned advertisements by the plurality of mobile devices.

[0020] In the alternative or additionally thereto, in the foregoing embodiment, the lock-state directive is sent over a cellular network and the lock-state command is sent over a short range communication protocol.

[0021] A regional lock-state control system monitored by an administrator, operating within a region, utilizing at least one mobile device, and communicating with and controlling at least one lock assembly according to another, non-limiting, embodiment includes a control arrangement; a mobile device module configured to be executed by the mobile device, and configured to send a lock-event request to the control arrangement, wherein the control arrangement is configured to record the lock-event request; and an administrator device configured to receive an administrator notification, wherein the administrator initiates a lock- event command associated with the lock-event request and received by the control arrangement.

[0022] Additionally to the foregoing embodiment, the lock-event request is a lockdown request, the mobile device is a smartphone, the control arrangement is configured to send a lock-event directive associated with the lock-event command to the mobile device module, and the mobile device module is configured to send a lock-event command associated with the lock-event directive to the at least one lock assembly.

[0023] The foregoing features and elements may be combined in various combinations without exclusivity, unless expressly indicated otherwise. These features and elements as well as the operation thereof will become more apparent in light of the following description and the accompanying drawings. However, it should be understood that the following description and drawings are intended to be exemplary in nature and non-limiting.

BRIEF DESCRIPTION OF THE DRAWINGS

[0024] Various features will become apparent to those skilled in the art from the following detailed description of the disclosed non-limiting embodiments. The drawings that accompany the detailed description can be briefly described as follows:

[0025] FIG. 1 is a schematic of a regional lock-state control system as one, non- limiting, exemplary embodiment of the present disclosure;

[0026] FIG. 2 is a schematic of a mobile device of the regional lock-state control system;

[0027] FIG. 3 is a schematic of lock assembly of the regional lock-state control system;

[0028] FIG. 4 is a flow chart illustrating a method of operating the regional lock-state control system;

[0029] FIG. 5 is a flow chart illustrating a second embodiment of a method of operating the regional lock- state control system; and

[0030] FIG. 6 is a flow chart illustrating a method of requesting a lock-event. DETAILED DESCRIPTION

[0031] Referring to FIG. 1, a regional lock-state control system 20 may be operable within a region 22, and may include a control arrangement 24, a multitude of mobile devices 26, and a plurality of lock assemblies 28 that may be dispersed throughout the region 22. The regional lock-state control system 20 may be a regional lockdown system, or alternatively, may be a regional unlocking system. Examples of a region 22, may include an office building, a student campus, a hotel, and others. The control arrangement 24 may include a server 30 and a controller 32 that may be local (i.e., located within the region 22). The server 30 may be run remotely or locally, and/or may be cloud or web based. In one example, the server 30 may not be in direct communication with the local controller 32. It is further contemplated and understood that the controller 32 may be an integral part of the server 30 (i.e., may share the same processor and computer readable storage medium). Although the lock assembly 28 is illustrated as a door lock assembly, non-limiting examples of the lock assembly 28 may also include key boxes, padlocks, core locks, Bluetooth modules, vaults, and others.

[0032] The remote server 30 may include a computing processor 34 (e.g., microprocessor), an electronic storage medium 36 that may be computer readable and writeable, and a transceiver 38 for wireless communications. The controller 32 may include a computing processor 40 (e.g., microprocessor), an electronic storage medium 42 that may be computer readable and writeable, and in some applications, a transceiver 44 for wireless communications. Referring to FIG. 2, each one of the mobile devices 26 may include a computing processor 46 (e.g., microprocessor), an electronic storage medium 48 that may be computer readable and writeable, a user interface 50, and a transceiver 52 for wireless communications.

