GB2559672A - Improvements relating to access control mechanisms - Google Patents

Improvements relating to access control mechanisms Download PDF

Info

Publication number
GB2559672A
GB2559672A GB1720914.9A GB201720914A GB2559672A GB 2559672 A GB2559672 A GB 2559672A GB 201720914 A GB201720914 A GB 201720914A GB 2559672 A GB2559672 A GB 2559672A
Authority
GB
United Kingdom
Prior art keywords
signal
access
binary
code
access request
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Withdrawn
Application number
GB1720914.9A
Other versions
GB201720914D0 (en
Inventor
Abousaid Yssa Charles
Abousaid Yssa Alexandre
Abdel Nour Hady
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Smarke Ltd
Original Assignee
Smarke Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Smarke Ltd filed Critical Smarke Ltd
Publication of GB201720914D0 publication Critical patent/GB201720914D0/en
Publication of GB2559672A publication Critical patent/GB2559672A/en
Withdrawn legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M11/00Telephonic communication systems specially adapted for combination with other electrical systems
    • H04M11/02Telephonic communication systems specially adapted for combination with other electrical systems with bell or annunciator systems
    • H04M11/025Door telephones
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/30Individual registration on entry or exit not involving the use of a pass

Abstract

An aftermarket adapter 80 for controlling access in an intercom access system is retrofit-able to a user control module or intercom telephone handset 72. The retrofit adapter comprises an access request signal receiver, a signal to binary converter, a memory, a comparator, for comparing received codes against stored codes, and a controller, which sends an unlock signal to a door unlock actuator 82 upon a code matching. The access request signal may be created by pressing an intercom buzzer 12 in a certain sequence or the signal may be sent from a mobile phone via communication network 74. The pattern of the input code may identify a user gaining access, where the input may take the form of Morse code. The access codes may be re-programmable, allowing authorised persons to change access rights to the locked door. The invention allows people to enter a building when the owner or occupant is unavailable.

