US20170032594A1 - Method and apparatus for a merged power-communication cable in door security environment - Google Patents
Method and apparatus for a merged power-communication cable in door security environment Download PDFInfo
- Publication number
- US20170032594A1 US20170032594A1 US15/260,176 US201615260176A US2017032594A1 US 20170032594 A1 US20170032594 A1 US 20170032594A1 US 201615260176 A US201615260176 A US 201615260176A US 2017032594 A1 US2017032594 A1 US 2017032594A1
- Authority
- US
- United States
- Prior art keywords
- door
- access
- power
- processing
- communication cable
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Abandoned
Links
Images
Classifications
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07C—TIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
- G07C9/00—Individual registration on entry or exit
- G07C9/20—Individual registration on entry or exit involving the use of a pass
- G07C9/27—Individual registration on entry or exit involving the use of a pass with central registration
-
- G07C9/00007—
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07C—TIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
- G07C9/00—Individual registration on entry or exit
- G07C9/20—Individual registration on entry or exit involving the use of a pass
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07C—TIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
- G07C9/00—Individual registration on entry or exit
- G07C9/00174—Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07C—TIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
- G07C9/00—Individual registration on entry or exit
- G07C9/00174—Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
- G07C9/00563—Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys using personal physical data of the operator, e.g. finger prints, retinal images, voicepatterns
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07C—TIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
- G07C9/00—Individual registration on entry or exit
- G07C9/00174—Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
- G07C9/00571—Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated by interacting with a central unit
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07C—TIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
- G07C9/00—Individual registration on entry or exit
- G07C9/00174—Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
- G07C2009/00634—Power supply for the lock
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07C—TIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
- G07C9/00—Individual registration on entry or exit
- G07C9/30—Individual registration on entry or exit not involving the use of a pass
- G07C9/38—Individual registration on entry or exit not involving the use of a pass with central registration
-
- Y—GENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
- Y10—TECHNICAL SUBJECTS COVERED BY FORMER USPC
- Y10T—TECHNICAL SUBJECTS COVERED BY FORMER US CLASSIFICATION
- Y10T70/00—Locks
- Y10T70/70—Operating mechanism
- Y10T70/7051—Using a powered device [e.g., motor]
- Y10T70/7062—Electrical type [e.g., solenoid]
-
- Y—GENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
- Y10—TECHNICAL SUBJECTS COVERED BY FORMER USPC
- Y10T—TECHNICAL SUBJECTS COVERED BY FORMER US CLASSIFICATION
- Y10T70/00—Locks
- Y10T70/70—Operating mechanism
- Y10T70/7051—Using a powered device [e.g., motor]
- Y10T70/7062—Electrical type [e.g., solenoid]
- Y10T70/7068—Actuated after correct combination recognized [e.g., numerical, alphabetical, or magnet[s] pattern]
Definitions
- the invention relates to an access controlled door lock in a door, as well as a conduit providing the merged power-communications cable for interactions and power delivery for components within the door.
- the invention relates to improving security and access control for doors using a merged power-communication cable, which allows the entire access control identification mechanism to reside within the door.
- an access control system for a door requires at least an access control identification mechanism, an access controlled door lock, a way to generate a Request-to-Exit (REX) signal, and a door position sensor.
- REX Request-to-Exit
- An equipment closet is usually physically located near the door being controlled.
- the equipment closet contains a door lock power supply and a data-communications node.
- the power network couples to the door lock power supply.
- the data-communications network couples to the data-communications node.
- the data-communications node communicates with a central security node, often through a communications network.
- the Open Systems Interconnection-Reference Model refers to an abstract description of the digital communications between application processes running in distinct systems.
- the model employs a hierarchical structure of seven layers. Each layer performs value-added service at the request of the adjacent higher layer and, in turn, requests more basic services from the adjacent lower layer:
- the Physical Layer is Layer 1, the lowest of seven hierarchical layers of the OSI-RM.
- the Physical layer performs services requested by the Data Link Layer. There are three major functions and services performed by the physical layer. First, establishment and termination of a connection to a communications medium. Second, participation in the process whereby the communication resources are effectively shared among multiple users, e.g., contention resolution and flow control. And third, conversion between the representation of digital data in user equipment and the corresponding signals transmitted over a communications channel.
- the Data Link Layer is Layer 2 of the OSI-RM. This layer responds to service requests from the Network Layer and issues service requests to the Physical Layer.
- the Data Link Layer provides the functional and procedural means to transfer data between network entities and to detect and possibly correct errors that may occur in the Physical Layer.
- Examples of data link protocols are HDLC and ADCCP for point-to-point or packet-switched networks and LLC for local area networks.
- the Network Layer is Layer 3 of the OSI-RM. This layer responds to service requests from the Transport Layer and issues service requests to the Data Link Layer.
- the Network Layer provides the functional and procedural means of transferring variable length data sequences from a source to a destination via one or more networks while maintaining the quality of service requested by the Transport Layer.
- the Network Layer performs network routing, flow control, segmentation/desegmentation, and error control functions.
- the Transport Layer is Layer 4 of the OSI-RM. This layer responds to service requests from the Session Layer and issues service requests to the Network Layer.
- the purpose of the Transport Layer is to provide transparent transfer of data between end users, thus relieving the upper layers from any concern with providing reliable and cost-effective data transfer.
- the Session Layer is Layer 5 of the OSI-RM. This layer responds to service requests from the Presentation Layer and issues service requests to the Transport Layer.
- the Session Layer provides the mechanism for managing the dialogue between end-user application processes. It provides for either duplex or half-duplex operation and establishes checkpointing, adjournment, termination, and restart procedures.
- the Presentation Layer is Layer 6 of the OSI-RM. This layer responds to service requests from the Application Layer and issues service requests to the Session Layer.
- the Presentation Layer relieves the Application Layer of concern regarding syntactical differences in data representation within the end-user systems. Note: An example of a presentation service would be the conversion of an EBCDIC-coded text file to an ASCII-coded file.
- the Application Layer is Layer 7, the highest layer of the OSI-RM. This layer interfaces directly to and performs common application services for the application processes; it also issues requests to the Presentation Layer.
- the common application services provide semantic conversion between associated application processes. Note: Examples of common application services of general interest include the virtual file, virtual terminal, and job transfer and manipulation protocols.
- Communications refers herein to at least one of the following First, information transfer, among users or processes, according to agreed conventions. Second, the branch of technology concerned with the representation, transfer, interpretation, and processing of data among persons, places, and machines. The meaning assigned to the data typically must be preserved during these operations.
- Information transfer refers herein to the process of moving messages containing user information from a source to a sink.
- Data refers here to representations of facts, concepts, or instructions in a formalized manner suitable for communication, interpretation, or processing by humans or by automatic means. Any representations such as characters or analog quantities to which meaning is or might be assigned.
- a Layer in a telecommunications network and/or an open systems architecture refers herein to a group of related functions that are performed in a given level in a hierarchy of groups of related functions. In specifying the functions for a given layer, the assumption is made that the specified functions for the layers below are performed, except for the lowest layer.
- Open systems architecture refers herein to a layered hierarchical structure, configuration, or model of a communications or distributed data processing system and/or a nonproprietary systems architecture.
- the layered hierarchical structure, configuration, or model of a communications or distributed data processing system provides the following: the layered hierarchical structure enables system description, design, development, installation, operation, improvement, and maintenance to be performed at a given layer or layers in the hierarchical structure.
- the layered hierarchical structure allows each layer to provide a set of accessible functions that can be controlled and used by the functions in the layer above it.
- the layered hierarchical structure enables each layer to be implemented without affecting the implementation of other layers.
- the layered hierarchical structure allows the alteration of system performance by the modification of one or more layers without altering the existing equipment, procedures, and protocols at the remaining layers.
- Examples of independent alterations by modifying one or more layers include the following. Converting from wire to optical fibers at a physical layer without affecting the data-link layer or the network layer except to provide more traffic capacity. And altering the operational protocols at the network level without altering the physical layer.
- Connection refers here to at least one of the following: A provision for a signal to propagate from one point to another, such as from one circuit, line, subassembly, or component to another. An association established between functional units for conveying information.
- Communications medium refers herein to at least one of the following:
- the transmission path along which a signal propagates such as a wire pair, coaxial cable, waveguide, optical fiber, or radio path.
- the material on which data are or may be recorded such as plain paper, paper tapes, punched cards, magnetic tapes, magnetic disks, or optical disks.
- a channel refers herein to at least one of the following: A connection between initiating and terminating nodes of a circuit.
- the portion of a storage medium such as a track or a band, that is accessible to a given reading or writing station or head. In a communications system, the part that connects a data source to a data sink.
- a transfer refers herein to sending information from one location and to receive it at another.
- a packet refers herein to a sequence of binary digits, which may including data and/or control signals, that is transmitted and/or switched as a composite whole.
- the data, control signals, and possibly error control information, are typically arranged in a specific format.
- a format refers herein to the arrangement of bits or characters within a group, such as a word, message, or language.
- a group refers herein to the following within the context of frequency division multiplexing and/or in the context of a set of characters forming a unit for transmission of cryptographic treatment.
- a group in frequency-division multiplexing refers herein to a specific number of associated voice channels and/or data channels, either within a supergroup or as an independent entity.
- Routing refers herein to the process of determining and prescribing the path or method to be used for establishing telephone connections or forwarding messages.
- TCP/IP refers herein to Transmission Control Protocol/Internet Protocol, which is a set of communications protocols required to communicate over a channel with the Internet.
- a TCP/IP Stack refers herein to the method of interacting with the Internet, which is often implemented as software running on a computer.
- the Internet Protocol refers herein to a packet switching protocol used as the network layer in the TCP/IP stack.
- Access control systems are needed which can be installed in a door with a minimum of wiring. Access control systems are needed which interact across standard communications networks with centralized security systems.
- the invention includes a preferred mechanism for controlling access through a door, which electrically couples to security and power networks through a merged power-communication cable.
- This is the invention's access control module.
- the access control module When installed, the access control module preferably couples with a position magnet located in a strike plate mounted in the door frame.
- the access control module preferably includes an access control identification mechanism, an access controlled door lock, a door position sensor, and a Request Exit switch.
- the access control identification mechanism is preferably an access control scanning device, which is further preferably an access control card reader.
- the invention includes many alternatives on the elements of the access control module, which will be disclosed in the detailed description to follow.
- the invention has the advantages of providing network interacting door locks without any additional power wiring. It supports security software models such as door objects as discussed on the www.sbd.us web site. It allows door security control to easily employ one or more communication networks to update access to each door equipped with the invention.
- the invention includes a method of controlling access to the door using a merged power-communication cable. Electrical power is provided from the merged power-communication cable through a means for managing the electrical power to a processing module, an access control identification mechanism and an access controlled door lock.
- the processing module interacts with the access control identification mechanism and with the merged power-communication cable to control the access controlled door lock.