[0033] In one embodiment, each one of the lock assemblies 28 may not be generally 'smart', and instead, may be generally powered, actuated, and controlled by the controller 32. In this embodiment, the local controller 32 may be hardwired to each lock assembly 28 (see hardwired pathways 55 in FIG. 1). In another example, each lock assembly 28 may include and receives power via a respective energy storage devices or batteries (not shown). In yet another embodiment, and referring to FIG. 3, each one of the lock assemblies 28 may include a computing processor 54 (e.g., microprocessor), an electronic storage medium 56 that may be computer readable and writeable, and a transmitter 58 for transmitting an advertisement or beacon 60. In some applications, the transmitter 58 may be a transceiver for additional wireless communications. [0034] Referring to FIGS. 1 through 3, the regional lock-state control system 20 may further include a plurality of mobile device modules 62, a status module 64 that may be a lock status module, a people locator module 66, and a central lock control module 68. Each one of the plurality of mobile device modules 62 may be programmed into a respective one of the plurality of mobile devices 26 (i.e., stored in the medium 48 and executed by the processor 46). The status module 64 and the people locator module 66 may be programmed into the server 30 (i.e., stored in the medium 36 and executed by the processor 34). The central lock control module 68 may be programmed into the controller 32 (i.e., stored in the medium 42 and executed by the processor 40).

[0035] Each mobile device 26 may be generally carried by a respective person or user known to be in, or have cause to be in, the region 22 for a length of time. The mobile device 26 may be configured to operate any number of the lock assemblies 28 via techniques known to one having skill in the art. It is contemplated and understood that the mobile devices 26 may not be part of the regional lock-state control system 20, and instead, may be host devices used to execute the mobile device modules 62. Similarly, the server 30 may not be part of the regional lock-state control system 20, and instead, may be a host server used to execute the mobile device modules 64, 66 and store data of the system 20. Various, non-limiting, examples of the mobile device 26 may include a smartphone, a tablet, an integral part of an identification and/or access badge, an access card, and any combinations thereof.

[0036] Referring to FIGS. 1 and 2, the people locator module 66 of the regional lock- state control system 20 may determine the location of mobile device users in the region 22 via one of two different techniques. The first technique may utilize the advertisement 60 and the second technique may utilize a geographic position application 72 of the mobile device 26. The geographic position application 72 is configured to determine the geographic position of the mobile device 26 using one or more positioning systems or protocols of a type well known in the art, such as Global Positioning Systems (GPS), Global Navigation System (GLONASS), Global Navigation Satellite System (GNSS), Galileo, Long Range Navigation (LORAN), National Marine Electronics Association (NMEA), Trimble Standard Interface Protocol (TSIP), DELORME® EARTHMATE®, Rockwell PLGR Protocol, iBeacon®, and SIRF®, to name a few non-limiting examples. It is also appreciated that the geographic position application 72 may include local, regional, or site-wide systems of a type well known in the art, such as radio frequency identification (RFID), infrared (IR), sensor networks, Wi-Fi-based positioning, and Ultra-Wideband (UWB) positioning systems, to name a few non-limiting examples. In one embodiment, the geographic position application 72 may work in conjunction with the people locator module 66 to determine the location of each user of each mobile device 26 relative to the plurality of lock assemblies 28.

[0037] Referring to FIG. 4, a method of operating the regional lock mode system 20 is illustrated. To simplify explanation, the example of a regional lockdown system 20 will be elaborated upon in terms of operation. At block 100, the controller 30 may trigger a lockdown event that generally commands, or places, each lock assembly 28 into a locked state. Upon the lockdown command (see arrows 74 in FIG. 1), and at block 102, each lock assembly 28 may initiate the advertisement 60. In one embodiment, the advertisement 60 may be wireless, may be a short range advertisement, and/or may be an advertisement sent via Bluetooth ®. The lockdown command 74 may be sent over wired or wireless pathways 55.

[0038] At block 104, the status module 64 of the cloud-based server 30 may send a lockdown directive (see arrows 76 in FIG. 1) to each of the mobile devices 26. In one example, the region 22 may be a campus, and the lockdown directive 76 may be sent to every mobile device 26 (e.g., smartphone) on campus 22. At block 106, and upon receipt of the lockdown directive 76, the mobile device module 62 of each mobile device 26 may begin to automatically scan for the advertisement 60, which may include an address of the specific lock assembly 28 and an indication that the lock assembly 28 is in the locked state or the unlocked state. It is contemplated and understood that the lockdown directive 76 may be a "push notification."