Description

(71) Applicant(s):
Smarke Limited (Incorporated in the United Kingdom)
Kemp Little LLP, Cheapside House, 138 Cheapside, London, EC2V 6BJ, United Kingdom (72) Inventor(s):
Charles Abousaid Yssa Alexandre Abousaid Yssa Hady Abdel Nour (74) Agent and/or Address for Service:
Keltie LLP
No. 1 London Bridge, LONDON, SE1 9BA, United Kingdom (51) INT CL:
H04M 11/02 (2006.01) (56) Documents Cited:
GB 2489509 A EP 0064640 A1 DE 102004059224 A1
G07C 9/00 (2006.01)
EP 2698976 A1 DE 010127029 C1 US 20150179011 A1
Jamie, 25 March 2013, Doorbell Buzzer Hack for Keyless Entry, mouseextinction.com, [online], available from: http://mouseextinction.com/2013/ doorbell-buzzer-hack-for-keyless-entry/ [accessed 08/06/2018]
Jamie, 31 January 2016, Smartphone-based Keyless Entry for Door Buzzer, mouseextinction.com, [online] available from: http://mouseextinction.com/2016/ control-door-buzzers-from-your-smartphone-orapple-watch/ [accessed 08/06/2018] (58) Field of Search:
INT CL E05B, G07C, H04M
Other: EPODOC, WPI, Patent Fulltext, Internet (54) Title of the Invention: Improvements relating to access control mechanisms
Abstract Title: Retrofit adapter for controlling access in a building intercom telephone system (57) An aftermarket adapter 80 for controlling access in an intercom access system is retrofit-able to a user control module or intercom telephone handset 72. The retrofit adapter comprises an access request signal receiver, a signal to binary converter, a memory, a comparator, for comparing received codes against stored codes, and a controller, which sends an unlock signal to a door unlock actuator 82 upon a code matching. The access request signal may be created by pressing an intercom buzzer 12 in a certain sequence or the signal may be sent from a mobile phone via communication network 74. The pattern of the input code may identify a user gaining access, where the input may take the form of Morse code. The access codes may be re-programmable, allowing authorised persons to change access rights to the locked door. The invention allows people to enter a building when the owner or occupant is unavailable.
Base
Interface
Unit
XL.
Intercom Telephone Handset
JZ
JZ
Speaker
Microphone (— z I Actuator iS '
Figure GB2559672A_D0001
Communications Network
1/10
Figure GB2559672A_D0002
Figure 1 (prior art)
2/10
Figure GB2559672A_D0003
Figure 2 (prior art)
3/10
Figure GB2559672A_D0004
Figure 3 (prior art)
4/10
Figure GB2559672A_D0005
Figure 4
5/10
Figure GB2559672A_D0006
Figure GB2559672A_D0007
Figure 5
6/10
Figure GB2559672A_D0008
Figure 6
7/10
Figure GB2559672A_D0009
Figure GB2559672A_D0010
Figure 7
8/10
Figure GB2559672A_D0011
Figure 8
9/10
Figure GB2559672A_D0012
Figure 9
10/10
Figure GB2559672A_D0013
10 0 10 111
Output signal (._ 218
Figure 10
Improvements Relating to Access Control Mechanisms
Field of the Invention
The present invention concerns a system and method for controlling access mechanisms. More particularly, though not exclusively, the present invention concerns a controller configured to be retrofitted to an existing intercom access system to permit access to a restricted area even when a building occupant is unavailable to allow such access.
Background of the Invention
It is increasingly common to find a plurality of private occupancies which are located in a single location. For example, this scenario may apply to an office building in which a plurality of companies each hire a particular number of rooms in the building, or an apartment building in which a plurality of distinct residences are situated. Regardless of the actual scenario to which this situation applies, they all have in common the need to provide a centralised access control system which allows individuals access to required areas of the single location whilst preventing their access to other areas of the single location. For example, in an apartment building, it is necessary to provide a system in which an occupant is allowed access to a main entrance of the building whilst also preventing their access to the residences of other occupants.
Furthermore, it is also necessary to provide a system in which visitors who are not permanent or regular accessors of the single location to be allowed temporary access as and when such access is required. Returning to the apartment building example, this situation may arise when an acquaintance of an occupant of a particular residence wishes to visit the occupant and does not have a permanent method of accessing the residence, such as a key or wireless fob. The difficulty here is providing a solution where temporary access can be enabled to a visitor without unduly compromising the security of other residences within the building.
A commonly used solution to the above problem is to provide an intercom system, in which an external user who requires temporary access is required to interact with a base interface unit which connects them to a specific occupant of the building. Upon subsequent communication, typically once the user has identified themselves to the occupant the occupant is able to enable temporary access forthe external user, so that the external user may enter the location. Known intercom systems as described briefly above are typically reliant on an occupant of a particular residence being present in order to enable temporary access to an external user. This known type of system has particular advantages for enabling temporary location access which are explained in greater detail below
Turning firstly to Figure 1, there is shown a known centralised access control system 10 (door entry system) for a plurality of private occupancies in a single location or building, and in particular, a mechanism which utilises an intercom system. The system 10 comprises a base interface unit 12 (gate control module) which is configured to receive input from an external user (visitor) 14. The base interface unit 12 is located in an area which is accessible to a visitor 14 without requiring access rights, such as adjacent to a main building entrance door having an electronic door lock 20 which is used to prevent undesired access to the location. The first input to be received by the base interface unit 12 will typically be of the form of the visitor 14 pressing an interface button 15 which is provided on the base interface unit 12. The base interface unit is further communicably coupled to an intercom telephone handset 16 (user control module) which is located in the residence which the visitor 14 is attempting to access. This coupling is typically achieved through a suitable wired communications means. Upon user input being received by the base interface unit 12, a signal will be sent by the base interface unit 12 to the intercom telephone handset 16 which notifies an occupant of the residence 18 that the visitor 14 wishes to gain access to the residence. The way in which the intercom telephone handset 16 is configured to provide such a notification to the occupant of the residence 18 will be described in greater detail below with reference to Figures 2 and 3.
Once the notification has been received by the occupant of the residence 18, the occupant 18 will then be required to decide whether to allow the visitor 14 access to the residence. If such access is deemed allowable, the occupant of the residence 18 will then be required to enable such access. The intercom telephone handset 16 has a door release button 36 which when activated by the occupant of the residence 18 indicates that access to the residence has been deemed allowable. Once this has been activated, a signal is sent to the base interface unit 12 which instructs the base interface unit 12 to send a control signal to the electronic door lock 20 instructing it to disengage and permit the visitor 14 to enter the location.
Figure 2 shows a known configuration of the intercom telephone handset 16 of the centralised access control system 10 of Figure 1 .The intercom telephone handset 16 comprises a buzzer 30 which is wired to the base interface unit 12. In use, the buzzer 30 receives a signal from the base interface unit 12 upon a visitor 14 pressing the interface button 15 and produces an audible tone. This audible tone provides a notification that the visitor 14 wishes to gain access to the residence. The intercom telephone handset 16 also comprises a microphone 32 which is provided in order to allow the occupant of the residence 18 to communicate with the visitor 14 in order to ascertain their identity and the reason that they wish to gain access to the location. The microphone 32 is also connected to the base interface unit 12 and in use transmits the audio input received from the occupant of the residence 18 to the base interface unit 12. Similarly, the intercom telephone handset 16 also comprises a speaker 34 which is coupled to the base interface unit 12 and in use, receives the audio input from the base interface unit 12 and generates an audio output signal for the occupant of the residence 18. This enables the visitor 14 to communicate with the occupant of the residence 18 in a complementary process to the occupant of the residence 18 communicating with the visitor 14.
The actuator 36 of the telephone handset 16 in use is activated when the occupant of the residence 18 decides that they wish to allow the visitor 14 access to the location. The actuator 36 will often take the form of an interface button which the occupant of the residence 18 presses to allow such access.
The actuator 36 is additionally coupled to a door unlock instruction generator 38. Upon the actuator being activated, a signal is sent to the instruction generator 38 indicating that input has been received. Upon the receipt of this signal, the instruction generator 38 then generates an instruction to unlock the electronic door lock 20. The instruction generator 38 is coupled to the base interface unit 12 and the generated instruction is then transmitted to the base interface unit 12, where it is converted into a control signal which is passed to the electronic door lock 20 instructing it to disengage and permit the visitor 14 to enter the location, as described above.
Figure 3 shows a known method of operation 40 of the centralised access control system 10 of Figure 1 in detail. The method 40 begins when the base interface unit 12 receives an input, at Step 42, from the visitor 14. This input is, in this instance, the visitor 14 pressing the interface button 15 on the base interface unit 12 as described with reference to Figure 1 above. Once this input is received, a signal is sent, at Step 43, from the base interface unit 12 to the intercom telephone handset 16. Upon receipt of this signal, the buzzer 30 is then activated, at Step 44, generating an audible tone which is used to notify the occupant of the residence 18 that the visitor 14 wishes to gain access to the location. Following this notification, the microphone 32 will then receive, at Step 46, an input from the occupant of the residence 18. As described above with reference to Figure 2, this input typically comprises audio input from the occupant of the residence 18, which is provided in order to allow the occupant of the residence 18 to communicate with the visitor 14 in order to ascertain their identity and the reason that they wish to gain access to the location. Following this, the base interface unit 12 will then receive, at Step 48, further input from the external unit 14, where the input is typically audio input. As described above, this enables the visitor 14 to communicate with the occupant of the residence 18 in a complementary process to the occupant of the residence 18 communicating with the visitor 14.
Once this input has been received it is transmitted to the intercom telephone handset 16 where, at Step 49, the speaker 34 generates the audio input for the occupant of the residence 18.
Following the exchange described in Steps 46, 48 and 49, it is then decided, at Step 50, whether the visitor 14 is to be permitted access to the location. This is typically to be decided by the occupant of the residence 18 based on the contents of the exchange described by Steps 46, 48 and 49. If the visitor 14 is not permitted access at Step 50, then it is necessary to decide, at Step 51, whether entry is to be completely refused to the visitor 14. If the answer is yes, then the method proceeds to its conclusion and the visitor 14 is not permitted access to the location. If however it is decided at Step 51 that entry is not to be refused, the method then returns to Step 46, where the microphone 32 receives further input from the occupant of the residence 18. This situation may arise where the initial exchange described by Steps 46, 48 and 49 is not sufficient to determine whether or not access to the location should be permitted and the occupant of the residence 18 wishes to conduct further exchanges before a decision is reached.
Returning now to Step 50, if it is decided that the visitor 14 is to be permitted access to the location, the actuator 36 is then activated, at Step 52; namely the interface button is pressed. Once the interface button has been pressed, the actuator 36 then sends, at Step 54, a signal to the door unlock instruction generator 38 in order to generate an instruction and send it to the base interface unit 12. The instruction is then received, at Step 56, by the base interface unit 12 which causes the base interface unit 12 to generate a control signal. Once the control signal is generated, it is sent, at Step 58, to the electronic door lock 20, which is configured to temporarily disengage and consequently permit access to the location to the visitor 14. The length of time that the electronic door lock 20 is configured to disengage for may be configured to be set upon installation of the centralised access control system 10. The electronic door lock 20 may also be configured to reengage once a visitor 14 has accessed the location. Following the control signal being sent at Step 58, the method 40 then proceeds to its conclusion, ready for use again.
One significant drawback to the presently known system described above is that in order for a visitor 14 to be permitted access to the location, it is necessary for an occupant of the residence 18 to be present in the residence to verify that access should be permitted. Whilst explicit identification of the visitor 14 by the occupant of the residence 18 increases the level of security of the system 10 above a system in which no identification is required, in some scenarios, it may be desirable for a visitor 14 to be permitted access to the location even when an occupant of the residence 18 is not present (such as when a postal worker wishes to deliver a parcel to the occupant 18). The system 10 as stated above is unable to resolve these scenarios. One solution which is often used is to provide a concierge service which is able to enable access to the visitor 14 in the event that the occupant of the residence 18 is unavailable. However, such solutions introduce flaws in the security of the system, since the concierge service will not necessarily be certain of the identity of the visitor 14. Furthermore, such concierge services introduce an additional cost which will typically be borne out by the occupant of the residence 18, which again may be neither practical nor desirable.
