CA1181506A - Security system with multiple levels of access - Google Patents

Security system with multiple levels of access

Info

Publication number
CA1181506A
CA1181506A CA000410011A CA410011A CA1181506A CA 1181506 A CA1181506 A CA 1181506A CA 000410011 A CA000410011 A CA 000410011A CA 410011 A CA410011 A CA 410011A CA 1181506 A CA1181506 A CA 1181506A
Authority
CA
Canada
Prior art keywords
code
pass code
access
predetermined
security
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Expired
Application number
CA000410011A
Other languages
French (fr)
Inventor
James B. Edson
Patrick G. Monroe
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
American District Telegraph Co
Original Assignee
American District Telegraph Co
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by American District Telegraph Co filed Critical American District Telegraph Co
Application granted granted Critical
Publication of CA1181506A publication Critical patent/CA1181506A/en
Expired legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/30Individual registration on entry or exit not involving the use of a pass
    • G07C9/32Individual registration on entry or exit not involving the use of a pass in combination with an identity check
    • G07C9/33Individual registration on entry or exit not involving the use of a pass in combination with an identity check by means of a password

Abstract

SECURITY SYSTEM WITH MULTIPLE LEVEL OF ACCESS

ABSTRACT

A security system is provided with multiple levels of access in which a higher level pass code gives the user access to numerous system functions, such as disarming of the system, resetting, system testing, loop by-passing, and system programming, whereas a lower level pass code gives the user access to less functions, in one embodiment to disarming only a portion of the system. In one embodiment, an eraseable memory is programmed with a number representing a temporary pass code after the entry of a higher order pass code by the individual setting the temporary pass code. The permanent pass code may be made more complex than the temporary pass code to provide an extra level of security by providing that the permanent pass code have more digit. Timing circuitry is provided to establish a temporary pass code entry window during which a temporary pass code may be entered into the eraseable memory. No entry of a temporary pass code within the alloted time results in a disabling of the temporary pass code system.

Description

IELD OF THlE IMVENlION
This invention relates to security systemis and more parti~ularly to a system
2 for providing differing leYels of access to the security system.

~3ACKGROUND OF THE INVENTION
3 Security systems in general reguire the entry of a predetermined digital pass
4 o~ access code in order to disarrn the system so that authorized users of the systam may operate freely within a protected area. The pro~ected area may be a plant7 6 residence or eYen R location within a buildingO These protected areas are 7 commonly protected by two generically different types of systems. The first type 8 of system is usually enabled 24 ;.ours a day and can include fire de1:ection or 9 detection of an emergency situation whie.l, for instance, could be the actuation of a hold-up switch, the occurrence of a medical emergency, or the actuation of a 11 "panic button" ~o indica~e an unspecified emergency. Other types of continuously 12 monitored systems include tamper detection or facility monitoring including the 13 ~ansmission of data such as building temperature, boiler pressure, etc., for 14 recordingandanalysisO
Other types of protection provided by security systems include those which 16 are actuated on a periodic basis, for instance, at night or when personnel leave a 17 protected facility. This type of detection includes volumetric protection in which 18 motion sensors of the ultrasonic, passive infrared, or microwave variety detect 19 motion within a given ~rea. Other types of systems which are actuated on a~ periodic basis are perimeter detection systems and more particularly point 21 1 detection systems in which for instance door contacts are utilized to detect the 22 ¦ intrusion into a building through the door. Vibration detectors detect, for instance, 23 ¦ footsteps or the use of saws and acetylene torches, whereas glass break detectors 24 1I detect the intrusion via the breaking of glass~ Moreover, for safes, capacitive 1~ .