[0039] The mobile device module 62 for each mobile device 26 may be registered by a process of downloading the module from, for example, an application store and signing in with an account. The account may be obtained via various means, but the account may be associated with, or known by, the locator module 66. The account may be created by region 22 administrators who may create the account in one of the modules 66, 68, and provide to the user of the mobile device 26. Alternatively, the account may be created in a separate system (e.g., Facebook ® or Google ® login) and the account may be registered into the modules 66, 68 so that it is known. After logging into the mobile device module 62, the module 62 may communicate with the modules 66, 68 so that the modules 66, 68 are aware of every registered mobile device 26.

[0040] Optionally, the module 62 for each mobile device 26, may have functionality to download mobile credentials from a credential module 67 (see FIG. 1) that may be loaded into the server 30 of the control arrangement 24. The credential module 67 may provide access rights to the mobile devices 26 so that the users may open the lock assemblies 28 (i.e., unlock) with the mobile device 26 using techniques for mobile credentialing that include the transfer via Near Field Communications (NFC) or Bluetooth using the transceivers 52, 58, and other means generally known to one having skill in the art. Similarly, the lock assembly 28 may be configured to validate the command 86 as coming from the central control arrangement 24 via digital signature, encryption, and others. Authentication of command 86 may reduce, or eliminate, any chances of a nuisance lock-down message.

[0041] At block 108, each mobile device 26 may send a wireless status message (see arrow 78) to the server 30 for use by the people locator module 66. The status message 78 may include the signal strength of each advertisement 60 detected (i.e., or an averaging of recently received advertisements 60), the address of each advertisement 60, an address or identification of the associated mobile device 26, and the lock status of the associated lock assembly 28. It is further contemplated and understood that the status message 78 may be time stamped providing a "time-to-live" of the message that may enable other lock assemblies 28 to respond as long as the originating message remains valid.

[0042] Although not illustrated, portions of the directives 76, commands 86, advertisements 60, and/or status messages 78 may also be sent mobile device 26 to mobile device 26, lock assembly 28 to lock assembly 28, mobile device 26 to lock assembly 28, and lock assembly 28 to mobile device 26. In one example, the "time-to-live" feature may generally be the directive 76 decaying over time (i.e., the time stamp has elapsed and the message has expired). This feature may also be included in the transfer of directives 76 from mobile device 26 to mobile device 26, and/or may be included in the commands 86 from mobile device 26 to lock assembly 28, and/or the re-transfer of the command 86 between lock assemblies 28.

[0043] At block 110 and based on the information provided by the status message 78 and preprogrammed information in the server 30 that provides the locations of the lock assemblies 28, the people locator module 66 may determine the location of the transmitting mobile devices 26. That is, the server 30 may determine which users are located near which lock assemblies 28, and which lock assemblies are in the locked state. This may be accomplished by calculating distances based on signal strength or triangulation based upon multiple status messages 78. Or, it may be accomplished based on proximity alone (i.e., being near a lock assembly means the user must be at a particular location).

[0044] It is contemplated and understood that the status message 78 may further include information about the individual user of a particular mobile device 26. For example, the mobile device module 62 may provide, via the interface 50, an opportunity for a user to specify handicap conditions. The mobile device module 62 may also activate a microphone 82 of the mobile device 26 enabling the listening for sounds (e.g., gun shots) that may be sent as data included as part of the status message 78. Module 62 may also activate other features of the mobile device 26 such as phone position (e.g., gyroscope), camera (i.e. phone video), phone calls, and others. Other information that may be included as part of the status message 78 may be anything a user chooses to enter into the mobile device 26, such as the need for help due to, for example, an injury. Yet further, biometric information (e.g., heartbeat) may be included as part of the status message 78 indicating a user is in distress.