One solution which is used to address this problem is to replace the intercom system with a more sophisticated system, such as a keycard access system, or a system in which a numerical keypad and associated entry code are provided for a visitor 14. Whilst this does partially overcome the stated drawbacks, these types of system are typically much more complicated than existing systems, and hence are far more costly, which may be either undesirable or unfeasible. Furthermore, these systems cannot be easily retrofitted to existing systems and will typically require existing systems to be removed, thereby increasing costs and causing disruption to occupants of the building. Such adaptations also cannot be provided fora single residence of the building, but must instead be provided for the building as a whole, preventing a single occupant from upgrading without obtaining permission from all other occupants. Finally, and with particular reference to a numerical keypad solution, such systems can be subject to ‘shoulder-surfing,’ where a further external user who is separate from the intended visitor watches the visitor input their code, thereby nullifying the security of the code.
The present invention has been devised against this backdrop and seeks to obviate at least some of the above-described problems with centralised access control systems as described. More particularly, the present invention aims to provide a system which is able to allow an occupant of the residence to allow access to a visitor without requiring that the occupant be present to do so, whilst still retaining the functionality of the present system. Furthermore, the present invention aims to do so whilst still maintaining the cost-efficiency of the known system.
It is to be understood that the systems described herein only extend to the mechanisms by which a visitor 14 may be permitted access to the location. Typically such systems will work in conjunction with a further system which is provided to allow access to an occupant of one of the residences 18, such as a keyfob access systems or more simply, a physical key. Since the subject of the present application is directed toward systems for allowing access to visitors 14, these further systems will not be described in any greater detail, however it is to be assumed that a person familiar with the subject matter of the present application would understand that the systems described herein would be configured to work in conjunction with systems which allow occupants of the residences 18 to have access to the location.
Summary of the Invention
According to one aspect of the present invention there is provided a method of controlling a door entry system using an adapter unit retrofitted to a user control module of the door entry system, where the door entry system is arranged to unlock a remotely-located door on receipt of a control signal from the user control module, the method comprising: receiving an access request signal at the retrofitted adapter unit, converting the access request signal into a binary code; comparing the binary code against a plurality of stored binary codes; and if there is a match between the binary code and any of the plurality of stored binary codes, instructing the user control module to generate the control signal to unlock the remotely-located door.
The present invention provides a very low-cost solution to the problem of providing unattended entry to general entrances of communal buildings for example. The invention can be realised in a simple electronic module which can be readily wired to an existing user control module without the need to replace an existing door entry system. This is advantageous not only because of the low cost but also because the solution can be implemented on an individual user basis, not requiring for example the permission of other occupiers of the building who also have control of the door access at a communal entrance to a building. Other higher cost solutions which require replacement of the existing system also require the permission of all the communal occupiers of the building which can be difficult and time consuming. Also the present invention can be retrofitted to any conventional door access control system because it only requires the essential components of every system, thus making it a universal solution.
In some embodiments the method further comprises creating the access request signal using an intercom buzzer of the door entry system, the access request signal comprising a binary signal having an asserted level and a non-asserted level produced by temporal assertions of the intercom buzzer. The use of the intercom buzzer provides a simple way of utilising existing communications channels of the door access system to provide a low-cost door access solution for unattended entry into the building past the locked communal entrance. Also the buzzer system typically only has two states asserted and non-asserted. Accordingly this very simple communications channel is utilised to create a much more sophisticated access request signal without requiring any adaptation of the existing door access control system.
In some embodiments the converting step may comprise measuring the duration of an asserted or non-asserted level of the binary signal and comparing the duration with a predetermined time period to determine a current state of the binary code derived from the access request signal. This is a simple way of implementing a robust technique for creating an access control signal from temporal variation of the access request signal.
The comparing step may comprise determining if the asserted or non-asserted level of the binary signal persists for longer than the predetermined time period to determine the current state of the binary code. This feature helps to prevent noise in the access request signal from generating incorrect binary codes. Any spikes in the signals caused by noise can advantageously and effectively be filtered out using this technique.
In some embodiments the predetermined time period comprises a first time period for recognising the asserted level of the binary signal and a second time period for recognising the non-asserted level of the binary signal, the first and second time periods being different. Different time periods for asserted and non-asserted levels (typically voltage levels in the signal) further provides resilience against external noise factors and helps to clearly distinguish between time periods associated with asserted signal levels and time periods associated with non-asserted signal levels.
The method may further comprise adjusting a previously set value for the predetermined time period or the first or second time periods. The ability to adjust these time periods enables the user to customise the interaction required by a visitor to enable access. Some older users may take much longer to enter in each asserted or non-asserted digit of the access code whereas other possibly younger users may be able to enter codes much faster. The ability to vary these time periods enables different types of users to be accommodated.
The converting step may comprise measuring a time out period from the end of the last of a series of asserted levels of the binary signal and, if the time out period exceeds a predetermined time limit, considering the last asserted or non-asserted level as being the end of the binary signal. This is a simple way of determining the end of an access request signal when generated by use of an intercom buzzer.
In some embodiments not described in detail herein, the creating step may comprise producing a binary signal in Morse code using temporal assertions of the buzzer. In this case the duration of an asserted level of the binary signal being longer than a predetermined period can determine one of the binary states of the binary signal, and the duration of the asserted level of the binary signal being shorter than the predetermined level can determine the other binary state of the binary signal.
The method may further comprise on determining that there is no match between the binary code of the access request signal and any of the plurality of stored binary codes, generating a rejection signal and transmitting the same back to the source of the access request signal. This is helpful for users where they may make mistakes in the generation of the access request signal, such that they get positive feedback and so can be permitted to regenerate the access request signal again. This is particularly helpful where the intercom buzzer is being used to generate the access request signal.
In some embodiments the receiving step may comprise receiving the access request signal from a remote device via a wide-area communications network. Preferably, the requests may be received via the internet and possibly over a wireless link. This provides the least disruptive way of connecting the adapter unit to the outside world. In many cases the receiving step may comprise receiving the access request signal from a mobile telecommunications device, for example a smart phone. In this way an app can be used on a visitor’s mobile telecommunications device to make access requests and on an occupier’s device to manage the set-up of access rights in a very simple manner.
In some embodiments, the method may further comprise receiving a programming signal for programming the adaptor unit, the request comprising a source identifier of the source of the request, comparing the source identifier of the programming signal with a predetermined list of permitted source identifiers; and permitting access to at least one of the plurality of stored binary codes, if the source identifier matches one of the list of predetermined source identifiers. The ability to program the adapter unit enables the embodiment to be customisable by the occupier to their particular situation. It provides the advantage of being able to give temporary permissions to visitors or time-restricted permissions for example only allowing unattended access for a correct access code between the hours of 9AM to 5PM. The ability to withdraw permissions is also useful for example when a relationship between a visitor and an occupier change.
The method may further comprise determining access rights associated with the source identifier and permitting modification of one or more of the plurality of stored binary codes in accordance with the stored access rights associated with the source identifier. In this way an occupier (super user) may be given access rights to modify all binary codes whereas a visitor (user) may only be able to modify their own binary code.
In some embodiments, the method may further comprise determining if the programming signal includes a new binary code, and if so adding the new binary code to the plurality of stored binary codes. Clearly if a binary code is provided in a programming signal it is intended to be used to populate the plurality of stored binary codes and so this action can be taken quickly without further steps being required. Conversely if the determining step concludes that the programming signal does not include a new binary code, the method can further comprise sending a request to the source of the programming signal for a new binary code if required.
Advantageously the method may further comprise storing a log of each received access request signal and the action taken by the adapter unit as a result of the access request signal. This can be very useful to the super user to see activity in terms of the number and frequency of access requests and also a list of times and dates as well as identifiers of which visitors were permitted access using the adapter unit.
The method may further comprise transmitting a notification to a predetermined address on each occasion of generation of the control signal by the adapter unit. This advantageously can notify the super user (occupier) of each occasion when access is granted with them being present and can in cases of breach of the security of the system act as an alarm alert.
In some embodiments the binary code may comprises a user identifier. This can act as a simplification of the information required to be stored as the binary code fulfils two functions.
According to another aspect of the present invention there is provided an adapter unit for controlling a door entry system for unlocking a remotely-located door on generation of an unlock control signal, the door entry system including a user control module and a gate control module, the adapter unit being retrofittable to the user control module of the door entry system and comprising: a receiver for receiving an access request signal, a convertor for converting the access request signal into a binary code; a data store for storing a plurality of binary codes; a comparator for comparing the binary code against the plurality of stored binary codes; and a controller for receiving the output of the comparator, the controller being arranged to instruct the user control module to generate the unlock control signal to unlock the remotely-located door if there is a match between the binary code and any of the plurality of stored binary codes.
In some embodiments the receiver can be arranged to receive access request signals via a communications network and via an interface to the user control module. The advantages of this have been described above.
The interface to the user control module may in some embodiments comprise a relay for converting signals generated from an intercom buzzer ofthe door entry system into a binary signal having an asserted level and a non-asserted level produced by temporal assertions ofthe intercom buzzer. The relay represents a simple low-cost electronic component for generating the binary signal.
In various embodiments the adaptor unit may be provided with components which are arranged to implement any ofthe functionality described above in relation to the above described method.
The present invention also extends to a combination of an adapter unit as described above and a door entry system comprising a user control module and a remotely-located base interface unit operatively coupled to an electronic door lock, wherein the base interface unit is arranged to unlock the electronic door lock on receipt of a control signal from the user control module.
For brevity, it will be understood that features, functions and advantages of different aspects ofthe present invention may be combined or substituted where context allows.
Brief Description ofthe Drawings
In order that the invention may be more readily understood, reference will now be made, by way of example, to the accompanying drawings in which:
Figure 1 is a schematic block diagram showing a known centralised access control system for a plurality of private occupancies in a single location which uses an intercom system;