.j proximity detPctors are utilizedO It is a feature of these latter types of protection that they are to be disarmed during off hours by maintenance personnel, char service personnel or others who need access to the facility. It is, however~ desirable that such persomlel not be given overall access to the system to avoid compromising the entire system. More specifically, it is highly detri-mental to give out a single pass code to everyone need~
ing access to a building because this may permit resett-ing of the systemr enable a user to by-pass selected pro-tection loops, or permit a user to reproyram the system.
Such a situation is equivalent to giving out a master key that provides unlimited access to a facility. In short, a single pass code cannot provide for different levels of access. Thus, a single pass code system cannot dis-tinguish between the duties of a general manager and those of a janitor. It is ~herefore convenient that a system be made to ~perate with codes which may be assigned as frequently as on a daily basis so as to provide only limited access for certain levels of personnel.
- For residential applications, it is also some-times desixa~le to permit persons access to a house for a limited period of time as for a vacation without re-vealing a permanent pass code which would enable entry at an other than authorized time. Providing a permanent pass code would, in effect, be giving an individual a master key which could be utilized at any time.
Thus, the security systems which utilize a single pass code suffer from the inability to establish various levels of access to the facility. Moreover, when a single pass code is used, it is not conveniently changed for ~ ~15Q6 temporary access situations, primarily due to problems in notifying all users of the system.
According to the present invention there is pro-vided a multiple priority security system providing mul-tiple levels of personnel access to multiple prioritized security controllers of a secured facility, comprising:
means for storing a predetermined top priority code; a first memory device; input means for writing a first top priority system access code into said first memory device, a~d for writing a second and lower priority system access code into said first memory device; means, connect-ed to said first memory device and to said means for storing said predetermined top priority code, for pro-viding a signal whenever said predetermined top priority code matches said first top priority system access code in said first memory device; means, connected to said in-put means and enabled in response to said signal, for controlling substantially all of said prioritized securi--ty controllers via said input means; a second memory de-vice, coupled to said input means and to said first memory device and enabled by said signal, for storing a predeter-mined ~econd and lower priority code therein via said in-put means; and means connected to said second memory de-vice and to said first memory device and operative in response,to a match between said predetermined second and lower priority code and said second and lower priority system access code for enabling access to preselected lo~er priority ones of said prioritized security control-lers.
In one embodiment, a four digit code is selected and is permanently stored in a programmable read only memory ~PROM). The four digit code permits access to selectable functions which, can include, an alarm dis-arm function ~oth for "home" and "away" in whi~h sensors in a so-called night loop may be disarmed as well as a -communicator such as a dialer which would report an alarm condition to, for instance, a police station, a fire station, or a remotely-located cent~al monitoring station~ Additionally, for those systems provided with alarm delays to permit entry or exit, the entry of the four digit code could provide for an instant alarm indication by cancelling the delay. The four digit code can also permit bypassing of protective loops such as for instance the perimeter detection loops, the motion detector loops and the detector loops for instance pro-tecting a safe within the protection zone. The entry of the four digit code also permits the operation of the system in a test mode which, in many cases, includes a walk-through testing of all of the sensors utilized in the system. The four digit code - 4a -~',i ~ L5~6 permits the entry or deletion of a temporary pass code. Finally, the enl:ry of the 2 four digit permanent code can serve to reset the entire system which may include 3 the unlatching of indicator lamps and the resetting of sensors thI oughout the 4 facility.
S On the other hand, the temporary pass code can provide for only an al~rm 6 disarm function in which local alarms may be disabled to allow access to the 7 facility by the lower level personnel. Use of the temporary pass code can also be 8 made to interrupt communication of an alarm condition status to a remote 9 location. - ¦
Additionally, temporary access codes can be made to cancel non-latched 11 alarm condition indications such as, for instance, the unintentional tripping of a 12 hold-up button, which ~ipping might have been accidently caused by second level 13 personnel. For all latched alarm conditions such as ~or instance fire or unauthor- j 14 ized perimeter intrusion, the temporary personnel would not have access to disarming the system as an added precaution against the compromise of the systern 16 by temporary personnel. Thus, temporary personnel can be preeluded from being 17 able to disarm elec~ic fences, photoelectric sensors utilized in protecting the 18 grol~nds of a given facility, etc.
19 The entry of the temporary access code in one embodiment does not affect the 24 hour loops, whereby a fire protection loop may be allowed to operate 21 regardless of whether temporary personnel are within the area.
22 The provision of the security system with m~tiple levels of access ~y 23 providing temporary pa~; codes permits the selection of which protection loops 24 may be activated or deactivated by designated levels of personnel as well as providing ease of code change to protect against the effects ol transient persoMel 26 ~ leaYing the employ and therefore con~ol of the authorized users of the systerll.
27 Mor~over, an added layer of security may be obtained by providing temporary pass ll codes of decreased complexity, such that, for instance, a permanent pass code may 2 have four digits, while a temporary pass eode may have three digi~s. The system 3 may be made to opera~e wit~ more than two levels of access, with decreased levels 4 of access being capable of affecting fewer system functions.
S As an added security feature, in one embodiment timing circui~y is 6 provided to establish a time window during which a temporary pass code is to be 7 programmed into an eraseable memory. As an added security precaution" if no 8 temporary pass code is entered, the ~emporary pass code portion of the system is 9 disabled, at least until the permanent pass code is re-entered and a code key depressed.

DESCRIPTION OE THE DRAWINGS
11 These and other features of the subject invention will be better understood 12 in conjunction with the following detailed description taken in conjunction with ths 13 drawings of which: .
14 Fig. 1 i a block diagram of a security system illustrating the utilization of permanent and temporary pass codes;
16 Fig. 2 is a block diagram illustrating selective access to a security system 17 through the utilization of different pa~; codes;
18 Fig. 3 is a more detailed block diagram illustrating one embodiment of the 19 systel I i3ustrated in Eig. 2.

