EP1169843B1 - Method and device for utilization of mobile radio telephones for surveillance and/or control purposes - Google Patents

Method and device for utilization of mobile radio telephones for surveillance and/or control purposes Download PDF

Info

Publication number
EP1169843B1
EP1169843B1 EP00923049A EP00923049A EP1169843B1 EP 1169843 B1 EP1169843 B1 EP 1169843B1 EP 00923049 A EP00923049 A EP 00923049A EP 00923049 A EP00923049 A EP 00923049A EP 1169843 B1 EP1169843 B1 EP 1169843B1
Authority
EP
European Patent Office
Prior art keywords
mobile radio
telephone
radio telephone
mobile
received
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Expired - Lifetime
Application number
EP00923049A
Other languages
German (de)
French (fr)
Other versions
EP1169843A2 (en
Inventor
Anders Edvard Trell
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Individual
Original Assignee
Individual
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Family has litigation
First worldwide family litigation filed litigation Critical https://patents.darts-ip.com/?family=20415185&utm_source=google_patent&utm_medium=platform_link&utm_campaign=public_patent_search&patent=EP1169843(B1) "Global patent litigation dataset” by Darts-ip is licensed under a Creative Commons Attribution 4.0 International License.
Application filed by Individual filed Critical Individual
Publication of EP1169843A2 publication Critical patent/EP1169843A2/en
Application granted granted Critical
Publication of EP1169843B1 publication Critical patent/EP1169843B1/en
Anticipated expiration legal-status Critical
Expired - Lifetime legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G08SIGNALLING
    • G08BSIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
    • G08B25/00Alarm systems in which the location of the alarm condition is signalled to a central station, e.g. fire or police telegraphic systems
    • G08B25/007Details of data content structure of message packets; data protocols
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/20Individual registration on entry or exit involving the use of a pass
    • G07C9/22Individual registration on entry or exit involving the use of a pass in combination with an identity check of the pass holder
    • G07C9/23Individual registration on entry or exit involving the use of a pass in combination with an identity check of the pass holder by means of a password