- the processing module and the access controlled door lock are located in the door. Preferably, the access control identification mechanism is also located in the door.
- the invention also includes a method of using the access control module to make an access controlled door.
- a method of using the access control module to make an access controlled door By way of example, an installation estimate based upon this method shows an access door total of less than half the estimated cost of the prior art approach.
- FIG. 1A shows a simplified schematic of a typical prior art access controlled door
- FIG. 1B shows a schematic of the inventions access control module coupling a merged power-communication cable through a door conduit and aligned with a position magnet mounted in a door frame on the door latch side;
- FIG. 2A shows a preferred embodiment of the access control module, the merged power-communication cable, and the strike plate of FIG. 1B ;
- FIG. 2B shows the door frame side of the strike plate of FIG. 2A ;
- FIGS. 2C to 2E show alternative embodiments of the hinge conduit of FIGS. 1B, 2A, 3A, 3D, 4A, 4B, and 16B , used to provide the merged power-communication cable;
- FIG. 3A shows the door coupled with the door conduit providing a merged power-communication cable into the door to certain embodiments of the access control module of FIGS. 1B and 2A ;
- FIG. 3B shows a typical view of the secured side of the door of FIGS. 1B and 3A , including the access controlled door lock, and the REquest eXit switch;
- FIG. 3C shows a typical view of the unsecured side of the door of FIGS. 1B, 3A, and 3B , including at least one access control identification mechanism and the access controlled door lock;
- FIG. 3D shows the hinge side of the door at which the door conduit of FIGS. 1B and 3A couples with the door frame
- FIG. 3E shows a placement of the door position sensor on the door latch side of the door of FIGS. 1B and 3A ;
- FIG. 4A shows the access control module of FIGS. 1B and 3A , where the means for interacting includes a first communications coupling between the processing module and the communication channel;
- FIG. 4B shows the access control module of FIG. 4A where the means for interacting further includes the access identifier coupling to the communication channel, and the access control coupling to the communication channel;
- FIG. 5A shows the access control module of FIG. 3A where the processing module includes the means for managing and the means for interacting;
- FIG. 5B shows a refinement of the processing module of FIGS. 3A, and 4A to 5A , where the communication interface, is an implementation of the means for interacting and is controllably coupled to the power interface, which is an implementation of the means for managing;
- FIGS. 6A and 6B show the processing module of FIGS. 3A, and 4A to 5B , including a processing computer, which is first accessibly coupled to the processing memory;
- FIG. 7A shows an embodiment of the communication interface of FIGS. 6A and 6B including a communication interface computer
- FIG. 7B shows an embodiment of the access control identification mechanism including an access identification computer, an access control scanning device, an identification interface, and an access identification memory;
- FIG. 8A shows a communication interface including a channel interface cryptically coupled with the encryption module, and providing the first communications coupling
- FIG. 8B shows the encryption module including at least one of a send-encryption mechanism and/or a receive-encryption mechanism
- FIG. 8C shows that an access control scanning device may include at least one of the following: the access control card reader, the access control biometric sensor, which may in turn include any of the following: a facial biometric sensor, a fragrance biometric sensor, a fingerprint biometric sensor, a skin residue DNA biometric sensor, and a skin characteristic sensor;
- FIG. 8D shows a security state for the door, which may take any one of the values of a secure door, a forced open door, a held open door, and an unlocked door;
- FIG. 9 shows a preferred implementation of the access control module of FIGS. 1B, 2A, 3A, and 4A to 5A , including the processing computer, the power interface, the channel interface, and the peripheral interface;
- FIG. 10A shows a detail flowchart of the processing program system of FIGS. 2A, 6A, 6B, and 9 ;
- FIG. 10B shows a detail flowchart of FIG. 10A further interacting with the access control identification mechanism and the merged power-communication cable to control the access controlled door lock;
- FIG. 11A shows a detail flowchart of FIG. 10B further incorporating the access identification to create an access directive
- FIG. 11B shows a detail flowchart of FIG. 11A , and alternatively, part of the communications program system of FIGS. 7A and 9 , for sending the access identification via the merged power-communication cable to create a sent-identification;
- FIG. 12A shows a detail flowchart of FIG. 11B , further processing the access identification
- FIG. 12B shows a detail flowchart of FIG. 11A , and part of the communications program system of FIGS. 7A and 9 , for receiving the access directive;
- FIG. 12C shows a detail flowchart of FIG. 12B further processing the access directive message to create the access directive
- FIG. 13 shows a detail flowchart of FIG. 10B further receiving the access identification
- FIG. 14A shows a detail flowchart of FIG. 10B , alternatively part of the access identification program system of FIGS. 7B and 9 , further receiving the access identification;
- FIG. 14B shows a detail flowchart of the processing program system of FIGS. 6A, 6B and 9 ;
- FIG. 15A shows a detail flowchart of FIG. 10A further managing the electrical power
- FIG. 15B shows a detail flowchart of FIG. 10A further interacting
- FIG. 15C shows a detail flowchart of FIG. 10B further controlling the access controlled door lock
- FIG. 16A shows a flow chart in accord with example embodiments of the invention.
- FIG. 16B shows an example door configuration
- FIG. 17A shows the access controlled door lock including a piezoelectric controlled door lock
- FIG. 17B shows alternatively, the access controlled door lock including a standalone door lock powered by an internal power storage device
- FIG. 17C shows the access controlled door lock including an access controlled cylinder lock
- FIG. 17D shows the access controlled door lock including an access controlled mortise lock
- FIG. 17E shows an alternative access controlled door lock including a standalone door lock which is not powered by an internal power storage device
- FIG. 17F shows alternatively, the access controlled door lock including a solenoid controlled door lock.
- the invention includes a method of using an access control module 2000 to make an access controlled door as shown in FIG. 1B .
- an installation estimate based upon this method shows an access door total of less than half the estimated cost of the prior art approach shown in FIG. 1A .
- the inventor has recognized a need for improvement, and provided a solution to a significant installation cost problem.
- FIG. 1A shows a schematic of a door 10 implementing the access control technology of the prior art.
- the access control technology of today requires separate installation of an access control card reader 310 , a Request Exit Switch 30 , a door position sensor 40 and an access controlled door lock 80 .
- Each of these units requires separate wiring through at least one door conduit 300 , which must provide power and communications wiring to each of these modules.
- the door frame 8 must further include a position magnet 46 , which must work successfully with the door position sensor 40 . During installation the position magnet 46 must be aligned with the door position sensor 40 . Often these units must be installed in the door and tested one at a time, which dramatically increases the installation time and cost. The cost of running the many separate wires dramatically adds to the installation time and cost.
- each of the control and data connections, as well as the power connections, for each of the installed units must also be built and tested.
- FIG. 1B shows a schematic of the door 10 using a preferred access control module 2000 , which in turn uses a merged power-communication cable 50 .
- the merged power-communication cable 50 is provided through the door conduit 300 to a security network 5002 , as will be discussed in FIG. 16B .
- the access control module will be discussed further in FIGS. 2, 3A, 4A, 4B, 5A, 6A, 6B, and 9 .
- the invention has the advantage of providing network interacting door locks without any addition power wiring. It supports security software models such as door objects. It allows door security control to easily employ one or more communication networks to update access to each door equipped with the invention.
- Tables 1 and 2 show installation estimates for the prior art door of FIG. 1A and the invention's door of FIG. 1B .
- Table 2 illustrates an installation estimate for the door 10 of FIG. 1B , using the invention's access control module 2000 , indicating a total of $1,760 (US), less than half the estimated cost of the prior art approach.
- the invention includes a preferred mechanism for controlling access through a door 10 .
- the mechanism known herein as the access control module 2000 , electrically couples to security and power networks through a merged power-communication cable 50 as shown in FIGS. 1B and 16B .
- FIGS. 2A, 3A, 4A to 5A, and 9 show examples of the invention's access control module 2000 .
- the access control module 2000 When installed, the access control module 2000 preferably couples with a position magnet 46 located in a strike plate 60 mounted in the door frame 8 .
- the access control module 2000 may preferably include an access control identification mechanism 20 , an access controlled door lock 80 , a door position sensor 40 , and a Request Exit switch 30 .
- the invention includes many alternatives of the elements of the access control module, which will be disclosed in the detailed description to follow.
- the merged power-communication cable 50 uses a single cable to provide both a communications protocol and to distribute power.
- the merged power-communications cable will support both delivering electrical power and providing at least one communications channel.
- the merged power-communication cable 50 includes at least two wires.
- One example of a merged power-communication cable 50 is the various versions of the Power over Ethernet (PoE) cable standard.
- the Power over Ethernet cable may preferably support a standard CAT-5 or CAT-6 cable.
- the use of the merged power-communication cable 50 to exclusively supply all electrical power and communications to the access control module 2000 in the door 10 has numerous advantages.
- the invention includes a door conduit 300 as shown in FIGS. 2C to 2E .
- Each door conduit 300 includes exactly the merged power-communication cable 50 conveyed in a protected passage 302 between a first conduit opening 304 and a second conduit opening 306 , which are mounted on the door frame 8 and door hinge side 12 .
- the merged power-communication cable 50 may further preferably include at least one merged power-communication coupling 58 as shown in FIG. 2A . As shown in FIG. 2C , the merged power-communication cable 50 may preferably include two of the merged power-communication couplings 58 . The merged power-communication coupling 58 may further preferably embody a RJ-45 connector.
- the access control module 2000 may further preferably include a power-communications mating coupling 56 for coupling to the merged power-communication coupling 58 as shown in FIG. 2A .
- the invention includes a preferred module for controlling access through the door 10 , which electrically couples to security and power networks through the merged power-communication cable 50 .
- This module is an example of the invention's access control module 2000 as shown in FIGS. 1B, 2A, 3A, 4A to 5A, 7B, and 9 .
- the access control module 2000 preferably includes an access control identification mechanism 20 , an access controlled door lock 80 , a door position sensor 40 , and a Request Exit switch 30 .
- the invention includes the door 10 made using the access control module 2000 as shown in FIGS. 1B, 3A, 4A, 4B, and 16B .
- the door conduit 300 may be assembled on the door hinge side 12 of the door 10 as shown in FIGS. 2B to 2D, and 3D .
- the invention includes the door 10 mounted in the door frame 8 .
- the position magnet 46 is included in the strike plate 60 supporting alignment of the door position sensor 40 by aligning the first latch 66 to the first latch entry 62 included in the strike plate 60 , as shown in FIGS. 2A and 2B . It may be further preferred that a dead bolt latch 68 also align to a second latch entry 64 in the strike plate 60 .
- the position magnet 46 is further preferred to be located on the face of the strike plate 60 facing the door frame 8 .
- the Request Exit Switch 30 is available for use on the secure door side 16 as further shown in FIG. 3B .