DETAII ED DESCRIPTION OE THE INVENTION
¦ . In order to provide for multiple levels of access to a security system, and 21 j referring now to Fi8~. 1, a security system typically includes a central unit 10 and a 22 i number of sensors located throughout the premises to be protected, with the 23 ¦ sensors being connected typically by multi-wire cables to the control unit. The ~- ;
!i 6 1.

sensors, in general, are usually divided into two groups, the first of which being a 2 group of resettable sensors which are activated twenty-four hours a day and are 3 therefore referred to as being in twenty-four hour loops. I`he resettable sensors 4 are illustrated in dotted block ~2 to include fire de~ectors 14 or an emergency detector 16 which may have as inputs a hold-up switch, a medical emergency 6 remote transmitter, or a panic button which when actuated, is designed to alert 7 security personnel to an unspecified emergency. Alarm and status signals from the 8 resettable sensors 12 are carried over a transmission line generally designated by 9 reference character 18 which Qlso includes command signals and power transmitted from the control unit to the resettable sensors.
11 On the other hand a group of sensors designated by reference character 20 12 are periodically actuated sensors normally operated at night to detect intrusion 13 into a given area. These sensors are in turn divided into two classes, the first of 14 which being a volumetric protection group 22 which may include ultrasonic motion sensors 24, passlve infrared sensors 26 or microwave motion sensors ~8. The 16 second group is a perimeter protection and or point detection group 30 which, in 17 general, are located at the perimeter of the facility to be protected and include 18 door contacts 32 or glass bre~k detection apparatus 34. Point detectors within the 19 protected area may include a vibration detector 36 or a capacitive safe al~rm 38.
The types of sensors mentioned aboYe are by no means exhaustive of the type of 21 sensors that could fPll in either one of the two aboYe categories, but are rather 22 detailed in order to represent classes of sensors which may be deactivated during 23 l¦ normal working hours and activated at night or during non-working hours. These 24 1¦ sensors are connected via cable 40 to control unit 10, with control unit lû also ~5 ¦¦ supplying power and control signals to the sensoFs. The control unit includes a 26 1l keypad 42 and function switches 44, with one of the outputs of the control unit 27 being cou.oled to ~ local annuncl~tion unit 48. Local ~nnunciation can be in the ,1 ., ( I
I
l ~ s~
¦ form OI a lighted panel board indicating not only the occurrence of a specified 2 alarm condition, but also its location9 but may also include sirens ~nd the like for 3 giving an audible indication of an alarm condition having been sensed. In addition 4 to local annlmciation, off-premises annunciation can be accomplished through the utilization of a communicator 48 which, in general includes a dialer for dialing a 6 police department, a fire department or an off-premises security office~ Ln one 7 embodiment, the output of the control panel is coupled via line 50 through a d~ay 8 circuit 52 to the communicator with the purpose of the dehy unit being to delay the off-premises annunciation of an ~larm condition pending determination as to whether or not the alarm condition indication is to ~e communicated off-premises 11 rather ~han being addressed by on-loca~ion persom~el.
12 A permanent pass code 54 is entered into keypad 42 for either qrming or 13 disarming the entire system or for permitting ~lteration of the system to provide 14 for specific needs. For instance, the entry of the permanent pass code may permit 15 an inhibiting function in which th~ entire system or portions thereof may be 16 disarmed. Ln addition, after utilizing the permanent pass code, certain of the 17 resettable sensors may be reset or certain loops or loops within loops may be by-18 pa~ed. Additionally, the entry of the permanent pass code may permit the 19 programming OI a temporary p~; code in an eraseable memory within the control 20 unit so as to permit the aforementioned second level of access to the system.
21 Further, the entry of the permanent pass code permits the running of a test 22 sequence. When a temporary pass code is used, a temporary pass code as 23 1 illustrated at 56 may be entered into the keypad, with the ability to alter the 24 1l system limited to inhibiting the night loops as one example As mentioned 25 1l hereinbefore, the utilization of a temporary or second level pass code greatly 26 1 facilitates the security of the system while allowing temporary access during off 27 hours. As diagrammatically illustrated by dotted lines 58, the utilization of the . '.
l ~ ' Ii temporary pass code can, for ir~stance, interrupt off-premises annunciation as by a actuating switch 60, or inhibit the alarm condition signals from the sensors 20 from 3 being transmitted to the control unit as indicated by switch 62. Moreover, local 4 annunciation of an alRrm condition may be inhibited as by switch 64, with all of the aforementioned switches hctivated to open up the respective circuits when the 6 temporary pass eode has been enterPd into the control unit.
7 How one such system might operate is illustrated in Fig. 2 in which like 8 reference characters are utilized to designate like elements in Fig. 1. In this 9 figure, control unit 10 2S illustrated as including keypad 42 and function ke~s 44.
One of the function keys may be a s~called "code key" which in combination with 11 the entry OI a permanent pass code, routes the output of the keypad to a temporary 12 address code memory so as to program it with a temporary pass code. In the 13 embodiment ~lustrated, the keypad is coupled to a temporary pass code detector 14 66 and a permanent pass code and. function detector 68, with the function keys coupled to the permanent pass code and function detector 68. In the system 16 depicted in ~ig. 2, resettable latching sensors 7û are coupled to a multiwire 17 transmission line generally designated at 72 which is utilized, for instance, to 18 supply d.c. power frorn a d.c. power supply 74 to the sensors through a d.c. power 19 interrupt circuit 76. Control signals for the sensors including actuating and deactuation thereof, are generated by a sensor control unit 73 which may be oi a 21 conventional variety to provide con¢ol signals alon~ one of the wires of the 22 m~dtiwire cable to the sensors. A ground wire is also illustrated as being one of the 23 wires of multiwire cable 72. Control unit 10 additionally has a sensor status 24 detector 79 coupled to a signal line which is one of the lines of the multiwire cable, 25 the purpose of which is to deterrnine an alarm condition signal coming from one of 2~ the sensors attached to the multiw;re cable. ~ one embodiment, (not shown) the 27 alarm signal in the signal line may be in the form of a current drawn from this line, ;~ $