Definitions

  • the present invention is mainly related to a method and a device whereby commonly used radio (cellular) telephones facilitate various substantially physical types of services, and this is described, purely by way of example, for control of access, signalling, communication and e.g. entrance door lock opening for an entrance telephone system. However, also examples of other fields of use will be mentioned.
  • radio cellular
  • Entrance telephones used today are either arranged with installed fixed communication circuits ("local telephones") or connected to and switched through a public telephone network ("door telephones"). They exist basically due to a need for security and privacy - while still offering a sodal possibility - for inhabitants in areas which require locked entrances due to various threats and risks in mainly highly populated areas, but they also involve certain disadvantages.
  • WO 93 14571 A1 discloses establishment of a conventional call from a user's cellular telephone to a clearinghouse. After receipt of an incoming call, the clearinghouse uses a separate RF communication link from the clearinghouse to the locks controlled by the clearinghouse.
  • WO 94 01963 A1 discloses am access control system that uses transmitters which generate a dual tone (DTMF) modulated signal. A standard mobile telephone can thus be used to obtain access to controlled areas.
  • DTMF dual tone
  • the method disdosed in WO 94 01963 A1 is related to MFC-signalling and makes no use of the information obtainable during a "hand-shaking" procedure between a mobile radio telephone and adjacent conventional base station.
  • a further object of the present invention is to give mobile telephones existing "out there" desired possibility for control of visitors/entrance telephone properties for a building having the aforementioned installation.
  • scanners which today may for example include receiving capability for the entire GSM frequency range. Only the receiving capability of a scanner is required; since the communication properties of same according to the present invention are only utilized as a "passive" listener for data, same does not require analogue sound, nor transmitting possibility.
  • PCS 1900 "JAPAN PHS”, “DCS 1800”, “CT-2”, “CT-2-CALL”, “CT-3” and “DECT” and/or digital cellular communication systems named "IS-54B (ADC, D-AMPS, CDMA, IS-136)” in the United States of America, JDC in Japan and the global GSM-networks.
  • IS-54B ADC, D-AMPS, CDMA, IS-136)
  • the “scanning" radio receiver part according to the present invention must thus be in a position to handle the most frequently used mobile telephone systems within the area of use (and possibly facilitate upgrading to future specifications/protocols, for example "Bluetooth”, “Maya”, “Chat”, “e-mode”, “3G”, “SMS”, “WAP (/MEXE)", “iDEN”, “IMT-2000”, “GMPCS”, “GPRS”, “UMTS”, “FDMA”, and “(W) CDMA” with “FH/SS”, “DS/SS” and “CO FDM”), but in order to simplify the non-restricting description, GSM has been chosen. GSM is a commonly used standard for mobile telephones.
  • MC denominated MultiCarrier
  • TDMA Time Division Multiple Access
  • TDD Time Division Duplex
  • MC denominated MultiCarrier
  • TDMA Time Division Multiple Access
  • DECT Time Division Duplex
  • the method according to the present invention is mainly characterized by the features stated in the following Claim 1, and related subclaims, whereas the device for utilization of the method is disclosed in Claim 5 and the subclaims related to this claim.
  • mobile telephony is radio communication
  • same can be intercepted by devices known as scanners, which operate by continuously proceeding search of the radio frequency spectrum or chosen parts thereof, and which detect and "lock" on active channels, and submit intercepted sound to a listener.
  • scanners which operate by continuously proceeding search of the radio frequency spectrum or chosen parts thereof, and which detect and "lock" on active channels, and submit intercepted sound to a listener.
  • digital communication such as GSM
  • the output would be a meaningless noise, unless they are capable of performing a speech and signal data decoding operation with use of the same protocol as used for the intercepted signal.
  • such scanners are today commercially available, which are also capable of detecting the number dialled from the mobile telephone and also to disclose their individual and unique PIN (a subscriber's personal identification number - "International Mobile Subscriber Identity” - IMSI)/SIM number, particularly in the case when the mobile telephone is switched on from an off condition and when "hand shaking" is performed with the base station located closest to the subscriber with use of a few basic protocols, when also the protocols to be used for a subsequently following telephone call are disclosed to an initiated listener.
  • PIN subscriber's personal identification number - "International Mobile Subscriber Identity” - IMSI)/SIM number
  • the visitor's mobile telephone is located in such a close relationship to the entrance as a normal entrance request situation requires, before same can be detected, prevents all other persons switching on their mobile telephones in an adjacent area from addressing or initiating the system according to the present invention.
  • the antenna used by the system can thus be well screened, being directional and having a short reception range.
  • a "switched off" mobile telephone which is switched on also acts as a starting or activating unit for the system, apart from the fact that same generously gives away the protocols facilitating an "entrance call".
  • the radio receiving "scanning" unit in the described system will, after being activated, perform scanning of assigned radio channel (frequency) for communication and perform synchronisation with transmitted time divided TDMA parcels. It may thus detect, decode and handle the number that the visitor will dial in order to make a request for access to the building. This number is typically the telephone number of a tenant living in the building.
  • a programmable device, a "number discriminator” compares this number with preprogrammed numbers - normally the telephone numbers of the tenants and/or other persons authorized to unlock the door - and if these numbers correspond, the door lock is allowed to receive and be activated by an unlock command.
  • the system according to the present invention thus operates in synergy with the mobile telephone call, it does not take any part in any telephone communication, to which it is only acting as a passive listener, and when reacting on stimulus from same, it does not influence the actual conversation, which is carried out and completed (logically after intended result) by the parties concerned, and furthermore is the call without charges for the building - normally is the visitor charged to call fee unless a 1-800 (free of charge) number is offered, whereby the need for a communication unit for visitors no longer exists, such as a keyboard, microphone and loudspeaker - and furthermore will excellent sound quality be achieved, well suited for use in an area having street sounds.
  • the described system can also offer a code lock possibility, as is the case with known entrance telephone systems. This is advantageous for tenants, service personnel etc., as well as to give tenants having no telephone a possibility to let in visitors by giving them a door opening code.
  • the system according to the invention can obviously also include a keypad, for addressing a code lock, but this would mean additional hardware and an external user influenced unit which is sensitive for influence/damage.
  • a number dialled from a mobile telephone must not necessarily be a functioning/existing telephone number which is transferred to the base station (or in the air). All numbers dialled are transmitted after a command and "authenticated” (authentication) by the base station, and by preferably starting with a non-numerical part such as "*" or "#” it will, as disclosed above, reach and be understood by the described system. Should this number correspond to a number stored in the number discriminator for a certain code lock purpose, intended function can be performed, in the same way and with same advantages, e.g. time zones, as for a code lock having a keypad, even though no keypad exists.
  • a system according to the present invention can obviously also be equipped with a suitable type of card reader (this may also include a conventional physical card reader which reads the SIM card of the "visiting mobile", removed from the telephone and inserted into the reader), but it may also use mobile telephones for accomplishing a corresponding function, without the need for any external user unit.
  • a GSM mobile telephone When a GSM mobile telephone is switched on, same discloses during the initial handshaking operation with the base station its unique "PIN-code/SIM-card" number (amongst other information required to reach correct base station) in a format and according to a protocol which can be read by the now activated described system.
  • the mobile telephone acts very much the same as a "proximity card” and the system as a “proximity card reader” which reads the card without direct physical contact, and programming can be performed as "card only", or alternatively as "card-plus-code sequence” with required code sequence being inputted subsequently.
  • proximity card reader which reads the card without direct physical contact
  • programming can be performed as "card only”, or alternatively as "card-plus-code sequence” with required code sequence being inputted subsequently.
  • PIN/SIM code etc. transferred "automatically" from the visiting mobile when switched on and conventional dialled number
  • other types of automatically or intentionally transferred signals from the mobile can be used for the above code lock/card functions.
  • the described system should include a speech handling unit, mainly in order to detect and decode DTM F signals sent as speech data, same may theoretically also accept voice and speech commands for its functions/actions, but DTMF is believed both simpler and better for the relatively few tasks that an entrance surveillance system has to perform.
  • commands consist of longer DTMF code sequences, as well as different command codes for different called inhabitants (based on the different call numbers of same) for same type of actions, or for actions specific for only certain inhabitants, such as permitting a lift to reach a certain floor level, but normally is only one or a few DTMF digits required to achieve required extent of signalling with adequate security, since same in fact must originate from the called party, and amongst other criteria, preferably also within a predetermined time frame in a by the base station authenticated call.
  • GSM-scanners can be used for radio frequency scanning and reception, time adjustment and synchronization, and signal/speech decoding required for utilization of the present invention
  • the speech must never leave its digitized format to be transformed to an analogue signal audible to a listener; each system function is preferably in digital format. Accordingly, when using such devices a considerable part of their functions are not utilized, but since they are available and can be used, same confirms that described functions can be achieved in a number of ways and by use of standard components.
  • Programming the system according to the invention can be carried out in a number of ways, e.g. in position by means of a serial connection and with a handheld programming device or a PC (or PC-capable mobile telephone), and programming from a PC at a distant location via modem is also possible.
  • the system may also receive DTMF or, if adapted thereto, data via mobile telephone (WAP, SMS etc.) as programming commands, provided that somebody (authorized, e.g. by PIN/SIM number) is in place and establishes a mobile telephone call to an authorized programming telephone, in which case the described system can listen to the communication therebetween and thus receive the correctly formatted programming instructions/commands.
  • WAP mobile telephone
  • SMS mobile telephone
  • It may also be arranged with a connection to a public telephone network for distant programming purposes, as well as, for example, a mobile telephone subscription of cash card type or via Internet, typically not utilized for speech communication, but possibly used, for example, for alarm transmission purposes and surveillance/control purposes of functions within the building.
  • Non-existence of external physical user units results in a highly secure substantially non-external installation, protected against external influence and damage, and expensive parts and covers are not required.
  • Normally, only a few instructions are required (even though same may be an electronic display or similar, as well as audio/voice synthesized instructions, which on the other hand increases the costs and the risk for damage, but still remains as a possibility), and with indication of the area within which the mobile telephone should be switched on, even though this is not absolutely necessary for an experienced user, whereby nothing is required that would damage the looks, integrity and security of a beautifully designed entrance, even though same is equipped with an entrance surveillance system.
  • Ring signals and engaged signals can also be detected, since they are sent back to the calling telephone from the side of the called telephone, and can thus be detected by the described system and be utilized for additional purposes, for example, as known from existing entrance telephone systems, to start a time period allowed for DTMF detection only as from detection of reply (end of ring signals); the time period allowed for calling (between dialled telephone number and reply) and possibly also to specify separately the time of the call.
  • DTMF detection only as from detection of reply (end of ring signals); the time period allowed for calling (between dialled telephone number and reply) and possibly also to specify separately the time of the call.
  • the described embodiment will be related to the GSM standard, which, as already mentioned, is a MC/TDMA/TDD format for communication between mobile telephones (not shown) and base stations (not shown).
  • GSM Global System for Mobile communications
  • base stations not shown
  • all types of telephones and other "telephone related" apparatus e.g. modems, computers etc., that can be reached by a call from a mobile telephone are also not shown, and same can be connected to a wired telephone network but also consist of mobile telephones.
  • page 2 has the almost strigic scenario with regard to available mobile systems been discussed.
  • GSM has today the largest number of users, and this fact is the main reason why same has been chosen for the example of an embodiment. However, also this system is relatively difficult to describe in brief terms.
  • Fig. 1 discloses DECT.
  • DECT is allocated certain "frequency bands" for wireless radio communication in which a number of carrier waves are available.
  • Each carrier wave is divided in time periods having twenty-four "time slots”.
  • Two time slots are utilized to create a duplex channel, which means that twelve speech channels exist within the range of each carrier wave.
  • Said twenty-four time slots are transmitted as so called TDMA frames having a frame cycle time TF of 10 ms.
  • a typical frame structure for a digital TDMA/TDD communication system is shown in Fig. 1. During the first half of the frame, i.e. the first twelve time slots denominated R1, R2 ...
  • R12 data are received from the base station, whereas during the second half of the frame, i.e. the second group of twelve time slots denominated T1, T2 ... T12, the telephone unit is transmitting data to the base station.
  • a radio connection between a base station and a telephone unit is assigned a time slot in the first half of the time frame and a time slot having the same number in the second half of the time frame.
  • Each time slot normally includes synchronizing data, control data and digitalized speech or user data.
  • Signalling data such as data referring to the calling party, dialled telephone number and call progress signals can be included in control data as well as speech/user data.
  • Digital cellular systems must be even more complicated, but differ from the above by having individual radio frequencies (carrier waves) for transmission and reception (according to present and previous GSM).
  • Fig. 2 shows a simplified block diagram disclosing the described system 1, including four essential building blocks, i.e. a central controlling user adapted logical unit 2, a radio unit 3, a time controlling and synchronizing control unit 4 and a speech treating unit 5.