[0045] It is contemplated and understood that the sending of the lockdown directive 76 may be repetitious causing the system to reinitiate the determination of locations of the mobile devices 26. This re-initiation enables tracking of the users of the mobile devices 26 throughout the region 22. This repetition may continue until the server 30 sends a cease lockdown initiative to the mobile devices 26. By enabling the tracking of the mobile devices 26, a central command post (e.g., police or security station) may receive the tracking and other data from the server 30, and better plan and conduct, for example, evacuations of the region 22 based on the locations of the mobile devices 26. Such evacuations may be based upon population concentrations and dynamics. The users of the mobile devices 26 may be instructed via the interface 50 of the mobile devices 26.

[0046] It is further contemplated and understood, and similar to block 106, that the mobile device 26 may transmit an advertisement 80 (see FIG. 2) that includes the address of the respective mobile device. Other mobile devices 26 may receive the advertisements 80, and as part of the wireless status message 78, or as a separate message, may transmit the mobile device address data and signal strength relative to the advertisements 80 to the locator module 66. The locator module 66, via the advertisements 60, 80 may then use this data to determine the locations of the various mobile devices 26 relative to the lock assemblies 28 and relative to the other mobile devices 26.

[0047] Referring to FIG. 5, a second embodiment of a method of operating the regional lock-state control system 20 is illustrated. At block 200, the control arrangement 24, which may be a cloud-based server, triggers a lock-state event that may be a lockdown event. At block 202, the control arrangement 24 sends a lock-state directive 76 to each of the plurality of mobile devices 26 in the region 22. The lock-state directive 76 may be a lockdown directive and may be sent wirelessly via, for example, a cellular network. Alternatively, the lock-state directive 76 may be an unlock directive. The lock-state directive may be generalized where a mobile device 26 is instructed to interact with any lock assembly 28, or may be specific to a lock assembly 28 if the location of the mobile device 26 is known to be near the particular lock assembly.

[0048] In one, non-limiting, embodiment of the regional lock-state control system 20, the system may include a combination of both lock and unlock behaviors with a region depending on how an administrator wants to filter human traffic through, for example, a building, or a region. More specifically, and in an example of a tornado event, certain doors may be locked to make sure people are directed to safer areas, and other doors may be unlocked so the people are assist toward those safe areas (e.g. basement areas) that may typically be inaccessible to the general public.

[0049] In one example, or scenario, of operation, a person with bad or illegal intentions (e.g., a shooter) may be on a college campus 22. An administrator, or first responder, with this information may trigger a lockdown event via the controller 32, which may be a centralized portal. The administrator may login with an identification and/or password that may place the lock-state control system 20 in a lockdown mode.

[0050] In another scenario, a fire alarm may be triggered that places the lock-state control system 20 into a pre-determined mode where certain lock assemblies 28 are unlocked via an unlock directive 76. This would permit personnel to leave, for example, a building 22. It is contemplated and understood that similar scenarios may include natural events (e.g., storms, earthquakes, tsunamis, hurricanes, tornadoes, and others), acts of war, and public health (i.e., outbreaks). Each scenario may include different, or modified, lock and phone behaviors.

[0051] At block 204 and upon receipt of the lock-state directive 76, each mobile device 26 may send a lock-state command 86 associated and reflective of the lock-state directive 76 to the plurality of lock assemblies 28. The lock-state command 86 may be applied in place of the command 74 previously described. Moreover, the lock-state command 86 may be sent over a wireless, short-range, protocol such as Bluetooth. It is further contemplated and understood that not all mobile devices 26 will be in Bluetooth range of all lock assemblies 28. However, the wide distribution of the mobile devices 26 is likely to be sufficient to distribute the command 86 to all of the lock assemblies 28. Regardless, each lock assembly 28 may also re-communicate the command 86 to other proximate lock assemblies 28 thereby assuring all lock assemblies have received the command. It is further contemplated and understood that this communication may apply to lock assemblies 28 that are off-line lock assemblies (i.e., not part of a network and/or do not communicate over the internet) and have no direct communication with, for example, the controller 32 or the server 30. Yet further, the mobile devices 26 may communicate the command from one mobile device 26 within the network coverage to another mobile device 26 outside of the network coverage, and back-and-forth in this way, between lock assemblies 26 and mobile devices 26, to propagate the command.