the drawing of ~urrent providing the alarm indication. The output of status 2 detector 79 is a sign~l which is applied over line 80 to local arnlmication unit 4~.
3 In the embodiment shown, this unit may includ~ a panel of lights or other 4 indicalors 82 which indicate not only the presence of an alarm condition~ but the location of the ~larm condition. Location can be established by conventional 6 polling techniques in which a clocked sensor polling locator 84 is coupled to sensor 7 control 78 to provide for the strobbing or polling of the various sensors in a timed 8 sequence. The arrival back of an ~larm condition indicating signal at the time tha$
9 a sensor is polled is detected at sensor polling locator 84 whieh activates a corresponding aMunciator indicator 82.
11 The location and status signals may also be applied to communicator 48 12 which may include a dialer which is automatic~lly actuated in accordance with a 13 trigger signal from trigger 86 to dial, for instance, a fire or police station and 14 transmit the ~tatus and location ~ignals to the off-premises loeation.
One of the outputs from the permanent pass code and fun--tion detector is a 16 signal deliYered to a test sequence unit 87 coupled to the multiwire transmission 1~7 line Ior initiating a test sequence, while at the same time inhibiting sensor 18 control 7~. During test, unit 87 takes over all of the sensor control Iunctions so as 19 to be able to actuate the sensors in accordance with a predetermined test sequence. The test se~uence may include a ~Iwalk-~y~ test or other conventional 21 testing techniquesO
22 An a.c. power supply 88 may be coupled to sensor control 78 to provide a.c.
23 power for any of the sensors requiring same or to provide high frequency carrier 24 sign~ls if such is desired.
In the ~lustr~ted embodiment, a tamper re~ognition circuit 94 is coupled 26 across the lines of the multiwire cable, with recognition OI tampering being an 27 alarm condition9 a signal for which is applied via line 96 to sensor status 28 detector 79 ,, ,, Il ' ~ l In operation, the entry of a temporary pass code is detected by temporary 2 pass code detector 66 which develops an inhibit sign~l applied as illustrated to local 3 annunciator 46 and trigger 86 to inhibit local annuneiation and off-premises com-4 munication. The inhibiting of the local annunciation may also include the inhibiting of an audible indication of an alarm condition as would be provided by a loud 6 speaker 98. It wi~ be appreciated that the permanent pass code and function 7 detector, upon entry of a permanent pass eode, also provides an inhibit signal for 8 the self-same purposes. However, the entry of a permanent pass code provides 9 additional levels of access to the system in which the temporary pass code can ~e programmed, the system tested, in which various loops can be by~assed as 11 indicated by the line running from the permanent pass code and function detector 12 to sensor control 78, or can res~dt in a reset signal being applied to reset a31 of the 13 resettable latching sensors. As is conYentional, resettable sensors can be reset by 14 mer~ly interrupting the d.c. power to the latching relay coil usua~y used in the sensor and this is accomplished as ~lustrated 16 The functions of the polling of sensors, the detection of the types of alarm 17 signaLs provided by sensors, test procedures, and the ability to provide a loop by-18 pass function are conventional and are not described herein. It will be appreciated 19 however, that it is a feature of the subject invention that the utilization af a temporary pass code Rllows only a limited access to the system in that, as 21 illustrated in the Fig. 2 embodiment, its only capability is to inhibit local 22 annunciation and off~remises annunciation. On the other hand, the entry of the 23 permisnent pa~ code allows additional functions, such as inhibiting, programming, 24 ¦~ loop by-passing, testing, and resetting. While the rather simplified system of Fig. 2 25 1 is operative to ~escribe the effects of multiple level access, the number of 26 ¦ functions to be accessible by a given level of user varies with the particular systern 27 ! application. While only two levels of access have been described in connection ll l ~ G~ ~