  • the radio unit includes an atmospheric interface by means of an antenna 6, connected to the radio unit 3 and including a searching "scanning" part and a receiver/demodulator.
  • Time adaption during reception is controlled by the time controlling unit 4, which, in the case of TDMA/TDD technology, handles synchronization of frames and time slots in a known fashion.
  • the time reference is normally gained from a synchronizing signal received by the antenna 6.
  • said antenna is preferably of receive type only, screened and of directional type, whereby same has a very short, narrow and defined reception range wherein same well receives radio signals within the frequency band(s) utilized for mobile telephony within the installed area.
  • a first phase which can be called the "resting phase”
  • said antenna can under ideal conditions only be activated by signals from the predetermined area (which usually requires certain calibration in position, e.g. when the system is installed), but a nearly “ideal” condition is also acceptable due to the following protocol.
  • the antenna connected to a searching ("scanning") device, which constitutes the first part of the radio unit 3.
  • This searching device searches during the first phase continuously the frequency bands used for a suddenly occurring relatively strong radio signal on any of the frequencies. This is a reason why it is preferred that a visitor should switch on a "disconnected" mobile telephone adjacent to the entrance in order to initiate the entrance telephone procedure.
  • Such a scanner would be a luxury, since reproduction of speech is not required, and since most of these scanners are built to cover the entire radio spectrum; totally unnecessary in the present case.
  • a discrete circuit, LSI circuit or a few commercially available IC circuits would be more suitable to implement the functions described herein, surveillance/"scanning" only within required narrow bands, and surveillance of the handshaking procedure, and gaining only a few desired parameters from same.
  • Technically can this be accomplished today in a number of ways by a person skilled in the art and by use of commercially available standard components, and in view of this fact a more detailed description of a certain embodiment is not believed required and would only constitute a non-required restriction.
  • a "scanning" device After having been initiated in previously described fashion are (if previously described "proximity card” and/or transaction memory possibility are used, to deal with data including PIN/SIM number or corresponding equivalents and secure that same are transferred for adequate treatment) to connect another antenna (or part of an antenna) facilitating reception at a large distance, which results in reception also from the base station and possibly power reduced mobile telephone signals, and to transfer same to the more stable parts of the radio unit 3. Mentioned reduction/increase of the receiving range can also be carried out in other fashions, e.g. by use of a connectable and disconnectable attenuating unit.
  • the system according to the invention now enters into “active” condition, and it is transferred back to "resting” condition after having completed intended/instructed actions, or by disconnection after a predetermined time period.
  • active condition no “scanning” is performed, since only one visitor at the time requires to be handled at an entrance.
  • satellite stations are preferably by means of a "multiplexed system” connected to a central main unit, which may have the entire capacity for handling calls and the main part of hardware, thereby reducing the costs for the installation.
  • the central control unit 2 receives data from the radio unit 3. Signalling and synchronization information are removed from received data, and resulting speech data are transferred to the speech treating unit 5, which decodes received data. It should be noted, that according to described embodiment, unless speech/voice commands are utilized, preferably only DTMF signals are of interest, which are included in the flow of speech from the party called by the telephone, and only when a valid and preprogrammed telephone number has been dialled from the visitor's mobile telephone; and that DTMF signals are fairly easy to detect and decode from a speech data stream.
  • the unit 5 preferably maintains received "T" speech data and preferably also all control data for internal treatment, preferably in order to obtain the number dialled by the visitor's mobile telephone and which is transferred after "handshaking". This number may thereafter be compared with the numbers stored/programmed in the number discriminator 7 in order to ascertain whether or not corresponding, and should this not be the case, the system may immediately return to "resting" status.
  • a door lock for example, may be immediately unlocked followed by return to "resting".
  • the unit 5 can be started pending incoming "R" data and for detection of in such data included DTMF signals, and provided that such are located within a predetermined time limit, corresponding to programmed criteria, corresponding action can be performed. After completion of programmed action, and also at reception of a non-valid digit/code command and/or expiration of time period for surveillance, the described system can return to "resting".
  • the central control unit 2 In the case of multi carrier wave/multi time frames, such as GSM, the central control unit 2 normally also controls the various combinations of carrier wave frequencies and time frames in a known fashion. In order to minimize the number of required components, the unit 2 may according to the present invention be configured in such a way that same helps the "scanner" to lock on assigned carriers/time frames. According to the described embodiment is the control unit 2 arranged to handle received signal information for decoding a transmitted dialled number from a mobile telephone at the entrance, for comparison with programmed/stored numbers, and for possibly taking actions based on the instructions associated with said number. This is carried out by the schematically indicated number discriminator denominated 7.
  • the number discriminator 7 can be integrated with the control unit 2, and may substantially comprise of a for the purpose adapted micro control circuit, which furthermore may be integrated with the control unit 2 and perform substantially all steps associated with same. It includes an operative memory, in which all operative programs are stored. Furthermore, same also includes memory means including data for a number of decoding logarithms, for example adapted to the type of signalling information that must be decoded for a certain purpose. These decoding algorithms are fetched and treated together with received signalling information to reveal instructions for an action.
  • the memory means also facilitates possibility for adapted and/or personal user programming (which for applications requiring high security, such as military applications, may include memory components which can not be reprogrammed by "external persons"), such as programming/storage of desired actions, choice of decoding algorithms from the users of the system depending on requirements and circumstances, and/or programming of user specific information, e.g. telephone numbers, code lock numbers, numbers for "proximity cards”; if and how this information should co-act; DTMF digits/codes to be used for instructions from the called telephone; etc., as well as temporary information, e.g. parameters relating to time periods whereunder certain functions are allowed/not allowed.
  • at least one serial port and a real time clock are advantageously arranged.
  • the system 1 may furthermore include a keypad 8 (and/or, for analogue purposes, an IR receiver, "Bluetooth” receiver or similar), an optional card reader 9 (and/or for analogue purposes, a “biometrical” reader or similar) and an optional display unit 10. It is connected to a power source 11, and is shown connected to an entrance lock 12 for influence of same. A connection to a block 13 is also shown, which is intended to illustrate a number of possible added options, e.g. a TV camera, a device for announcing a visitor via cable network, a light source, transmitting status data, or any other desired device/procedure.
  • a keypad 8 and/or, for analogue purposes, an IR receiver, "Bluetooth” receiver or similar
  • an optional card reader 9 and/or for analogue purposes, a “biometrical” reader or similar
  • display unit 10 It is connected to a power source 11, and is shown connected to an entrance lock 12 for influence of same.
  • a connection to a block 13
  • the described embodiment is normally in “resting” condition, which means that same is continuously “scanning” for a sudden and sufficiently strong radio signal within utilized frequency bands, block 15.
  • the "scanning" operation is halted, the range of the receiving antenna is increased and surveillance is performed with regard to the initiating functions, the "handshaking" between the mobile telephone and the base station, the PIN/SIM number is possibly collected (if this should be used), and more specifically, locking is performed to utilized carrier wave and assigned time frames for interception of initiated communication, block 16.
  • Block 17 shows a possibly included action, namely a question whether or not a PIN/SIM number has been detected.
  • the reply in block 21 should be "no"
  • the number is transferred to block 23, which ascertains whether or not the number is a telephone number programmed into the number discriminator 7 as a number which at the actual time of day is authorized to control some related functions/actions in the building. If the reply is "no", the system is reset and returns to block 14. If the reply is "yes”, the flow of operations is moved to block 24, in which the speech treating unit 5 starts waiting for reception of "R" speech data (i.e. a reply to the telephone call), and if this should occur, detection and decoding of any possible DTMF signals in same during a predetermined time period for this purpose.
  • "R" speech data i.e. a reply to the telephone call
  • scanning function may be replaced by a device which in a more "stationary” fashion is arranged to monitor carriers/frequency bands, and furthermore can mobile telephones already “switched on” be “tapped” with regard to dialled number, and furthermore may also more distantly located telephones in conjunction with one single type of antenna system be used in certain cases and/or a starting sequence for the system can be caused by another means, e.g. a keypad or a pushbutton adjacent to the entrance.
  • Mobile telephones utilizing other types of systems than GSM can be used, many different decoding algorithms/routines can be used to meet various needs, and also other command types than DTMF can be used, e.g.
  • SMS, WAP can also be used, and some functions can, provided that the operator supplies such services, be handled/implemented by the base station, and may, for example via "menu choice", be included amongst the services and functions included in the mobile telephone, if also supported by the manufacturer.
  • GSM GSM
  • constant surveillance (monitoring) of "BCCH” carrier waves from base stations in the area should also be mentioned, whereby correct synchronization is always achieved when a "RACH burst" is detected from an (adjacent) mobile telephone which is being switched on, whereby detection and decoding of parameters in the "handshake" and the call thus is made simplified.
  • "handshaking” PIN/SIM codes, dialled numbers etc., and instead allow created reply codes carry out corresponding authentication/discrimination/etc.
  • the device according to the invention is arranged with a keypad, pushbutton or similar, that the called party during the conversation informs the entrance, either programming the device or verbally informing the visitor, which code/action (e.g. buttons to press) required, whereby the visitor may "key himself in”. If this should occur, the operation is temporary and can not be “publicly known” and thereby misused, and even a simple operation will be safe enough. Also more complicated methods can be used.
  • a wired circuit from the inhabitant to the entrance set can cause opening (for example by galvanical closed circuit) during conversation, but the functional possibilities will be restricted to the influence caused via the wired circuit.
  • the entrance apparatus may according to the invention namely be arranged in a conventional way connected to a fixed or mobile telephone network, Internet or similar. It may thus be called in a conventional way from the visitor's mobile. Its own number may be secret, only shown by the entrance, to avoid calls from distant locations, or it may be temporary and variable and shown on a display by the entrance, readable by a visitor; or it may only accept calls after depressing a pushbutton by the entrance.
  • the call number is dialled by the visitor on the mobile, and the caller is thus conventionally connected to the entrance apparatus and may then communicate therewith, i.e. send and receive commands.
  • the visitor can now be requested to dial a code number, which can be constantly shown on a name-number-board at the entrance, or alternatively may the call number (shown at the entrance) include components for selective calling (only to parties at present in program/memory).
  • the entrance apparatus now quite conventionally, for example according to the "three parties call service", establish a conference call between the visitor, the party to be called and itself, whereby the first two parties can talk, whereas the entrance apparatus a silent listener await/monitor for given commands, which can be given by the called party and reacted to in accordance with the described preferred example of an embodiment.
  • caller ID caller identification
  • this solution is regarded as non-preferred, since same involves permission for connection and connection charges (subscriber and call charges), but same is mainly disclosed as an example of a technical solution within the scope of the inventive thought.
  • Siemens offers a GSM module, which for the purpose includes unnecessarily many functions, since same also can handle transmission, microphone, loudspeaker, CODEC/DA-transformer, SIM card interface etc., which are not used according to the present invention. Due to similar reasons are also so called GSM chip sets offered by, amongst others, Philips and Mitel to advanced, even though possible a restricted number of such circuits can be used cost effectively. Motorola has recently released a circuit, DSP 56690, which can handle mostly everything and covers all standards, and other manufacturers are about to release similar type of circuits.
  • micro control means has, for example, Dallas DS2250(T)-64 64 Kb RAM for storage of program and/or data, and the circuit also includes a serial port having full duplex and a real time clock, which thus is more than sufficient for the described embodiment.
  • the present invention can also be used for other purposes than surveillance of a building, e.g. for car parks, access to computers or machinery, rental cars, dispensers for purchase or issuance of travel tickets and similar, ATMS, "toll"-roads/bridges, control points for night watchmen, border surveillance, time/presence charting systems, "distant control" of garage doors, car locks/alarms, etc.
  • IR/"Bluetooth When using IR/"Bluetooth” communication, it is also possible, via corresponding transceiver for the controlled object, to establish a reciprocal "dialogue", whereby the controlled object also may transfer for example status data to the controlling mobile (which of course also is possible with regard to previously described mobile-base station-related "code/card”-communication, but would involve further complications; either some sort of subscription, or granted permission, in order to radio transmit back in the established carrier format, via base station or direct, to the mobile "in sync", respectively, and hence is viewed less preferable, at least for low cost applications), which PIN/SIM number, inputted code numbers etc. also, for example by a menu choice at the mobile telephone, can be transferred via the same link and thus be used for authorization checkup, transaction memory etc. Since "Bluetooth” (in difference to conventional GSM communication) is fairly easy to intercept and copy transmit, should for many cases IR be preferred, which (if well designed) is extremely difficult for intruders to intercept, and thus would be preferred for transfer of
  • the present invention may also make use of the unique serial number ("International Mobile Equipment Identity" - IMEI) allocated to every mobile radio telephone when manufactured, and this number is also made available during the handshaking process and can thus identify a specific mobile radio telephone.
  • International Mobile Equipment Identity - IMEI