Figure 2 is a schematic block diagram showing a known intercom telephone handset used in the centralised access control system of Figure 1;
Figure 3 is a flow diagram showing a method of enabling access to a location using the centralised access control system of Figure 1;
Figure 4 is a schematic block diagram showing a centralised access control system for a plurality of private occupancies in a single location which uses an intercom system according to an embodiment ofthe present invention;
Figure 5 is a schematic block diagram showing an intercom telephone handset used in the centralised access control system of Figure 4;
Figure 6 is a schematic block diagram showing an unattended entry controller used in the intercom telephone handset of Figure 5;
Figure 7 is a schematic block diagram showing an entry microcontroller board used in the unattended entry controller of Figure 6;
Figure 8 is a flow diagram showing a method of enabling access to a location using the centralised access control system of Figure 4;
Figure 9 is a flow diagram showing a method of processing requests in an embodiment of the system of Figure 4; and
Figure 10 is an illustrative diagram showing a translation between a visitor input and a representation of the input as a code pattern.
Detailed Description of Exemplary Embodiments
Specific embodiments are now described with reference to the appended figures.
Referring now to Figure 4, there is shown a centralised access control system 70 according to a first embodiment of the present invention, which enables an occupant of one residence of a plurality of residences located in a single location to permit an visitor 14 access to the single location without the occupant 18 needing to be present in the location. In particular, the system 70 is designed to be installed as a modification to pre-existing intercom system architecture, as described with reference to Figures 1,2 and 3. The system 70 therefore operates in an environment which is the same as that described previously in relation to Figure 1. In this regard and for the sake of brevity, the following description will only focus on the differences between the centralised access control system 10 of Figure 1 and of the current embodiment shown in Figure 4. It is to be understood that, as part of the design of the present system 70, the functionality of the known system described previously is retained by the present system 70, with further functionality additionally provided. Such additional functionality is enabled by the differences between the present system 70 and the known system 10. The present system 70 is designed to be retrofittable to existing systems as previously described and therefore to provide a low cost solution to the previously identified drawbacks.
As can be seen from Figure 4, the centralised access control system 70 comprises a base interface unit 12 and an electronic door lock 20 which are communicably coupled. These two features are, by design, substantially similar to the corresponding features in the system 10 of Figure 1. As such, the base interface unit is configured to receive input from a visitor 14, in accordance with the description given in the background section. The base interface unit 12 is also communicably coupled with the electronic door lock 20 and is configured to send a control message to the electronic door lock 20 enabling said lock to be disengaged. Such a control message is sent upon receipt of an instruction to do so from a modified intercom telephone handset 72. One system and method enabling this to be achieved is described above with reference to Figures 1,2 and 3.
The intercom telephone handset 72 is also configured to receive input from the base interface unit 12 in accordance with embodiments of the known system described previously. Similarly, the intercom telephone handset is also configured to receive input from the occupant of the residence 18, again in accordance with embodiments of the known system described previously.
In the present system 70, the intercom telephone handset 72 is further configured to receive input from additional sources, via a communications network 74. These external sources may comprise the visitor 14 who is trying to obtain access to the location. In order to provide this input, the visitor 14 may be provided with any suitable communications device so that input may be sent via the communications network 74. This may, by way of illustrative example, comprise a mobile telecommunications device 76 which is provided with suitable software to enable this communication. It may additionally comprise a stationary device provided with suitable software, such as a personal computer (not shown). The external sources may further comprise the occupant of the residence 18, where communication is enabled by any suitable communications device being provided to the occupant of the residence, such as the mobile telecommunications device 76 described above. It is to be appreciated that the two external sources described above are illustrative examples, and that further external sources may additionally be permitted to communicate with the intercom telephone handset 72, via the communications network 74 and a suitable communications device. In the embodiment described, this communications network 74 is configured to provide a wireless communications method via known methods, however it is to be appreciated that suitable modification may be made to the system 70 such that this communication may be enabled by known wired means. The nature of the input will be described in detail below, with reference to Figure 7.
In an embodiment of the present centralised access control system 70 described above, there is provided a system by which access to the location by a visitor 14 is enabled upon determination of entry of a predetermined code pattern into the system 70. More specifically, the code pattern is entered via temporal interaction with the interface button 15 on the provided base interface unit 12. Once it is determined that a code pattern has been entered that matches the predetermined code pattern, the system is configured 70 to disengage the electronic door lock 20, thereby permitting access to the visitor 14. The method by which this is achieved is described in greater detail below, with respect to Figure 8. It is to be appreciated that there may be a plurality of predetermined codes which may be entered by a visitor 14 which permit access to the location. Furthermore, the system 70 may be adapted such that any suitable form of code entry device may be used, and that the form of the code pattern may be adapted in concurrence with the code entry method. The predetermined codes may be configured such they are supplied upon installation of the centralised access control system 70 and are unmodifiable. Alternatively, the list of predetermined codes may be configured such that they are amendable, such that more codes may be added or that existing codes may be modified or removed.
In another embodiment of the present centralised access control system 70 described above, there is provided a system by which access to the location by an visitor 14 is enabled upon a suitable input being sent from the visitor 14 directly to the intercom telephone handset 72 requesting access to the location, where the system 70 has previously been configured to allow access to this user 14 upon receipt of the input. This input may be achieved by a signal being sent wirelessly from a suitably configured communications device which identifies the user 14 to the intercom telephone handset 72. The configuration of the system 70 to allow access to this user may comprise the occupant of the residence 18 specifying that the visitor 14 is to be allowed access upon request. Such specification may be achieved by a signal being sent wirelessly from a suitably configured communications device which enables the occupant of the residence 18 to alter the settings of the intercom telephone handset 72 such that access rights are granted to the visitor 14. It is to be understood that throughout the following description, references to the occupant of the residence 18 are given purely as examples of a user who may be afforded the ability to assign access rights, and that any suitable person may be afforded these privileges.
Unlike the prior art systems, the above embodiments provide a system by which an visitor 14 is able to access the location without requiring that the occupant of the residence be present within the residence. This allows for known visitors 14 who should be allowed such access to enter the location when necessary. Additionally, due to the nature of the modifications, the advantages which are present in the known systems are retained in the present system, since all of the functionality remains intact. Namely, this allows for access to be permitted to known visitors 14, whilst still requiring explicit verification from unknown visitors and without requiring that existing systems be removed and replaced with alternative and more expensive solutions.
The centralised access control system 70 may be configured to be powered by any suitable means, such as a battery pack or through being attached to a power supply. Alternatively, the system 70 may also draw power directly from pre-existing system architecture.
Turning now to Figure 5, there is shown an intercom telephone handset 72 of the system 70 of Figure 4. As with Figure 4, the intercom telephone handset 72 of the present system 70 is designed to retain the functionality of the known system 10 described with reference to Figures 1,2 and 3, whilst achieving the added functionality of enabling access to a visitor 14 without requiring their physical presence in the residence. As such, the components and connections which were described in Figure 2 remain intact, with modifications made as described below.
In addition to the components previously described, there is also provided an unattended entry controller 80 (adapter unit) within the intercom telephone handset 72. The unattended entry controller is a simple unit which needs to be retrofitted to an existing intercom telephone handset 72 to attain the benefits of the current embodiment. The unattended entry controller 80 is configured to determine whether entry is to be permitted to a visitor 14, without any further input being required from the occupant of the residence 18. The unattended entry controller 80 is communicably coupled to the buzzer 30 such that upon the buzzer 30 being activated, a notification signal is sent to the unattended entry controller 80. This notification signal may be configured to be sent every time the buzzer 30 is activated. The notification signal may further be configured to provide information to the unattended entry controller 80 regarding when the buzzer 30 is activated, and the length of time that it is activated for. This notification signal may be used to determine whether access is to be permitted to the visitor 14. This determination is described in further detail with reference to Figures 6, 7 and 8.
The unattended entry controller 80 is additionally communicably coupled to the communications network 74 and is configured to receive suitable input from external sources via the communications network 74 in accordance with embodiments described above. This input may be used to determine whether access is to be permitted to the visitor 14. The nature of the input will be described in greater detail with reference to Figure 7.
The unattended entry controller 80 is further communicably coupled to an actuator 82 within the intercom telephone handset 72. The actuator is configured to receive a notification signal from the unattended entry controller 80 upon determination by the unattended entry controller 80 that and visitor 14 is to be permitted access to the location, in accordance with the embodiments described above. Upon receipt of the notification signal, the actuator is configured to send a signal to the door unlock instruction generator 38 indicating that the electronic door lock 20 is to be disengaged, in accordance with the description given above with reference to the known system. The actuator 82 of the present system is additionally configured to receive direct input from the occupant of the residence 18, as previously described with reference to Figure 2.
Turning now to Figure 6, there is shown in further detail an unattended entry controller 80 of an embodiment of the intercom telephone handset 72 of Figure 5. There is firstly provided a code recognition relay 90 which is communicably coupled to the buzzer 30. The code recognition relay 90 is configured to switch from an off position to an on position upon sensing that the buzzer 30 has been activated. The result of this is that an electric signal is generated by the relay which can be used to interpret when the buzzer 30 has been activated. Furthermore, the length of time that the electric signal is generated for can be used to determine how long the buzzer 30 has been held down for. The result of this is that, through an analysis of the generated electric signal over a predetermined period of time, a profile can be generated regarding the number of times the buzzer has been activated, and how long it has been asserted for with each activation. This form of pattern analysis may be used as a binary code recognition mechanism, wherein each time period of assertment of the buzzer 30 is viewed as a ‘1,’ and each time period where the buzzer 30 is not asserted is viewed as a Ό.’ An applicable code form for which this mechanism may in one embodiment operate is Morse Code, where a ‘dot’ may be represented by an assertion which is less than a predetermined period of time, and a dash may be represented by an assertion which is greater than a predetermined period of time. It is to be understood that the equivalence of an assertion as being equivalent to a Ί ’ and nonassertion being equivalent to a Ό’ may be reversed. In further embodiments, the code recognition relay 90 may be replaced by any suitable component which allows for a determination of how often the buzzer 30 has been asserted, such as a microphone which is able to determine via audio identification when the buzzer 30 has been activated, and generate an electric signal in dependence upon this determination.
The code recognition relay 90 is additionally communicably coupled to an entry microcontroller board 92. The entry microcontroller board 92 is configured to analyse the electric signals generated by the code recognition relay 90, in order to associate the signals with a binary code which has been entered via assertion of the buzzer 30, in accordance with any of the embodiments described above. Further, the entry microcontroller board 92 is configured to compare the binary code associated with the electric signals with one or more predetermined binary code patterns. The one or more predetermined binary code patterns are code patterns which are used by the entry microcontroller board 92 to enable access to the location if they match the code pattern associated with the electric signals generated by the code recognition relay 90. Typically, these predetermined binary code patterns will be stored on the entry microcontroller board 92 and will be provided to the entry microcontroller board 92 at a point in time prior to the attempted access by the visitor 14.