~ with e embodiment of l; ig. 2, it will be appreciated that any number of levals of 2 access involving different numbers of functions can be incorporated into a securi~y 3 1 system and are within the seope of this inventionD
4 ~ In describing one type of multiple level pass code system and referring now to Fig. 3, a keypad 100 is utilized to drive a decode circuit 102 which decodes the 6 output of the keypad. In general, keypads are numeric entry devices as opposed ~o 7 providing funetion keys 104 which may be also provided. Thus, the Iceypad ser~es 8 the major function of providing a pass code whereas the funetion keys provide for 9 the actuation of various system functions such as arming, providing for home protection when the premises are occupied or away protection when the premises 11 are unattended, testing of the security system, disabling entrance or exit delays, 12 resetting or silencin~. The decode 7~1nit decodes the outputs of either the keypad or 13 the function keys and provides decoded functions on line 106, whereas the decoded 14 nurnbers entered at the keypad are cou~led over line 108 to a shift register 110. A
programmable read-only memory (PROM~ 112 is preprogrammed with a four digit 16 permanent pass code. The PROI~q is connected to a comparator circ~t 114 which 17 compares the permanent pass code to the code entered into shi~t register 11û. In 18 order to gain aceess to system from the primary leYel, the perm~nent pass code is 19 keyed in at keypad la0 and decoded at 102 such that the numbers, for instance 1, 3, 2, and 4, are entered sequentially into shift register 110. Upon the occurrence of 21 the code indicated, comparator 114 produces ~n output signal over line 116 which 22 serves as a Full Enable signal Ior the entire system. By 7'Pull Enable" is meant that 23 any system function may be accessed. This is shown by the enabling of a system 24 control Imit 117 which provides reset, loop activation and test sequences designa-ted by the function keys and decoded at decode ;mit lD2. The ~;ignal on line 116 is 26 additionany applied to a one~hot multivibrat~r 118 for providing a timing window 27 for th progremming of a temporary pass code. In one embodiment, the 1 multivibrator produces an output pulse having a 45-second duration and 2 corresponds to a 45-second enable pulse. The output of the one shot 3 multivibrator is provided to a random access memory (RAM) 120 as an 4 enabling pul æ which enables the writing into the R~M of the temporary pass code, in this case for 45 seconds. ecode unit 102 decodes one 6 of the function keys, the code key, to enable the designated thxee 7 R~M segments assigned to the second level or temporary pass oode, 8 which in this case is a three digit code. Thereafter, if during g the 45 second enable pulse from one-shot multivibrator 118 keypad 100 is actuated, the decoded temporary pass code will be entered into the 11 designated segments in RAM 120 such as to provide a temporary pass 12 code of 7,3,5, as indicated. If no temporary pass code is entered 13 during the 45-second window provid d by the one-shot m~ltivibrator, 14 zeros are entered into the seclected RAM mem~ry sections. The system is structured such that it will not respond to zeros and thus, the 16 temporary pass code system is disabled. M~reover, should a function 17 key be actuated af-ter the code key, a signal on line 106 serves to 18 reset one shot multivibrator 118 to prevent the wr_ting in of the non-19 co~e key functions into the RAM.
As an added precaution against unauthorized access, a second 21 one-shot multivibrator 119 is interposed in line 116 to provide another 22 timing w mdow with~in which a function key must be actuated. This pre-23 vents against function keys being actuable, for instance, an hour 24 after a permanent pass code has been entered. In one emkcdiment, this wlndow is 45 seconds in duration, which means that a function key 26 must be actuated within 45 seconds or its activation will not be 27 accepted by the system.
28 After a temporary pass code has been entered into F~M 120, 29 secondary access to the security system can be obtained by the en~ry at keypad 100 of the temporary pass code. Upon 31 entry of the pass code into the first three sections of shift register 32 110 and upon a matching output from the three RAM sections, a l ~ ~ l ~ 5~ 1 comparator 122 produces a Second Level En~ble signal over line 124 which is 2 utilized to inhibit an alarm condition detection circuit 126 and an annunciation 3 circuit 127 which may be a zone indicator or any type of audio or visual alarm 4 indication. Additionally, should a communicator be utilized, the signal on line 124 S inhibits all night loop inputs to a delay unit 128 transmitted through a gate 129 6 which is coupled to a communica~or 130. Communicator 130 is triggered by 7 receipt at ~igger 132 of either night loop or 24 hour loop signals, with this system 8 being given the capability of inhibiting the off-premises transmission of 24 hour 9 loop signals only by entry of a permanent pass code. This is unlike the system of Fig. 2 in which both pass codes inhibit off~remL~es transmission. Note further 11 that in the Fig. 3 embodiment, the use of the temporary pass code interr~ts night 12 loop signals so that the trigger is inhibited onlS7 for these signals. It wi31 be 13 appreciated that the 24 hour l~p signals are not interrupted by virtue oî the 14 provision of a ternporary pass code such that the 24 hour loops are continuously monitored by virtue of the communicator. Note also that the interruption of the 16 transmission of the 24 hour loop signals occurs or~y when the permanent pa~; code 17 is entered. Additionally, what can be provided is that should the comm~icator be 18 on line during the entry of a pass code, it will be allowed to continue its 19 transmission for its full transrnitting cycle.
2û What will be appreciated is that ~oth the F~l ~nable and the Second LeYel 21 ~3nable signals are operative to inhibit alarm condition detection and a~unciationj 22 and certain off-premises transmissions. The Second Level Enable signals however 23 are incapable of inhi~iting 24 hour loop signal transmissi or resetting any latched 24 sensor such as a smoke detector, whereas the higher level pass code permits resetting the entire system.
26 It will also be appreciated that although two levels OI access have been 2~ provided in terms of decreasing complexity of pass codes, multiple levels of access 28 may be rovided with either inoreasingly or decreeringly complex pars oodes.