- the access control identification mechanism 20 is available on the unsecured door side 18 of the door 10 as shown in FIG. 3C .
- a typical application such as in a hotel, has the secure door side 16 of the door 10 facing the interior of a room, apartment, and/or suite.
- the request exit switch 30 is built into an integrated door lock, which also includes the access controlled door lock 80 .
- the access controlled door lock 80 and the Request eXit switch 30 may be integrated into a single lock set. This is often the preferred mode of the invention.
- a typical view of the unsecured door side 18 includes at least one access control identification mechanism 20 and the access controlled door lock 80 .
- the door position sensor 40 of FIGS. 3A and 3E may include an open circuit presenting two contacts, which couple with a conductive strip 46 mounted in the door frame 8 .
- the door position sensor 40 may interact with a position magnet 46 mounted in the door frame 8 .
- the door position sensor 40 may preferably be located at the top of the door 10 , adjacent to the door frame 8 , and not necessarily visible.
- the access control identification mechanism 20 of FIGS. 2A, 3A, 4A to 5A, and 9 may preferably include an access control scanning device 378 as shown in FIGS. 8C and 9 , which is further preferred to include an access control card reader 310 .
- the access control identification mechanism 20 may include an access control biometric sensor 312 .
- the access control biometric sensor 312 may include at least one of the following.
- a facial biometric sensor 314 may be a fragrance biometric sensor 316 .
- a fingerprint biometric sensor 318 may be a fingerprint biometric sensor 318 .
- a skin residue DNA biometric sensor 320 may a skin characteristic biometric sensor 322 .
- the access control scanning device 378 of FIG. 7B is an access control card reader 310 . In certain preferred embodiments, there may be more than one access control scanning device 378 . To simplify the discussion and Figures, this discussion will focus on just one such device. This is not meant to limit the scope of the claims.
- an access control biometric sensor 312 may be used. This may lead to creating a biometric access sensor identification 340 . Creating the biometric access sensor identification 340 may further involve the use of a biometric sensor template 350 .
- the invention includes a method of controlling access to the door 10 using the merged power-communication cable 50 .
- Electrical power 52 is provided from the merged power-communication cable through the means for managing 100 electrical power to a processing module 1000 , the access control identification mechanism 20 and the access controlled door lock 80 .
- the processing module 1000 interacts 200 with the access control identification mechanism 20 and with the merged power-communication cable 50 to control the access controlled door lock 80 .
- the processing module 1000 and the access controlled door lock 80 are located in the door 10 .
- the access control identification mechanism 20 is also located in the door 10 .
- the access control module 2000 preferably implements this method.
- the access control module 2000 preferably includes the following: The means for managing 100 electrical power from the merged power-communication cable 50 to the processing module 1000 , the access control identification mechanism 20 and the access controlled door lock 80 , as shown in FIGS. 3A, 5A, 5B, 6B and 9 .
- the means for interacting 200 between the processing module 1000 , the merged power-communication cable 50 and the access control identification mechanism 20 is used to control 84 the access controlled door lock 80 as shown in FIGS. 3A , and 4 A to 5 B.
- the access control module 2000 includes the following. A means for managing 100 electrical power 52 from the merged power-communication cable 50 to the processing module 1000 , the access control identification mechanism 20 and the access controlled door lock 80 . And includes a means for interacting 200 with the processing module 1000 , the merged power-communication cable 50 and the access control identification mechanism 20 to control 84 the access controlled door lock 80 .
- the access control module 2000 preferably includes a processing module 1000 , an access control identification mechanism 20 , an access controlled door lock 80 , a request exit switch 30 , and a door position sensor 40 .
- the processing module 1000 is interacting 200 with at least one communication channel 54 of the merged power-communication cable 50 .
- the invention includes operating the processing module 1000 in the door 10 to control access through the door 10 as shown in FIGS. 3A, 4A to 6B, and 9 .
- the processing module 1000 receives at least part of the electrical power 52 from the merged power-communication cable 50 .
- the processing module 1000 interacts with the access control identification mechanism 20 and with the merged power-communication cable 50 to control the access controlled door lock 80 .
- the processing module 1000 of FIG. 3A , and FIG. 4A to FIG. 5B including a processing computer 1100 , which is first accessibly coupled 1102 to the processing memory 1200 , as shown in FIGS. 6A, 6B and 9 .
- the processing memory 1200 includes the processing program system 1300 , the access identification 1220 , and access directive 1210 .
- the processing memory 1200 may further preferably include the access identification message 1230 and/or the access directive message 1240 .
- the processing computer 1100 uses the first communications coupling 202 to communicate via the communication interface 210 with the communication channel 54 .
- the communication interface 210 may preferably embody an implementation of the means for interacting 200 .
- the processing computer 1100 uses the peripheral interface coupling 802 to communicate and control via the peripheral interface 800 .
- the processing computer 1100 communicates and controls the access control identification mechanism 20 via the access identifier coupling 24 and via the peripheral interface 800 .
- the processing computer 1100 communicates and controls the access controlled door lock 80 via the access control coupling 84 and via the peripheral interface 800 .
- the processing computer 1100 communicates and controls the Request EXit Switch 30 to provide the sensed request_to_exit state 32 via the peripheral interface 800 .
- the processing computer 1100 communicates and controls the door position sensor 40 to provide the sensed door position 42 and via the peripheral interface 800 .
- Some of the following figures show flowcharts of at least one method of the invention, possessing arrows with reference numbers. These arrows will signify of flow of control and sometimes data supporting implementations including at least one program operation or program thread executing upon a computer, inferential links in an inferential engine, state transitions in a finite state machine, and dominant learned responses within a neural network.
- the operation of starting a flowchart refers to at least one of the following. Entering a subroutine in a macro instruction sequence in a computer. Entering into a deeper node of an inferential graph. Directing a state transition in a finite state machine, possibly while pushing a return state. And triggering a collection of neurons in a neural network.
- the starting of a flowchart is denoted by an oval with the word “Start” in its interior.
- the operation of termination in a flowchart refers to at least one or more of the following.
- the completion of those operations which may result in a subroutine return, traversal of a higher node in an inferential graph, popping of a previously stored state in a finite state machine, return to dormancy of the firing neurons of the neural network.
- the operation of termination is denoted by an oval with the word “Exit” in its interior.
- a computer as used herein will include, but is not limited to an instruction processor.
- the instruction processor includes at least one instruction processing element and at least one data processing element. Each data processing element is controlled by at least one of the instruction processing elements.
- the invention also includes the processing module 1000 implemented as means for its operations. These means may include at least one of any of the following: a computer, a finite state machine, a neural network and an inferential engine.
- the operations of the processing module 1000 may be implemented as program steps in a processing program system 1300 controlling at least one computer, the processing computer 1100 .
- the program steps residing in a processing memory 1200 may be accessibly coupled with the processing computer 1100 .
- any memory may include at least one volatile memory address and/or at least one non-volatile memory address.
- the content of a volatile memory address may be altered by a loss of electrical power. Whereas the content of a non-volatile memory address is unaffected by the loss of electrical power.
- the means for managing 100 the electrical power 52 may include a power interface 100 .
- FIG. 10A shows a detail flowchart of the processing program system 1300 of FIGS. 6A, 6B, and 9 for the inventions method.
- Operation 1312 supports managing the power interface 100 to distribute the electrical power 52 .
- Operation 1322 supports interacting with the access control identification mechanism 20 and the merged power-communication cable 50 to control 84 the access controlled door lock 80 .
- the means for managing 100 may provide a third electrical power 102 to the means for interacting 200 .
- the means for interacting 200 may include, and/or be implemented as, a communication interface 210 interacting with the merged power-communication cable 50 as in FIGS. 5A and 5B .
- the power interface 100 may preferably provide a second electrical power 82 to the access controlled door lock 80 .
- the processing module 1000 may operate as in FIG. 4A .
- the power interface 100 receives at least part of the electrical power 52 from the merged power-communication cable 50 and provides a third electrical power 102 to a communication interface 210 which interacts 200 with the merged power-communication cable 50 .
- the power interface 100 may provide a second electrical power 82 to the access controlled door lock 80 .
- the invention also includes the processing module 1000 implemented as means for its operations. These means may include at least one of the following: a computer, a finite state machine, a neural network and an inferential engine.
- a computer includes at least one instruction processor and at least one data processor, where each of the data processors is controlled by at least one of the instruction processors.
- the operations of the processing module 1000 may be implemented as program steps in a processing program system 1300 controlling at least one computer, the processing computer 1100 , as shown in FIGS. 6A, 6B, and 9 .
- the program steps reside in a processing memory 1200 accessibly coupled with the processing computer 1100 .
- the processing memory 1200 may include volatile and/or non-volatile memory addresses.
- FIG. 9 shows a preferred implementation of the access control module 2000 of FIG. 3A , and FIG. 4A to FIG. 5A , including the processing computer 1100 , the power interface 100 , the channel interface 220 , and the peripheral interface 800 , which have been previously discussed.
- the method of operating the access control module 2000 is shown as the processing computer 1100 directed by the communications program system 3000 , the access identification program system 3300 , and the processing program system 1300 .
- these potentially separate operational aspects will be primarily discussed in terms of the processing program system 1300 , with specific reference made to operations which might frequently be performed by the access identification computer 370 and/or the communication interface computer 230 .
- operations which might frequently be performed by the access identification computer 370 and/or the communication interface computer 230 .
- One skilled in the art will recognize that some or all of these operations may just as readily be performed by the access identification computer 370 and/or the communication interface computer 230 .
- the processing module 1000 interactions may include the following. Receiving an access identification 1220 from the access control identification mechanism 20 . Incorporating the access identification 1220 to create an access directive 1210 . The processing module 1000 controlling the access controlled door lock 80 based upon the access directive 1210 .
- FIG. 10B shows a detail flowchart of operation 1322 of FIG. 10A interacting with the access control identification mechanism 20 and the merged power-communication cable 50 to control 84 the access controlled door lock 80 .
- Operation 1352 supports receiving the access identification 1220 from the access control identification mechanism 20 .
- Operation 1362 supports incorporating the access identification 1220 to create an access directive 1210 .
- Operation 1372 supports controlling the access controlled door lock 80 based upon the access directive 1210 .
- the processing module 1000 may further interact as follows.
- the processing module 1000 may receive a sensed door position 42 from a door position sensor 40 .
- the processing module 1000 may receive a sensed request_to_exit state 32 from a Request Exit switch 30 , also sometimes known as a REX switch. Controlling the access controlled door lock 80 may be further based upon the sensed door position 42 , the sensed request_to_exit state 32 and the access directive 1210 .
- FIG. 15B shows a detail flowchart of operation 1322 of FIG. 10A .
- Operation 1772 supports receiving a sensed door position 42 from the door position sensor 40 of FIGS. 3A, 3B, 3E, 5A, and 9 .