To that end, the entry microcontroller board 92 is additionally communicably coupled to a receiver 94. The receiver 94 is configured to receive communications from external sources via the communications network 74 in accordance with embodiments described above. In particular, the communications which are received may comprise a signal sent wirelessly from a suitably configured communications device of the occupant of the residence 18 where the signal is configured to alter the settings of the intercom telephone handset 72. The communications may also comprise the receipt of a signal from a visitor 14 requesting access to the location, in accordance with embodiments described above.
In an embodiment in which predetermined codes are used to grant access rights, the altering of settings may comprise the occupant of the residence 18 amending, appending or removing predetermined binary code patterns which are stored on the code recognition relay 90, to change, add or remove codes which enable access rights for an visitor 14 as required. In an embodiment in which a visitor 14 sends a signal requesting access to the location, the altering of settings may comprise the occupant of the residence 18 amending, appending or removing access rights associated with a particular visitor 14 as required. The settings in this embodiment may also include a means of identifying the visitor 14, such as a username or a mobile identification number (MIN) which is associated with the device that the visitor 14 will request access from.
In certain embodiments, a particular predetermined binary code may be associated with a specific visitor 14 and the code which is to be used may be specified by the visitor 14. In such embodiments, the receiver 94 may first be configured to receive a communication from the occupant ofthe residence 18 indicating that a visitor 14 is to be granted access rights, in accordance with embodiments described above. In these embodiments, once this message is received, it may be passed to the entry microcontroller board 92 which determines that the visitor 14 now needs to provide a code to be associated with them. In such embodiments, the unattended entry controller 80 is further provided with a transmitter, which is configured to transmit a message via the communications network 74 to the visitor 14 notifying them that they must provide an access code, via a suitable software application. Upon receipt of this message, the visitor 14 may then provide such a code, which is transmitted to the receiver 94 via the communications network 74. This code will then be passed to the entry microcontroller board 92 where the code is stored, in accordance with embodiments described previously.
Returning to the embodiment of Figure 6, the entry microcontroller board 92 is also communicably coupled with an entry command relay 92. The entry command relay 92 is additionally communicably coupled to the actuator 82, and is configured to activate the actuator 82 upon receipt of a signal from the entry microcontroller board 92 upon determination that the visitor 14 is to be permitted access to the location (according to any ofthe embodiments previously described). In further embodiments, the entry command relay 92 may be replaced by any suitable component which allows the actuator 82 to be activated upon determination by the entry microcontroller board 92 that the visitor is to be permitted access to the location. In alternate embodiments, the entry microcontroller board 92 may also be adapted to provide an activation signal directly to the actuator 82 without the need for any intermediary components.
The composition ofthe entry microcontroller board 92 ofthe unattended entry controller 80 is shown in more detail in Figure 7. The entry microcontroller board 92 comprises a processor 100 (convertor) which is configured to receive input from the receiver 94 and electrical signals from the code recognition relay 90, where the input may be any input as described above. The processor 100 is configured to process the electrical signals received from the code recognition relay 90 so that the signals may be interpreted as a code which has been input by a visitor 14. Following this, the processed information is then passed to a comparator 104 which is communicably coupled to the processor 100.
The processor 100 is also configured to process input received from the receiver 94 to determine its nature and/or its origin before further determining what action needs to be taken in determination upon this information. If the processor determines that the input relates to amending the settings of the entry microcontroller board 92 as described above, the required alterations are determined by the processor 100 and are passed to a data store 102 which is coupled to the processor 100. The data store 102 is configured to store any predetermined binary codes 103A, 103B which are deemed to allow access to the location. The data store 102 is additionally configured to store information relating to visitors 14 who have access rights 105A, 105B to the location in addition to identification information which may allow the visitor 14 to be identified by their request, such as a username or MIN. If the processor 100 instead determines it has received input from the receiver which relates to a visitor 14 requesting access, then the request is processed to identify any necessary information, before this information is passed to the comparator 104. Such information may comprise the origin of the request, and/or an identifier of the requestor.
The comparator 104 is configured to compare information which has been received from the processor relating to a request for access with information relating to visitors 14 who are permitted access to the location and/or codes which grant access to the location. To that end, the comparator 104 is also coupled to the data store 102, and upon receipt of a request, will request relevant information be retrieved from the data store 102. This request may comprise requisitioning all available information. Alternatively, it may comprise requisitioning a subset of the contained data which is most relevant to the request. For example, if the request is in the form of an entered code, the comparator 104 may only requisition from the data store 102, information pertaining to predetermined binary access codes. Similarly if the request relates to a direct request made by a visitor 14, the comparator 104 may only requisition from the data store 102 information pertaining to a list of visitors 14 who are permitted access and their corresponding identifiers. The comparator 104 will compare information which has been received from the processor 100 with the relevant information retrieved from the data store 102 to determine whether a match can be made. If it cannot, then no further action will be taken by the comparator 104. If a match is found, then the comparator 204 is configured to send a signal to a controller 106 to which it is communicably coupled. The controller 106 is further communicably coupled to the entry command relay 96, and upon receipt of a suitably configured signal from the comparator 104, will send a control signal to the entry command relay 96, thereby engaging the relay in accordance with embodiments described above.
In further embodiments, there may also be provided a notification system (not shown), wherein if the comparator 104 determines that a match cannot be made, the notification system notifies the visitor 14. This may comprise sending a notification to the mobile telecommunications device of the visitor 14. Alternatively, this may comprise sending a pre-recorded audio notification to the base interface unit 12 which generates audio output for the visitor 14. In such an embodiment, upon determination that a match cannot be made, the comparator 104 may send a suitably configured signal to the controller 106, indicating this result. The controller 106 may then be configured to instruct the notification system to distribute the notification in whichever format is applicable.
Returning to the first embodiment described in Figure 3 and with reference to Figure 8, the method of operation 120 of the centralised access control system 70 is now described in greater detail. The method 120 described relates to an embodiment in which an visitor 14 inputs a code pattern in accordance with a predetermined binary code pattern in order to gain access to the location. It is to be understood that this method 120 may be used in a manner which is complementary to the known method 40 described with reference to Figure 3. The present method 120 begins when the base interface unit 12 receives, at Step 122, input from the visitor 14 which is representative of a predetermined binary code. This input may be provided by the visitor 14 interacting with an interface button 15 provided on the base interface unit 12, where the frequency and duration of each interaction and the length of time between interactions is designed to mimic a pattern which has previously been designated as allowing access to the location.
As the signals are input by the visitor 14, they are then sent, at Step 124, from the base interface unit 12 to the intercom telephone handset 16. In some embodiments the signals are sent as soon as input is received by the base interface unit 12. In other embodiments, the system 70 is configured to wait fora predetermined period of time before a signal representing all ofthe inputs received by the base interface unit 12 are sent in a single batch. In this way, a visitor 14 may input a full input pattern before the signal is sent.
Once the signal or signals are received by the intercom telephone handset 16, the buzzer 30 is configured to engage, at Step 126, in a way which mimics the input pattern received by the base interface unit 12. For example, the signals and the buzzer 30 may be configured so that the buzzer is activated for the same length and duration of each ofthe interactions received by the base interface unit 12, with the buzzer 30 being deactivated in the intermediary time corresponding to the periods in which there is no interaction with the base interface unit 12.
As the buzzer 30 engages, the code recognition relay 90 is configured to activate, at Step 128, in accordance to the buzzer activation pattern described above. In such an embodiment, when the buzzer 30 engages, the code recognition relay 90 is configured to close and in doing so, completes a circuit to which it is coupled and an electrical signal is generated. Similarly, when the buzzer 30 is not activated, the code recognition relay 90 is configured to be open, thereby leaving an incomplete circuit and so either no signal is generated, or alternatively only a low signal is generated in comparison to when the code recognition relay 90 is closed. In order to achieve the required functionality, all that is required is that there is a clear distinction in the electrical signals produced when the buzzer 30 is activated and when it is deactivated. As such, any component may be used in place ofthe code recognition relay 90 so long as it enables the above functionality.
The electrical signals produced by the code recognition relay 90 are then passed to the processor 100, which proceeds to analyse, at Step 130, the electrical signals in order to produce a machine readable representation ofthe code pattern which has been entered. This representation may comprise a binary format, where an engagement ofthe buzzer is represented by a ‘1,’ and a buzzer disengagement is represented by a Ό,’ as described above. An example illustrating one possible method for producing this representation is described below, with reference to Figure 10. Once this representation has been produced, the processor then passes, at Step 132, this representation to the comparator 104.
Upon receipt ofthe code pattern representation, the comparator 104 then retrieves, at Step 134, the list of predetermined binary codes from the data store 102. The comparator 104 may be configured to retrieve all ofthe predetermined binary codes. Alternatively, the comparator 104 may be configured to only retrieve a subset of these codes, in dependence upon their relevance to the presented code pattern. By way of example, if the presented code pattern comprises a pattern which is in total 10 seconds long, the comparator 104 may only retrieve predetermined binary code patterns which are 9 - 11 seconds long, as they will be the most likely predetermined binary codes which will match the presented code. Once the predetermined binary codes have been retrieved from the data store 102, the comparator 104 then proceeds to compare, at Step 136, the presented code pattern with the retrieved list of predetermined binary code patterns. This may be achieved by known computerised comparative methods of comparing signals and patterns.
Once the presented code pattern is compared with codes retrieved from the data store 102, the comparator then determines, at Step 138, whether the presented code pattern matches any ofthe retrieved codes. If it is determined that it does not, then the method 120 concludes and no further action is taken. In this case, the entrant is refused entry. In certain embodiments where there is provided a notification system as described above, if it is determined that there is no match, then the method may be amended such that rather than ending upon determination of a mismatch, instead the notification system of these embodiments is configured to send a notification to the visitor 14 informing them that they have been refused access and that they should retry entering their code pattern.
Returning to Step 138, if it is determined that there is a match between the presented code pattern and a code in the list of retrieved codes, then the controller 106 proceeds to send a control signal to engage, at Step 140, the actuator 82 in accordance with embodiments described above. The system 70 then proceeds to follow the methodology of known systems, where the actuator sends a signal to the instruction generator, as at Step 54 of Figure 3.
Turning now to Figure 9, there is shown a method of operation 150 by which the centralised access control system 70 of Figure 4 processes requests which it receives via the receiver 94. These requests may comprise requests to amend the settings (a programming signal), or direct requests for access to the location using an appropriately configured communications device (an access request signal). Requests to amend the settings may comprise adding, removing or changing predetermined binary access codes which permit access to the location in accordance with embodiments previously described. Alternatively this may comprise amending, appending or removing access rights associated with a particular visitor 14 as required in accordance with previously described embodiments.