Abstract

A method and a device for utilization of mobile radio telephones for surveillance and/or control purposes in which a radio unit (3) for reception of signals from mobile radio telephones is arranged to be activated in a first step by an incoming signal from a mobile radio telephone, as a second step analysing the first part of received signal with regard to the PIN/SIM number (or corresponding) and/or inputted call number during the handshaking procedure between the mobile radio telephone and an associated base station for comparison with preprogrammed corresponding information, and as a third step, when correspondence has been established, initiate preprogrammed procedures and/or actions, and if non-correspondence is established return to "resting" and non-activated condition pending a signal inputted from a mobile radio telephone. The receiving radio unit (3) is preferably performing a scanner function in "resting" condition with regard to within the geographical area utilized frequencies for mobile telephones, and performs a locking operation to the frequency for an incoming signal, maintaining this locking when approval for the third step is established, and returning thereafter, as well as when non-acceptance is established during the second or third step, to "resting" function with scanning of the frequencies. The reception range for used radio unit (3) is preferably maintained restricted during the first and second step, and extended during the third step, whereby reception of called subscriber can be accomplished from the base station communicating with the mobile radio telephone.

Description

    Technical Field
  • The present invention is mainly related to a method and a device whereby commonly used radio (cellular) telephones facilitate various substantially physical types of services, and this is described, purely by way of example, for control of access, signalling, communication and e.g. entrance door lock opening for an entrance telephone system. However, also examples of other fields of use will be mentioned.
  • Background Art
  • "Entrance telephones" used today are either arranged with installed fixed communication circuits ("local telephones") or connected to and switched through a public telephone network ("door telephones"). They exist basically due to a need for security and privacy - while still offering a sodal possibility - for inhabitants in areas which require locked entrances due to various threats and risks in mainly highly populated areas, but they also involve certain disadvantages.
  • Local telephones are costly to install, wire and maintain; door telephones involve continuos costs for the building when used, and for reasons unknown are the local telecommunication authorities always attempting to create a number of obstacles for an economical installation. All of them include the disadvantage caused by externally available user units which are extremely sensitive for outer influence and vandalism, and mainly for the same reason, most of these units are of loudspeaking types, "hands free", and often having a poor sound quality.
  • However, today a large part of the population, and rapidly increasing, carry a radio telephone ("cellular phone"; "mobile (telephone)"), or may at least do so if there are suffident reasons. These telephones have excellent communication, signalling and sound properties, but have so far lacked possibility of using these properties as a possibility to gain access/lock opening from a visitor's point of view.
  • WO 93 14571 A1 discloses establishment of a conventional call from a user's cellular telephone to a clearinghouse. After receipt of an incoming call, the clearinghouse uses a separate RF communication link from the clearinghouse to the locks controlled by the clearinghouse.
  • WO 94 01963 A1 discloses am access control system that uses transmitters which generate a dual tone (DTMF) modulated signal. A standard mobile telephone can thus be used to obtain access to controlled areas. However, the method disdosed in WO 94 01963 A1 is related to MFC-signalling and makes no use of the information obtainable during a "hand-shaking" procedure between a mobile radio telephone and adjacent conventional base station.
  • Disclosure of Invention
  • It would be a major advantage to accomplish an entrance system, such as a door opening system, which is easy to install and maintain, having good sound quality, having a minimum of external physical user communication parts, which does not involve continuos fees for inhabitants and property owners for the use of the system etc., but instead allows a visitor's mobile telephone accomplish this. It is thus an object of the present invention to disclose a method and a device facilitating a functional system having simple installation, substantially only requiring connection to an electrical power source and a controlled device, such as a door lock, but which does not require external physical user communication means such as a microphone, loudspeaker and push buttons/keyboard, as well as wired communication circuits or connection to a communication network, but still offers complete and functional selective control of visitors/entrance telephone services for intended building. A further object of the present invention is to give mobile telephones existing "out there" desired possibility for control of visitors/entrance telephone properties for a building having the aforementioned installation.
  • These and other objects, advantages and features of the present invention are for this special purpose (for intended purpose preferably by specially adapted devices) partly obtained by use of means known as "scanners", which today may for example include receiving capability for the entire GSM frequency range. Only the receiving capability of a scanner is required; since the communication properties of same according to the present invention are only utilized as a "passive" listener for data, same does not require analogue sound, nor transmitting possibility.
  • Since said scanner mean are only receivers, they do not require any permit or licence to keep or use, and there are no laws prohibiting preventing the use of same for technical solutions of the type described herein, nor any user fees, formal acceptances or similar. With regard to analogue radio telephones, such as NMT, it is only conventional radio reception, whereas for digital networks, such as GSM, certain signal processing is required. Without restricting the present invention (NMT and other "analogue" standards are used less and less, whereas "satellite" (IRIDIUM), "broadband", "dual mode", "multi mode" and other "digital" standards are increasing), the invention will hereafter be described with reference to an embodiment for use with digital wireless communication systems named as "U.S. PCS 1900", "JAPAN PHS", "DCS 1800", "CT-2", "CT-2-CALL", "CT-3" and "DECT" and/or digital cellular communication systems named "IS-54B (ADC, D-AMPS, CDMA, IS-136)" in the United States of America, JDC in Japan and the global GSM-networks. The "scanning" radio receiver part according to the present invention must thus be in a position to handle the most frequently used mobile telephone systems within the area of use (and possibly facilitate upgrading to future specifications/protocols, for example "Bluetooth", "Maya", "Chat", "e-mode", "3G", "SMS", "WAP (/MEXE)", "iDEN", "IMT-2000", "GMPCS", "GPRS", "UMTS", "FDMA", and "(W) CDMA" with "FH/SS", "DS/SS" and "CO FDM"), but in order to simplify the non-restricting description, GSM has been chosen. GSM is a commonly used standard for mobile telephones. In accordance with a so called "protocol", a format is used denominated MultiCarrier(MC)/Time Division Multiple Access (TDMA)/Time Division Duplex (TDD) for radio communication between the units, such as mobile telephones and base stations, which are connected to a public telephone network. Mobile radio telephone systems are restricted to use certain frequency ranges for communication, and mobile telephones transmit and receive at separate frequencies (cellular) or "time frames" (DECT) in order to accomplish speech with "full duplex".
  • The method according to the present invention is mainly characterized by the features stated in the following Claim 1, and related subclaims, whereas the device for utilization of the method is disclosed in Claim 5 and the subclaims related to this claim.
  • Since mobile telephony is radio communication, same can be intercepted by devices known as scanners, which operate by continuously proceeding search of the radio frequency spectrum or chosen parts thereof, and which detect and "lock" on active channels, and submit intercepted sound to a listener. In the case with analogue radio, the communication is immediately understandable, but with regard to digital communication, such as GSM, the output would be a meaningless noise, unless they are capable of performing a speech and signal data decoding operation with use of the same protocol as used for the intercepted signal. In the case of GSM, such scanners are today commercially available, which are also capable of detecting the number dialled from the mobile telephone and also to disclose their individual and unique PIN (a subscriber's personal identification number - "International Mobile Subscriber Identity" - IMSI)/SIM number, particularly in the case when the mobile telephone is switched on from an off condition and when "hand shaking" is performed with the base station located closest to the subscriber with use of a few basic protocols, when also the protocols to be used for a subsequently following telephone call are disclosed to an initiated listener. Accordingly, even though it is technically possible according to the present invention to perform required scanning/"tapping" of mobile telephones that are "switched on", it is preferred and described that a visitor should initiate the access control procedure by switching on a "disconnected" mobile telephone closely adjacent to the entrance to which access is desired. This results in many advantages.
  • Firstly, that the visitor's mobile telephone is located in such a close relationship to the entrance as a normal entrance request situation requires, before same can be detected, prevents all other persons switching on their mobile telephones in an adjacent area from addressing or initiating the system according to the present invention. The antenna used by the system can thus be well screened, being directional and having a short reception range.
  • Secondly, a "switched off" mobile telephone which is switched on also acts as a starting or activating unit for the system, apart from the fact that same generously gives away the protocols facilitating an "entrance call".
  • The radio receiving "scanning" unit in the described system will, after being activated, perform scanning of assigned radio channel (frequency) for communication and perform synchronisation with transmitted time divided TDMA parcels. It may thus detect, decode and handle the number that the visitor will dial in order to make a request for access to the building. This number is typically the telephone number of a tenant living in the building. A programmable device, a "number discriminator", compares this number with preprogrammed numbers - normally the telephone numbers of the tenants and/or other persons authorized to unlock the door - and if these numbers correspond, the door lock is allowed to receive and be activated by an unlock command. Should the numbers not correspond, and provided that the dialled number was a telephone number, same results in a conventional telephone call between the calling party and the called party, while the described system does not respond to any control commands. On the other hand, should the numbers correspond, a call can be started between the calling and called party (provided that a reply is obtained), whereby the calling party may identify himself and request permission to enter, whereafter the called party has possibility to allow this by sending adequate control signals back via the established connection - preferably as a DTMF digit sequence or code sequence - which can be detected and decoded by the locked, synchronised and listening scanner radio part of the system., which "listens in" to the entire communication between the parties concerned (via the base station) and may thus, preferably during a predetermined time period, detect DTMF signals and act in response to same, as well as, since it may require that valid DTMF signals must be in the correct frequency/time slot, secure that only the called party can transmit DTMF signals influencing the system. (other means of protection can be to disregard valid DTMF signals at T-frequency, or rather, in GSM and unless DTMF:s are acoustically being loaded into the visiting mobile's "mic" from a tone generator, the DTMF instructing signal messages which a mobile telephone transfers to the base station in order to make same produce DTMF signals to the replying telephone, this in case of attempts to force the system, strong feedback, echoes or side tone; or a required certain dB-level to cause acceptance). Since DTMF makes it very simple to give numerous types of commands, also other functions apart from opening a door lock can be accomplished, e.g. start of a camera, alarm transmission, switching on a light source etc. by commands from the called party, and such functions only require system programming and that required hardware for such functions are made available.
  • The system according to the present invention thus operates in synergy with the mobile telephone call, it does not take any part in any telephone communication, to which it is only acting as a passive listener, and when reacting on stimulus from same, it does not influence the actual conversation, which is carried out and completed (logically after intended result) by the parties concerned, and furthermore is the call without charges for the building - normally is the visitor charged to call fee unless a 1-800 (free of charge) number is offered, whereby the need for a communication unit for visitors no longer exists, such as a keyboard, microphone and loudspeaker - and furthermore will excellent sound quality be achieved, well suited for use in an area having street sounds. Since conventional telephone numbers are used, no list of numbers is required, which favours welcome visitors, who normally knows the person to be visited and the telephone number of same, as well as the need to bring a mobile telephone. Since the described system has a number discriminator for storage of different numbers, it can also offer a code lock possibility, as is the case with known entrance telephone systems. This is advantageous for tenants, service personnel etc., as well as to give tenants having no telephone a possibility to let in visitors by giving them a door opening code. The system according to the invention can obviously also include a keypad, for addressing a code lock, but this would mean additional hardware and an external user influenced unit which is sensitive for influence/damage. A number dialled from a mobile telephone must not necessarily be a functioning/existing telephone number which is transferred to the base station (or in the air). All numbers dialled are transmitted after a command and "authenticated" (authentication) by the base station, and by preferably starting with a non-numerical part such as "*" or "#" it will, as disclosed above, reach and be understood by the described system. Should this number correspond to a number stored in the number discriminator for a certain code lock purpose, intended function can be performed, in the same way and with same advantages, e.g. time zones, as for a code lock having a keypad, even though no keypad exists. A possible disadvantage would be that both tenants and service personnel must carry mobile telephones to use this, but this can be motivated by costs and the advantage of security against damage. Since the base station according to the GSM protocol first authenticates the "mobile" and thereby makes it possible for same to "send out" a dialled number, security against copy transmissions from a possible intruder is also reasonably high. The level of security can be increased further, if the code lock function first must be initiated by "switch on" of a "mobile" followed by handshaking between same and the base station, as discussed in otherwise in this description. Furthermore may "rolling" variable codes, time zones etc. be used to safeguard the authority. In any case, since no telephone calls take place, due to the fact that same is interpreted by the base station as "wrong number", the use is free of charge. Another additional feature of existing entrance systems is often a card reader facilitating entrance for persons having valid cards, which in conjunction with a code lock result in different "levels" of security, namely "card only", "code sequence" or "card-plus-code sequence", apart from the fact that it is smart, fast and practical, particularly for company staff. A system according to the present invention can obviously also be equipped with a suitable type of card reader (this may also include a conventional physical card reader which reads the SIM card of the "visiting mobile", removed from the telephone and inserted into the reader), but it may also use mobile telephones for accomplishing a corresponding function, without the need for any external user unit. When a GSM mobile telephone is switched on, same discloses during the initial handshaking operation with the base station its unique "PIN-code/SIM-card" number (amongst other information required to reach correct base station) in a format and according to a protocol which can be read by the now activated described system. If such a number is programmed and stored in the number discriminator as a valid "card code", the mobile telephone acts very much the same as a "proximity card" and the system as a "proximity card reader" which reads the card without direct physical contact, and programming can be performed as "card only", or alternatively as "card-plus-code sequence" with required code sequence being inputted subsequently. The same disadvantages and advantages exist as for a non-keypad code lock, but routine reading of the unique PIN/SIM code for a visitor can also result in advantages such as an improved registration in a transaction memory to relate a certain visitor to misuse, also with regard to conventional entrance communication or code lock situations, who otherwise are completely untraceable. One may also, particularly with regard to installations having high security requirements such as military stores or similar, authorize only a few selected mobile telephones to initiate communication or code lock opening, and also define what certain mobile telephones that should be permitted to do, and additionally possibly include selectively chosen time zones, format changes, variable codes etc., and the initial authentication by the base station of the mobile/the connection results in a general guard against misuse. Apart from the PIN/SIM code etc. transferred "automatically" from the visiting mobile when switched on and conventional dialled number, also other types of automatically or intentionally transferred signals from the mobile can be used for the above code lock/card functions.