1,i .

iQ6 It is one feature of the subject system that the output of the shift register is applied to a keypad lock-out circuit 133, the purpose of which is to count the number of entries into the shift register. For instance in one embodiment, upon 16 separate sequential entries into the shift register, the decode unit 102 is disabled for one minute thereby to preclude, at least to a certain extent, continuous tampering with the security system in an effort to provide all possible codes. Decode unit 102 may be disabled by simply entering a series of zeros to which the remainder of the system will not respond.
What is therefore provided is a relatively simple system for providing certain levels of personnel with limited access to a secure facility, with the ability to change the temp~rary pass code through the utilization of the higher level pass code and various function keys.
In so doing, the security level for the facility is in-creased at least against unauthorized access in a way not previously possi~le with single level systems.
2~ In the described system, at least two access levels are provided by providing a permanent pass or access code and an alterable temporary pass or access code in which the temporary pass code may be set after entry of the permanent pass code. This permits the highest level user with the ability to access all the functions of the secur-ity system at will, yet provide limited access to another level of personnel. For instance, the permanent pass code may permit disarming of the system or selected parts of the system, resetting of all or part of the sensors used in the system, loop by-pass, and programming including the setting of the temporary pass code. On the other hand, use ~. ~

of the temporary pass code can permit the disarming of only a portion of the system. As an example, assuming latchable fire alarm sensors in a 24 hour loop, it would not be prudent to give anyone other than a general plant manager the ability to reset these sensors, since the decision that a first emergency is either over or non-existent is usually made at a very high level of author-ity. Moreover, giving temporary help access to reprogram-ming an entire system defeats the security provided by the system.
Having above indicated a preferred embodiment of the present invention, it will occur to those skilled in the art that modifications and alternatives can be prac-ticed within the spirit of the invention. It is accord-ingly intended to define the scope of the invention only - as indicated in the following claims.

- 15a -; .,'

Claims (22)

The embodiment of the invention in which an exclusive property or privilege is claimed are defined as follows:-
1. A multiple priority security system providing multiple levels of personnel access to multiple priorit-ized security controllers of a secured facility, compris-ing:
means for storing a predetermined top priority code;
a first memory device;
input means for writing a first top priority system access code into said first memory device, and for writing a second and lower priority system access code into said first memory device;
means, connected to said first memory device and to said means for storing said predetermined top priority code, for providing a signal whenever said predetermined top priority code matches said first top priority system access code in said first memory device;
means, connected to said input means and enabled in response to said signal, for controlling substantially all of said prioritized security controllers via said input means;
a second memory device, coupled to said input means and to said first memory device and enabled by said signal, for storing a predetermined second and lower priority code therein via said input means; and means connected to said second memory device and to said first memory device and operative in response to a match between said predetermined second and lower prior-ity code and said second and lower priority system access code for enabling access to preselected lower priority ones of said prioritized security controllers.
2. The system of claim 1, wherein said signal is a signal pulse, and wherein said controlling means are enabled only for the duration of said signal pulse.
3. The system of claim 1, wherein said signal is a signal pulse, and wherein said input means is enabled for storing a predetermined second and lower priority code in said second memory device via said input means only for the duration of said signal pulse.
4. The system of claim 1, wherein said first memory device is a shift register.
5. The system of claim 1, wherein said predeter-mined top priority code storing means is a ROM.
6. The system of claim 1, wherein said input means includes a keypad having a plurality of numeric keys and function keys.
7. The system of claim 1, wherein said signal providing means includes a comparator.
8. The system of claim 7, further including a one-shot connected to said comparator.
9. The system of claim 1, wherein said second memory device includes a RAM.
10. The system of claim 1, wherein said means for enabling access to lower priority ones of said prioritized security controllers includes a second comparator.
11. The system of claim 10, further including a one-shot connected to said second comparator.
12. The security system of claim 1, wherein said security controllers include bypassable twenty-four hour loops having resettable latches, bypassable night loops, and local and remote annunciators, and wherein said first predetermined and top priority pass code permits keyboard access to resetting, loop bypass, and annunciator inhibit functions.
13. The security system of claim 1, wherein said first predetermined and top priority pass code and said second predetermined and lower priority pass codes are digital sequences that differ by the number of digits of the corresponding pass code.
14. The security system of claim 3 wherein said input means includes function control keys including a code key, and wherein said input means is responsive to the entry of said first level code and the depression of said code key to program a subsequent series of digits entered at said keypad as said second level pass code.
15. A multiple priority security system providing multiple levels of personnel access to multiple security controllers of a secured facility ranked on a preselected priority basis, comprising:
a keypad; and means connected to said keypad and operative in response to entering a first predetermined and top prior-ity pass code on said keypad for enabling keypad control of substantially all of said prioritized security control-lers, and operative in response to entering a second pre-determined and lower priority pass code on said keypad for enabling keypad control of substantially less than all of said prioritized security controllers.
16. The system of claim 15, further including a memory, and means responsive to said first predetermined and top priority pass code for enabling keypad programming of said memory with said predetermined second and lower priority pass code.
17. The system of claim 15, wherein-said security controllers include a local annunciator and a remote annun-ciator, and wherein said keypad control enabling means is operative in response to said second predetermined and lower priority pass code to inhibit the operation of said local and said remote annunciator.
18. The system of claim 15, wherein said security controllers include a local annunciator and a remote annun-ciator, and wherein said keypad control enabling means is operative in response to said top priority pass code to inhibit remote annunciator operation and operative in res-ponsive to said second and lower priority pass code to inhibit said local annunciator.
19. The system of claim 15, wherein said security controllers include twenty-four hour loops, and wherein said keypad control enabling means is operative to inhibit said loops only in response to said predetermined and top priority pass code.
20. A method of increasing the security of a keypad-accessed security system having a plurality of security controllers arranged in a predetermined priority basis, comprising the steps of:
defining a digital sequence pass code format having a first bit length representative of top priority and a second bit length representative of lower priority, said first bit length word having more digits than said second bit length word;
entering a first predetermined and top priority pass code having said first bit length into a keypad to selectively enable keypad access to substantially all of said prioritized security controllers;
entering into said keypad a second and lower prior-ity pass code having said second bit length for enabling access to substantially less than all of said prioritized security controllers and selected lower priority ones of said prioritized security controllers;
whereby, lower level personnel cognizant of said second and lower priority pass code thereby have access to said predetermined and lower priority ones of said prioritized security controllers, and higher level per-sonnel cognizant of said predetermined top priority pass code have access to substantially all of said security controllers of said secured facility thereby to prevent system tampering by said lower level personnel.
21. The method of claim 20, further including the step of enabling writing into system memory of a selected lower priority pass code only in response to the correct entry of said predetermined top priority pass code and only for a limited time thereafter.
22. The method of claim 21 and further including the step of preventing access to selected controllers of the system at times other than within a time window starting with the entry of a predetermined pass code.
CA000410011A 1981-08-25 1982-08-24 Security system with multiple levels of access Expired CA1181506A (en)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
US29562181A 1981-08-25 1981-08-25
US295,621 1981-08-25