The method 150 begins when the receiver 94 receives, at Step 152, a request via the communications network 74. This may be achieved using software installed on a suitable communications device, in accordance with embodiments described above. Upon receipt of this information, the receiver 94 passes, at Step 154, the request to the processor 100. Following receipt of the information, the processor 100 then determines, at Step 156, whether the request relates to a request to amend the settings of the unattended entry controller 80, or whether it is a direct request for access to the location. This may be achieved, for example, by identification of a particular form of data which indicates the type of request, where the form of the data is a distinguishing feature which provides a distinction between the forms of request which may be received by the receiver 94 and processor 100. The processor 100 then queries, at Step 158, whether the request relates to the amendment of the settings of the unattended entry controller 80. If it is determined that it does not, the request is necessarily assumed to be a request for direct access to the location. If this is the case, then the request is passed, at Step 160 to the comparator. The method proceeds to Step 134 of the method of Figure 8, where the request is to be compared to information stored in the data store 102. It is to be appreciated that whilst the method of Figure 8 relates to comparison of an inputted code pattern with predetermined binary code patterns, it may be simply modified to relate to a comparison of an identification of the visitor 14 who is requesting access with visitors 14 who are permitted access in accordance with settings stored in the data store 102.
Returning to Step 158, if it is determined that the request relates to an amendment of settings, the method 150 then proceeds to query, at Step 162, whether the request originates from a super user. For the purposes of this description, a super user refers to any person who has rights to amend all settings relating to who may be granted access rights and any associated predetermined binary code patterns. One example of such a super user would be the occupant of the residence 18. The identity of the originator of the request may be identified by any suitable form of identifier. This may comprise the MIN of the device that the request originates from. It may alternatively comprise the telephone number or MAC address of the device that the request originates from. In order to determine whether this person is a super user 18, the identifier may, for example, be compared to a list of identifiers stored on the data store 102 who are designated as having super user access. Super user access may be determined upon initial setup of the centralised access control system 70, where a list of identifiers of those people who are to be granted super user access is defined. Super user access may also be amendable, where a present super user 18 may grant another user the status of super user 18. This may be achieved using the current method 150.
If it is determined that the request originates from a super user 18, the processor 100 then queries, at Step 164, whether any further user input is required. For the purposes of this description, a user refers to any entity that is not granted super user access, but may have the ability to change a subset of settings on the unattended entry controller, namely settings which relate to their own access. One example of such a user would be the visitor 14. An example of where further user input would be required is where, a super user 18 grants access rights to the user 14, but the visitor 14 is further required to input a binary access code pattern which is assigned to them, such that it may be stored in the data store 102 of the entry microcontroller board 92. If it is determined that further input is required, the method 150 then proceeds to send, at Step 166, a request to the user 14 informing them that they must input a binary access code which is assigned to their profile. In order to send this signal, the system 70 may be provided with a suitable notification system which is configured to send a message to a suitable communications device of the visitor 14, such as a smartphone provided with appropriate software. This software may also be configured to allow the visitor 14 to input a code pattern which may be replicated upon interaction with the base interface unit 12. Following this, the user 14 will then be required to send a further request to amend the settings with this binary access code. Once this has been sent, the method 150 returns to Step 152, where the receiver receives the request.
Returning to Step 154, if it is determined that no further user input is required, the request and any necessary information included within the request is then passed to and stored, at Step 158, in the data store 102. This is then ready to be accessed at a later stage by the comparator 104, in accordance with the method 120 of Figure 8. The information which is included as part of the request may comprise a unique identifier of a user 14 who is to be allowed access to the location upon request. It may additionally or alternatively comprise a predetermined binary access code which, when entered, will allow a user 14 access to the location.
Returning now to Step 162, if it is determined that the request does not originate from a super user 18, the method proceeds to Step 170, where the processor determines whether the request originates from a user 14 who has amendment access to the settings that they wish to change. As above, the identity of the originator of the request may be identified by any suitable form of identifier, and to determine whether they have the correct settings access, the identifier may, for example, be compared to a list of identifiers and corresponding settings access rights stored on the data store 102. If it is determined that the user 14 does not have sufficient settings access rights in relation to their request, the method 150 ends, and no amendments to the settings will be made. If it is determined that they do have sufficient access rights, then the method proceeds to Step 158 as described above, and the request and any necessary information included within the request is then passed to and stored in the data store 102.
In some further embodiments, the method 150 of Figure 9 may be amended to further provide a notification to all super users 18 whenever a request is received. This may be achieved by including a further step after the receiver receives a request wherein a control message is sent to a suitably configured notification system (as previously described) upon receipt of the request, causing the notification system to transmit a message to all identified super users 18 that this request has been made. The notification may further comprise relevant information about the request, such as the identity of the requestor and what the request relates to. It is to be appreciated that this may be modified such that only a subset of super users 18 is notified when a request is received.
Furthermore, it is to be appreciated that the notifications may be restricted to only be transmitted when the request is a certain type of request, for example, when a request originates from a user 14 rather than a super user 18. Additionally or alternatively, the system 70 may be configured to record any received requests and store a log file of all of these requests in the data store 102.
In some further embodiments, when a user 14 receives a notification that they are required to provide a predetermined binary access code input, rather than being required to input such a binary access code input, they may configure the software on their communications device to automatically provide one of a plurality of prestored binary codes which they have previously input. This prevents the user from needing to actively respond to every instance of such notifications that they are sent.
Turning to Figure 10, there is shown an illustrative diagram showing a translation between a visitor input and a representation of the how this input may be interpreted as a binary code pattern by the processor 100 in an embodiment of the above described centralised access control system 70. In particular, this translation involves generating a binary output signal 218 based on an input signal received by the processor 100, where the generation of the output signal 218 involves determination of the logical state of the input signal at discrete time intervals.
There is shown firstly a representation of the signal 210 received by the processor 100 from the code recognition relay 90. It is to be appreciated that the signal displayed is assumed to be in direct correspondence with the input received from the visitor 14 by the base interface unit 12, with no loss or degradation of information between the base interface unit 12, the buzzer 30, the code recognition relay 90 and the processor 100. Where the signal 210 is shown to be peaking, this is to be interpreted as the code recognition relay 90 being energised and where the signal 210 is at its lowest point, this is to be interpreted as the code recognition relay 90 being de-energised. In accordance with this embodiment, it is assumed that the electric signal is configured to have only two states (high or low).
In further embodiments, the system 70 may be adapted that there are more than two states which may allow for further distinctions between visitor 14 inputs, which may be achieved for example by the pressure applied to an interface button 15 on the base interface unit 12.
As shown, the translation of the signal begins upon input first being received 212 at a time t = 0. In the present embodiment, the translation of the signal 210 can only begin upon an input from the visitor 14 being received, however in separate embodiments, the system 70 may be adapted that the translation of the signal 210 can be initiated in an alternative manner, such as by a proximity sensor detecting that a user has approached the base interface unit 12.
In order to provide a mechanism which is able to translate the signal 210 into a binary code pattern, the processor 100 is configured to define distinct time intervals 214A, 214B, 214C, 214D, 214E, 214F, 216A, 216B, 216C, 216D within which it is determined whether the buzzer 30 is activated or deactivated. If the buzzer 30 is determined as being activated for any period of time during these time intervals 214A, 214B, 214C, 214D, 214E, 214F, 216A, 216B, 216C, 216D then the processor 100 will interpret the buzzer 30 as being activated and will subsequently translate the signal as being equivalent to a ‘1.’ If multiple engagement signals are received within one discrete time period 214A, 214B, 214C, 214D, 214E, 214F, 216A, 216B, 216C, 216D then the processor 100 is configured to only translate these multiple signals a single ‘1.’ If no signal is received within a time period 214A, 214B, 214C, 214D, 214E, 214F, 216A, 216B, 216C, 216D, then the processor 100 is configured to interpret the buzzer 30 as being deactivated and will subsequently translate the signal as being equivalent to a Ό.’ The provision of these time intervals enables the processor 100 not only to determine that the visitor 14 has provided an input, but can distinguish a time dependency upon their inputs, so that rather than simply providing a code pattern which is dependent on the number of inputs, the visitor 14 can provide a code which additionally has a time dependent component.
In order to describe the above in more detail, reference is made to the specific embodiment of Figure
10. In this embodiment, two variants of time period 214A, 214B, 214C, 214D, 214E, 214F, 216A, 216B, 216C, 216D are provided. The first variant 214A, 214B, 214C, 214D, 214E, 214F is the time period which is begun upon the receipt of a signal indicating the buzzer 30 is activated. If the buzzer 30 is determined to be deactivated and then reactivated within this time period, then the processor is configured to only translate this as a single ‘1.’ Following the first variant 214A, 214B, 214C, 214D,
214E, 214F, the second variant time period 216A, 216B, 216C, 216D begins. This is a time period which the processor is configured to wait for before recording the buzzer 30 as being deactivated and translating this as a Ό.’ Ifthe buzzer 30 is activated during this time period, then a T is recorded rather than a Ό.’ As the buzzer 30 is activated, the first variant of time period 214A, 214B, 214C,
214D, 214E, 214F begins. In the embodiment of Figure 10, the first time period variant 214A, 214B,
214C, 214D, 214E, 214F is configured to be 350ms, and the second time period variant 216A, 216B, 216C, 216D is configured to be 500ms. It has been determined that these two lengths of time are exemplary in allowing a time dependent component to be included within code entry, whilst also balancing this with false signal entries recorded as a result of background electrical noise. It is to be appreciated that, whilst these time periods are stated, the two may be varied, either upon installation of the system, or at a later date by an occupant of the residence 18. This enables the code entry system to be varied in accordance with the occupant of the residence’s preferences and may allow for more or less precision being required on code entry, and more or less sensitivity to background electrical noise.
The processor 100 may be configured to analyse the received signal for a predetermined period of time 220 after time t = 0, and after this time period 220 has elapsed, the output signal 218 is then provided to the comparator 104. This predetermined time period 220 provides a total window within which a visitor 14 must complete their code input. In conjunction with the distinct time intervals 214A, 214B, 214C, 214D, 214E, 214F, 216A, 216B, 216C, 216D, this may be used to define the total number of outputs that make up a code entry. Additionally or alternatively, the processor 100 may be configured to cease analysing the signal following a prolonged period of inactivity, where this period of inactivity may be predefined. This allows for the total length of the output signal code pattern to be variable, depending upon the preferences of either the visitor 14 or the occupant of the residence 18 in various embodiments.
Having described several exemplary embodiments of the present invention and the implementation of different functions of the device in detail, it is to be appreciated that the skilled addressee will readily be able to adapt the basic configuration of the system to carry out described functionality without requiring detailed explanation of how this would be achieved. Therefore, in the present specification several functions of the system have been described in different places without an explanation of the required detailed implementation as this not necessary given the abilities of the skilled addressee to introduce functionality into the system.