- Operation 1782 supports receiving a sensed request_to_exit state 32 from a Request EXit switch 30 .
- FIG. 15C shows a detail flowchart of operation 1372 of FIG. 10B further controlling the access controlled door lock 80 .
- Operation 1792 supports controlling the access controlled door lock 80 based upon the sensed door position 42 , the sensed request_to_exit state 32 , and the access directive 1210 .
- FIG. 16A shows a detail flowchart of operation 1792 of FIG. 15C further controlling the access controlled door lock 80 .
- Operation 1812 supports determining a security state 270 of FIG. 8D for the door 10 based upon the sensed door position 42 , the sensed request_to_exit state 32 , and the access directive 1210 .
- Operation 1822 supports performing the access directive 1210 upon the access controlled door lock 80 .
- Operation 1832 supports sending the security state 270 .
- FIG. 4A shows the access control module 2000 of FIG. 3A where the means for interacting 200 includes a first communications coupling 202 between the processing module 1000 and the communication channel 54 .
- FIG. 4B shows the access control module 2000 of FIG. 4A where the means for interacting 200 further includes the access identifier coupling 24 to the communication channel 54 , and the access control coupling 84 to the communication channel 54 .
- the access control module 2000 may preferably support a TCP/IP stack 246 in any of several alternative embodiments.
- the communication interface 210 may support the TCP/IP stack 246 stack for interactions with the merged power-communication cable 50 as shown in FIG. 7A .
- the access control identification mechanism 20 may support the TCP/IP stack 246 as shown in FIG. 7B .
- the processing module 1000 may support the TCP/IP stack 246 as shown in FIG. 9 .
- the communication interface 210 may preferably include a communication interface computer 230 as shown in FIG. 7A .
- the communication interface computer 230 may accessibly couple with a communication interface memory 240 , interactively couple with the merged power-communication cable 50 and controllably couple with the access controlled door lock 80 .
- the access controlled door lock 80 may include a piezoelectric controlled door lock 700 as shown in FIG. 17A .
- the access controlled door lock 80 may include a standalone door lock 710 , as shown in FIG. 17E , and powered by an internal power storage device 714 , which typically drives a Direct Current (DC) motor as shown in FIG. 17B .
- the access controlled door lock 80 may include an access controlled cylinder door lock 720 as shown in FIGS. 2A and 17C .
- the access controlled door lock 80 may include an access controlled mortise door lock 730 as shown in FIG. 17D .
- the access controlled door lock 80 may include a solenoid controller door lock 722 , as shown in FIG. 17F .
- the invention also includes a door conduit 300 providing the merged power-communication cable 50 to at least the processing module 1000 in the door 10 .
- the door conduit 300 includes a protected passage capable of passing the merged power-communication cable 50 from a door frame 8 conduit-opening to a door 10 conduit-opening inside the door 10 .
- the protected passage may also act as a mechanical hinge for the door.
- FIG. 3D shows the door latch side 14 of the door 10 of FIGS. 1B, 2C, 2D, and 3A , where the door conduit 300 of FIG. 2C to 3A , couples with the door frame 8 .
- the components of the access control module 2000 may be organized in several ways to suit the needs of various environments.
- the processing module 1000 may includes the means for managing 100 and the means for interacting 200 as in FIGS. 5A and 5B .
- the means for managing 100 , and/or the power interface 100 may include at least one computer, at least one finite state machine, an inferential engine and/or a neural network.
- FIG. 5B shows a refinement of the processing module 1000 FIGS. 3A, and 4A to 5A .
- the communication interface 210 which is an implementation of the means for interacting 200 , is controllably coupled 104 to the power interface 100 , which is an implementation of the means for managing 100 .
- the power interface 100 provides at least part of the electrical power 52 as a third electrical power 102 received by the means for interacting 200 .
- FIG. 7A shows an embodiment of the communication interface 210 of FIGS. 6A and 6B including a communication interface computer 230 .
- the communication interface computer 230 is second accessibly coupled 242 to the communication interface memory 240 .
- the communications program system 3000 includes program steps residing in the communication interface memory 240 to direct the operations of the communication interface 210 .
- the communication interface memory 240 may also include, both through use of the communications program system 3000 and other resources, the TCP/IP stack 246 .
- the communication interface 210 may include an encryption module 250 .
- the communication interface 210 may store the access identification message 1230 and/or the access directive message 1240 .
- the channel interface 220 interacts with the communication channel 54 to support communication via the merged power-communication cable 50 .
- the communication interface computer 230 is fifth coupled 222 with the channel interface 220 .
- FIG. 7B shows an embodiment of the access control identification mechanism 20 , which includes an access identification computer 370 , an access control scanning device 378 , an identification interface 374 , and an access identification memory 360 .
- the access identification computer 370 is third accessibly coupled 362 to the access identification memory 360 .
- the access identification program system 3300 includes at least one program step residing in the access identification memory 360 , which implements, at least in part, the access identification method(s) used by the invention's embodiments.
- the access identifier coupling 24 interacts with the identification interface 374 .
- the identification interface 374 access-ident-couples 372 with the access identification computer 370 .
- the access identification computer 370 access-ID-couples 376 with the access control scanning device 378 .
- the access identification computer 370 directed by program steps of the access identification program system 3300 , communicates via the access-ID-couples 376 with the access control scanning device 378 to create the access identification 1220 .
- FIGS. 7A, 8A, and 9 show the communication interface 210 including a channel interface 220 , which provides the first communications coupling 202 .
- the channel interface 220 couples with at least one communication channel 54 .
- the operation of the access control module 2000 may include using encryption to limit the potential compromising the data content through reading or writing on the security network 5002 shown in FIG. 16B .
- Interactions of the processing module 1000 with the merged power-communication cable 50 may use encryption.
- FIG. 8A the channel interface 220 is cryptically coupled 252 with the encryption module 250 .
- FIG. 8B shows the encryption module 250 including at least one of a send-encryption mechanism 254 and/or a receive-encryption mechanism 256 .
- the processing module 1000 interacts 200 with the access control identification mechanism 20 , and with the merged power-communication cable 50 , to control 84 the access controlled door lock 80 .
- At least the processing module 1000 and the access controlled door lock 80 are located in the door 10 .
- the access control identification mechanism 20 is also located in the door 10 .
- FIG. 11A shows a detail flowchart of operation 1362 of FIG. 10B further incorporating the access identification 1220 to create an access directive 1210 .
- Operation 1502 supports sending the access identification 1220 via the merged power-communication cable 50 to create a sent-identification.
- Operation 1512 supports receiving the access directive 1210 from the merged power-communication cable 50 based upon the sent-identification.
- FIG. 11B shows a detail flowchart of operation 1512 of FIG. 11A , and alternatively, part of the communications program system 3000 of FIGS. 7A and 9 , for sending the access identification 1220 via the merged power-communication cable 50 to create a sent-identification.
- Operation 1532 supports processing the access identification 1220 to create an access identification message 1230 .
- Operation 1542 supports sending the access identification message 1230 to create the sent-identification.
- FIG. 12A shows a detail flowchart of operation 1532 of FIG. 11B , further processing the access identification 1220 .
- Operation 1562 supports processing the access identification 1220 based upon the send-encryption mechanism 254 of FIG. 8B to create the access identification message 1230 .
- FIG. 12B shows a detail flowchart of operation 1512 of FIG. 11A , and part of the communications program system 3000 of FIGS. 7A and 9 , for receiving the access directive 1210 .
- Operation 1582 supports receiving an access directive message 1240 from the merged power-communication cable 50 based upon the sent-identification.
- Operation 1592 supports processing the access directive message 1240 to create the access directive 1210 .
- FIG. 12C shows a detail flowchart of operation 1592 of FIG. 12B further processing the access directive message 1240 to create the access directive 1210 .
- Operation 1592 supports processing the access directive message 1240 based upon the receive-encryption mechanism 256 of FIG. 8C to create the access directive 1210 .
- FIG. 13 shows a detail flowchart of operation 1352 of FIG. 10B further receiving the access identification 1220 .
- Operation 1612 supports receiving the access identification 1220 from the access control card reader 310 of FIG. 8C .
- Operation 1622 supports receiving the access identification 1220 from the access control biometric sensor 312 .
- Operation 1632 supports receiving the access identification 1220 from a facial biometric sensor 314 .
- Operation 1642 supports receiving the access identification 1220 from a fragrance biometric sensor 316 .
- Operation 1652 supports receiving the access identification 1220 from a fingerprint biometric sensor 318 .
- Operation 1662 supports receiving the access identification 1220 from a skin residue DNA biometric sensor 320 or a skin characteristic biometric sensor 322 .
- FIG. 14A shows a detail flowchart of operation 1352 of FIG. 10B , alternatively part of the access identification program system 3300 of FIGS. 7B and 9 .
- Operation 1682 supports receiving a biometric access sensor identification 340 from the access control biometric sensor 312 .
- Operation 1692 supports processing the biometric access sensor identification 340 based upon the biometric sensor template 350 to create the access identification 1220 .
- FIG. 14B shows a detail flowchart of the processing program system 1300 of FIGS. 6A, 6B and 9 .
- Operation 1712 supports receiving the biometric sensor template 350 from the merged power-communication cable 50 .
- Operation 1722 supports sending the biometric sensor template to the access control identification mechanism.
- FIG. 15A shows a detail flowchart of operation 1312 of FIG. 10A .
- Operation 1742 supports providing a first electrical power 22 to the access control identification mechanism 20 .
- Operation 1752 supports providing a second electrical power 82 to the access controlled door lock 80 .
- FIG. 16B shows the door 10 made with a first instance 2000 - 1 of the access control module 2000 coupled by a first cable instance 50 - 1 of the merged power-communication cable 50 .
- the first cable instance 50 - 1 is routed through the door conduit 300 to the security network 5002 .
- the first cable instance 50 - 1 may be seen in network diagrams to be a direct part of the security network 5002 .
- the second instance 2000 - 2 of the access control module 2000 is shown to couple by a second cable instance 50 - 2 of the merged power-communication cable 50 to a Power over Ethernet switch 3920 .
- the Power over Ethernet switch 3920 may communicatively couple 3902 to a controller 3900 , all of which may be included in a local security closet.
- the controller 3900 may be shown in network diagrams communicating over the security network 5002 with a server 5000 .
- the server 5000 may have dedicated security activities, or else provide a transfer point to a security management station which may be located at a distance from the door 10 and/or the server 5000 .
Landscapes
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Small-Scale Networks (AREA)
- Near-Field Transmission Systems (AREA)
Abstract
A method controlling access to a door using a merged power-communication cable. An access controlled door lock in door is operated using merged power-communication cable. Access control identification mechanism in door may operate using merged power-communication cable. The access controlled door lock may include a piezoelectric controlled door lock or a standalone door lock or a solenoid controlled door lock. A processing module may operate in door to control access with power interface receiving at least part of the electrical power from the merged power-communication cable. The invention includes a strike plate containing a magnetic sensor aligns by a latch hole to a latch included an access control door lock. The invention also includes using a door conduit to provide the merged power-communication cable to at least the processing module in the door.
