Door lock system

Abstract

Provided is a door lock system, which can control a door lock using a user's own terminal without regard to kinds of the user's terminal and mobile service providers that the user's terminal has been registered. The door lock system includes: an entrance door provided at one side of a building; a door lock provided at one side of the entrance door for controlling opening and closing of the entrance door; and a terminal for providing a communication signal to the door lock through communication with the door lock.

Claims

1 . A door lock system comprising: an entrance door provided at one side of a building; a door lock provided at one side of the entrance door for controlling opening and closing of the entrance door; and a terminal for providing a communication signal to the door lock through communication with the door lock. 2 . The door lock system according to claim 1 , wherein the terminal includes: a phone number provided from a communication service provider corresponding to a communication signal; and a caller phone number provision center executing communication with the terminal for providing the phone number provided from the communication service provider as a caller identification service (CID: Caller ID), wherein the door lock includes the phone number provided from the communication service provider and a phone number of a previously registered terminal, executes communication with the caller phone number provision center, and then, is unlocked in the case that the phone number received from the caller phone number provision center is agreed with one of the phone numbers of the previously registered terminal, when it gets a phone call from the terminal. 3 . The door lock system according to claim 1 , wherein the terminal further includes a first wireless LAN part for sending a secrete access number corresponding to a communication signal, and wherein the door lock includes a previously registered secrete access number and a second wireless LAN part for executing communication with the first wireless LAN part, and is unlocked in the case that the secrete access number sent through the first wireless LAN part and received through the second wireless LAN part is agreed with one of the previously registered secrete access numbers. 4 . The door lock system according to claim 1 , further comprising: a door phone provided at the other side of the building, wherein the terminal includes a phone number provided by the communication service provider, and further includes a previously designated entrance door opening button corresponding to the communication signal for controlling the door lock in communication with the door lock, and wherein the door lock includes a phone number provided by the communication service provider and a phone number of the previously registered terminal, executes communication with the door phone, makes a call to the terminal having the phone number of the previously registered terminal in synchronism with a call signal when a visitor tries to open the entrance door by the call signal through the door phone, and in the case that the user of the terminal having the phone number of the previously registered terminal checks the visitor by a voice or an image through the door phone and allows the visitor access, is unlocked when the user of the terminal selectively presses the previously designated entrance door opening button while being on the phone. 5 . The door lock system according to claim 1 , further comprising: a door phone provided at the other side of the building, wherein the terminal includes: a phone number provided from a communication service provider corresponding to a communication signal; and a caller phone number provision center executing communication with the terminal for providing the phone number provided from the communication service provider as a caller identification service (CID: Caller ID), and wherein the door lock includes the phone number provided from the communication service provider and a phone number of a previously registered terminal, executes communication with the door phone and the caller phone number provision center, makes a call to the terminal having the phone number of the previously registered terminal in synchronism with a call signal when a visitor tries to open the entrance door by the call signal through the door phone, and in the case that the user of the terminal having the phone number of the previously registered terminal checks the visitor by a voice or an image through the door phone and allows the visitor access, is unlocked in the case that the phone number received from the caller phone number provision center is agreed with one of the phone numbers of the previously registered terminal when it gets a call from the terminal after the visitor ends the call with the user. 6 . The door lock system according to claim 1 , wherein the terminal further includes a first wireless LAN part for sending identification information corresponding to a communication signal, and wherein the door lock includes identification information of a previously registered terminal and a second wireless LAN part for executing communication with the first wireless LAN part, and when the terminal is in a communication range, is unlocked in the case that identification information sent through the first wireless LAN part and received through the second wireless LAN part is agreed with one of identification information of the previously registered terminal. 7 . The door lock system according to claim 1 , wherein the terminal further includes a first wireless LAN part for sending identification information corresponding to a communication signal, and a door lock application execution part for executing a door lock application to communicate with the door lock and control the door lock, and wherein the door lock includes identification information of a previously registered terminal and a second wireless LAN part for executing communication with the first wireless LAN part, provides a door lock application execution signal to the terminal so as to execute the door lock application execution part in the case that identification information sent through the first wireless LAN part and received through the second wireless LAN part when the terminal is in a communication range is agreed with one of identification information of the previously registered terminal, and is controlled by a door lock application of the user's terminal. 8 . The door lock system according to claim 1 , wherein the terminal further includes a first wireless LAN part for sending identification information and a secrete access number corresponding to a communication signal, and a door lock application execution part for executing a door lock application to communicate with the door lock and control the door lock, and wherein the door lock includes identification information of a previously registered terminal and a previously registered secrete access number and a second wireless LAN part for executing communication with the first wireless LAN part, provides a door lock application execution signal to the terminal so as to execute the door lock application execution part in the case that identification information sent through the first wireless LAN part and received through the second wireless LAN part when the terminal is in a communication range is agreed with one of identification information of the previously registered terminal, and is controlled by a door lock application of the user's terminal when the user of the terminal using the door lock application inputs a secrete access number agreeing with one of the previously registered secrete access numbers. 9 . The door lock system according to claim 1 , wherein the terminal further includes a first wireless LAN part for sending identification information corresponding to a communication signal, and a door lock application execution part having a previously registered secrete access number for executing a door lock application to communicate with the door lock and control the door lock, and wherein the door lock includes identification information of a previously registered terminal and a second wireless LAN part for executing communication with the first wireless LAN part, provides a door lock application execution signal to the terminal so as to execute the door lock application execution part in the case that identification information sent through the first wireless LAN part and received through the second wireless LAN part when the terminal is in a communication range is agreed with one of identification information of the previously registered terminal, and is controlled by a door lock application of the user's terminal when the user of the terminal using the door lock application inputs a secrete access number agreeing with one of the previously registered secrete access numbers. 10 . The door lock system according to claim 1 , further comprising a server for relaying communication between the terminal and the door lock, wherein the door lock is periodically connected to the server, and executes communication with the terminal through relay of the server when communication is requested from the server by a server connection of the terminal. 11 . The door lock system according to claim 1 , further comprising a server for relaying communication between the terminal and the door lock, wherein the terminal is periodically connected to the server, and executes communication with the door lock through relay of the server when communication is requested from the server by a server connection of the door lock. 12 . The door lock system according to claim 1 , further comprising: a door lock application execution part for executing a door lock application to communicate with the door lock and control the door lock; and a server for relaying communication between the terminal and the door lock, wherein the door lock is synchronized when a visitor tries to open the entrance door, provides a door lock application execution signal to the terminal by the server through the server connection of the terminal so as to execute the door lock application execution part, and is controlled by the door lock application through relay of the server. 13 . The door lock system according to claim 1 , further comprising: a door lock application execution part for executing a door lock application to communicate with the door lock and control the door lock; and a server for relaying communication between the terminal and the door lock, wherein the door lock includes a previously registered secrete access number, is synchronized when a visitor tries to open the entrance door, provides a door lock application execution signal to the terminal by the server through the server connection of the terminal so as to execute the door lock application execution part, and is controlled by the door lock application through relay of the server when a secrete access number agreeing with one of the previously registered secrete access numbers is inputted by the user's door lock application. 14 . The door lock system according to claim 1 , further comprising: a door phone provided at the other side of the building; a door lock application execution part for executing a door lock application to communicate with the door lock and control the door lock; and a server for relaying communication between the terminal and the door lock, wherein the door lock includes the phone number provided from the communication service provider and a phone number of a previously registered terminal, executes communication with the terminal and the door phone, makes a call to the terminal having the phone number of the previously registered terminal in synchronism with a call signal when a visitor tries to open the entrance door by the call signal through the door phone, provides a door lock application execution signal to the terminal by the user of the terminal in a state where it is periodically connected to the server, and is controlled by the door lock application by the user of the terminal through relay of the server when communication is requested from the server by a server connection of the terminal synchronized when the door lock application execution part is executed. 15 . The door lock system according to claim 1 , further comprising: a door phone provided at the other side of the building; a door lock application execution part for executing a door lock application to communicate with the door lock and control the door lock; and a server for relaying communication between the terminal and the door lock, wherein the door lock includes the phone number provided from the communication service provider, a phone number of a previously registered terminal and a previously registered phone number, executes communication with the door phone, makes a call to the terminal having the phone number of the previously registered terminal in synchronism with a call signal when a visitor tries to open the entrance door by the call signal through the door phone, provides a door lock application execution signal to the terminal by the user of the terminal in a state where it is periodically connected to the server, receives a request of communication from the server by a server connection of the terminal synchronized when the door lock application execution part is executed, and is controlled by the door lock application when the user of the terminal inputs a secrete access number agreeing with one of the previously registered secrete access numbers using the door lock application through relay of the server. 16 . The door lock system according to claim 1 , wherein the terminal manipulates the door lock remotely so as to register a phone number of a new terminal, and checks, changes or deletes the phone number of the terminal previously registered in the door lock. 17 . The door lock system according to claim 1 , wherein the terminal manipulates the door lock remotely so as to register a new secrete access number, and checks, changes or deletes the secrete access number previously registered in the door lock. 18 . The door lock system according to claim 7 , further comprising: a door phone provided at the other side of the building having the door lock for executing communication with the door lock, wherein the door lock application is provided to allow the user of the terminal to check one of a visitor's voice and image provided to the door lock application execution part. 19 . The door lock system according to claim 14 , wherein the door lock application is provided to allow the user of the terminal to check one of a visitor's voice and image provided to the door lock application execution part from the door phone. 20 . The door lock system according to claim 1 , wherein the door lock includes a previously set network key and executes communication with the terminal when a network key received from the terminal is agreed with the previously set network key. 21 . The door lock system according to claim 1 , wherein the terminal is one of a phone and a remote controller.