[0052] In an application where the intent is to safely and efficiently evacuate people from a region 22, the limited range of communication between a mobile device 26 and any particular lock assembly 28 may have little negative effect. That is, if the lock-state command is an unlock command 86, and the mobile device 26 continues to transmit the command throughout the unlock event, the lock assembly 28 will unlock as the user of the mobile device 26 moves closer to the lock assembly.

[0053] At block 206 and upon receipt of the lock-state command 86, each lock assembly 28 may begin transmitting an advertisement 60 that may be wireless and short ranged (e.g., Bluetooth). Each advertisement 60 for each lock assembly 28 may include data that reflects the associated lock assembly's lock-state. Examples of a lock-state may include locked and unlocked states of a latch 88 of the lock assembly 28 (see FIG. 3), thrown and un- thrown states of a deadbolt 90 of the lock assembly 28, and open and closed positions of a door 92 that is coupled to and generally utilized the lock assembly 28. More specifically, if the lock-state command 86 is a lockdown command, the advertisement 60 may include data that indicates the latch 88 is in a locked state, the deadbolt 90 is in a thrown state, and the door 92 is in a closed position, thus indicating a secured orientation.

[0054] In one embodiment, the lock assemblies 28 may be configured to continuously send advertisements 60 indicating the assembly is either in a locked or unlocked state. Upon a lockdown event, the mobile devices 26 may not send a lockdown command 86 to the lock assemblies 28 that are already advertising a locked state. That is, the mobile devices 26 may only send a lockdown command 86 to the lock assemblies 28 advertising an unlocked state.

[0055] At block 208, the mobile devices 26 may scan for the advertisements 60. At block 210, the mobile devices 26 may send a status message 78 reflective of the scanned advertisements to the control arrangement 24. In one example, the data from the status message 78 may be used to inform an administrator of which doors are locked down, and/or the current status of a particular door with a particular lock assembly 28.

[0056] Referring to FIGS. 1 and 6, a method of requesting a lock-state event that may be a lockdown event is illustrated. At block 300, a user of the mobile device 26 may request a lock-state event via the user interface 50, and as a lock-event request 94 that may be wirelessly sent to the server 30 (see FIG. 1). In one example, and to request the lock-state event, the user may push a button, or press a virtual button, on the user interface 50. In another example, or additionally thereto, the system may apply an additional security feature. For instance, the user may press a button and submit to a biometric (e.g., thumbprint) verification, or password authorization. In one example, the act of unlocking a smartphone as the mobile device 26 may be equivalent to entering the password. Requesting a lock-state event may be conducted via a voice command received by a smartphone. The system may further recognize a voice as being in distress. In yet another embodiment, the request for a lock-state event may simply be triggered by the sound of a gunshot. In this embodiment, the message 94 may be sent automatically without user interaction.

[0057] At block 302, the processor 34 of the server 30 may record the request utilizing a request module 96 stored in the electronic storage medium 36. This request data may be utilized to determine false alarms and take appropriate action including potential disciplinary action against the user of the mobile device 26.

[0058] At block 304, the server 30 may send an administrator notification 98 to the controller 32, or to any other device having an interface with a stationed administrator. In one embodiment, a user of a mobile device 26 may be the pre-designated, or assigned, administrator. In this embodiment, the mobile device 26 used by the administrator is an alternative to the controller 32 (i.e., hereafter termed administrator device to mean the controller 32 or a mobile device 26 used by the administrator). The administrator notification 98 provides an alert indicative of the lock-event request to an administrator who may take appropriate action (i.e., act upon the request or not). At block 306 and during blocks 300, 302 and 304, other lock-event request 94 may be sent to the server 30, and the request module 96 may tabulate the number of requests, locations of the requesting mobile devices 26, and send administrator notifications 98 to the controller 32. In one embodiment, the request module 30 may tabulate the lock-event requests 94 and hold-off on sending the administrator notification 98 until a preprogrammed number of requests are received (e.g., two). In this way, false alarms may be minimized.