Description
- This application is a continuation application of U.S. patent application Ser. No. 14/601,113, filed Jan. 20, 2015, which is a continuation application of U.S. patent application Ser. No. 13/609,106, filed Sep. 10, 2012, now U.S. Pat. No. 8,937,526, which is a continuation application of U.S. patent application Ser. No. 11/883,689, filed Aug. 3, 2007, now U.S. Pat. No. 8,264,323, which claims the benefit of PCT Application Number PCT/US2006/004263, filed Feb. 6, 2006, which claimed the benefit of the priority date of provisional patent application Ser. No. 60/650,247, filed on Feb. 4, 2005, all of which are hereby incorporated by reference in their entirety.
- The invention relates to an access controlled door lock in a door, as well as a conduit providing the merged power-communications cable for interactions and power delivery for components within the door.
- The invention relates to improving security and access control for doors using a merged power-communication cable, which allows the entire access control identification mechanism to reside within the door.
- Today, an access control system for a door requires at least an access control identification mechanism, an access controlled door lock, a way to generate a Request-to-Exit (REX) signal, and a door position sensor. These elements are used to form the prior art access control system involving a power network and a data-communications network. An equipment closet is usually physically located near the door being controlled. The equipment closet contains a door lock power supply and a data-communications node. The power network couples to the door lock power supply. The data-communications network couples to the data-communications node. The data-communications node communicates with a central security node, often through a communications network.
- There are several problems with the access control door systems of the prior art. Installing an access controlled door lock system involves a lot of wiring, entailing high installation expenses. The power network and the data-communications networks require many different cables wired to each door being controlled. Once the wiring has been installed, each interface from the equipment closet to the door must be tested. Such testing costs personnel time and may cause delays in deploying an access control system in multiple door environments, such as industrial, commercial and government buildings. Additionally, maintenance and repair is complicated by the wiring complexity. These complications cost the user money.
- Some common terms used to describe communications follow, based upon on the web site glossary of technical terms from the web site http://www.its.bldrdoc.gov/fs-1037/dir-001/_0063.htm, accessed in 2004.
- The Open Systems Interconnection-Reference Model (OSI-RM) refers to an abstract description of the digital communications between application processes running in distinct systems. The model employs a hierarchical structure of seven layers. Each layer performs value-added service at the request of the adjacent higher layer and, in turn, requests more basic services from the adjacent lower layer:
- The Physical Layer is Layer 1, the lowest of seven hierarchical layers of the OSI-RM. The Physical layer performs services requested by the Data Link Layer. There are three major functions and services performed by the physical layer. First, establishment and termination of a connection to a communications medium. Second, participation in the process whereby the communication resources are effectively shared among multiple users, e.g., contention resolution and flow control. And third, conversion between the representation of digital data in user equipment and the corresponding signals transmitted over a communications channel.
- The Data Link Layer is Layer 2 of the OSI-RM. This layer responds to service requests from the Network Layer and issues service requests to the Physical Layer. The Data Link Layer provides the functional and procedural means to transfer data between network entities and to detect and possibly correct errors that may occur in the Physical Layer. Note: Examples of data link protocols are HDLC and ADCCP for point-to-point or packet-switched networks and LLC for local area networks.
- The Network Layer is Layer 3 of the OSI-RM. This layer responds to service requests from the Transport Layer and issues service requests to the Data Link Layer. The Network Layer provides the functional and procedural means of transferring variable length data sequences from a source to a destination via one or more networks while maintaining the quality of service requested by the Transport Layer. The Network Layer performs network routing, flow control, segmentation/desegmentation, and error control functions.
- The Transport Layer is Layer 4 of the OSI-RM. This layer responds to service requests from the Session Layer and issues service requests to the Network Layer. The purpose of the Transport Layer is to provide transparent transfer of data between end users, thus relieving the upper layers from any concern with providing reliable and cost-effective data transfer.
- The Session Layer is Layer 5 of the OSI-RM. This layer responds to service requests from the Presentation Layer and issues service requests to the Transport Layer. The Session Layer provides the mechanism for managing the dialogue between end-user application processes. It provides for either duplex or half-duplex operation and establishes checkpointing, adjournment, termination, and restart procedures.
- The Presentation Layer is Layer 6 of the OSI-RM. This layer responds to service requests from the Application Layer and issues service requests to the Session Layer. The Presentation Layer relieves the Application Layer of concern regarding syntactical differences in data representation within the end-user systems. Note: An example of a presentation service would be the conversion of an EBCDIC-coded text file to an ASCII-coded file.
- The Application Layer is Layer 7, the highest layer of the OSI-RM. This layer interfaces directly to and performs common application services for the application processes; it also issues requests to the Presentation Layer. The common application services provide semantic conversion between associated application processes. Note: Examples of common application services of general interest include the virtual file, virtual terminal, and job transfer and manipulation protocols.
- Communications refers herein to at least one of the following First, information transfer, among users or processes, according to agreed conventions. Second, the branch of technology concerned with the representation, transfer, interpretation, and processing of data among persons, places, and machines. The meaning assigned to the data typically must be preserved during these operations.
- Information transfer refers herein to the process of moving messages containing user information from a source to a sink.
- Data refers here to representations of facts, concepts, or instructions in a formalized manner suitable for communication, interpretation, or processing by humans or by automatic means. Any representations such as characters or analog quantities to which meaning is or might be assigned.
- A Layer in a telecommunications network and/or an open systems architecture, refers herein to a group of related functions that are performed in a given level in a hierarchy of groups of related functions. In specifying the functions for a given layer, the assumption is made that the specified functions for the layers below are performed, except for the lowest layer.
- Open systems architecture refers herein to a layered hierarchical structure, configuration, or model of a communications or distributed data processing system and/or a nonproprietary systems architecture.
- The layered hierarchical structure, configuration, or model of a communications or distributed data processing system provides the following: the layered hierarchical structure enables system description, design, development, installation, operation, improvement, and maintenance to be performed at a given layer or layers in the hierarchical structure. The layered hierarchical structure allows each layer to provide a set of accessible functions that can be controlled and used by the functions in the layer above it. The layered hierarchical structure enables each layer to be implemented without affecting the implementation of other layers. The layered hierarchical structure allows the alteration of system performance by the modification of one or more layers without altering the existing equipment, procedures, and protocols at the remaining layers.
- Examples of independent alterations by modifying one or more layers include the following. Converting from wire to optical fibers at a physical layer without affecting the data-link layer or the network layer except to provide more traffic capacity. And altering the operational protocols at the network level without altering the physical layer.
- Connection refers here to at least one of the following: A provision for a signal to propagate from one point to another, such as from one circuit, line, subassembly, or component to another. An association established between functional units for conveying information.
- Communications medium refers herein to at least one of the following: In telecommunications, the transmission path along which a signal propagates, such as a wire pair, coaxial cable, waveguide, optical fiber, or radio path. The material on which data are or may be recorded, such as plain paper, paper tapes, punched cards, magnetic tapes, magnetic disks, or optical disks.
- A channel refers herein to at least one of the following: A connection between initiating and terminating nodes of a circuit. A single path provided by a transmission medium via either physical separation, such as by multipair cable or electrical separation, such as by frequency- or time-division multiplexing. A path for conveying electrical or electromagnetic signals, usually distinguished from other parallel paths. Used in conjunction with a predetermined letter, number, or codeword to reference a specific radio frequency. The portion of a storage medium, such as a track or a band, that is accessible to a given reading or writing station or head. In a communications system, the part that connects a data source to a data sink.
- A transfer refers herein to sending information from one location and to receive it at another.
- A packet refers herein to a sequence of binary digits, which may including data and/or control signals, that is transmitted and/or switched as a composite whole. The data, control signals, and possibly error control information, are typically arranged in a specific format.
- A format refers herein to the arrangement of bits or characters within a group, such as a word, message, or language.
- A group refers herein to the following within the context of frequency division multiplexing and/or in the context of a set of characters forming a unit for transmission of cryptographic treatment. A group in frequency-division multiplexing refers herein to a specific number of associated voice channels and/or data channels, either within a supergroup or as an independent entity.
- Routing refers herein to the process of determining and prescribing the path or method to be used for establishing telephone connections or forwarding messages.
- TCP/IP refers herein to Transmission Control Protocol/Internet Protocol, which is a set of communications protocols required to communicate over a channel with the Internet. A TCP/IP Stack refers herein to the method of interacting with the Internet, which is often implemented as software running on a computer. The Internet Protocol refers herein to a packet switching protocol used as the network layer in the TCP/IP stack.
- To summarize. Methods and apparatus are needed which simplify installation of access control systems for doors. A simple, modular approach is needed for installing and operating an access control system for a door. Access control systems are needed which can be installed in a door with a minimum of wiring. Access control systems are needed which interact across standard communications networks with centralized security systems.
- The invention includes a preferred mechanism for controlling access through a door, which electrically couples to security and power networks through a merged power-communication cable. This is the invention's access control module. When installed, the access control module preferably couples with a position magnet located in a strike plate mounted in the door frame. The access control module preferably includes an access control identification mechanism, an access controlled door lock, a door position sensor, and a Request Exit switch. Today the access control identification mechanism is preferably an access control scanning device, which is further preferably an access control card reader. The invention includes many alternatives on the elements of the access control module, which will be disclosed in the detailed description to follow.
- The invention has the advantages of providing network interacting door locks without any additional power wiring. It supports security software models such as door objects as discussed on the www.sbd.us web site. It allows door security control to easily employ one or more communication networks to update access to each door equipped with the invention.
- The invention includes a method of controlling access to the door using a merged power-communication cable. Electrical power is provided from the merged power-communication cable through a means for managing the electrical power to a processing module, an access control identification mechanism and an access controlled door lock. The processing module interacts with the access control identification mechanism and with the merged power-communication cable to control the access controlled door lock. The processing module and the access controlled door lock are located in the door. Preferably, the access control identification mechanism is also located in the door.
- The invention also includes a method of using the access control module to make an access controlled door. By way of example, an installation estimate based upon this method shows an access door total of less than half the estimated cost of the prior art approach.