  • Since the described system should include a speech handling unit, mainly in order to detect and decode DTM F signals sent as speech data, same may theoretically also accept voice and speech commands for its functions/actions, but DTMF is believed both simpler and better for the relatively few tasks that an entrance surveillance system has to perform. Possibly, and in order to improve security and use, may given commands consist of longer DTMF code sequences, as well as different command codes for different called inhabitants (based on the different call numbers of same) for same type of actions, or for actions specific for only certain inhabitants, such as permitting a lift to reach a certain floor level, but normally is only one or a few DTMF digits required to achieve required extent of signalling with adequate security, since same in fact must originate from the called party, and amongst other criteria, preferably also within a predetermined time frame in a by the base station authenticated call.
  • Even though commercially available GSM-scanners can be used for radio frequency scanning and reception, time adjustment and synchronization, and signal/speech decoding required for utilization of the present invention, the speech must never leave its digitized format to be transformed to an analogue signal audible to a listener; each system function is preferably in digital format. Accordingly, when using such devices a considerable part of their functions are not utilized, but since they are available and can be used, same confirms that described functions can be achieved in a number of ways and by use of standard components.
  • Programming the system according to the invention can be carried out in a number of ways, e.g. in position by means of a serial connection and with a handheld programming device or a PC (or PC-capable mobile telephone), and programming from a PC at a distant location via modem is also possible. In position, the system may also receive DTMF or, if adapted thereto, data via mobile telephone (WAP, SMS etc.) as programming commands, provided that somebody (authorized, e.g. by PIN/SIM number) is in place and establishes a mobile telephone call to an authorized programming telephone, in which case the described system can listen to the communication therebetween and thus receive the correctly formatted programming instructions/commands. It may also be arranged with a connection to a public telephone network for distant programming purposes, as well as, for example, a mobile telephone subscription of cash card type or via Internet, typically not utilized for speech communication, but possibly used, for example, for alarm transmission purposes and surveillance/control purposes of functions within the building.
  • Non-existence of external physical user units (apart from the antenna, which can be arranged hidden) results in a highly secure substantially non-external installation, protected against external influence and damage, and expensive parts and covers are not required. Normally, only a few instructions are required (even though same may be an electronic display or similar, as well as audio/voice synthesized instructions, which on the other hand increases the costs and the risk for damage, but still remains as a possibility), and with indication of the area within which the mobile telephone should be switched on, even though this is not absolutely necessary for an experienced user, whereby nothing is required that would damage the looks, integrity and security of a beautifully designed entrance, even though same is equipped with an entrance surveillance system. Based on input of a correct telephone number and that same is detected/approved by the number discriminator, same can order connection of a TV camera operating on a channel in a cable TV system, and also via secondary unit give a general "alert" to all TV sets in the building, or based on the dialled number only to the party having said number, in order to disclose that the call resulting in a ring signal is an entrance telephone call (should the called party have the service "caller ID", the telephone number/identity of the calling party is also disclosed) and that the visitor can be seen on TV, prior to responding to the call. A similar function can also be implemented for code/card addressing.
  • Certain mobile telephones use speech scrambling in order to make the calls safer. Even so, all mobile telephones within a given area must use the protocols for handshaking, dialled telephone number, radio transmission etc.. This communication between the mobile telephone and the base station remains within given standards. Only the speech is made subject to speech scrambling and can only be received by another telephone having the same algorithm for speech scrambling. However, it is not a major problem to detect and decode DTMF signals from a scrambled data stream. Since the pair of tones have such a typical configuration and maintain their frequency relationship also when scrambled, they are easily detectable as DTMF signals and their specific internal frequency relationship between the two frequencies identifies the digit.
  • Ring signals and engaged signals (signals identifying call progress) can also be detected, since they are sent back to the calling telephone from the side of the called telephone, and can thus be detected by the described system and be utilized for additional purposes, for example, as known from existing entrance telephone systems, to start a time period allowed for DTMF detection only as from detection of reply (end of ring signals); the time period allowed for calling (between dialled telephone number and reply) and possibly also to specify separately the time of the call. Many of the above mentioned possibilities are only stated to indicate functions intended to meet certain specific situations, demands and/or design alternatives, and in order to give a general background to the following example of a non-restricting example of an embodiment according to the method of the present invention, described with reference to the accompanying drawings.
  • Brief Description of Drawings
  • Fig. 1
    shows, schematically and illustratively, a digital data stream including bursts of transferred data in a digital radio telecommunication system (in this case, for simplification, DECT);
    Fig. 2
    shows a simplified block diagram disclosing an example of a system according to the present invention; and
    Fig. 3
    shows a flow diagram, illustrating the function of the system according to Fig. 2.
    Detailed Description of the Preferred embodiment
  • As previously mentioned, and without intending any undue restriction, the described embodiment will be related to the GSM standard, which, as already mentioned, is a MC/TDMA/TDD format for communication between mobile telephones (not shown) and base stations (not shown). Furthermore, all types of telephones and other "telephone related" apparatus, e.g. modems, computers etc., that can be reached by a call from a mobile telephone are also not shown, and same can be connected to a wired telephone network but also consist of mobile telephones. Earlier (page 2) has the almost Babylonic scenario with regard to available mobile systems been discussed. GSM has today the largest number of users, and this fact is the main reason why same has been chosen for the example of an embodiment. However, also this system is relatively difficult to describe in brief terms. In order to simplified illustrate some common principles for "digital" mobile telephones, Fig. 1 discloses DECT. DECT is allocated certain "frequency bands" for wireless radio communication in which a number of carrier waves are available. Each carrier wave is divided in time periods having twenty-four "time slots". Two time slots are utilized to create a duplex channel, which means that twelve speech channels exist within the range of each carrier wave. Said twenty-four time slots are transmitted as so called TDMA frames having a frame cycle time TF of 10 ms. A typical frame structure for a digital TDMA/TDD communication system is shown in Fig. 1. During the first half of the frame, i.e. the first twelve time slots denominated R1, R2 ... R12, data are received from the base station, whereas during the second half of the frame, i.e. the second group of twelve time slots denominated T1, T2 ... T12, the telephone unit is transmitting data to the base station. A radio connection between a base station and a telephone unit is assigned a time slot in the first half of the time frame and a time slot having the same number in the second half of the time frame. Each time slot normally includes synchronizing data, control data and digitalized speech or user data.
  • Signalling data, such as data referring to the calling party, dialled telephone number and call progress signals can be included in control data as well as speech/user data.
  • Digital cellular systems must be even more complicated, but differ from the above by having individual radio frequencies (carrier waves) for transmission and reception (according to present and previous GSM).
  • Fig. 2 shows a simplified block diagram disclosing the described system 1, including four essential building blocks, i.e. a central controlling user adapted logical unit 2, a radio unit 3, a time controlling and synchronizing control unit 4 and a speech treating unit 5.
  • The radio unit includes an atmospheric interface by means of an antenna 6, connected to the radio unit 3 and including a searching "scanning" part and a receiver/demodulator. Time adaption during reception is controlled by the time controlling unit 4, which, in the case of TDMA/TDD technology, handles synchronization of frames and time slots in a known fashion. The time reference is normally gained from a synchronizing signal received by the antenna 6. Suitable for described embodiment, said antenna is preferably of receive type only, screened and of directional type, whereby same has a very short, narrow and defined reception range wherein same well receives radio signals within the frequency band(s) utilized for mobile telephony within the installed area. During a first phase, which can be called the "resting phase", said antenna can under ideal conditions only be activated by signals from the predetermined area (which usually requires certain calibration in position, e.g. when the system is installed), but a nearly "ideal" condition is also acceptable due to the following protocol. During this phase is the antenna connected to a searching ("scanning") device, which constitutes the first part of the radio unit 3. This searching device searches during the first phase continuously the frequency bands used for a suddenly occurring relatively strong radio signal on any of the frequencies. This is a reason why it is preferred that a visitor should switch on a "disconnected" mobile telephone adjacent to the entrance in order to initiate the entrance telephone procedure. When a mobile telephone is "switched on", it is transmitting with substantially full power in order to secure contact with a possibly distant base station (the output of the telephone may be relatively low in certain areas), and this signal is often considerably reduced due to instructions received from the contacted base station during the initial "handshaking" phase, during which also other parameters for the communication are transferred, followed by a number of initiating routines, or "protocols", which, due to the general character of the situation, must be rather general and repeated and thus easy to understand. As previously mentioned, required decoding of same can be carried out by commercially available scanners, and certain of these can also decode mobile GSM conversations without having performed surveillance of the handshaking procedure. In order to accomplish the present embodiment, such a scanner would be a luxury, since reproduction of speech is not required, and since most of these scanners are built to cover the entire radio spectrum; totally unnecessary in the present case. A discrete circuit, LSI circuit or a few commercially available IC circuits would be more suitable to implement the functions described herein, surveillance/"scanning" only within required narrow bands, and surveillance of the handshaking procedure, and gaining only a few desired parameters from same. Technically can this be accomplished today in a number of ways by a person skilled in the art and by use of commercially available standard components, and in view of this fact a more detailed description of a certain embodiment is not believed required and would only constitute a non-required restriction.
  • With reference to "handshaking", same also involves that the mobile telephone gives away its PIN/SIM number, which, even it is not necessary for utilization of the basic principle according to the present invention, can be used for many interesting purposes, as already described earlier. However, since this is an added feature within the scope of the invention, no technical solution for the gain and use thereof is described, it is believed sufficient to disclose that this can be carried out technically in a number of ways, and with use of components adapted for this purpose.
  • The only tasks to be performed by a "scanning" device according to the present invention after having been initiated in previously described fashion are (if previously described "proximity card" and/or transaction memory possibility are used, to deal with data including PIN/SIM number or corresponding equivalents and secure that same are transferred for adequate treatment) to connect another antenna (or part of an antenna) facilitating reception at a large distance, which results in reception also from the base station and possibly power reduced mobile telephone signals, and to transfer same to the more stable parts of the radio unit 3. Mentioned reduction/increase of the receiving range can also be carried out in other fashions, e.g. by use of a connectable and disconnectable attenuating unit. The system according to the invention now enters into "active" condition, and it is transferred back to "resting" condition after having completed intended/instructed actions, or by disconnection after a predetermined time period. During "active" condition, no "scanning" is performed, since only one visitor at the time requires to be handled at an entrance. With regard to buildings having several entrances scanning and associated procedures can simultaneously be carried out at each not yet engaged entrance, and such satellite stations are preferably by means of a "multiplexed system" connected to a central main unit, which may have the entire capacity for handling calls and the main part of hardware, thereby reducing the costs for the installation.
  • The central control unit 2 receives data from the radio unit 3. Signalling and synchronization information are removed from received data, and resulting speech data are transferred to the speech treating unit 5, which decodes received data. It should be noted, that according to described embodiment, unless speech/voice commands are utilized, preferably only DTMF signals are of interest, which are included in the flow of speech from the party called by the telephone, and only when a valid and preprogrammed telephone number has been dialled from the visitor's mobile telephone; and that DTMF signals are fairly easy to detect and decode from a speech data stream. Accordingly need only received time slots with "R" speech data (for DECT) or corresponding frequency (in cellular networks) be transferred to the unit 5, which can be of a fairly simple design, whereas the unit 2 preferably maintains received "T" speech data and preferably also all control data for internal treatment, preferably in order to obtain the number dialled by the visitor's mobile telephone and which is transferred after "handshaking". This number may thereafter be compared with the numbers stored/programmed in the number discriminator 7 in order to ascertain whether or not corresponding, and should this not be the case, the system may immediately return to "resting" status. Should comparison establish that the number corresponds to a programmed "code lock number" (if this function is utilized), a door lock, for example, may be immediately unlocked followed by return to "resting". Should comparison establish that the number corresponds to an authorized/programmed "reply telephone number", the unit 5 can be started pending incoming "R" data and for detection of in such data included DTMF signals, and provided that such are located within a predetermined time limit, corresponding to programmed criteria, corresponding action can be performed. After completion of programmed action, and also at reception of a non-valid digit/code command and/or expiration of time period for surveillance, the described system can return to "resting".