BACKGROUND OF THE INVENTION [0001] 1. Field of the Invention [0002] The present invention relates to a door lock system. [0003] 2. Background Art [0004] In general, electronic door locks have been provided in order to make up for the weakness of traditional door locks to which keys are used and to enhance convenience in use. [0005] Recently, studies on a door lock system for preventing theft of a key for the door lock and an illegal use of the entrance door and for maximizing security and convenience by controlling the door lock using a user's own terminal have been continued. SUMMARY OF THE INVENTION [0006] Accordingly, the present invention has been made to solve the above-mentioned problems occurring in the prior arts, and it is an object of the present invention to provide a door lock system, which can control a door lock using a user's own terminal without regard to kinds of the user's terminal and mobile service providers that the user's terminal has been registered. [0007] It is another object of the present invention to provide a door lock system, which can control the door lock remotely when there is a visitor who does not have the terminal whose phone number is registered in the door lock. [0008] It is a further object of the present invention to provide a door lock system, which can control the door lock using the user's own terminal without regard to kinds of the terminal if the terminal can execute a door lock application. [0009] It is a still further object of the present invention to provide a door lock system, which can preclude a person, who does not have a registered terminal, from controlling the door lock because identification information of a terminal of a person who will gain admission has been registered in advance. [0010] It is another object of the present invention to provide a door lock system, which can preclude a person, who does not have a registered terminal, from controlling the door lock because identification information of a terminal of a person who will gain admission has been registered in advance, and which can prevent the person, who does not have the registered terminal, from stealing the registered terminal and illegally using the door because a secrete access number has been registered in advance. [0011] It is a further object of the present invention to provide a door lock system, which can preclude a person, who does not have a registered terminal, from controlling the door lock because identification information of a terminal of a person who will gain admission has been registered in advance, which prevents communication between the door lock and a terminal to which a network key of the door lock was not set because the network key of the door lock has been set to the user's terminal in advance, and which can prevent the person, who does not have the registered terminal, from stealing the registered terminal and illegally using the door because a secrete access number has been registered in advance, thereby maximizing security. [0012] To achieve the above objects, the present invention provides a door lock system including: an entrance door provided at one side of a building; a door lock provided at one side of the entrance door for controlling opening and closing of the entrance door; and a terminal for providing a communication signal to the door lock through communication with the door lock. [0013] The door lock system according to the present invention has the following effects. [0014] First, the door lock system can control the door lock using the user's own terminal without regard to kinds of the user's terminal and mobile service providers that the user's terminal has been registered. [0015] Second, the door lock system can control the door lock remotely when there is a visitor who does not have the terminal whose phone number is registered in the door lock. [0016] Third, the door lock system can control the door lock using the user's own terminal without regard to kinds of the terminal if the terminal can execute a door lock application. [0017] Fourth, the door lock system can preclude a person, who does not have a registered terminal, from controlling the door lock because identification information of a terminal of a person who will gain admission has been registered in advance. [0018] Fifth, the door lock system can preclude a person, who does not have a registered terminal, from controlling the door lock because identification information of a terminal of a person who will gain admission has been registered in advance, and prevent the person, who does not have the registered terminal, from stealing the registered terminal and illegally using the door because a secrete access number has been registered in advance. [0019] Sixth, the door lock system can preclude a person, who does not have a registered terminal, from controlling the door lock because identification information of a terminal of a person who will gain admission has been registered in advance, prevent communication between the door lock and a terminal, to which a network key of the door lock was not set, because the network key of the door lock has been set to the user's terminal in advance, and prevent the person, who does not have the registered terminal, from stealing the registered terminal and illegally using the door because a secrete access number has been registered in advance, thereby maximizing security. BRIEF DESCRIPTION OF THE DRAWINGS [0020] The above and other objects, features and advantages of the present invention will be apparent from the following detailed description of the preferred embodiments of the invention in conjunction with the accompanying drawings, in which: [0021] FIG. 1 is a block diagram of a door lock system according to a first preferred embodiment of the present invention; [0022] FIG. 2 is a block diagram of a door lock system according to a second preferred embodiment of the present invention; [0023] FIG. 3 is a block diagram of a door lock system according to third and fourth preferred embodiments of the present invention; [0024] FIG. 4 is a block diagram of a door lock system according to a fifth preferred embodiment of the present invention; [0025] FIG. 5 is a block diagram of a door lock system according to a sixth preferred embodiment of the present invention; [0026] FIG. 6 is a block diagram of a door lock system according to seventh, eighth and ninth preferred embodiments of the present invention; [0027] FIG. 7 is a block diagram of a door lock system according to tenth, eleventh and twelfth preferred embodiments of the present invention; [0028] FIG. 8 is a block diagram of a door lock system according to thirteenth and fourteenth preferred embodiments of the present invention; [0029] FIG. 9 is a block diagram of a door lock system according to fifteenth and sixteenth preferred embodiments of the present invention; and [0030] FIG. 10 is a block diagram of a door lock system according to seventeenth, eighteenth, nineteenth and twentieth preferred embodiments of the present invention; DETAILED DESCRIPTION OF THE PREFERRED EMBODIMENT [0031] Reference will be now made in detail to the preferred embodiment of the present invention with reference to the attached drawings. Embodiment 1 [0032] FIG. 1 is a block diagram of a door lock system according to a first preferred embodiment of the present invention. [0033] Referring to FIG. 1 , the door lock system 100 according to the first preferred embodiment of the present invention includes an entrance door 102 , a terminal 104 , and a door lock 106 . [0034] The entrance door 102 is not illustrated in the drawing, but is provided at one side of a building (not shown). [0035] The door lock 106 is provided at one side of the entrance door 102 for controlling opening and closing of the entrance door 102 . [0036] Moreover, the door lock 106 includes a network key previously set, and executes communication with the terminal 104 when the network key received from the terminal 104 is agreed with the previously set network key. [0037] The terminal 104 executes communication with the door lock 106 so as to provide a communication signal to the door lock 106 . [0038] Here, the terminal 104 may be at least one of a telephone and a remote controller. [0039] In this instance, in the case that the terminal 104 is the telephone, the terminal 104 may be at least one of a mobile communication terminal, a wire phone, a wire and wireless IP phone, and a smart phone. [0040] Furthermore, in the case that the terminal 104 is the remote controller, the terminal 104 may be at least one of a Pc having a phone number, a mobile PC having a phone number, and a special device having a phone number. [0041] In this instance, in the case that the terminal 104 is the remote controller, the terminal 104 may include at least one of a PSTN phone module (not shown), a mobile communication phone module (not shown), and a wire and wireless IP phone module (not shown). [0042] Additionally, the terminal 104 may manipulate the door lock 106 remotely so as to register a phone number of a new terminal, and can check, change and delete the phone number of the terminal which has been previously registered in the door lock 106 . [0043] In addition, the terminal 104 may manipulate the door lock 106 remotely so as to register a new secrete access number, and can check, change and delete the secrete access number which has been previously registered in the door lock 106 . [0044] In the meantime, not shown in the drawing, but the entrance door 102 , the terminal 104 and the door lock 106 of the door lock system according to the first preferred embodiment of the present invention can execute communication with one another by at least one of the wire communication method and the wireless communication method. [0045] In this instance, the wireless communication method is executed through at least one of WiFi connection, WiFi direct connection, and binary CDMA connection. [0046] Moreover, the wireless communication method can execute communication through a mobile phone network or a wireless Internet phone network based on at least one of CDMA, GSM, WCDMA, LTE, Wibro, and Wimax, and the wire communication method can execute communication through a wire phone network or a wire Internet phone network. [0047] In this instance, not shown in the drawing, but the door lock 106 of the door lock system according to the first preferred embodiment of the present invention may include an Internet sharer (not shown), which is means for sharing the Internet, in an integrated type or a separated type. Embodiment 2 [0048] FIG. 2 is a block diagram of a door lock system according to a second preferred embodiment of the present invention. [0049] Referring to FIG. 2 , the door lock system 200 according to the second preferred embodiment of the present invention includes an entrance door 202 , a terminal 204 , a door lock 206 , and a caller phone number provision center 208 . [0050] The entrance door 202 is not illustrated in the drawing, but is provided at one side of a building (not shown). [0051] The