-
FIG. 1A shows a simplified schematic of a typical prior art access controlled door; -
FIG. 1B shows a schematic of the inventions access control module coupling a merged power-communication cable through a door conduit and aligned with a position magnet mounted in a door frame on the door latch side; -
FIG. 2A shows a preferred embodiment of the access control module, the merged power-communication cable, and the strike plate ofFIG. 1B ; -
FIG. 2B shows the door frame side of the strike plate ofFIG. 2A ; -
FIGS. 2C to 2E show alternative embodiments of the hinge conduit ofFIGS. 1B, 2A, 3A, 3D, 4A, 4B, and 16B , used to provide the merged power-communication cable; -
FIG. 3A shows the door coupled with the door conduit providing a merged power-communication cable into the door to certain embodiments of the access control module ofFIGS. 1B and 2A ; -
FIG. 3B shows a typical view of the secured side of the door ofFIGS. 1B and 3A , including the access controlled door lock, and the REquest eXit switch; -
FIG. 3C shows a typical view of the unsecured side of the door ofFIGS. 1B, 3A, and 3B , including at least one access control identification mechanism and the access controlled door lock; -
FIG. 3D shows the hinge side of the door at which the door conduit ofFIGS. 1B and 3A couples with the door frame; -
FIG. 3E shows a placement of the door position sensor on the door latch side of the door ofFIGS. 1B and 3A ; -
FIG. 4A shows the access control module ofFIGS. 1B and 3A , where the means for interacting includes a first communications coupling between the processing module and the communication channel; -
FIG. 4B shows the access control module ofFIG. 4A where the means for interacting further includes the access identifier coupling to the communication channel, and the access control coupling to the communication channel; -
FIG. 5A shows the access control module ofFIG. 3A where the processing module includes the means for managing and the means for interacting; -
FIG. 5B shows a refinement of the processing module ofFIGS. 3A, and 4A to 5A , where the communication interface, is an implementation of the means for interacting and is controllably coupled to the power interface, which is an implementation of the means for managing; -
FIGS. 6A and 6B show the processing module ofFIGS. 3A, and 4A to 5B , including a processing computer, which is first accessibly coupled to the processing memory; -
FIG. 7A shows an embodiment of the communication interface ofFIGS. 6A and 6B including a communication interface computer; -
FIG. 7B shows an embodiment of the access control identification mechanism including an access identification computer, an access control scanning device, an identification interface, and an access identification memory; -
FIG. 8A shows a communication interface including a channel interface cryptically coupled with the encryption module, and providing the first communications coupling; -
FIG. 8B shows the encryption module including at least one of a send-encryption mechanism and/or a receive-encryption mechanism; -
FIG. 8C shows that an access control scanning device may include at least one of the following: the access control card reader, the access control biometric sensor, which may in turn include any of the following: a facial biometric sensor, a fragrance biometric sensor, a fingerprint biometric sensor, a skin residue DNA biometric sensor, and a skin characteristic sensor; -
FIG. 8D shows a security state for the door, which may take any one of the values of a secure door, a forced open door, a held open door, and an unlocked door; -
FIG. 9 shows a preferred implementation of the access control module ofFIGS. 1B, 2A, 3A, and 4A to 5A , including the processing computer, the power interface, the channel interface, and the peripheral interface; -
FIG. 10A shows a detail flowchart of the processing program system ofFIGS. 2A, 6A, 6B, and 9 ; -
FIG. 10B shows a detail flowchart ofFIG. 10A further interacting with the access control identification mechanism and the merged power-communication cable to control the access controlled door lock; -
FIG. 11A shows a detail flowchart ofFIG. 10B further incorporating the access identification to create an access directive; -
FIG. 11B shows a detail flowchart ofFIG. 11A , and alternatively, part of the communications program system ofFIGS. 7A and 9 , for sending the access identification via the merged power-communication cable to create a sent-identification; -
FIG. 12A shows a detail flowchart ofFIG. 11B , further processing the access identification; -
FIG. 12B shows a detail flowchart ofFIG. 11A , and part of the communications program system ofFIGS. 7A and 9 , for receiving the access directive; -
FIG. 12C shows a detail flowchart ofFIG. 12B further processing the access directive message to create the access directive; -
FIG. 13 shows a detail flowchart ofFIG. 10B further receiving the access identification; -
FIG. 14A shows a detail flowchart ofFIG. 10B , alternatively part of the access identification program system ofFIGS. 7B and 9 , further receiving the access identification; -
FIG. 14B shows a detail flowchart of the processing program system ofFIGS. 6A, 6B and 9 ; -
FIG. 15A shows a detail flowchart ofFIG. 10A further managing the electrical power; -
FIG. 15B shows a detail flowchart ofFIG. 10A further interacting; -
FIG. 15C shows a detail flowchart ofFIG. 10B further controlling the access controlled door lock; -
FIG. 16A shows a flow chart in accord with example embodiments of the invention. -
FIG. 16B shows an example door configuration. -
FIG. 17A shows the access controlled door lock including a piezoelectric controlled door lock; -
FIG. 17B shows alternatively, the access controlled door lock including a standalone door lock powered by an internal power storage device; -
FIG. 17C shows the access controlled door lock including an access controlled cylinder lock; -
FIG. 17D shows the access controlled door lock including an access controlled mortise lock; -
FIG. 17E shows an alternative access controlled door lock including a standalone door lock which is not powered by an internal power storage device; and -
FIG. 17F shows alternatively, the access controlled door lock including a solenoid controlled door lock. - The invention includes a method of using an
access control module 2000 to make an access controlled door as shown inFIG. 1B . By way of example, an installation estimate based upon this method shows an access door total of less than half the estimated cost of the prior art approach shown inFIG. 1A . The inventor has recognized a need for improvement, and provided a solution to a significant installation cost problem. -
FIG. 1A shows a schematic of adoor 10 implementing the access control technology of the prior art. The access control technology of today requires separate installation of an accesscontrol card reader 310, aRequest Exit Switch 30, adoor position sensor 40 and an access controlleddoor lock 80. Each of these units requires separate wiring through at least onedoor conduit 300, which must provide power and communications wiring to each of these modules. Thedoor frame 8 must further include aposition magnet 46, which must work successfully with thedoor position sensor 40. During installation theposition magnet 46 must be aligned with thedoor position sensor 40. Often these units must be installed in the door and tested one at a time, which dramatically increases the installation time and cost. The cost of running the many separate wires dramatically adds to the installation time and cost. At the local security closet, each of the control and data connections, as well as the power connections, for each of the installed units, must also be built and tested. -
FIG. 1B shows a schematic of thedoor 10 using a preferredaccess control module 2000, which in turn uses a merged power-communication cable 50. The merged power-communication cable 50 is provided through thedoor conduit 300 to asecurity network 5002, as will be discussed inFIG. 16B . The access control module will be discussed further inFIGS. 2, 3A, 4A, 4B, 5A, 6A, 6B, and 9 . - The invention has the advantage of providing network interacting door locks without any addition power wiring. It supports security software models such as door objects. It allows door security control to easily employ one or more communication networks to update access to each door equipped with the invention.
- Tables 1 and 2 show installation estimates for the prior art door of
FIG. 1A and the invention's door ofFIG. 1B . -
Item Remark Cost Electric lock premium over mechanical lock Assume a mortise lock $400 Wired hinge premium over a mechanical hinge Assume a wired hinge $100 Door board for connections at the door Typical of many systems $500 Portion of access panel or Smart Remote Box Assume 16 card reader $750 Cost of Smart Remote Box with 16 portions for a fully capacity with 12 Volt and utilized panel including 40 hours installation at $75 24 Volt DC power per hour supplies Access control card reader Typical prior art switch plate $400 style Door contact In edge of door as in FIGS. 1B $10 or 1E Request-to-Exit Switch PIR Device $150 Install equipment at door 6 hours at $75 per hour $450 Wire cost from Smart Remote Box to door and wire at 150 feet at $0.50 per foot $75 door Wire installation cost to door 160 feet, 4 hours at $75 per $300 hour Junction box for door, back box for card reader, plus $500 any conduit stubs to ceiling Programming 1 hour at $75 per hour $75 Sub total $3710 Warranty, overhead and profit at 15% $557 Access door total $4,267
Table 1 illustrates an installation estimate for the access controlled door ofFIG. 1A using the prior art, indicating a total cost of over $4,200 (US). -
Item Remark Cost Access control module premium over a mechanical Assume a mortise lock $900 lock. This assumes a mortise lock at $400, so the access control module at $1,300 Wired hinge premium over a mechanical hinge Assume a wired hinge $100 Portion of access panel or Smart Remote Box with 1 Assume 16 access control $100 Rack Unit in an IDF closet with 16 portions for a fully card reader capacity with utilized panel including 2 hours installation at $75 panel cost at $1,600 per hour Off-the-shelf PoE IP switch 24 port at $1,000, but only $65 17 used Install equipment at door 1 hours at $75 per hour $75 Wire cost from Smart Remote Box to door and wire at 150 feet at $0.10 per foot $15 door Wire installation cost to door 160 feet, 2 hours at $75 per $150 hour Conduit stubs from hinge to ceiling $50 Programming 1 hour at $75 per hour $75 Sub total $1530 Warranty, overhead and profit at 15% $230 Access door total $1760 - Table 2 illustrates an installation estimate for the
door 10 ofFIG. 1B , using the invention'saccess control module 2000, indicating a total of $1,760 (US), less than half the estimated cost of the prior art approach. - The invention includes a preferred mechanism for controlling access through a
door 10. The mechanism, known herein as theaccess control module 2000, electrically couples to security and power networks through a merged power-communication cable 50 as shown inFIGS. 1B and 16B .FIGS. 2A, 3A, 4A to 5A, and 9 show examples of the invention'saccess control module 2000. When installed, theaccess control module 2000 preferably couples with aposition magnet 46 located in astrike plate 60 mounted in thedoor frame 8. Theaccess control module 2000 may preferably include an accesscontrol identification mechanism 20, an access controlleddoor lock 80, adoor position sensor 40, and aRequest Exit switch 30. The invention includes many alternatives of the elements of the access control module, which will be disclosed in the detailed description to follow. - The merged power-