  • In the case of multi carrier wave/multi time frames, such as GSM, the central control unit 2 normally also controls the various combinations of carrier wave frequencies and time frames in a known fashion. In order to minimize the number of required components, the unit 2 may according to the present invention be configured in such a way that same helps the "scanner" to lock on assigned carriers/time frames. According to the described embodiment is the control unit 2 arranged to handle received signal information for decoding a transmitted dialled number from a mobile telephone at the entrance, for comparison with programmed/stored numbers, and for possibly taking actions based on the instructions associated with said number. This is carried out by the schematically indicated number discriminator denominated 7. It should be noted that the number discriminator 7 can be integrated with the control unit 2, and may substantially comprise of a for the purpose adapted micro control circuit, which furthermore may be integrated with the control unit 2 and perform substantially all steps associated with same. It includes an operative memory, in which all operative programs are stored. Furthermore, same also includes memory means including data for a number of decoding logarithms, for example adapted to the type of signalling information that must be decoded for a certain purpose. These decoding algorithms are fetched and treated together with received signalling information to reveal instructions for an action. The memory means also facilitates possibility for adapted and/or personal user programming (which for applications requiring high security, such as military applications, may include memory components which can not be reprogrammed by "external persons"), such as programming/storage of desired actions, choice of decoding algorithms from the users of the system depending on requirements and circumstances, and/or programming of user specific information, e.g. telephone numbers, code lock numbers, numbers for "proximity cards"; if and how this information should co-act; DTMF digits/codes to be used for instructions from the called telephone; etc., as well as temporary information, e.g. parameters relating to time periods whereunder certain functions are allowed/not allowed. In order to allow maximum use of these possibilities, at least one serial port and a real time clock are advantageously arranged.
  • The system 1 may furthermore include a keypad 8 (and/or, for analogue purposes, an IR receiver, "Bluetooth" receiver or similar), an optional card reader 9 (and/or for analogue purposes, a "biometrical" reader or similar) and an optional display unit 10. It is connected to a power source 11, and is shown connected to an entrance lock 12 for influence of same. A connection to a block 13 is also shown, which is intended to illustrate a number of possible added options, e.g. a TV camera, a device for announcing a visitor via cable network, a light source, transmitting status data, or any other desired device/procedure.
  • According to the present invention, as shown in Fig. 3, block 14, the described embodiment is normally in "resting" condition, which means that same is continuously "scanning" for a sudden and sufficiently strong radio signal within utilized frequency bands, block 15. When this occurs, the "scanning" operation is halted, the range of the receiving antenna is increased and surveillance is performed with regard to the initiating functions, the "handshaking" between the mobile telephone and the base station, the PIN/SIM number is possibly collected (if this should be used), and more specifically, locking is performed to utilized carrier wave and assigned time frames for interception of initiated communication, block 16. Block 17 shows a possibly included action, namely a question whether or not a PIN/SIM number has been detected. If the answer is "yes", same is transferred to block 18 (to which also inputted information from a possible optional card reader or similar can be transferred) in order to initiate an associated predetermined action, which is not described here in detail, but unless it is an action of type "card only" the flow of operations must now return to the "no" flow from block 17 to block 19, which, during a predetermined time period, questions whether or not any number has been dialled/transferred from the active mobile telephone. If the reply is "no", the system returns to block 14. However, should the reply be "yes", same is transferred to block 20, where the number is decoded and thereafter transferred to block 21 (to which also a sequencer inputted from a possible optional keypad or similar can be transferred), which ascertains whether or not the received number corresponds to a number programmed into the number discriminator as a "code lock number", and if the reply is "yes" same is transferred to block 22, in which the number is used to initiate desired predetermined function, which is not described here, but the completion of which may reset the system 1 and cause a return to block 14, but with regard to certain applications first influencing block 25. If the reply in block 21 should be "no", the number is transferred to block 23, which ascertains whether or not the number is a telephone number programmed into the number discriminator 7 as a number which at the actual time of day is authorized to control some related functions/actions in the building. If the reply is "no", the system is reset and returns to block 14. If the reply is "yes", the flow of operations is moved to block 24, in which the speech treating unit 5 starts waiting for reception of "R" speech data (i.e. a reply to the telephone call), and if this should occur, detection and decoding of any possible DTMF signals in same during a predetermined time period for this purpose. If "no", the system 1 is reset and returns to block 14, whereas if "yes", decoded digit/digits are transferred to the number discriminator 7 and the flow of operations moves to block 25, in which the number discriminator compares received digits/codes with stored/programmed telephone numbers, commands, time zones etc., in order to establish programmed action for given command. Should no correspondence be established, i.e. "No", the system 1 is reset and returns to block 14; should on the other hand correspondence be established, i.e. "Yes", corresponding action is performed; typically a door lock opening operation (with the unlocking indicated by "buzz", "click" and/or LED), whereafter the system 1 is reset and returns to block 14 (block 26).
  • The previous description is only intended to serve as an illustrating description of an example of an embodiment according to the present invention. The method in which the described system performs surveillance, detection and identification of activity and signals from the connection of a mobile telephone normally with a base station, and carries out actions associated with related received commands, can today be solved in a number of ways and by use of commercially available components, whereby detailed described embodiments are not regarded as necessary. Those skilled in the art can easily on basis of the present description easily make alternative designs, which incorporate functions corresponding to the described embodiment and without departing from the basic principles or the scope of the invention. For example, previously described "scanning function" may be replaced by a device which in a more "stationary" fashion is arranged to monitor carriers/frequency bands, and furthermore can mobile telephones already "switched on" be "tapped" with regard to dialled number, and furthermore may also more distantly located telephones in conjunction with one single type of antenna system be used in certain cases and/or a starting sequence for the system can be caused by another means, e.g. a keypad or a pushbutton adjacent to the entrance. Mobile telephones utilizing other types of systems than GSM can be used, many different decoding algorithms/routines can be used to meet various needs, and also other command types than DTMF can be used, e.g. speech, SMS, WAP can also be used, and some functions can, provided that the operator supplies such services, be handled/implemented by the base station, and may, for example via "menu choice", be included amongst the services and functions included in the mobile telephone, if also supported by the manufacturer. Finally, the possibility (for GSM) of constant surveillance (monitoring) of "BCCH" carrier waves from base stations in the area should also be mentioned, whereby correct synchronization is always achieved when a "RACH burst" is detected from an (adjacent) mobile telephone which is being switched on, whereby detection and decoding of parameters in the "handshake" and the call thus is made simplified. One may also, perhaps mainly in an attempt to by-pass the present invention as described and furthermore, not in a particularly advantageous way and without departing from the inventive thought, completely or partly avoid surveillance/analysation/discrimination etc. Of "handshaking", PIN/SIM codes, dialled numbers etc., and instead allow created reply codes carry out corresponding authentication/discrimination/etc. of primarily the number dialled from the visiting mobile, and to do this by holding parameters for this purpose, interpretable by the device according to the invention by the corresponding programming of same, the codes generated by replying part - man or machine - will probably be rather large, complex and difficult to handle, but the version is interesting from descriptive point of view, since same discloses a solution whereby only a commercially available GSM scanner is required to accomplish the more special functions of the invention. Quite conventionally can thus all DTM signals in an intercepted GSM call in a known way (for example by a passband filter) completely analogue be gained from the CODEC of the scanner and in a conventional way be handled by a "number discriminator"/processor. Should an intercepted and obtained DTMF sequence correspond to preprogrammed criteria, this would serve as "evidence" of the authenticity of both the number dialled and the command, and this could possibly meet required security, at least for more trivial applications. This is even more conventional, when the "scanner" of the device according to the invention receives a call via the still well used NMT 450 or the analogue alternative of D-AMPS etc. This would require no signal treatment at all. In correspondence with what has been disclosed above concerning speech scrambling it will be understood, that signal treatment for only DTMF will be fairly simple, also for GSM. In this connection can be mentioned the possibility, provided that the device according to the invention is arranged with a keypad, pushbutton or similar, that the called party during the conversation informs the entrance, either programming the device or verbally informing the visitor, which code/action (e.g. buttons to press) required, whereby the visitor may "key himself in". If this should occur, the operation is temporary and can not be "publicly known" and thereby misused, and even a simple operation will be safe enough. Also more complicated methods can be used. For example, should there be an entrance set having a microphone able to receive verbal or DTMF commands, the visitor can be requested to press the loudspeaker of the mobile against this microphone, whereafter the called party sends an opening command (which does not require to be changed), hopefully unheard by the visitor. For certain applications, particularly single family houses, a wired circuit from the inhabitant to the entrance set can cause opening (for example by galvanical closed circuit) during conversation, but the functional possibilities will be restricted to the influence caused via the wired circuit. These, and possibly other more or less cunning modifications pertaining to how the called party shall be able to give functional commands influencing the system after replying to a mobile call authorized by a listening entrance apparatus give fair security against damage from visitors, particularly if the above time zone/authorization/transaction memory criteria with PIN/SIM numbers and called number are included, but are not preferred, since the simplest, straightest and most versatile use is accomplished according to the described and preferred embodiment.
  • Finally, a further solution resulting in all functions and features of the invention, but involving only known and conventional components and techniques, and without any need for scanners, D/A-transformation etc. will now be disclosed. The entrance apparatus may according to the invention namely be arranged in a conventional way connected to a fixed or mobile telephone network, Internet or similar. It may thus be called in a conventional way from the visitor's mobile. Its own number may be secret, only shown by the entrance, to avoid calls from distant locations, or it may be temporary and variable and shown on a display by the entrance, readable by a visitor; or it may only accept calls after depressing a pushbutton by the entrance. The call number is dialled by the visitor on the mobile, and the caller is thus conventionally connected to the entrance apparatus and may then communicate therewith, i.e. send and receive commands. The visitor can now be requested to dial a code number, which can be constantly shown on a name-number-board at the entrance, or alternatively may the call number (shown at the entrance) include components for selective calling (only to parties at present in program/memory). Based on this code/component and remaining design/program can the entrance apparatus now quite conventionally, for example according to the "three parties call service", establish a conference call between the visitor, the party to be called and itself, whereby the first two parties can talk, whereas the entrance apparatus a silent listener await/monitor for given commands, which can be given by the called party and reacted to in accordance with the described preferred example of an embodiment. By means of caller identification (caller ID), it is possible to a certain extent copy functions based on PIN/SIM numbers, and for safeguarding that commands are only recognized from the called party can also thus, or by applying some of the above discussed methods for "in retro OK:ing", be cared for. However, also this solution is regarded as non-preferred, since same involves permission for connection and connection charges (subscriber and call charges), but same is mainly disclosed as an example of a technical solution within the scope of the inventive thought.
  • Use of an adapted GSM scanner has already been discussed. With regard to suitable types of components, Siemens offers a GSM module, which for the purpose includes unnecessarily many functions, since same also can handle transmission, microphone, loudspeaker, CODEC/DA-transformer, SIM card interface etc., which are not used according to the present invention. Due to similar reasons are also so called GSM chip sets offered by, amongst others, Philips and Mitel to advanced, even though possible a restricted number of such circuits can be used cost effectively. Motorola has recently released a circuit, DSP 56690, which can handle mostly everything and covers all standards, and other manufacturers are about to release similar type of circuits. With regard to micro control means has, for example, Dallas DS2250(T)-64 64 Kb RAM for storage of program and/or data, and the circuit also includes a serial port having full duplex and a real time clock, which thus is more than sufficient for the described embodiment.
  • The present invention can also be used for other purposes than surveillance of a building, e.g. for car parks, access to computers or machinery, rental cars, dispensers for purchase or issuance of travel tickets and similar, ATMS, "toll"-roads/bridges, control points for night watchmen, border surveillance, time/presence charting systems, "distant control" of garage doors, car locks/alarms, etc. For example, with regard to the last mentioned application speech communication/telephone call need not be connected through, since there a replying party often does not exist, and the communication will thus be one-sided of controlling character, whereby the claimed invention can be utilized in a simpler and more of the type special purpose, for example may no speech processing unit 5 be required and/or scanner, and same may apart from radio communication also in certain cases use infrared (IR) communication and/or "Bluetooth" (or similar standard) short range radio communication as an alternative, since modern radio telephones often are arranged to facilitate such communication in the near range of the mobile telephone. Also with regard to other applications may IR/Bluetooth communication serve as an alternative, and such communication is therefore included with regard to described embodiments when the notion radio communication has been used. When using IR/"Bluetooth" communication, it is also possible, via corresponding transceiver for the controlled object, to establish a reciprocal "dialogue", whereby the controlled object also may transfer for example status data to the controlling mobile (which of course also is possible with regard to previously described mobile-base station-related "code/card"-communication, but would involve further complications; either some sort of subscription, or granted permission, in order to radio transmit back in the established carrier format, via base station or direct, to the mobile "in sync", respectively, and hence is viewed less preferable, at least for low cost applications), which PIN/SIM number, inputted code numbers etc. also, for example by a menu choice at the mobile telephone, can be transferred via the same link and thus be used for authorization checkup, transaction memory etc. Since "Bluetooth" (in difference to conventional GSM communication) is fairly easy to intercept and copy transmit, should for many cases IR be preferred, which (if well designed) is extremely difficult for intruders to intercept, and thus would be preferred for transfer of confidential information.
  • Described example of an embodiment and stated examples of fields of use are thus in no way intended to serve as a restriction in relation to the inventive thought and the method and the device as defined in the following claims. Accordingly, also embodiments are possible in which generated control codes afterwards are used to complete/authorize and/or verify the authority/relevance of an initially dialled number and/or commands; control function signalling/effectuation can be accomplished in many different ways while maintaining authentication/authority for the command; transforming elements, scanner/radio receiver/DA-converter may also be substituted by a substantially convention telephone network connection with call possibility; and call numbers inputted to the mobile telephone can be substituted by (menu chosen) depressed buttons, speech commands, code input etc.
  • Finally, apart from PIN/SIM number, the present invention may also make use of the unique serial number ("International Mobile Equipment Identity" - IMEI) allocated to every mobile radio telephone when manufactured, and this number is also made available during the handshaking process and can thus identify a specific mobile radio telephone.