Publications (1)

Publication Number Publication Date
CA1181506A true CA1181506A (en) 1985-01-22

Family

ID=23138510

Family Applications (1)

Application Number Title Priority Date Filing Date
CA000410011A Expired CA1181506A (en) 1981-08-25 1982-08-24 Security system with multiple levels of access

Country Status (12)

Country Link
JP (1) JPS5843097A (en)
AU (1) AU555954B2 (en)
BE (1) BE894205A (en)
CA (1) CA1181506A (en)
DE (1) DE3231591A1 (en)
ES (2) ES515217A0 (en)
FR (1) FR2512231B1 (en)
GB (1) GB2104696B (en)
IT (1) IT1152092B (en)
NL (1) NL8203334A (en)
PT (1) PT75465B (en)
SE (1) SE8204827L (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6078264A (en) * 1989-08-09 2000-06-20 Fujitsu Ten Limited Apparatus for remotely controlling a door locking state and theft prevention alarm state of an automobile
CN102419874A (en) * 2010-09-27 2012-04-18 株式会社山武 Facilities controlling system and method

Families Citing this family (13)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
GB2149185B (en) * 1983-11-04 1986-11-05 Robert Ernest Barwick Device for protecting electronic equipment
DE3408904A1 (en) * 1984-03-10 1985-09-12 Philips Kommunikations Industrie AG, 8500 Nürnberg CIRCUIT ARRANGEMENT FOR PREVENTING UNAUTHORIZED ACCESS TO A COMMUNICATION SYSTEM SECURED BY SUBSCRIBER-SPECIFIC PASSWORDS
FI76889C (en) * 1987-02-17 1988-12-12 Kone Oy FOERFARANDE FOER VAL AV FUNKTIONSSAETT VID EN ANORDNING SOM ANVAENDS FOER RAEKNING AV OBJEKT INOM ETT VISST OMRAODE.
JPS63174815U (en) * 1987-02-17 1988-11-14
FR2615895B1 (en) * 1987-06-01 1990-03-09 Magnan Jean Charles ANTI-THEFT EQUIPMENT FOR DELIVERIES AND HOME DEPOSITS
DE3924896C1 (en) * 1989-07-27 1990-09-27 Blaupunkt-Werke Gmbh, 3200 Hildesheim, De
AU660293B2 (en) * 1990-11-21 1995-06-22 Nidac Security Pty. Ltd. Improved code pad
IE80962B1 (en) * 1994-03-11 1999-07-14 Hi Key Ltd Arming apparatus for a security circuit
US5903216A (en) * 1996-12-12 1999-05-11 Sutsos; Pete Security structure unlocking system for use by emergency response and authorized personnel
GB2329497B (en) 1997-09-19 2001-01-31 Ibm Method for controlling access to electronically provided services and system for implementing such method
FR2769736B1 (en) * 1997-10-10 2000-01-14 Denis Palos PROCESS FOR SECURING FINANCIAL TRANSACTIONS, CARD AND PAYMENT TERMINAL IMPLEMENTING THIS PROCESS
EP1158466B1 (en) * 2000-05-25 2012-03-07 Inventio AG Method for triggering a process within a building
JP5159006B2 (en) 2000-05-25 2013-03-06 インベンテイオ・アクテイエンゲゼルシヤフト How to start a procedure in a building