Claims (23)

Claims:
1. A method of controlling a door entry system using an adapter unit retrofitted to a user control module of the door entry system, where the door entry system is arranged to unlock a remotely-located door on receipt of a control signal from the user control module, the method comprising:
receiving an access request signal at the retrofitted adapter unit, converting the access request signal into a binary code;
comparing the binary code against a plurality of stored binary codes; and if there is a match between the binary code and any of the plurality of stored binary codes, instructing the user control module to generate the control signal to unlock the remotely-located door.
2. A method according to Claim 1, further comprising creating the access request signal using an intercom buzzer of the door entry system, the access request signal comprising a binary signal having an asserted level and a non-asserted level produced by temporal assertions of the intercom buzzer.
3. A method according to Claim 2, wherein the converting step comprises: measuring the duration of an asserted or non-asserted level of the binary signal; and comparing the duration with a predetermined time period to determine a current state of the binary code derived from the access request signal.
4. A method according to Claim 3, wherein the comparing step comprises determining if the asserted or non-asserted level of the binary signal persists for longer than the predetermined time period to determine the current state of the binary code.
5. A method according to Claim 3 or 4, wherein the predetermined time period comprises a first time period for recognising the asserted level of the binary signal and a second time period for recognising the non-asserted level of the binary signal, the first and second time periods being different.
6. A method according to any one of Claims 3 to 5, further comprising adjusting a previously set value for the predetermined time period or the first or second time periods.
7. A method according to any one of Claims 2 to 6, wherein the converting step comprises measuring a time out period from the end of the last of a series of asserted levels of the binary signal and, if the time out period exceeds a predetermined time limit, considering the last asserted or nonasserted level as being the end of the binary signal.
8. A method according to Claim 1, wherein the creating step comprises producing a binary signal in Morse Code using temporal assertions of the buzzer.
9. A method according to Claim 8, wherein the duration of an asserted level of the binary signal being longer than a predetermined period determines one of the binary states of the binary signal, and the duration of the asserted level of the binary signal being shorter than the predetermined level determines the other binary state of the binary signal.
10. A method according to any one of Claims 1 to 9, further comprising: on determining that there is no match between the binary code of the access request signal and any of the plurality of stored binary codes, generating a rejection signal and transmitting the same back to the source of the access request signal.
11. A method according to any one of Claims 1 to 10, wherein the receiving step comprises receiving the access request signal from a remote device via a wide-area communications network.
12. A method according to Claim 11, wherein the receiving step comprises receiving the access request signal from a mobile telecommunications device.
13. A method according to any one of Claims 1 to 12, further comprising:
receiving a programming signal for programming the adaptor unit, the signal comprising a source identifier of the source of the signal, comparing the source identifier of the programming signal with a predetermined list of permitted source identifiers; and permitting access to at least one of the plurality of stored binary codes, if the source identifier matches one of the list of predetermined source identifiers.
14. A method according to Claim 13, further comprising determining access rights associated with the source identifier and permitting modification of one or more of the plurality of stored binary codes in accordance with the stored access rights associated with the source identifier.
15. A method according to Claim 14, further comprising determining if the programming signal includes a new binary code, and if so adding the new binary code to the plurality of stored binary codes.
16. A method according to Claim 14, further comprising determining if the programming signal includes a new binary code, and if not, sending a request to the source of the programming signal for a new binary code if required.
17. A method according to any one of Claims 1 to 16, further comprising: storing a log of each received access request signal and the action taken by the adapter unit as a result of the request.
18. A method according to Claim 17, further comprising: transmitting a notification to a predetermined address on each occasion of generation of the control signal by the adapter unit.
19. A method according to any one of Claims 1 to 18, wherein the binary code comprises a user identifier.
20. An adapter unit for controlling a door entry system for unlocking a remotely-located door on generation of an unlock control signal, the door entry system including a user control module and a gate control module, the adapter unit being retrofittable to the user control module of the door entry system and comprising:
A receiver for receiving an access request signal,
A convertor for converting the access request signal into a binary code;
A data store for storing a plurality of binary codes
A comparator for comparing the binary code against the plurality of stored binary codes; and A controller for receiving the output of the comparator, the controller being arranged to instruct the user control module to generate the unlock control signal to unlock the remotely-located door if there is a match between the binary code and any of the plurality of stored binary codes.
21. An adaptor unit according to Claim 20, wherein the receiver is arranged to receive access request signals via a communications network and via an interface to the user control module.
22. An adaptor unit according to Claim 21, wherein the interface to the user control module comprises a relay for converting signals generated from an intercom buzzer of the door entry system into a binary signal having an asserted level and a non-asserted level produced by temporal assertions of the intercom buzzer.
23. A combination of an adapter unit as described in any one of Claims 20 to 22, and a door entry system comprising a user control module and a remotely located base interface unit operatively coupled to an electronic door lock, wherein the base interface unit is arranged to unlock the door lock on receipt of a control signal from the user control module.
GB1720914.9
1-23
Intellectual
Property
Office
Application No: Claims searched:
GB1720914.9A 2016-12-14 2017-12-14 Improvements relating to access control mechanisms Withdrawn GB2559672A (en)