[0059] In another embodiment, and if the administrator does not respond to the administrator notification 98, the system may escalate. That is, the notification 98 is escalated to the next higher level of an administrator. For instance, if a student on a college campus presses an 'alarm' button, the administrator is notified and has the ability to choose 'alarm' and thus alert authorities. If the administrator does not respond with either an 'alarm', or 'resolve', then the alarm notification initiated by the student is escalated to the next level of administrator. Once the alarm mode is activated then the system may go into a lockdown.

[0060] The concept of administrator levels may provide for mini-lockdowns versus a whole system lockdown. A lockout may be based on administrator levels, so the residence hall administrator, in the example of a college campus, may lock down the hall, whereas the dean of the campus may lock down the entire campus. A residence administrator may have the ability to escalate to the dean if deemed necessary.

[0061] In one embodiment, the system may include the ability to send messages to government enforcement agencies and/or alarm companies as soon as there are a sufficient number of smartphones indicating an alarm status. The system may be preprogrammed to include what this population is. For example, if more than ten smartphones indicate an alarm status, then the entire system may go into an alarm mode. In another example, multiple alarm status' or requests may come from the same smartphone, and/or at least two requests may come from different smartphones, thus different users, before the administrator escalation occurs.

[0062] At block 308, and during blocks 300, 302, and/or 304, the server 30 may send request information notifications 100 to other users of mobile devices 26. In one embodiment the request information notification 100 is sent to users who are near the user who initiated the lock-event request 94. The request information notification 100 may cause the mobile device 26, via the module 62 to prompt the user to confirm the need of the initial lock-event request 94. Upon the request, the other mobile devices may reply via a confirmation 99. In another embodiment, the administrator may apply other forms of confirmation that may include cameras 101 configured to send images or video signals as the confirmation 99 (i.e., or additional confirmation) received from a proximate location of a potential scenario that caused the lock event request to occur.

[0063] At block 310, and upon one or more lock-event requests 94, the administrator may initiate the lock-event by utilizing the administrator device that is configured to send a lock-event command 102 to the server 30. The lock-event may then occur as previously described (e.g., lock assemblies 28 are automatically locked). At block 312, server 30 sends lock-event directives 76 to the users of the mobile devices 26. At block 314, and after resolution of the lock-event, the administrator may undo the lock-event by sending a resolution command 106 to the server 30 (e.g., causing the lock assemblies to automatically unlock). At block 316, the server 30 may send a resolution notification 108 to the users of the mobile devices 26, thereby notifying the users that the lock-event is resolved. [0064] The various functions described above may be implemented or supported by a computer program that is formed from computer readable program codes, and that is embodied in a computer readable medium. Computer readable program codes may include source codes, object codes, executable codes, and others. Computer readable mediums may be any type of media capable of being accessed by a computer, and may include Read Only Memory (ROM), Random Access Memory (RAM), a hard disk drive, a compact disc (CD), a digital video disc (DVD), or other forms.

[0065] Terms used herein such as component, application, module, system, and the like are intended to refer to a computer-related entity, either hardware, a combination of hardware and software, or software execution. By way of example, an application may be, but is not limited to, a process running on a processor, a processor, an object, an executable, a thread of execution, a program, and/or a computer. It is understood that an application running on a server and the server, may be a component. One or more applications may reside within a process and/or thread of execution and an application may be localized on one computer and/or distributed between two or more computers.

[0066] Advantages and benefits of the present disclosure include a regional lock-state control system 20 capable of leveraging phone network systems to locate and track people, monitor lock states, and gather other information when a region is in, for example, a lockdown event. Other advantages include a system configured to automatically initiate, or immediate the initiation of, a lock-event so that the overall response time is relatively quick and users of the system are immediately notified.

[0067] While the present disclosure is described with reference to illustrated embodiments, it will be understood by those skilled in the art that various changes may be made and equivalents may be substituted without departing from the spirit and scope of the present disclosure. In addition, various modifications may be applied to adapt the teachings of the present disclosure to particular situations, applications, and/or materials, without departing from the essential scope thereof. The present disclosure is thus not limited to the particular examples disclosed herein, but includes all embodiments falling within the scope of the appended claims.