Family Cites Families (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US4148012A (en) * 1975-09-26 1979-04-03 Greer Hydraulics, Inc. Access control system
JPS54139397A (en) * 1978-03-30 1979-10-29 Nippon Keibi Hosho Kk Fire extinguishing system
US4157534A (en) * 1976-11-15 1979-06-05 Jacob Schachter Locking system for hotels
US4148092A (en) * 1977-08-04 1979-04-03 Ricky Martin Electronic combination door lock with dead bolt sensing means
US4095739A (en) * 1977-08-26 1978-06-20 A-T-O Inc. System for limiting access to security system program
JPS5475967A (en) * 1977-11-29 1979-06-18 Nec Corp Command protect system
JPS5495148A (en) * 1978-01-13 1979-07-27 Toshiba Corp Set data protection method
US4283710A (en) * 1978-10-25 1981-08-11 J.S. Lock Company Security system
JPS5672740A (en) * 1979-11-20 1981-06-17 Fujitsu Ltd System console connection system
EP0071600A1 (en) * 1981-02-06 1983-02-16 NELSON, Avi N. Security system

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6078264A (en) * 1989-08-09 2000-06-20 Fujitsu Ten Limited Apparatus for remotely controlling a door locking state and theft prevention alarm state of an automobile
US6091341A (en) * 1989-08-09 2000-07-18 Fujitsu Ten Limited Remote control security system for determining that identification data has been repetitively received continuously during a period of time
US6624740B2 (en) 1989-08-09 2003-09-23 Fujitsu Ten Limited Receiving apparatus
CN102419874A (en) * 2010-09-27 2012-04-18 株式会社山武 Facilities controlling system and method

Also Published As

Publication number Publication date
PT75465A (en) 1982-09-01
FR2512231B1 (en) 1989-04-21
ES523764A0 (en) 1984-05-16
ES8400623A1 (en) 1983-10-16
AU555954B2 (en) 1986-10-16
NL8203334A (en) 1983-03-16
SE8204827D0 (en) 1982-08-24
ES515217A0 (en) 1983-10-16
JPS5843097A (en) 1983-03-12
IT1152092B (en) 1986-12-24
GB2104696A (en) 1983-03-09
ES8405182A1 (en) 1984-05-16
SE8204827L (en) 1983-02-26
PT75465B (en) 1984-10-31
GB2104696B (en) 1985-08-21
IT8222980A0 (en) 1982-08-25
DE3231591A1 (en) 1983-03-10
FR2512231A1 (en) 1983-03-04
AU8754682A (en) 1983-03-03
BE894205A (en) 1982-12-16

Similar Documents

Publication Publication Date Title
US4532507A (en) Security system with multiple levels of access
CA1181506A (en) Security system with multiple levels of access
US4021796A (en) Pushbutton purmutation code control means for a security alarm system
US5552766A (en) Anti-crime security system
CA1134003A (en) Central station alarm system
CA2503352C (en) Alarm system armed and disarmed by a door contact
US5850180A (en) Portable alarm system
US5774051A (en) Security system with multi-function transmitter
US5416826A (en) Gun safe
US5986571A (en) Building security system having remote transmitter code verification and code reset features
US5920270A (en) Security system remote control
US20060181401A1 (en) Vacation mode security system and method
ATE139048T1 (en) SAFETY ARRANGEMENT
US6249225B1 (en) Auxiliary alert process and system thereof for alarm system
GB2104697A (en) Testing systems
US4195288A (en) Alarm system
US5907288A (en) Access code processing for a security system
USRE32468E (en) Central station alarm
JPS58203595A (en) Fire/crime prevension system
WO2000038118A1 (en) Biometric input device for security system
US3631444A (en) Electric permutation lock and alerting systems
EP0850468A1 (en) System and method for arming an alarm system when an occupant fails to turn the system on
GB2264802A (en) Signal communication systems
AU615798B2 (en) Alarm control system
AU660293B2 (en) Improved code pad

Legal Events

Date Code Title Description
MKEC Expiry (correction)
MKEX Expiry