Claims (14)

  1. Method to use mobile radio telephones for surveillance and/or control purposes, wherein, a receiver for reception of signals from mobile radio telephones, in a "resting" and non-activated condition is arranged to perform a scanning function with regard to frequencies utilized within the present geographical area for mobile radio telephone communication; where the receiver is arranged in a first step to be activated by an incoming signal from a mobile telephone, detected by the scanning function and to lock onto the frequency of the incoming signal in a second step to analyse the received signal with regard to the PIN/SIM number or corresponding ID and/or dialled call number for comparison with preprogrammed corresponding data, and in a successive, "third" step when correspondence is established, to initiate performance of preprogrammed procedures and/or influence on predetermined devices, and if correspondence is not established, to return to the "resting" and non-activated condition pending receipt of an incoming signal from a mobile telephone.
  2. Method according to claim 1, wherein locking to the frequency of an incoming signal is also maintained on acceptance to perform the third step, and that the receiver thereafter, as well as at non-acceptance during the second or the third step, returns to "resting" function with scanning of the frequencies.
  3. Method according to claim 1 or 2, wherein the geographical extension of the receiving area for utilized receiver is maintained restricted during the performance of initial steps, and that the receiving area thereafter is extended In order to facilitate reception of the base station with which the mobile radio telephone is communicating.
  4. Method according to anyone of claims 1-3. wherein utilized mobile radio telephone is switched on from non-active operation within the area covered by the receiver, thereby initiating a handshaking procedure with an adjacent base station, which base station can be received by the receiver due to an extension of the receiving area.
  5. Device for performing the method to use mobile radio telephones for surveillance and/or control purposes according to any one of claims 1-4, comprising a receiving radio unit (3) with associated receiving antenna (6), having a searching scanner for reception of the frequencies used within related geographical area for mobile radio telephone communication, a central control unit (2) whereto a received signal from a mobile radio telephone detected by the scanner, is transferred and a time related synchronizing unit (4) for surveillance and decoding of completed hand shaking procedure between the mobile radio telephone and an associated base station and thereby reported PIN/SIM number and/or from the mobile radio telephone transferred called number, whereby conformity with corresponding stored information is arranged to initiate a predetermined process or action, and otherwise result in return to "resting" and listening condition pending a new inputted signal.
  6. Device according to claim 5, wherein the receiving radio unit (3) is arranged having a restricted geographical reception area, said area being extended when an incoming signal has been determined as a call to a preprogrammed subscriber, and that the radio unit (3) thereafter during a predetermined time period listens to the communication channel of the called subscriber via a speech treatment unit (5) for preprogrammed commands in the form of DTMF signals, the receipt of such an approved command resulting in performance of an associated predetermined procedure/action, and otherwise return to the "resting" and listening condition pending a new inputted signal.
  7. Device according to any one of claims 5 and 6, wherein the central control unit (2) also is connected to be influenced by a user operated physical input means, such as for example a keypad (8), a card reader (9) or similar, and that commands via such a means (8; 9) are arranged to individually, or in combination/interchange with information obtained from a mobile radio telephone, result in initiation for performance of predetermined procedure and/or action.
  8. Device according to any one of claims 5 - 7, wherein the receiving radio unit (3), when an approved call to a subscriber has been confirmed, is arranged to change to listening of the speech data stream of the called subscriber, and thereby only receive and accept possible commands existing in the speech data stream of the called subscriber, introduced as DTMF sequences, speech commands or similar.
  9. Device according to any one of claims 5 - 8, wherein a number sequence dialled from a mobile radio telephone commencing with a non-numerical part, such as, for example, "*" or "#", is received and interpreted as a direct command, which, when corresponding to a preprogrammed command, results in initiation and performance of predetermined process/action, for example, a code lock command for opening an entrance door lock.
  10. Device according to any one of claims 5-9, wherein the geographical receiving range of the receiving radio unit (3) in "resting" condition is so restricted, that same substantially only will react on signals resulting from a mobile radio telephone which is switched on from disconnected condition within the receiving range, i.e. when the mobile radio telephone with substantially full output power attempts to establish contact with an adjacent base station in order to perform a handshaking process.
  11. Device for performing the method to use mobile radio telephones for surveillance and/or control purposes according to claim 1, the receiver for reception of signals from mobile radio telephones comprising a receiving unit for infrared signalling for reception of infrared signals from a mobile radio telephone equipped with an interface for infrared communication, wherein said receiving unit is arranged to transfer a received infrared signal from a mobile radio telephone to a central control unit for surveillance and decoding of received infrared signals from the mobile radio telephone, said received signals including reported PIN/SIM number or corresponding information and/orfrom the mobile radio telephone transferred called number sequence, whereby conformity with corresponding stored information is arranged to initiate a predetermined process or action, and otherwise result in return to "resting" and listening condition pending a new infrared signal being received by the receiving unit.
  12. Device for performing the method to use mobile radio telephones for surveillance and/or control purposes according to claim 1, the receiver for reception of signals from mobile radio telephones comprising a receiving unit for short range wireless communication for reception of radio signals from a mobile radio telephone equipped with an interface for such communication, wherein said receiving unit is arranged to transfer received signals from a mobile radio telephone to a central control unit for surveillance and decoding of received signals utilizing the short range communication system from the mobile radio telephone, said received signals including reported PIN/SIM number and/or from the mobile radio telephone transferred called number sequence, whereby conformity with corresponding stored information is arranged to initiate a predetermined process or action, and otherwise result in return to "resting" and listening condition pending a new radio signal received by the receiving unit.
  13. Device according to claim 5, wherein a call number inputted by the visitor on the mobile is arranged to result in a conventional connection to an entrance apparatus for communication therewith, i.e, for sending and receiving commands, and that the entrance apparatus, based on received commands, is arranged to establish a connection, e.g. by means of a "three parties call service" established conference call between the visitor, the party to be called and itself, whereby the first two parties can talk, whereas the entrance apparatus as a silent listener await/monitor for given commands, which can be given by the called party and reacted to in accordance with the preprogrammed actions.
  14. Device according to claim 5, wherein commands received by the central control unit (2) from the called party in retrospect verify/discriminate the validity of established communication.
EP00923049A 1999-04-12 2000-04-11 Method and device for utilization of mobile radio telephones for surveillance and/or control purposes Expired - Lifetime EP1169843B1 (en)

