SMARTPHONE BASED PASSIVE KEYLESS ENTRY SYSTEM
First Claim
1. A passive keyless entry system for controlling a locking mechanism associated with an access point, the system comprising:
- a module located in proximity to the access point, the module in electrical communication with the locking mechanism and comprised of a first transceiver, a micro-controller, and memory;
a communication device comprised of a second transceiver, a third transceiver, a micro-processor, and a memory, the third transceiver in communication with a cellular phone network whereby executable code is downloaded from the cellular network to the communication device and stored in memory, and the second transceiver is paired for authorized communications with the first transceiver, the second transceiver transmitting a local wireless signal received by the first transceiver; and
whereby the module micro-controller executes the executable code to calculate the relative signal strength of the received signal at a selected distance of the communication device from the access point, the locking mechanism locking the access point when the signal strength is less than the calculated signal strength value and the locking mechanism unlocking the locking mechanism when the signal strength is greater than the calculated signal strength value.
0 Assignments
0 Petitions
Accused Products
Abstract
A passive keyless entry system is provided comprising an access point module, a smart phone for capable of transmitting an identification and proximity signal, the passive keyless entry system allows the user to program or set the distance for activating the passive triggering of the lock mechanism using radio signal strength indication means of a smart phone. The invention further provides for setting of a parameter boundary whereby the passive keyless entry system is disabled either manually or though an automated process or whereby a user can set a perimeter around a specified point location whereby a passive keyless entry system is disabled when a smart phone is within the perimeter and enabled the passive keyless entry system when outside of the perimeter.
-
Citations
14 Claims
-
1. A passive keyless entry system for controlling a locking mechanism associated with an access point, the system comprising:
-
a module located in proximity to the access point, the module in electrical communication with the locking mechanism and comprised of a first transceiver, a micro-controller, and memory; a communication device comprised of a second transceiver, a third transceiver, a micro-processor, and a memory, the third transceiver in communication with a cellular phone network whereby executable code is downloaded from the cellular network to the communication device and stored in memory, and the second transceiver is paired for authorized communications with the first transceiver, the second transceiver transmitting a local wireless signal received by the first transceiver; and whereby the module micro-controller executes the executable code to calculate the relative signal strength of the received signal at a selected distance of the communication device from the access point, the locking mechanism locking the access point when the signal strength is less than the calculated signal strength value and the locking mechanism unlocking the locking mechanism when the signal strength is greater than the calculated signal strength value. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11)
-
-
12. A method for passively locking and unlocking an access point comprising the steps of:
-
1. associating module comprising a first transceiver, a micro-controller and a first memory, the module in electrical communication with a locking mechanism in proximity to the access point; 2. pairing for authorized communications with the module a communication device having a second transceiver, a third transceiver in communication with a cellular network, a micro-controller and a second memory, the communication device maintaining in the second memory executable code received from the third transceiver; 3. accessing the executable code on the communication device; 4. moving the communication device to a distance from the access point; 5. transmitting a signal from the second transceiver and receiving the signal at the first transceiver; 6. determining the signal strength of the transmitted signal at the distance from the access point; 7. providing a lock command to the lock mechanism when the signal strength is less than the determined signal strength and providing an unlock command to the lock mechanism when the signal strength is greater than the determined signal strength. - View Dependent Claims (13, 14)
-
Specification