door lock 206 is provided at one side of the entrance door 202 for controlling opening and closing of the entrance door 202 . [0052] Moreover, the door lock 206 includes a network key previously set, and executes communication with the terminal 204 when the network key received from the terminal 204 is agreed with the previously set network key. [0053] The terminal 204 executes communication with the door lock 206 so as to provide a communication signal to the door lock 206 . [0054] Here, the terminal 204 may be at least one of a telephone and a remote controller. [0055] In this instance, in the case that the terminal 204 is the telephone, the terminal 204 may be at least one of a mobile communication terminal, a wire phone, a wire and wireless IP phone, and a smart phone. [0056] Furthermore, in the case that the terminal 204 is the remote controller, the terminal 204 may be at least one of a PC having a phone number, a mobile PC having a phone number, and a special device having a phone number. [0057] In this instance, in the case that the terminal 204 is the remote controller, the terminal 204 may include at least one of a PSTN phone module (not shown), a mobile communication phone module (not shown), and a wire and wireless IP phone module (not shown). [0058] Additionally, the terminal 204 may manipulate the door lock 206 remotely so as to register a phone number of a new terminal, and can check, change and delete the phone number of the terminal which has been previously registered in the door lock 106 . [0059] Here, the terminal 204 of the door lock system 200 according to the second preferred embodiment of the present invention may include a phone number provided by a communication service provider corresponding to the communication signal. [0060] Moreover, the door lock system 200 according to the second preferred embodiment of the present invention may further include a caller phone number provision center 208 . [0061] That is, the caller phone number provision center 208 executes communication with the terminal 204 so as to provide the phone number, which is provided by the communication service provider and sent from the terminal 204 , as a caller identification service (CID: Caller ID). [0062] Furthermore, the door lock 206 of the door lock system 200 according to the second preferred embodiment of the present invention may include a phone number provided by the communication service provider and a phone number of the previously registered terminal 204 , and execute communication with the caller phone number provision center 208 . [0063] When the door lock 206 gets a call from the terminal 204 , the door lock 206 of the door lock system 200 according to the second preferred embodiment of the present invention is unlocked when the phone number received from the caller phone number provision center 208 is agreed with one of the phone numbers of the previously registered terminal 204 . [0064] In the meantime, not shown in the drawing, but the entrance door 202 , the terminal 204 , the door lock 206 , and the caller phone number provision center 208 of the door lock system 200 according to the second preferred embodiment of the present invention can execute communication with one another by at least one of the wire communication method and the wireless communication method. [0065] In this instance, the wireless communication method is executed through at least one of WiFi connection, WiFi direct connection, and binary CDMA connection. [0066] Moreover, the wireless communication method can execute communication through a mobile phone network or a wireless Internet phone network based on at least one of CDMA, GSM, WCDMA, LTE, Wibro, and Wimax, and the wire communication method can execute communication through a wire phone network or a wire Internet phone network. [0067] In this instance, not shown in the drawing, but the door lock 206 of the door lock system 200 according to the second preferred embodiment of the present invention may include an Internet sharer (not shown), which is means for sharing the Internet, in an integrated type or a separated type. Embodiments 3 and 4 [0068] FIG. 3 is a block diagram of a door lock system according to third and fourth preferred embodiments of the present invention. [0069] Referring to FIG. 3 , the door lock system 300 according to the third and fourth preferred embodiments of the present invention includes an entrance door 302 , a terminal 304 , and a door lock 306 . [0070] The entrance door 302 is not illustrated in the drawing, but is provided at one side of a building (not shown). [0071] The door lock 306 is provided at one side of the entrance door 302 for controlling opening and closing of the entrance door 302 . [0072] Moreover, the door lock 306 includes a network key previously set, and executes communication with the terminal 304 when the network key received from the terminal 304 is agreed with the previously set network key. [0073] The terminal 304 executes communication with the door lock 306 so as to provide a communication signal to the door lock 306 . [0074] Here, the terminal 304 may be at least one of a telephone and a remote controller. [0075] In this instance, in the case that the terminal 304 is the telephone, the terminal 304 may be at least one of a mobile communication terminal, a wire phone, a wire and wireless IP phone, and a smart phone. [0076] Furthermore, in the case that the terminal 304 is the remote controller, the terminal 104 may be at least one of a Pc having a phone number, a mobile PC having a phone number, and a special device having a phone number. [0077] In this instance, in the case that the terminal 304 is the remote controller, the terminal 304 may include at least one of a PSTN phone module (not shown), a mobile communication phone module (not shown), and a wire and wireless IP phone module (not shown). [0078] In addition, the terminal 304 may manipulate the door lock 306 remotely so as to register a new secrete access number, and can check, change and delete the secrete access number which has been previously registered in the door lock 306 . [0079] Here, the terminal 304 of the door lock system 300 according to the third and fourth preferred embodiments of the present invention may further include a first wireless LAN part 304 a which sends a secrete access number corresponding to the communication signal. [0080] Moreover, the door lock 306 of the door lock system 300 according to the third and fourth preferred embodiments of the present invention may further include a second wireless LAN part 306 a which has a previously registered secrete access number for executing communication with the first wireless LAN part 304 a. [0081] The door lock 306 of the door lock system 300 according to the third and fourth preferred embodiments of the present invention is unlocked when the phone number sent by the first wireless LAN part 304 a of the terminal 304 and received from the second wireless LAN part 306 a is agreed with one of the phone numbers of the previously registered secrete access numbers. [0082] In the meantime, here, the terminal 304 of the door lock system 300 according to the third and fourth preferred embodiments of the present invention may further include a first wireless LAN part 304 a which sends identification information corresponding to the communication signal. [0083] Moreover, the door lock 306 of the door lock system 300 according to the third and fourth preferred embodiments of the present invention may further include a second wireless LAN part 306 a having identification information of the previously registered terminal 304 for executing communication with the first wireless LAN part 304 a. [0084] In this instance, the identification information may include at least one of MAC (Media Access Control) address and an IMEI (International Mobile Equipment Identity). [0085] The door lock 306 of the door lock system 300 according to the third and fourth preferred embodiments of the present invention is unlocked when the identification information sent from the first wireless LAN part 304 a of the terminal 304 and received through the second wireless LAN part 306 a when a user of the terminal 304 is in a communication range is agreed with one of the identification information of the previously registered terminal 304 . [0086] In the meantime, not shown in the drawing, but the entrance door 302 , the terminal 304 and the door lock 306 of the door lock system 300 according to the third and fourth preferred embodiments of the present invention can execute communication with one another by at least one of the wire communication method and the wireless communication method. [0087] In this instance, the wireless communication method is executed through at least one of WiFi connection, WiFi direct connection, and binary CDMA connection. [0088] Moreover, the wireless communication method can execute communication through a mobile phone network or a wireless Internet phone network based on at least one of CDMA, GSM, WCDMA, LTE, Wibro, and Wimax, and the wire communication method can execute communication through a wire phone network or a wire Internet phone network. [0089] In this instance, not shown in the drawing, but the door lock 306 of the door lock system 300 according to the third and fourth preferred embodiments of the present invention may include an Internet sharer (not shown), which is means for sharing the Internet, in an integrated type or a separated type. Embodiment 5 [0090] FIG. 4 is a block diagram of a door lock system according to a fifth preferred embodiment of the present invention. [0091] Referring to FIG. 4 , the door lock system 400 according to the fifth preferred embodiment of the present invention includes an entrance door 402 , a terminal 404 , a door lock 406 , and a door phone 410 . [0092] The entrance door 402 is not illustrated in the drawing, but is provided at one side of a building (not shown). [0093] The door lock 406 is provided at one side of the entrance door 402 for controlling opening and closing of the entrance door 402 . [0094] Moreover, the door lock 406 includes a network key previously set, and executes communication with the terminal 404 when the network key received from the terminal 404 is agreed with the previously set network key. [0095] The terminal 404 executes communication with the door lock 406 so as to provide a communication signal to the door lock 406 . [0096] Here, the terminal 404 may be at least one of a telephone and a remote controller. [0097] In this instance, in the case that the terminal 404 is the telephone, the terminal 404 may be at least one of a mobile communication terminal, a wire phone, a wire and wireless IP phone, and a smart phone. [0098] Furthermore, in the case that the terminal 404 is the remote controller, the terminal 404 may be at least one of a Pc having a phone number, a mobile PC having a phone number, and a special device having a phone number. [0099] In this instance, in the case that the terminal 404 is the remote controller, the terminal 404 may