communication cable 50, shown in the Figures, uses a single cable to provide both a communications protocol and to distribute power. The merged power-communications cable will support both delivering electrical power and providing at least one communications channel. The merged power-communication cable 50 includes at least two wires. One example of a merged power-communication cable 50 is the various versions of the Power over Ethernet (PoE) cable standard. The Power over Ethernet cable may preferably support a standard CAT-5 or CAT-6 cable. - The use of the merged power-
communication cable 50 to exclusively supply all electrical power and communications to theaccess control module 2000 in thedoor 10 has numerous advantages. The invention includes adoor conduit 300 as shown inFIGS. 2C to 2E . Eachdoor conduit 300 includes exactly the merged power-communication cable 50 conveyed in a protectedpassage 302 between a first conduit opening 304 and a second conduit opening 306, which are mounted on thedoor frame 8 and door hingeside 12. - The merged power-
communication cable 50 may further preferably include at least one merged power-communication coupling 58 as shown inFIG. 2A . As shown inFIG. 2C , the merged power-communication cable 50 may preferably include two of the merged power-communication couplings 58. The merged power-communication coupling 58 may further preferably embody a RJ-45 connector. Theaccess control module 2000 may further preferably include a power-communications mating coupling 56 for coupling to the merged power-communication coupling 58 as shown inFIG. 2A . - The invention includes a preferred module for controlling access through the
door 10, which electrically couples to security and power networks through the merged power-communication cable 50. This module is an example of the invention'saccess control module 2000 as shown inFIGS. 1B, 2A, 3A, 4A to 5A, 7B, and 9 . Theaccess control module 2000 preferably includes an accesscontrol identification mechanism 20, an access controlleddoor lock 80, adoor position sensor 40, and aRequest Exit switch 30. - The invention includes the
door 10 made using theaccess control module 2000 as shown inFIGS. 1B, 3A, 4A, 4B, and 16B . Thedoor conduit 300 may be assembled on thedoor hinge side 12 of thedoor 10 as shown inFIGS. 2B to 2D, and 3D . The invention includes thedoor 10 mounted in thedoor frame 8. Preferably, theposition magnet 46 is included in thestrike plate 60 supporting alignment of thedoor position sensor 40 by aligning thefirst latch 66 to thefirst latch entry 62 included in thestrike plate 60, as shown inFIGS. 2A and 2B . It may be further preferred that adead bolt latch 68 also align to asecond latch entry 64 in thestrike plate 60. Theposition magnet 46 is further preferred to be located on the face of thestrike plate 60 facing thedoor frame 8. - In
FIGS. 1A and 1B , theRequest Exit Switch 30 is available for use on thesecure door side 16 as further shown inFIG. 3B . The accesscontrol identification mechanism 20 is available on theunsecured door side 18 of thedoor 10 as shown inFIG. 3C . A typical application, such as in a hotel, has thesecure door side 16 of thedoor 10 facing the interior of a room, apartment, and/or suite. Often, therequest exit switch 30 is built into an integrated door lock, which also includes the access controlleddoor lock 80. In many situations, the access controlleddoor lock 80 and theRequest eXit switch 30 may be integrated into a single lock set. This is often the preferred mode of the invention. A typical view of theunsecured door side 18 includes at least one accesscontrol identification mechanism 20 and the access controlleddoor lock 80. - The
door position sensor 40 ofFIGS. 3A and 3E may include an open circuit presenting two contacts, which couple with aconductive strip 46 mounted in thedoor frame 8. Alternatively, thedoor position sensor 40 may interact with aposition magnet 46 mounted in thedoor frame 8. Thedoor position sensor 40 may preferably be located at the top of thedoor 10, adjacent to thedoor frame 8, and not necessarily visible. - The access
control identification mechanism 20 ofFIGS. 2A, 3A, 4A to 5A, and 9 , may preferably include an accesscontrol scanning device 378 as shown inFIGS. 8C and 9 , which is further preferred to include an accesscontrol card reader 310. The accesscontrol identification mechanism 20 may include an access controlbiometric sensor 312. The access controlbiometric sensor 312 may include at least one of the following. A facialbiometric sensor 314. A fragrancebiometric sensor 316. A fingerprintbiometric sensor 318. A skin residue DNAbiometric sensor 320. And a skin characteristicbiometric sensor 322. - In certain preferred embodiments, the access
control scanning device 378 ofFIG. 7B is an accesscontrol card reader 310. In certain preferred embodiments, there may be more than one accesscontrol scanning device 378. To simplify the discussion and Figures, this discussion will focus on just one such device. This is not meant to limit the scope of the claims. - In certain preferred embodiments, an access control
biometric sensor 312 may be used. This may lead to creating a biometricaccess sensor identification 340. Creating the biometricaccess sensor identification 340 may further involve the use of abiometric sensor template 350. - The invention includes a method of controlling access to the
door 10 using the merged power-communication cable 50.Electrical power 52 is provided from the merged power-communication cable through the means for managing 100 electrical power to aprocessing module 1000, the accesscontrol identification mechanism 20 and the access controlleddoor lock 80. Theprocessing module 1000 interacts 200 with the accesscontrol identification mechanism 20 and with the merged power-communication cable 50 to control the access controlleddoor lock 80. Theprocessing module 1000 and the access controlleddoor lock 80 are located in thedoor 10. Preferably, the accesscontrol identification mechanism 20 is also located in thedoor 10. - The
access control module 2000 preferably implements this method. Theaccess control module 2000 preferably includes the following: The means for managing 100 electrical power from the merged power-communication cable 50 to theprocessing module 1000, the accesscontrol identification mechanism 20 and the access controlleddoor lock 80, as shown inFIGS. 3A, 5A, 5B, 6B and 9 . The means for interacting 200 between theprocessing module 1000, the merged power-communication cable 50 and the accesscontrol identification mechanism 20 is used to control 84 the access controlleddoor lock 80 as shown inFIGS. 3A , and 4A to 5B. - In
FIG. 3A , theaccess control module 2000 includes the following. A means for managing 100electrical power 52 from the merged power-communication cable 50 to theprocessing module 1000, the accesscontrol identification mechanism 20 and the access controlleddoor lock 80. And includes a means for interacting 200 with theprocessing module 1000, the merged power-communication cable 50 and the accesscontrol identification mechanism 20 to control 84 the access controlleddoor lock 80. Theaccess control module 2000 preferably includes aprocessing module 1000, an accesscontrol identification mechanism 20, an access controlleddoor lock 80, arequest exit switch 30, and adoor position sensor 40. Preferably theprocessing module 1000 is interacting 200 with at least onecommunication channel 54 of the merged power-communication cable 50. - The invention includes operating the
processing module 1000 in thedoor 10 to control access through thedoor 10 as shown inFIGS. 3A, 4A to 6B, and 9 . Theprocessing module 1000 receives at least part of theelectrical power 52 from the merged power-communication cable 50. Theprocessing module 1000 interacts with the accesscontrol identification mechanism 20 and with the merged power-communication cable 50 to control the access controlleddoor lock 80. - There are numerous alternative interconnection, control and communication schemes which various embodiments of the
access control module 2000 may use. As a starting point, consider theprocessing module 1000 ofFIG. 3A , andFIG. 4A toFIG. 5B including aprocessing computer 1100, which is first accessibly coupled 1102 to theprocessing memory 1200, as shown inFIGS. 6A, 6B and 9 . Theprocessing memory 1200 includes theprocessing program system 1300, theaccess identification 1220, andaccess directive 1210. Theprocessing memory 1200 may further preferably include theaccess identification message 1230 and/or theaccess directive message 1240. - In
FIGS. 6A, 6B, and 9 , theprocessing computer 1100 uses the first communications coupling 202 to communicate via thecommunication interface 210 with thecommunication channel 54. Thecommunication interface 210 may preferably embody an implementation of the means for interacting 200. - In
FIGS. 6A, 6B, and 9 , theprocessing computer 1100 uses theperipheral interface coupling 802 to communicate and control via theperipheral interface 800. Theprocessing computer 1100 communicates and controls the accesscontrol identification mechanism 20 via theaccess identifier coupling 24 and via theperipheral interface 800. Theprocessing computer 1100 communicates and controls the access controlleddoor lock 80 via theaccess control coupling 84 and via theperipheral interface 800. Theprocessing computer 1100 communicates and controls theRequest EXit Switch 30 to provide the sensedrequest_to_exit state 32 via theperipheral interface 800. Theprocessing computer 1100 communicates and controls thedoor position sensor 40 to provide the senseddoor position 42 and via theperipheral interface 800. - Some of the following figures show flowcharts of at least one method of the invention, possessing arrows with reference numbers. These arrows will signify of flow of control and sometimes data supporting implementations including at least one program operation or program thread executing upon a computer, inferential links in an inferential engine, state transitions in a finite state machine, and dominant learned responses within a neural network.
- The operation of starting a flowchart refers to at least one of the following. Entering a subroutine in a macro instruction sequence in a computer. Entering into a deeper node of an inferential graph. Directing a state transition in a finite state machine, possibly while pushing a return state. And triggering a collection of neurons in a neural network. The starting of a flowchart is denoted by an oval with the word “Start” in its interior.
- The operation of termination in a flowchart refers to at least one or more of the following. The completion of those operations, which may result in a subroutine return, traversal of a higher node in an inferential graph, popping of a previously stored state in a finite state machine, return to dormancy of the firing neurons of the neural network. The operation of termination is denoted by an oval with the word “Exit” in its interior.
- A computer as used herein will include, but is not limited to an instruction processor. The instruction processor includes at least one instruction processing element and at least one data processing element. Each data processing element is controlled by at least one of the instruction processing elements.