Applications Claiming Priority (3)

Application Number Priority Date Filing Date Title
SE9901299A SE522742C2 (en) 1999-04-12 1999-04-12 Methods and apparatus for utilizing mobile radio telephones for control and / or control purposes
SE9901299 1999-04-12
PCT/SE2000/000689 WO2000062521A2 (en) 1999-04-12 2000-04-11 Method and device for utilization of mobile radio telephones for surveillance and/or control purposes

Publications (2)

Publication Number Publication Date
EP1169843A2 EP1169843A2 (en) 2002-01-09
EP1169843B1 true EP1169843B1 (en) 2006-08-02

Family

ID=20415185

Family Applications (1)

Application Number Title Priority Date Filing Date
EP00923049A Expired - Lifetime EP1169843B1 (en) 1999-04-12 2000-04-11 Method and device for utilization of mobile radio telephones for surveillance and/or control purposes

Country Status (8)

Country Link
EP (1) EP1169843B1 (en)
JP (1) JP2002542677A (en)
AT (1) ATE335355T1 (en)
AU (1) AU4323000A (en)
CA (1) CA2371332A1 (en)
DE (1) DE60029768D1 (en)
SE (1) SE522742C2 (en)
WO (1) WO2000062521A2 (en)

Families Citing this family (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
FI110224B (en) 1999-09-17 2002-12-13 Nokia Corp Monitoring system
FI20002255A (en) 2000-10-13 2002-04-14 Nokia Corp A method for controlling and controlling locks
JP2002269663A (en) * 2001-03-13 2002-09-20 Denso Corp Security system for vehicle
SE0401035L (en) 2004-04-21 2005-10-22 Anders Trell Trust Method and device for communication / control at access
SE530279C8 (en) 2005-03-18 2008-06-03 Phoniro Ab Method of unlocking a lock with a locking device capable of wireless short distance data communication in accordance with a communication standard, and an associated locking device
CN100466787C (en) * 2007-01-11 2009-03-04 上海柯斯软件有限公司 SIM card-based classified access method of incoming call
CN106331902A (en) * 2016-08-28 2017-01-11 桂林力拓信息科技有限公司 Building talkback system

Family Cites Families (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
AU673983B2 (en) * 1992-01-09 1996-12-05 Ge Security, Inc. Secure entry system with radio communication
WO1994001963A1 (en) * 1992-07-08 1994-01-20 Joseph Rozgonyi Cellular telephone access control and identification system
US5541585A (en) * 1994-10-11 1996-07-30 Stanley Home Automation Security system for controlling building access
WO1998006210A1 (en) * 1996-07-31 1998-02-12 Amadeus Lopatta Mobile telephone with additonal functions
DE29805758U1 (en) * 1998-03-30 1998-07-02 Stentofon Electronic Gmbh System for detecting mobile phones in operation in a security-endangered facility

Also Published As

Publication number Publication date
SE9901299D0 (en) 1999-04-12
EP1169843A2 (en) 2002-01-09
WO2000062521A3 (en) 2001-01-18
JP2002542677A (en) 2002-12-10
SE9901299L (en) 2000-10-13
DE60029768D1 (en) 2006-09-14
CA2371332A1 (en) 2000-10-19
SE522742C2 (en) 2004-03-02
ATE335355T1 (en) 2006-08-15
AU4323000A (en) 2000-11-14
WO2000062521A2 (en) 2000-10-19

Similar Documents

Publication Publication Date Title
US7031665B1 (en) Method and device for utilization of mobile radio telephones for surveillance and/or control purposes
FI101584B (en) Check your mobile subscriber ID
KR100293291B1 (en) Security wireless personal communication system and method
US6434158B1 (en) Entryway system using proximity-based short-range wireless links
JPH08186869A (en) Radio telephone set with illegal use preventing function
KR101490583B1 (en) Smart digital door lock system with a black-box functionality
US20010048744A1 (en) Access point device and authentication method thereof
CN101719291A (en) Method and system for realizing door control by using domestic information terminal equipment
JP2937820B2 (en) Dial lock system for mobile phones
JP2000165511A (en) Portable telephone set and dial lock method for portable telephone set
EP1169843B1 (en) Method and device for utilization of mobile radio telephones for surveillance and/or control purposes
JP2007023619A (en) Room entrance/exit managing system
KR20150035644A (en) Digital Door-Lock and Door-Lock Control System and Control Method thereof
KR100620917B1 (en) Door lock system using portable terminal and operating method
JP4581230B2 (en) Entrance / exit management system and control method thereof
JP2005210422A (en) Radio communication system provided with automatic control function, and base station device
JP2002344643A (en) Method and device for fastening/unfastening lock
KR100638025B1 (en) Locking release system
JP4454795B2 (en) Mobile radio terminal
KR100854396B1 (en) Mobile communication terminal having a voice authenticating function and controlling method therefore
JP3396149B2 (en) Mobile station authentication method and system
KR20020072074A (en) Locking system using wireless communication terminal of transmission signal and method thereof
JP3120834B2 (en) Mobile phone terminal illegal use protection method
JPH0787559A (en) Theft prevention method for portable telephone terminal
JP4778579B2 (en) Mobile radio terminal

Legal Events

Date Code Title Description
PUAI Public reference made under article 153(3) epc to a published international application that has entered the european phase

Free format text: ORIGINAL CODE: 0009012

17P Request for examination filed

Effective date: 20011005

AK Designated contracting states

Kind code of ref document: A2

Designated state(s): AT BE CH CY DE DK ES FI FR GB GR IE IT LI LU MC NL PT SE

AX Request for extension of the european patent

Free format text: AL;LT;LV;MK;RO;SI

17Q First examination report despatched

Effective date: 20050322

GRAP Despatch of communication of intention to grant a patent

Free format text: ORIGINAL CODE: EPIDOSNIGR1

GRAS Grant fee paid

Free format text: ORIGINAL CODE: EPIDOSNIGR3

GRAL Information related to payment of fee for publishing/printing deleted

Free format text: ORIGINAL CODE: EPIDOSDIGR3

GRAS Grant fee paid

Free format text: ORIGINAL CODE: EPIDOSNIGR3

GRAA (expected) grant

Free format text: ORIGINAL CODE: 0009210

AK Designated contracting states

Kind code of ref document: B1

Designated state(s): AT BE CH CY DE DK ES FI FR GB GR IE IT LI LU MC NL PT SE

PG25 Lapsed in a contracting state [announced via postgrant information from national office to epo]

Ref country code: IT

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT;WARNING: LAPSES OF ITALIAN PATENTS WITH EFFECTIVE DATE BEFORE 2007 MAY HAVE OCCURRED AT ANY TIME BEFORE 2007. THE CORRECT EFFECTIVE DATE MAY BE DIFFERENT FROM THE ONE RECORDED.

Effective date: 20060802

Ref country code: BE

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20060802

Ref country code: NL

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20060802

Ref country code: AT

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20060802

Ref country code: CH

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20060802

Ref country code: LI

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20060802

Ref country code: FI

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20060802

REG Reference to a national code

Ref country code: GB

Ref legal event code: FG4D

REG Reference to a national code

Ref country code: CH

Ref legal event code: EP

REG Reference to a national code

Ref country code: IE

Ref legal event code: FG4D

REF Corresponds to:

Ref document number: 60029768

Country of ref document: DE

Date of ref document: 20060914

Kind code of ref document: P

REG Reference to a national code

Ref country code: SE

Ref legal event code: TRGR

PG25 Lapsed in a contracting state [announced via postgrant information from national office to epo]

Ref country code: DK

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20061102

PG25 Lapsed in a contracting state [announced via postgrant information from national office to epo]

Ref country code: DE

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20061103

PG25 Lapsed in a contracting state [announced via postgrant information from national office to epo]

Ref country code: ES

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20061113

NLV1 Nl: lapsed or annulled due to failure to fulfill the requirements of art. 29p and 29m of the patents act
PG25 Lapsed in a contracting state [announced via postgrant information from national office to epo]

Ref country code: PT

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20070102

REG Reference to a national code

Ref country code: CH

Ref legal event code: PL

ET Fr: translation filed
PLBE No opposition filed within time limit

Free format text: ORIGINAL CODE: 0009261

STAA Information on the status of an ep patent application or granted ep patent

Free format text: STATUS: NO OPPOSITION FILED WITHIN TIME LIMIT

26N No opposition filed

Effective date: 20070503

PG25 Lapsed in a contracting state [announced via postgrant information from national office to epo]

Ref country code: GR

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20061103

PG25 Lapsed in a contracting state [announced via postgrant information from national office to epo]

Ref country code: IE

Free format text: LAPSE BECAUSE OF NON-PAYMENT OF DUE FEES

Effective date: 20070411

PG25 Lapsed in a contracting state [announced via postgrant information from national office to epo]

Ref country code: MC

Free format text: LAPSE BECAUSE OF NON-PAYMENT OF DUE FEES

Effective date: 20070430

PG25 Lapsed in a contracting state [announced via postgrant information from national office to epo]

Ref country code: LU

Free format text: LAPSE BECAUSE OF NON-PAYMENT OF DUE FEES

Effective date: 20070411

Ref country code: CY

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20060802

PGFP Annual fee paid to national office [announced via postgrant information from national office to epo]

Ref country code: FR

Payment date: 20090425

Year of fee payment: 10

REG Reference to a national code

Ref country code: GB

Ref legal event code: 746

Effective date: 20101101

REG Reference to a national code

Ref country code: FR

Ref legal event code: ST

Effective date: 20101130

PG25 Lapsed in a contracting state [announced via postgrant information from national office to epo]

Ref country code: FR

Free format text: LAPSE BECAUSE OF NON-PAYMENT OF DUE FEES

Effective date: 20090430

PGFP Annual fee paid to national office [announced via postgrant information from national office to epo]

Ref country code: SE

Payment date: 20171019

Year of fee payment: 18

REG Reference to a national code

Ref country code: SE

Ref legal event code: EUG

PG25 Lapsed in a contracting state [announced via postgrant information from national office to epo]

Ref country code: SE

Free format text: LAPSE BECAUSE OF NON-PAYMENT OF DUE FEES

Effective date: 20180412

PGFP Annual fee paid to national office [announced via postgrant information from national office to epo]

Ref country code: GB

Payment date: 20190404

Year of fee payment: 20

REG Reference to a national code

Ref country code: GB

Ref legal event code: PE20

Expiry date: 20200410

PG25 Lapsed in a contracting state [announced via postgrant information from national office to epo]

Ref country code: GB

Free format text: LAPSE BECAUSE OF EXPIRATION OF PROTECTION

Effective date: 20200410