include at least one of a PSTN phone module (not shown), a mobile communication phone module (not shown), and a wire and wireless IP phone module (not shown). [0100] Additionally, the terminal 404 may manipulate the door lock 406 remotely so as to register a phone number of a new terminal, and can check, change and delete the phone number of the terminal which has been previously registered in the door lock 406 . [0101] Here, the door lock system 400 according to the fifth preferred embodiment of the present invention may include a door phone 410 provided at the other side of the building (not shown). [0102] Moreover, the terminal of the door lock system 400 according to the fifth preferred embodiment of the present invention may include a phone number provided by the communication service provider, and further include a previously designated entrance door opening button 404 b corresponding to a communication signal for controlling the door lock 406 in communication with the door lock 406 . [0103] Furthermore, the door lock 406 of the door lock system 400 according to the fifth preferred embodiment of the present invention may include a phone number provided by the communication service provider and a phone number of the previously registered terminal 404 , and execute communication with the door phone 410 . [0104] When a visitor tries to open the entrance door 402 by a call signal through the door phone 410 , the door lock 406 of the door lock system 400 according to the fifth preferred embodiment of the present invention makes a call to the terminal 404 having the phone number of the previously registered terminal 404 in synchronism with the call signal. [0105] After that, in the case that the user of the terminal 404 having the phone number of the previously registered terminal 404 checks the visitor by a voice or an image through the door phone 410 and allows the visitor access, when the user of the terminal 404 selectively presses the previously designated entrance door opening button 404 b while being on the phone, the door lock 406 of the door lock system 400 according to the fifth preferred embodiment of the present invention is unlocked. [0106] In the meantime, not shown in the drawing, but the entrance door 402 , the terminal 404 , the door lock 406 , and the door phone 410 of the door lock system 400 according to the fifth preferred embodiment of the present invention can execute communication with one another by at least one of the wire communication method and the wireless communication method. [0107] In this instance, the wireless communication method is executed through at least one of WiFi connection, WiFi direct connection, and binary CDMA connection. [0108] Moreover, the wireless communication method can execute communication through a mobile phone network or a wireless Internet phone network based on at least one of CDMA, GSM, WCDMA, LTE, Wibro, and Wimax, and the wire communication method can execute communication through a wire phone network or a wire Internet phone network. [0109] In this instance, not shown in the drawing, but the door lock 406 of the door lock system 400 according to the fifth preferred embodiment of the present invention may include an Internet sharer (not shown), which is means for sharing the Internet, in an integrated type or a separated type. Embodiment 6 [0110] FIG. 5 is a block diagram of a door lock system according to a sixth preferred embodiment of the present invention. [0111] Referring to FIG. 5 , the door lock system 500 according to the sixth preferred embodiment of the present invention includes an entrance door 502 , a terminal 504 , a door lock 506 , and a door phone 510 . [0112] The entrance door 502 is not illustrated in the drawing, but is provided at one side of a building (not shown). [0113] The door lock 506 is provided at one side of the entrance door 502 for controlling opening and closing of the entrance door 502 . [0114] Moreover, the door lock 506 includes a network key previously set, and executes communication with the terminal 504 when the network key received from the terminal 504 is agreed with the previously set network key. [0115] The terminal 504 executes communication with the door lock 506 so as to provide a communication signal to the door lock 506 . [0116] Here, the terminal 504 may be at least one of a telephone and a remote controller. [0117] In this instance, in the case that the terminal 504 is the telephone, the terminal 504 may be at least one of a mobile communication terminal, a wire phone, a wire and wireless IP phone, and a smart phone. [0118] Furthermore, in the case that the terminal 504 is the remote controller, the terminal 504 may be at least one of a PC having a phone number, a mobile PC having a phone number, and a special device having a phone number. [0119] In this instance, in the case that the terminal 504 is the remote controller, the terminal 504 may include at least one of a PSTN phone module (not shown), a mobile communication phone module (not shown), and a wire and wireless IP phone module (not shown). [0120] Additionally, the terminal 504 may manipulate the door lock 506 remotely so as to register a phone number of a new terminal, and can check, change and delete the phone number of the terminal which has been previously registered in the door lock 506 . [0121] Here, the door lock system 500 according to the sixth preferred embodiment of the present invention may include a door phone 510 provided at the other side of the building (not shown). [0122] Moreover, the terminal 504 of the door lock system 500 according to the sixth preferred embodiment of the present invention may include a phone number provided by the communication service provider corresponding to the communication signal. [0123] Furthermore, the door lock system 500 according to the sixth preferred embodiment of the present invention may further include a caller phone number provision center 508 . [0124] That is, the caller phone number provision center 508 executes communication with the terminal 504 so as to provide the phone number, which is provided by the communication service provider and sent from the terminal 504 , as a caller identification service (CID: Caller ID). [0125] Furthermore, the door lock 506 of the door lock system 500 according to the sixth preferred embodiment of the present invention may include a phone number provided by the communication service provider and a phone number of the previously registered terminal 504 , and execute communication with the door phone 510 and the caller phone number provision center 508 . [0126] When a visitor tries to open the entrance door 502 by a call signal through the door phone 510 , the door lock 506 makes a call to the terminal 504 having the phone number of the previously registered terminal 504 in synchronism with the call signal. [0127] After that, in the case that the user of the terminal 504 having the phone number of the previously registered terminal 504 checks the visitor by a voice or an image through the door phone 510 and allows the visitor access, the terminal 504 makes a call to the door lock 506 after the user of the terminal 504 hangs up on the visitor. [0128] After that, when the phone number received from the caller phone number provision center 508 is agreed with one of the phone numbers of the previously registered terminal 504 , the door lock 506 is unlocked. [0129] In the meantime, not shown in the drawing, but the entrance door 502 , the terminal 504 , the door lock 506 , the caller phone number provision center 508 , and the door phone 510 of the door lock system 500 according to the sixth preferred embodiment of the present invention can execute communication with one another by at least one of the wire communication method and the wireless communication method. [0130] In this instance, the wireless communication method is executed through at least one of WiFi connection, WiFi direct connection, and binary CDMA connection. [0131] Moreover, the wireless communication method can execute communication through a mobile phone network or a wireless Internet phone network based on at least one of CDMA, GSM, WCDMA, LTE, Wibro, and Wimax, and the wire communication method can execute communication through a wire phone network or a wire Internet phone network. [0132] In this instance, not shown in the drawing, but the door lock 506 of the door lock system 500 according to the sixth preferred embodiment of the present invention may include an Internet sharer (not shown), which is means for sharing the Internet, in an integrated type or a separated type. Embodiments 7, 8 and 9 [0133] FIG. 6 is a block diagram of a door lock system according to seventh, eighth and ninth preferred embodiments of the present invention. [0134] Referring to FIG. 6 , the door lock system 600 according to the seventh, eighth and ninth preferred embodiments of the present invention includes an entrance door 602 , a terminal 604 , and a door lock 606 . [0135] The entrance door 602 is not illustrated in the drawing, but is provided at one side of a building (not shown). [0136] The door lock 606 is provided at one side of the entrance door 602 for controlling opening and closing of the entrance door 602 . [0137] Moreover, the door lock 606 includes a network key previously set, and executes communication with the terminal 604 when the network key received from the terminal 604 is agreed with the previously set network key. [0138] The terminal 604 executes communication with the door lock 606 so as to provide a communication signal to the door lock 606 . [0139] Here, the terminal 604 may be at least one of a telephone and a remote controller. [0140] In this instance, in the case that the terminal 604 is the telephone, the terminal 604 may be at least one of a mobile communication terminal, a wire phone, a wire and wireless IP phone, and a smart phone. [0141] Furthermore, in the case that the terminal 604 is the remote controller, the terminal 604 may be at least one of a PC having a phone number, a mobile PC having a phone number, and a special device having a phone number. [0142] In this instance, in the case that the terminal 604 is the remote controller, the terminal 604 may include at least one of a PSTN phone module (not shown), a mobile communication phone module (not shown), and a wire and wireless IP phone module (not shown). [0143] Additionally, the terminal 604 may manipulate the door lock 606 remotely so as to register a new secrete access number, and can check, change and delete the secrete access number which has been previously registered in the door lock 606 . [0144] Here, the terminal 604 of the door lock system 600 according to the seventh preferred embodiment of the present invention may further include a first wireless LAN part 604 a for sending identification information corresponding to the communication signal and an application execution part 604 c for controlling the door lock 606 in communication with the door lock 606 so as to execute a door lock application. [0145] Moreover, the door lock 