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
GBGB1621293.8A GB201621293D0 (en) 2016-12-14 2016-12-14 Improvements relating to access control mechanisms

Publications (2)

Publication Number Publication Date
GB201720914D0 GB201720914D0 (en) 2018-01-31
GB2559672A true GB2559672A (en) 2018-08-15

Family

ID=58222117

Family Applications (2)

Application Number Title Priority Date Filing Date
GBGB1621293.8A Ceased GB201621293D0 (en) 2016-12-14 2016-12-14 Improvements relating to access control mechanisms
GB1720914.9A Withdrawn GB2559672A (en) 2016-12-14 2017-12-14 Improvements relating to access control mechanisms

Family Applications Before (1)

Application Number Title Priority Date Filing Date
GBGB1621293.8A Ceased GB201621293D0 (en) 2016-12-14 2016-12-14 Improvements relating to access control mechanisms

Country Status (2)

Country Link
GB (2) GB201621293D0 (en)
WO (1) WO2018109482A1 (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109274693A (en) * 2018-11-14 2019-01-25 广东小天才科技有限公司 A kind of data register method and user equipment based on Morse code

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP0064640A1 (en) * 1981-04-30 1982-11-17 Nissan Motor Co., Ltd. Electronical unlocking method and system
DE10127029C1 (en) * 2001-06-02 2002-10-24 Andreas Gronarz Doorbell and security entry device for apartment building has switching device controlled by input of morse code via doorbell line for operation of door opener
DE102004059224A1 (en) * 2004-12-09 2006-06-14 Ritto Gmbh & Co. Kg Door intercom system has living telephone equipment with mobile radio module for making mobile connection with mobile telephone
GB2489509A (en) * 2011-03-31 2012-10-03 Lifealike Ltd Wireless device for door entry
EP2698976A1 (en) * 2012-08-13 2014-02-19 TRK Inovacije Doo Novi Sad An electronic device for recording and recognizing ring signal patterns in an intercom device sending a signal to unlock the door based on the recognition
US20150179011A1 (en) * 2011-09-10 2015-06-25 Mark Kramer Wireless radio frequency switch controller

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP0064640A1 (en) * 1981-04-30 1982-11-17 Nissan Motor Co., Ltd. Electronical unlocking method and system
DE10127029C1 (en) * 2001-06-02 2002-10-24 Andreas Gronarz Doorbell and security entry device for apartment building has switching device controlled by input of morse code via doorbell line for operation of door opener
DE102004059224A1 (en) * 2004-12-09 2006-06-14 Ritto Gmbh & Co. Kg Door intercom system has living telephone equipment with mobile radio module for making mobile connection with mobile telephone
GB2489509A (en) * 2011-03-31 2012-10-03 Lifealike Ltd Wireless device for door entry
US20150179011A1 (en) * 2011-09-10 2015-06-25 Mark Kramer Wireless radio frequency switch controller
EP2698976A1 (en) * 2012-08-13 2014-02-19 TRK Inovacije Doo Novi Sad An electronic device for recording and recognizing ring signal patterns in an intercom device sending a signal to unlock the door based on the recognition

Non-Patent Citations (2)

* Cited by examiner, † Cited by third party
Title
Jamie, 25 March 2013, Doorbell Buzzer Hack for Keyless Entry, mouseextinction.com, [online], available from: http://mouseextinction.com/2013/doorbell-buzzer-hack-for-keyless-entry/ [accessed 08/06/2018] *
Jamie, 31 January 2016, Smartphone-based Keyless Entry for Door Buzzer, mouseextinction.com, [online] available from: http://mouseextinction.com/2016/control-door-buzzers-from-your-smartphone-or-apple-watch/ [accessed 08/06/2018] *

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109274693A (en) * 2018-11-14 2019-01-25 广东小天才科技有限公司 A kind of data register method and user equipment based on Morse code

Also Published As

Publication number Publication date
WO2018109482A1 (en) 2018-06-21
GB201720914D0 (en) 2018-01-31
GB201621293D0 (en) 2017-01-25

Similar Documents

Publication Publication Date Title
JP7216101B2 (en) Access control system and access control method using the same
RU2631982C2 (en) System of vehicle access control and personalization by biometric parameters
EP3053148B1 (en) Access control using portable electronic devices
US11089165B2 (en) Retrofitable internet-enabled access control system and method
CN109361642B (en) Remote authorization unlocking method and system
KR102019097B1 (en) Vehicle access control system and method through code display
JP2010146095A (en) Biometric authentication system
CN107215330B (en) Mobile user terminal device, technical device and method for supporting user during remote control of mobile user terminal device
CN103419790A (en) Hierarchical recognition of vehicle driver and select activation of vehicle settings based on the recognition
CN109150877B (en) Method and apparatus for safety control of controlled apparatus
KR20190004831A (en) Authority sharing system of smart key and method of thereof
KR20230007986A (en) Access control system and access control method using the same
KR20220166237A (en) Access control system and access control method using the same
KR20230007984A (en) Access control system and access control method using the same
KR102063569B1 (en) Method and apparatus for controlling a door opening using a portable terminal
GB2559672A (en) Improvements relating to access control mechanisms
KR20230007985A (en) Access control system and access control method using the same
CN111768530B (en) Intelligent unlocking method and device
CN112352408A (en) Intruder detection method and device
JP4752547B2 (en) Printing machine management device
CN111179481A (en) Intelligent home platform, intelligent home key control method and system
US11386728B2 (en) System and method for granting access to or for starting an object
KR20220012025A (en) Digital Apparatus Control Method by Using AI Speaker and System thereof
JP2010055197A (en) Cooperation controller
CA2629271C (en) A biometric verification and duress detection system and method

Legal Events

Date Code Title Description
WAP Application withdrawn, taken to be withdrawn or refused ** after publication under section 16(1)