606 of the door lock system 600 according to the seventh preferred embodiment of the present invention may further include a second wireless LAN part 606 a having identification information of the previously registered terminal 604 for executing communication with the first wireless LAN part 604 a. [0146] In this instance, the identification information may include at least one of MAC (Media Access Control) address and an IMEI (International Mobile Equipment Identity). [0147] In the case the user of the terminal 604 is in a communication range, when the identification information sent by the first wireless LAN part 604 a of the terminal 604 and received through the second wireless LAN part 606 a is agreed with one of the identification information of the previously registered terminal 604 , a door lock application execution signal is supplied to the terminal 604 and the application execution part 604 c is executed, so that the door lock 606 of the door lock system 600 is controlled by the door lock application manipulated by the user. [0148] In the meantime, the terminal 604 of the door lock system 600 according to the eighth preferred embodiment of the present invention may further include a first wireless LAN part 604 a for sending identification information and a secrete access number corresponding to the communication signal and an application execution part 604 c for controlling the door lock 606 in communication with the door lock 606 so as to execute a door lock application. [0149] Moreover, the door lock 606 of the door lock system 600 according to the eighth preferred embodiment of the present invention may further include a second wireless LAN part 606 a having identification information of the previously registered terminal 604 and the previously registered secrete access number for executing communication with the first wireless LAN part 604 a. [0150] In this instance, the identification information may include at least one of MAC (Media Access Control) address and an IMEI (International Mobile Equipment Identity). [0151] In the case the user of the terminal 604 is in a communication range, when the identification information sent by the first wireless LAN part 604 a of the terminal 604 and received through the second wireless LAN part 606 a is agreed with one of the identification information of the previously registered terminal 604 , a door lock application execution signal is supplied to the terminal 604 and the application execution part 604 c is executed. [0152] After that, when a secrete access number agreeing with one of the previously registered secrete access numbers of the terminal 604 using the door lock application is inputted, the door lock 606 of the door lock system 600 according to the eighth preferred embodiment of the present invention is controlled by the door lock application manipulated by the user. [0153] In the meantime, the terminal 604 of the door lock system 600 according to the ninth preferred embodiment of the present invention may further include a first wireless LAN part 604 a for sending identification information corresponding to the communication signal and an application execution part 604 c having a previously registered secrete number for controlling the door lock 606 in communication with the door lock 606 so as to execute a door lock application. [0154] Moreover, the door lock 606 of the door lock system 600 according to the ninth preferred embodiment of the present invention may further include a second wireless LAN part 606 a having identification information of the previously registered terminal 604 for executing communication with the first wireless LAN part 604 a. [0155] In this instance, the identification information may include at least one of MAC (Media Access Control) address and an IMEI (International Mobile Equipment Identity). [0156] In the case the user of the terminal 604 is in a communication range, when the identification information sent by the first wireless LAN part 604 a of the terminal 604 and received through the second wireless LAN part 606 a is agreed with one of the identification information of the previously registered terminal 604 , a door lock application execution signal is supplied to the terminal 604 and the application execution part 604 c is executed. [0157] After that, when a secrete access number agreeing with one of the previously registered secrete access numbers of the terminal 604 using the door lock application is inputted, the door lock 606 of the door lock system 600 according to the ninth preferred embodiment of the present invention is controlled by the door lock application manipulated by the user. [0158] In the meantime, not shown in the drawing, but the entrance door 602 , the terminal 604 and the door lock 606 of the door lock system 600 according to the seventh, eighth and ninth preferred embodiments of the present invention can execute communication with one another by at least one of the wire communication method and the wireless communication method. In this instance, the wireless communication method is executed through at least one of WiFi connection, WiFi direct connection, and binary CDMA connection. [0159] Moreover, the wireless communication method can execute communication through a mobile phone network or a wireless Internet phone network based on at least one of CDMA, GSM, WCDMA, LTE, Wibro, and Wimax, and the wire communication method can execute communication through a wire phone network or a wire Internet phone network. [0160] In this instance, not shown in the drawing, but the door lock 606 of the door lock system 600 according to the seventh, eighth and ninth preferred embodiments of the present invention may include an Internet sharer (not shown), which is means for sharing the Internet, in an integrated type or a separated type. Embodiments 10, 11 and 12 [0161] FIG. 7 is a block diagram of a door lock system according to tenth, eleventh and twelfth preferred embodiments of the present invention. [0162] Referring to FIG. 7 , the door lock system 700 according to the tenth, eleventh and twelfth preferred embodiments of the present invention includes an entrance door 702 , a terminal 704 , a door lock 706 , and a door phone 710 . [0163] The entrance door 702 is not illustrated in the drawing, but is provided at one side of a building (not shown). [0164] The door lock 706 is provided at one side of the entrance door 702 for controlling opening and closing of the entrance door 702 . [0165] Moreover, the door lock 706 includes a network key previously set, and executes communication with the terminal 704 when the network key received from the terminal 704 is agreed with the previously set network key. [0166] The terminal 704 executes communication with the door lock 706 so as to provide a communication signal to the door lock 706 . [0167] Here, the terminal 704 may be at least one of a telephone and a remote controller. [0168] In this instance, in the case that the terminal 704 is the telephone, the terminal 704 may be at least one of a mobile communication terminal, a wire phone, a wire and wireless IP phone, and a smart phone. [0169] Furthermore, in the case that the terminal 704 is the remote controller, the terminal 704 may be at least one of a PC having a phone number, a mobile PC having a phone number, and a special device having a phone number. [0170] In this instance, in the case that the terminal 704 is the remote controller, the terminal 704 may include at least one of a PSTN phone module (not shown), a mobile communication phone module (not shown), and a wire and wireless IP phone module (not shown). [0171] Additionally, the terminal 704 may manipulate the door lock 706 remotely so as to register a new secrete access number, and can check, change and delete the secrete access number which has been previously registered in the door lock 706 . [0172] Here, the terminal 704 of the door lock system 700 according to the tenth preferred embodiment of the present invention may further include a first wireless LAN part 704 a for sending identification information corresponding to the communication signal and an application execution part 704 c for controlling the door lock 706 in communication with the door lock 706 so as to execute a door lock application. [0173] Moreover, the door lock 706 of the door lock system 600 according to the tenth preferred embodiment of the present invention may further include a second wireless LAN part 706 a having identification information of the previously registered terminal 704 for executing communication with the first wireless LAN part 704 a. [0174] In this instance, the identification information may include at least one of MAC (Media Access Control) address and an IMEI (International Mobile Equipment Identity). [0175] In the case the user of the terminal 704 is in a communication range, when the identification information sent by the first wireless LAN part 704 a of the terminal 704 and received through the second wireless LAN part 706 a is agreed with one of the identification information of the previously registered terminal 704 , a door lock application execution signal is supplied to the terminal 704 and the application execution part 704 c is executed, so that the door lock 706 of the door lock system 700 according to the tenth preferred embodiment of the present invention is controlled by the door lock application manipulated by the user. [0176] The door lock system 700 according to the tenth preferred embodiment of the present invention may further include a door phone 710 . [0177] That is, the door phone 710 is provided at the other side of the building (not shown) having the door lock 706 , and executes communication with the door lock 706 . [0178] In this instance, the user of the terminal 704 checks the visitor by a voice or an image through the door lock application execution part 704 a provided from the door phone 710 using the door lock application. [0179] In the meantime, the terminal 704 of the door lock system 700 according to the eleventh preferred embodiment of the present invention may further include a first wireless LAN part 704 a for sending identification information and a secrete access number corresponding to the communication signal and an application execution part 704 c for controlling the door lock 706 in communication with the door lock 706 so as to execute a door lock application. [0180] Moreover, the door lock 706 of the door lock system 700 according to the eleventh preferred embodiment of the present invention may further include a second wireless LAN part 706 a having identification information of the previously registered terminal 604 and the previously registered secrete access number for executing communication with the first wireless LAN part 704 a. [0181] In this instance, the identification information may include at least one of MAC (Media Access Control) address and an IMEI (International Mobile Equipment Identity). [0182] In the case the user of the terminal 704 is in a communication range, when the identification information sent by the first wireless LAN part 704 a of the terminal 704 and received through the second wireless LAN part 706 a is agreed with one of the identification information of the previously registered terminal 704 , a door lock application execution signal is supplied to the terminal 704 and the application execution part 704 c is executed. [0183] After that, when a secrete access number agreeing with one of the previously registered secrete access numbers of the terminal 704 using the door lock application is inputted, the door lock 706 of the door lock system 700 according to the eleventh preferred embodiment of the present invention is controlled by the door lock application manipulated by the user. [0184] The door lock system 700 according to the eleventh preferred embodiment of the present invention may further include a door phone 710 . [0185] That is, the door phone 710 is provided at the other side of the building (not shown) having the door lock 706 , and executes communication with the door lock 706 . [0186] In this instance, the user of the terminal 704 checks the visitor by a voice or an image through the door lock application execution part 704 a provided from the door phone 710 using the door lock application. [0187] In the meantime, the terminal 704 of the door lock system 700 according to the twelfth preferred embodiment of the present invention may further include a first wireless LAN part 704 a for sending identification information corresponding to the communication signal and an application execution part 704 c having a previously registered secrete access number for controlling the door lock 706 in communication with the door lock 706 so as to execute a door lock application. [0188] Moreover, the door lock 706 of the door lock system 700 according to the twelfth preferred embodiment of the present invention may further include a second wireless LAN part 706 a having identification information of the previously registered terminal 604 for executing communication with the first wireless LAN part 704 a. [0189] In this instance, the identification information may include at least one of MAC (Media Access Control) address and an IMEI (International Mobile Equipment Identity). [0190] In the case the user of the terminal 704 is in a communication range, when the identification information sent by the first wireless LAN part 704 a of the terminal 704 and received through the second wireless LAN part 706 a is agreed with one of the identification information of the previously registered terminal 704 , a door lock application execution signal is supplied to the terminal 704 and the application execution part 704 c is executed. [0191] After that, when a secrete access number agreeing with one of the previously registered secrete access numbers of the terminal 704 using the door lock application is inputted, the door lock 706 of the door lock system 700 according to the twelfth preferred embodiment of the present invention is controlled by the door lock application manipulated by the user. [0192] The door lock system 700 according to the twelfth preferred embodiment of the present invention may further include a door phone 710 . [0193] That is, the door phone 710 is provided at the other side of the building (not shown) having the door lock 706 , and executes communication with the door lock 706 . [0194] In this instance, the user of the terminal 704 checks the visitor by a voice or an image through the door lock application execution part 704 c provided from the door phone 710 using the door lock application. [0195] In the meantime, the entrance door 702 , the terminal 704 , the door lock 706 , and the door phone 710 of the door lock system 700 according to the tenth, eleventh and twelfth preferred embodiments of the present invention can execute communication with one another by at least one of the wire communication method and the wireless communication method. [0196] In this instance, the wireless communication method is executed through at least one of WiFi connection, WiFi direct connection, and binary CDMA connection. [0197] Moreover, the wireless communication method can execute communication through a mobile phone network or a wireless Internet phone network based on at least one of CDMA, GSM, WCDMA, LTE, Wibro, and Wimax, and the wire communication method can execute communication through a wire phone network or a wire Internet phone network. [0198] In this instance, not shown in the drawing, but the door lock 706 of the door lock system 700 according to the tenth, eleventh and twelfth preferred embodiments of the present invention may include an Internet sharer (not shown), which is means for sharing the Internet, in an integrated type or a separated type. Embodiments 13 and 14 [0199] FIG. 8 is a block diagram of a door lock system according to thirteenth and fourteenth preferred embodiments of the present invention. [0200] Referring to FIG. 8 , the door lock system 800 according to the thirteenth and fourteenth preferred embodiments of the present invention includes an entrance door 802 , a terminal 804 , a door lock 806 , and a server 812 . [0201] The entrance door 802 is not illustrated in the drawing, but is provided at one side of a building (not shown). [0202] The door lock 806 is provided at one side of the entrance door 802 for controlling opening and closing of the entrance door 802 . [0203] Moreover, the door lock 806 includes a network key previously set, and executes communication with the terminal 804 when the network key received from the terminal 804 is agreed with the previously set network key. [0204] The terminal 804 executes communication with the door lock 806 so as to provide a communication signal to the door lock 806 . [0205] Here, the terminal 804 may be at least one of a telephone and a remote controller. [0206] In this instance, in the case that the terminal 804 is the telephone, the terminal 804 may be at least one of a mobile communication terminal, a wire phone, a wire and wireless IP phone, and a smart phone. [0207] Furthermore, in the case that the terminal 804 is the remote controller, the terminal 804 may be at least one of a PC having a phone number, a mobile PC having a phone number, and a special device having a phone number. [0208] In this instance, in the case that the terminal 804 is the remote controller, the terminal 804 may include at least one of a PSTN phone module (not shown), a mobile communication phone module (not shown), and a wire and wireless IP phone module (not shown). [0209] Here, the door lock system 800 according to the thirteenth and fourteenth preferred embodiments of the present invention may further include a server 812 . [0210] That is, the server 812 is provided to relay communication between the terminal 804 and the door lock 806 . [0211] In this instance, the door lock 806 of the door lock system 800 according to the thirteenth preferred embodiment executes communication with the terminal 804 by relay of the server 812 when receiving communication from the server 812 by connection of the terminal 804 through the server 812 in a state where it is periodically connected to the server 812 . [0212] That is, the door lock 806 of the door lock system 800 according to the thirteenth preferred embodiment executes communication with the terminal 804 by relay of the server 812 , and then, can check, change or delete the phone number of the previously registered terminal 804 . [0213] In this instance, the terminal 804 manipulates the door lock 806 remotely so as to register a phone number of a new terminal 804 . [0214] Moreover, the terminal 804 can manipulate the door lock 806 so as to register a new secrete access number and can check, change or delete the previously registered secrete access number. [0215] Furthermore, the terminal 804 may provide identification information of the terminal 804 to the door lock 806 . [0216] In this instance, the identification information may include at least one of MAC (Media Access Control) address and an IMEI (International Mobile Equipment Identity). [0217] Additionally, the door lock 806 is unlocked when the identification information received from the terminal 804 is agreed with one of the identification information previously registered in the door lock 806 . [0218] Moreover, the terminal 804 may send the secrete access number to the door lock 806 . [0219] In this instance, the door lock 806 is unlocked when the secrete access number received from the terminal 804 is agreed with one of the secrete access numbers previously registered in the door lock 806 . [0220] Furthermore, not shown in the drawing, but the terminal 804 may be provided in such a manner that the user of the terminal 804 checks the visitor by a voice or an image through the door phone (not shown) communicating with the door lock 806 . [0221] In this instance, in the case that the user of the terminal 804 allows the visitor access, the door lock 806 is unlocked when the user selectively presses the previously designated entrance door opening button (not shown). [0222] Additionally, not shown in the drawing, but the terminal 804 may further include a door lock application execution part (not shown) for executing a door lock application to control the door lock 806 . [0223] In the meantime, in a state where it is periodically connected to the server 812 , the terminal 804 of the door lock system 800 according to the fourteenth preferred embodiment executes communication with the door lock 806 by relay of the server 812 when receiving communication from the server 812 by connection of the terminal 804 through the server 812 synchronized when the visitor tries to open the entrance door 802 . [0224] That is, the terminal 804 of the door lock system 800 according to the fourteenth preferred embodiment executes communication with the door lock 806 by relay of the server 812 , and then, can check, change or delete the phone number of the previously registered terminal 804 . [0225] In this instance, the terminal 804 manipulates the door lock 806 remotely so as to register a phone number of a new terminal 804 . [0226] Moreover, the terminal 804 can manipulate the door lock 806 so as to register a new secrete access number and can check, change or delete the previously registered secrete access number. [0227] Furthermore, the terminal 804 may provide identification information of the terminal 804 to the door lock 806 . [0228] In this instance, the identification information may include at least one of MAC (Media Access Control) address and an IMEI (International Mobile Equipment Identity). [0229] Additionally, the door lock 806 is unlocked when the identification information received from the terminal 804 is agreed with one of the identification information previously registered in the door lock 806 . [0230] Moreover, the terminal 804 may send the secrete access number to the door lock 806 . [0231] In this instance, the door lock 806 is unlocked when the secrete access number received from the terminal 804 is agreed with one of the secrete access numbers previously registered in the door lock 806 . [0232] Furthermore, not shown in the drawing, but the terminal 804 may be provided in such a manner that the user of the terminal 804 checks the visitor by a voice or an image through the door phone (not shown) communicating with the door lock 806 . [0233] In this instance, in the case that the user of the terminal 804 allows the visitor access, the door lock 806 is unlocked when the user selectively presses the previously designated entrance door opening button (not shown). [0234] Additionally, not shown in the drawing, but the terminal 804 may further include a door lock application execution part (not shown) for executing a door lock application to control the door lock 806 . [0235] In the meantime, not shown in the drawing, but the entrance door 802 , the terminal 804 , the door lock 806 , and the server 812 of the door lock system 800 according to the thirteenth and fourteenth preferred embodiments of the present invention can execute communication with one another by at least one of the wire communication method and the wireless communication method. [0236] In this instance, the wireless communication method is executed through at least one of WiFi connection, WiFi direct connection, and binary CDMA connection. [0237] Moreover, the wireless communication method can execute communication through a mobile phone network or a wireless Internet phone network based on at least one of CDMA, GSM, WCDMA, LTE, Wibro, and Wimax, and the wire communication method can execute communication through a wire phone network or a wire Internet phone network. [0238] In this instance, not shown in the drawing, but the door lock 806 of the door lock system 800 according to the thirteenth and fourteenth preferred embodiments of the present invention may include an Internet sharer (not shown), which is means for sharing the Internet, in an integrated type or a separated type. Embodiments 15 and 16 [0239] FIG. 9 is a block diagram of a door lock system according to fifteenth and sixteenth preferred embodiments of the present invention. [0240] Referring to FIG. 9 , the door lock system 900 according to the fifteenth and sixteenth preferred embodiments of the present invention includes an entrance door 902 , a terminal 904 , a door lock 906 , and a server 912 . [0241] The entrance door 902 is not illustrated in the drawing, but is provided at one side of a building (not shown). [0242] The door lock 906 is provided at one side of the entrance door 902 for controlling opening and closing of the entrance door 902 . [0243] Moreover, the door lock 906 includes a network key previously set, and executes communication with the terminal 904 when the network key received from the terminal 904 is agreed with the previously set network key. [0244] The terminal 904 executes communication with the door lock 906 so as to provide a communication signal to the door lock 906 . [0245] Here, the terminal 904 may be at least one of a telephone and a remote controller. [0246] In this instance, in the case that the terminal 904 is the telephone, the terminal 904 may be at least one of a mobile communication terminal, a wire phone, a wire and wireless IP phone, and a smart phone. [0247] Furthermore, in the case that the terminal 904 is the remote controller, the terminal 904 may be at least one of a PC having a phone number, a mobile PC having a phone number, and a special device having a phone number. [0248] In this instance, in the case that the terminal 904 is the remote controller, the terminal 904 may include at least one of a PSTN phone module (not shown), a mobile communication phone module (not shown), and a wire and wireless IP phone module (not shown). [0249] Moreover, the terminal 904 can manipulate the door lock 906 remotely so as to register a new secrete access number and can check, change or delete the secrete access number previously registered in the door lock 906 . [0250] Here, the terminal 904 of the door lock system 900 according to the fifteenth preferred embodiment of the present invention may further include a door lock application execution part 904 c for executing a door lock application to communicate with the door lock 906 and control the door lock 906 . [0251] Furthermore, the door lock system 900 according to the fifteenth preferred embodiment of the present invention may further include a server 912 . [0252] That is, the server 9812 is provided to relay communication between the terminal 904 and the door lock 906 . [0253] In this instance, the door lock 906 is synchronized when the visitor tries to open the entrance door 902 and sends the door lock application execution signal to the terminal 904 by connection of the terminal 904 to the service 912 so as to execute the door lock application execution part 904 c , so that the user of the terminal 904 can control the door lock 906 using the door lock application by relay of the server 912 . [0254] Moreover, the door lock system 900 according to the sixteenth preferred embodiment of the present invention may further include a server 912 . [0255] That is, the server 912 is provided to relay communication between the terminal 904 and the door lock 906 . [0256] In this instance, the door lock 906 is synchronized when the visitor tries to open the entrance door 902 and sends the door lock application execution signal to the terminal 904 by connection of the terminal 904 to the service 912 so as to execute the door lock application execution part 904 c. [0257] After that, when a secrete access number agreeing with one of the previously registered secrete access numbers of the terminal 904 using the door lock application is inputted, the door lock 906 of the door lock system 900 is controlled by the door lock application manipulated by the user. [0258] In the meantime, the entrance door 902 , the terminal 904 , the door lock 906 , and the server 912 of the door lock system 900 according to the fifteenth and sixteenth preferred embodiments of the present invention can execute communication with one another by at least one of the wire communication method and the wireless communication method. [0259] In this instance, the wireless communication method is executed through at least one of WiFi connection, WiFi direct connection, and binary CDMA connection. [0260] Moreover, the wireless communication method can execute communication through a mobile phone network or a wireless Internet phone network based on at least one of CDMA, GSM, WCDMA, LTE, Wibro, and Wimax, and the wire communication method can execute communication through a wire phone network or a wire Internet phone network. [0261] In this instance, not shown in the drawing, but the door lock 906 of the door lock system 900 according to the fifteenth and sixteenth preferred embodiments of the present invention may include an Internet sharer (not shown), which is means for sharing the Internet, in an integrated type or a separated type. Embodiments 17, 18, 19 and 20 [0262] FIG. 10 is a block diagram of a door lock system according to seventeenth, eighteenth, nineteenth and twentieth preferred embodiments of the present invention. [0263] Referring to FIG. 10 , the door lock system 900 according to the seventeenth, eighteenth, nineteenth and twentieth preferred embodiments of the present invention includes an entrance door 1002 , a terminal 1004 , a door lock 1006 , a door phone 1010 and a server 1012 . [0264] The entrance door 1002 is not illustrated in the drawing, but is provided at one side of a building (not shown). [0265] The door lock 1006 is provided at one side of the entrance door 1002 for controlling opening and closing of the entrance door 1002 . [0266] Moreover, the door lock 1006 includes a network key previously set, and executes communication with the terminal 1004 when the network key received from the terminal 1004 is agreed with the previously set network key. [0267] The terminal 1004 executes communication with the door lock 1006 so as to provide a communication signal to the door lock 1006 . [0268] Here, the terminal 1004 may be at least one of a telephone and a remote controller. [0269] In this instance, in the case that the terminal 1004 is the telephone, the terminal 1004 may be at least one of a mobile communication terminal, a wire phone, a wire and wireless IP phone, and a smart phone. [0270] Furthermore, in the case that the terminal 1004 is the remote controller, the terminal 1004 may be at least one of a PC having a phone number, a mobile PC having a phone number, and a special device having a phone number. [0271] In this instance, in the case that the terminal 1004 is the remote controller, the terminal 1004 may include at least one of a PSTN phone module (not shown), a mobile communication phone module (not shown), and a wire and wireless IP phone module (not shown). [0272] In addition, the terminal 1004 can manipulate the door lock 906 remotely so as to register a phone number of a new terminal, and can check, change or delete the phone number of the terminal previously registered in the door lock 1006 . [0273] Moreover, the terminal 1004 can manipulate the door lock 1006 remotely so as to register a new secrete access number and can check, change or delete the secrete access number previously registered in the door lock 1006 . [0274] Here, the terminal 1004 of the door lock system 1000 according to the seventeenth preferred embodiment of the present invention may further include a door lock application execution part 1004 c for executing a door lock application to communicate with the door lock 906 and control the door lock 1006 . [0275] Furthermore, the door lock system 1000 according to the seventeenth preferred embodiment of the present invention may further include a server 1012 . [0276] That is, the server 1012 is provided to relay communication between the terminal 1004 and the door lock 1006 . [0277] In this instance, the door lock 1006 is synchronized when the visitor tries to open the entrance door 1002 and sends the door lock application execution signal to the terminal 1004 by connection of the terminal 1004 to the service 1012 so as to execute the door lock application execution part 1004 c , so that the user of the terminal 1004 can control the door lock 1006 using the door lock application by relay of the server 1012 . [0278] Furthermore, the door lock system 1000 according to the seventeenth preferred embodiment of the present invention may include a door phone 1010 . [0279] That is, the door phone 1010 is provided at the other side of the building (not shown) for executing communication with the door lock 1006 . [0280] In this instance, the user of the terminal 1004 checks the visitor by a voice or an image through the door lock application execution part 1004 c provided from the door phone 1010 using the door lock application. [0281] In the meantime, the terminal 1004 of the door lock system 1000 according to the eighteenth preferred embodiment of the present invention may further include a door lock application execution part 1004 c for executing a door lock application to communicate with the door lock 906 and control the door lock 1006 . [0282] Furthermore, the door lock system 1000 according to the seventeenth preferred embodiment of the present invention may further include a server 1012 . [0283] That is, the server 1012 is provided to relay communication between the terminal 1004 and the door lock 1006 . [0284] In this instance, the door lock 1006 includes a previously registered secrete access number, and is synchronized when the visitor tries to open the entrance door 1002 and sends the door lock application execution signal to the terminal 1004 by connection of the terminal 1004 to the service 1012 so as to execute the door lock application execution part 1004 c. [0285] After that, when a secrete access number agreeing with one of the previously registered secrete access numbers of the terminal 1004 using the door lock application is inputted, the door lock 1006 of the door lock system 1000 is controlled by the door lock application manipulated by the user. [0286] Moreover, the door lock system 1000 according to the eighteenth preferred embodiment may further include a door phone 1010 . [0287] That is, the door phone 1010 is provided at the other side of the building (not shown) for executing communication with the door lock 1006 . [0288] In this instance, the user of the terminal 1004 checks the visitor by a voice or an image through the door lock application execution part 1004 c provided from the door phone 1010 using the door lock application. [0289] Meanwhile, the door lock system 1000 according to the nineteenth preferred embodiment may further include a door phone 1010 provided at the other side of the building (not shown). [0290] Moreover, the terminal 1004 of the door lock system 1000 according to the nineteenth preferred embodiment of the present invention may further include a door lock application execution part 1004 c for executing a door lock application to communicate with the door lock 906 and control the door lock 1006 . [0291] Furthermore, the door lock system 1000 according to the nineteenth preferred embodiment of the present invention may further include a server 1012 . [0292] That is, the server 1012 is provided to relay communication between the terminal 1004 and the door lock 1006 . [0293] In this instance, the door lock 1006 of the door lock system 1000 according to the nineteenth preferred embodiment includes a phone number provided by a communication service provider and a phone number of a previously registered terminal 1004 so as to execute communication with the terminal 1004 and the door phone 1010 . [0294] The door lock 1006 is synchronized to a call signal when the visitor tries to open the entrance door 1002 by the call signal through the door phone 1010 , and makes a call to the terminal 1004 having the phone number of the previously registered terminal 1004 . [0295] After that, in a state where the door lock 1006 is periodically connected to the server 1012 , the door lock 1006 receives communication from the server 1012 through the connection of the terminal 1004 to the server 1012 synchronized when the user of the terminal 1004 executes the door lock application execution part 1004 c by providing a door lock application execution single to the terminal 1004 , the user of the terminal 1004 can control the door lock 1006 using the door lock application by relay of the server 1012 . [0296] In this instance, the user of the terminal 1004 checks the visitor by a voice or an image through the door lock application execution part 1004 c provided from the door phone 1010 using the door lock application. [0297] In the meantime, the door lock system 1000 according to the twentieth preferred embodiment may further include a door phone 1010 provided at the other side of the building (not shown). [0298] Moreover, the terminal 1004 of the door lock system 1000 according to the nineteenth preferred embodiment of the present invention may further include a door lock application execution part 1004 c for executing a door lock application to communicate with the door lock 906 and control the door lock 1006 . [0299] Furthermore, the door lock system 1000 according to the nineteenth preferred embodiment of the present invention may further include a server 1012 . [0300] That is, the server 1012 is provided to relay communication between the terminal 1004 and the door lock 1006 . [0301] In this instance, the door lock 1006 of the door lock system 1000 according to the nineteenth preferred embodiment includes a phone number provided by a communication service provider and a phone number of a previously registered terminal 1004 so as to execute communication with the door phone 1010 . [0302] The door lock 1006 is synchronized to a call signal when the visitor tries to open the entrance door 1002 by the call signal through the door phone 1010 , and makes a call to the terminal 1004 having the phone number of the previously registered terminal 1004 . [0303] After that, in a state where the door lock 1006 is periodically connected to the server 1012 , the door lock 1006 receives communication from the server 1012 through the connection of the terminal 1004 to the server 1012 synchronized when the user of the terminal 1004 executes the door lock application execution part 1004 c by providing a door lock application execution single to the terminal 1004 . [0304] After that, when a secrete access number agreeing with one of the previously registered secrete access numbers of the terminal 1004 using the door lock application is inputted, the door lock 1006 of the door lock system 1000 is controlled by the door lock application manipulated by the user. [0305] In this instance, the user of the terminal 1004 checks the visitor by a voice or an image through the door lock application execution part 1004 c provided from the door phone 1010 using the door lock application. [0306] In the meantime, the entrance door 1002 , the terminal 1004 , the door lock 1006 , and the server 1012 of the door lock system 1000 according to the seventeenth, eighteenth, nineteenth and twentieth preferred embodiments of the present invention can execute communication with one another by at least one of the wire communication method and the wireless communication method. [0307] In this instance, the wireless communication method is executed through at least one of WiFi connection, WiFi direct connection, and binary CDMA connection. [0308] Moreover, the wireless communication method can execute communication through a mobile phone network or a wireless Internet phone network based on at least one of CDMA, GSM, WCDMA, LTE, Wibro, and Wimax, and the wire communication method can execute communication through a wire phone network or a wire Internet phone network. [0309] In this instance, not shown in the drawing, but the door lock 1006 of the door lock system 1000 according to the seventeenth, eighteenth, nineteenth and twentieth preferred embodiments of the present invention may include an Internet sharer (not shown), which is means for sharing the Internet, in an integrated type or a separated type. [0310] It will be understood by those of ordinary skill in the art that the present invention could be made in other forms without changing the essential characteristics and scope of the present invention. Therefore, it would be understood that the embodiments of the present invention have been described exemplarily and the present invention is not limited to the above embodiments. It would be understood that the technical and protective scope of the present invention should be defined by the technical idea as defined by the following claims, and the example embodiments of the present invention are to cover all modifications, equivalents, and alternatives derived from the meaning, scope and equivalent concepts of the scope of the invention.

Description

Topics

Download Full PDF Version (Non-Commercial Use)

Patent Citations (19)

    Publication numberPublication dateAssigneeTitle
    US-2002180582-A1December 05, 2002Nielsen Ernst LykkeElectronic key device a system and a method of managing electronic key information
    US-2004205350-A1October 14, 2004Paul Waterhouse, Verge Christopher W., Vandenberg Michael J., Kenneth Truong, Stevens John K., Jason AugustLow cost secure ID card and system
    US-2006170533-A1August 03, 2006France TelecomMethod and system for controlling networked wireless locks
    US-2007229257-A1October 04, 2007Olle Bliding, Lars Knutsson, Johan HorbergWake-up device and method for generating a control signal
    US-2008106369-A1May 08, 2008Harrow Products LlcAccess control system
    US-2008209228-A1August 28, 2008Chandler Edmonds HMethod and Apparatus for a Merged Power-Communication Cable in Door Security Environment
    US-2009219133-A1September 03, 2009Woodard Scott E, Herbert Greenman, Depeng BiShowing management system to automatically match and control electronic lockboxes
    US-2009219135-A1September 03, 2009Qualcomm IncorportatedDigital over-the-air keying system
    US-2010201482-A1August 12, 2010William Benjamin Robertson, Barden Robert PSystem and method for accessing a structure using a mobile device
    US-2010269553-A1October 28, 2010Min ZhongDouble lock system
    US-2011215899-A1September 08, 2011Ford Global Technologies, LlcMethod and system for authorizing a vehicle driveaway
    US-2011215901-A1September 08, 2011Ford Global Technologies, LlcMethod and system for enabling an authorized vehicle driveaway
    US-2012213362-A1August 23, 2012Phoniro AbDistribution Of Lock Access Data For Electromechanical Locks In An Access Control System
    US-2012280783-A1November 08, 2012Apigy Inc.Systems and methods for controlling a locking mechanism using a portable electronic device
    US-2013024222-A1January 24, 2013Leapin Pty LtdSystem and method for controlling access to electronic locks
    US-2014125453-A1May 08, 2014Yikes CorporationSystem and method for accessing a structure using directional antennas and a wireless token
    US-7321288-B2January 22, 2008Nec CorporationMobile terminal and security remote-control system and method using mobile terminal
    US-8145352-B2March 27, 2012Showingtime.Com, Inc.Showing management system to automatically match and control electronic lockboxes
    US-8754744-B2June 17, 2014Showingtime.Com, Inc.Integrated real estate showing scheduling and key dispensing system

NO-Patent Citations (0)

    Title

Cited By (5)

    Publication numberPublication dateAssigneeTitle
    EP-3065337-A4August 23, 2017Honesttechnology Co LtdSystème permettant de surveiller une porte au moyen d'un portier téléphonique
    US-2015235496-A1August 20, 2015Onity Inc.Systems and methods for lock access management using wireless signals
    US-2016269691-A1September 15, 2016Honesttechnology Co., Ltd.System for monitoring door using door phone
    US-9842446-B2December 12, 2017Onity Inc.Systems and methods for lock access management using wireless signals
    WO-2014031399-A1February 27, 2014Onity Inc.Systems and methods for lock access management using wireless signals