- The invention also includes the
processing module 1000 implemented as means for its operations. These means may include at least one of any of the following: a computer, a finite state machine, a neural network and an inferential engine. - The operations of the
processing module 1000 may be implemented as program steps in aprocessing program system 1300 controlling at least one computer, theprocessing computer 1100. The program steps residing in aprocessing memory 1200 may be accessibly coupled with theprocessing computer 1100. As used herein, any memory may include at least one volatile memory address and/or at least one non-volatile memory address. The content of a volatile memory address may be altered by a loss of electrical power. Whereas the content of a non-volatile memory address is unaffected by the loss of electrical power. - In certain embodiments of the invention, the means for managing 100 the
electrical power 52 may include apower interface 100.FIG. 10A shows a detail flowchart of theprocessing program system 1300 ofFIGS. 6A, 6B, and 9 for the inventions method.Operation 1312 supports managing thepower interface 100 to distribute theelectrical power 52.Operation 1322 supports interacting with the accesscontrol identification mechanism 20 and the merged power-communication cable 50 to control 84 the access controlleddoor lock 80. - The means for managing 100, possibly implemented as the
power interface 100, may provide a thirdelectrical power 102 to the means for interacting 200. The means for interacting 200 may include, and/or be implemented as, acommunication interface 210 interacting with the merged power-communication cable 50 as inFIGS. 5A and 5B . Thepower interface 100 may preferably provide a secondelectrical power 82 to the access controlleddoor lock 80. - The
processing module 1000 may operate as inFIG. 4A . Thepower interface 100 receives at least part of theelectrical power 52 from the merged power-communication cable 50 and provides a thirdelectrical power 102 to acommunication interface 210 which interacts 200 with the merged power-communication cable 50. Thepower interface 100 may provide a secondelectrical power 82 to the access controlleddoor lock 80. - The invention also includes the
processing module 1000 implemented as means for its operations. These means may include at least one of the following: a computer, a finite state machine, a neural network and an inferential engine. As used herein a computer includes at least one instruction processor and at least one data processor, where each of the data processors is controlled by at least one of the instruction processors. - The operations of the
processing module 1000 may be implemented as program steps in aprocessing program system 1300 controlling at least one computer, theprocessing computer 1100, as shown inFIGS. 6A, 6B, and 9 . The program steps reside in aprocessing memory 1200 accessibly coupled with theprocessing computer 1100. Theprocessing memory 1200 may include volatile and/or non-volatile memory addresses. -
FIG. 9 shows a preferred implementation of theaccess control module 2000 ofFIG. 3A , andFIG. 4A toFIG. 5A , including theprocessing computer 1100, thepower interface 100, thechannel interface 220, and theperipheral interface 800, which have been previously discussed. - In
FIG. 9 , the method of operating theaccess control module 2000 is shown as theprocessing computer 1100 directed by thecommunications program system 3000, the accessidentification program system 3300, and theprocessing program system 1300. To simplify the discussion, these potentially separate operational aspects will be primarily discussed in terms of theprocessing program system 1300, with specific reference made to operations which might frequently be performed by theaccess identification computer 370 and/or thecommunication interface computer 230. One skilled in the art will recognize that some or all of these operations may just as readily be performed by theaccess identification computer 370 and/or thecommunication interface computer 230. - In certain preferred embodiments, the
processing module 1000 interactions may include the following. Receiving anaccess identification 1220 from the accesscontrol identification mechanism 20. Incorporating theaccess identification 1220 to create anaccess directive 1210. Theprocessing module 1000 controlling the access controlleddoor lock 80 based upon theaccess directive 1210. -
FIG. 10B shows a detail flowchart ofoperation 1322 ofFIG. 10A interacting with the accesscontrol identification mechanism 20 and the merged power-communication cable 50 to control 84 the access controlleddoor lock 80.Operation 1352 supports receiving theaccess identification 1220 from the accesscontrol identification mechanism 20.Operation 1362 supports incorporating theaccess identification 1220 to create anaccess directive 1210.Operation 1372 supports controlling the access controlleddoor lock 80 based upon theaccess directive 1210. - In certain preferred embodiments, the
processing module 1000 may further interact as follows. Theprocessing module 1000 may receive a senseddoor position 42 from adoor position sensor 40. Theprocessing module 1000 may receive a sensedrequest_to_exit state 32 from aRequest Exit switch 30, also sometimes known as a REX switch. Controlling the access controlleddoor lock 80 may be further based upon the senseddoor position 42, the sensedrequest_to_exit state 32 and theaccess directive 1210. -
FIG. 15B shows a detail flowchart ofoperation 1322 ofFIG. 10A .Operation 1772 supports receiving a senseddoor position 42 from thedoor position sensor 40 ofFIGS. 3A, 3B, 3E, 5A, and 9 .Operation 1782 supports receiving a sensedrequest_to_exit state 32 from aRequest EXit switch 30. -
FIG. 15C shows a detail flowchart ofoperation 1372 ofFIG. 10B further controlling the access controlleddoor lock 80.Operation 1792 supports controlling the access controlleddoor lock 80 based upon the senseddoor position 42, the sensedrequest_to_exit state 32, and theaccess directive 1210. -
FIG. 16A shows a detail flowchart ofoperation 1792 ofFIG. 15C further controlling the access controlleddoor lock 80.Operation 1812 supports determining a security state 270 ofFIG. 8D for thedoor 10 based upon the senseddoor position 42, the sensedrequest_to_exit state 32, and theaccess directive 1210.Operation 1822 supports performing theaccess directive 1210 upon the access controlleddoor lock 80.Operation 1832 supports sending the security state 270. -
FIG. 4A shows theaccess control module 2000 ofFIG. 3A where the means for interacting 200 includes a first communications coupling 202 between theprocessing module 1000 and thecommunication channel 54.FIG. 4B shows theaccess control module 2000 ofFIG. 4A where the means for interacting 200 further includes theaccess identifier coupling 24 to thecommunication channel 54, and theaccess control coupling 84 to thecommunication channel 54. - The
access control module 2000 may preferably support a TCP/IP stack 246 in any of several alternative embodiments. By way of example, thecommunication interface 210 may support the TCP/IP stack 246 stack for interactions with the merged power-communication cable 50 as shown inFIG. 7A . The accesscontrol identification mechanism 20 may support the TCP/IP stack 246 as shown inFIG. 7B . Theprocessing module 1000 may support the TCP/IP stack 246 as shown inFIG. 9 . - The
communication interface 210 may preferably include acommunication interface computer 230 as shown inFIG. 7A . Thecommunication interface computer 230 may accessibly couple with acommunication interface memory 240, interactively couple with the merged power-communication cable 50 and controllably couple with the access controlleddoor lock 80. - The access controlled
door lock 80 may include a piezoelectric controlleddoor lock 700 as shown inFIG. 17A . Alternatively, the access controlleddoor lock 80 may include astandalone door lock 710, as shown inFIG. 17E , and powered by an internalpower storage device 714, which typically drives a Direct Current (DC) motor as shown inFIG. 17B . The access controlleddoor lock 80 may include an access controlled cylinder door lock 720 as shown inFIGS. 2A and 17C . The access controlleddoor lock 80 may include an access controlled mortise door lock 730 as shown inFIG. 17D . Alternatively, the access controlleddoor lock 80 may include a solenoidcontroller door lock 722, as shown inFIG. 17F . - The invention also includes a
door conduit 300 providing the merged power-communication cable 50 to at least theprocessing module 1000 in thedoor 10. Thedoor conduit 300 includes a protected passage capable of passing the merged power-communication cable 50 from adoor frame 8 conduit-opening to adoor 10 conduit-opening inside thedoor 10. The protected passage may also act as a mechanical hinge for the door.FIG. 3D shows thedoor latch side 14 of thedoor 10 ofFIGS. 1B, 2C, 2D, and 3A , where thedoor conduit 300 ofFIG. 2C to 3A , couples with thedoor frame 8. - The components of the
access control module 2000 may be organized in several ways to suit the needs of various environments. Theprocessing module 1000 may includes the means for managing 100 and the means for interacting 200 as inFIGS. 5A and 5B . The means for managing 100, and/or thepower interface 100, may include at least one computer, at least one finite state machine, an inferential engine and/or a neural network. -
FIG. 5B shows a refinement of theprocessing module 1000FIGS. 3A, and 4A to 5A . Thecommunication interface 210, which is an implementation of the means for interacting 200, is controllably coupled 104 to thepower interface 100, which is an implementation of the means for managing 100. Thepower interface 100 provides at least part of theelectrical power 52 as a thirdelectrical power 102 received by the means for interacting 200. There is no single central computer shown. However, either or both thepower interface 100 and/or thecommunication interface 210 may include at least one computer. -
FIG. 7A shows an embodiment of thecommunication interface 210 ofFIGS. 6A and 6B including acommunication interface computer 230. Thecommunication interface computer 230 is second accessibly coupled 242 to thecommunication interface memory 240. Thecommunications program system 3000 includes program steps residing in thecommunication interface memory 240 to direct the operations of thecommunication interface 210. Thecommunication interface memory 240 may also include, both through use of thecommunications program system 3000 and other resources, the TCP/IP stack 246. Thecommunication interface 210 may include anencryption module 250. Thecommunication interface 210 may store theaccess identification message 1230 and/or theaccess directive message 1240. Thechannel interface 220 interacts with thecommunication channel 54 to support communication via the merged power-communication cable 50. Thecommunication interface computer 230 is fifth coupled 222 with thechannel interface 220. - The access
control identification mechanism 20 ofFIGS. 2A, 3A, 4A to 5A, and 9 may include the following.FIG. 7B shows an embodiment of the accesscontrol identification mechanism 20, which includes anaccess identification computer 370, an accesscontrol scanning device 378, anidentification interface 374, and anaccess identification memory 360. Theaccess identification computer 370 is third accessibly coupled 362 to theaccess identification memory 360. The accessidentification program system 3300 includes at least one program step residing in theaccess identification memory 360, which implements, at least in part, the access identification method(s) used by the invention's embodiments. Theaccess identifier coupling 24 interacts with theidentification interface 374. Theidentification interface 374, in turn, access-ident-couples 372 with theaccess identification computer 370. Theaccess identification computer 370 access-ID-couples 376 with the accesscontrol scanning device 378. Theaccess identification computer 370, directed by program steps of the accessidentification program system 3300, communicates via the access-ID-couples 376 with the accesscontrol scanning device 378 to create theaccess identification 1220. - The discussion of the means for interacting 200, and more specifically the
communication interface 210 continues.FIGS. 7A, 8A, and 9 show thecommunication interface 210 including achannel interface 220, which provides thefirst communications coupling 202. Thechannel interface 220 couples with at least onecommunication channel 54. - The operation of the
access control module 2000 may include using encryption to limit the potential compromising the data content through reading or writing on thesecurity network 5002 shown inFIG. 16B . Interactions of theprocessing module 1000 with the merged power-communication cable 50 may use encryption. - In
FIG. 8A , thechannel interface 220 is cryptically coupled 252 with theencryption module 250.FIG. 8B shows theencryption module 250 including at least one of a send-encryption mechanism 254 and/or a receive-encryption mechanism 256. - In
FIGS. 3A, 4A to 5A, and 9 , theprocessing module 1000 interacts 200 with the accesscontrol identification mechanism 20, and with the merged power-communication cable 50, to control 84 the access controlleddoor lock 80. At least theprocessing module 1000 and the access controlleddoor lock 80 are located in thedoor 10. Preferably, the accesscontrol identification mechanism 20 is also located in thedoor 10. -
FIG. 11A shows a detail flowchart ofoperation 1362 ofFIG. 10B further incorporating theaccess identification 1220 to create anaccess directive 1210.Operation 1502 supports sending theaccess identification 1220 via the merged power-communication cable 50 to create a sent-identification.Operation 1512 supports receiving theaccess directive 1210 from the merged power-communication cable 50 based upon the sent-identification. -
FIG. 11B shows a detail flowchart ofoperation 1512 ofFIG. 11A , and alternatively, part of thecommunications program system 3000 ofFIGS. 7A and 9 , for sending theaccess identification 1220 via the merged power-communication cable 50 to create a sent-identification.Operation 1532 supports processing theaccess identification 1220 to create anaccess identification message 1230.Operation 1542 supports sending theaccess identification message 1230 to create the sent-identification. -
FIG. 12A shows a detail flowchart ofoperation 1532 ofFIG. 11B , further processing theaccess identification 1220.Operation 1562 supports processing theaccess identification 1220 based upon the send-encryption mechanism 254 ofFIG. 8B to create theaccess identification message 1230. -
FIG. 12B shows a detail flowchart ofoperation 1512 ofFIG. 11A , and part of thecommunications program system 3000 ofFIGS. 7A and 9 , for receiving theaccess directive 1210.Operation 1582 supports receiving anaccess directive message 1240 from the merged power-communication cable 50 based upon the sent-identification.Operation 1592 supports processing theaccess directive message 1240 to create theaccess directive 1210. -
FIG. 12C shows a detail flowchart ofoperation 1592 ofFIG. 12B further processing theaccess directive message 1240 to create theaccess directive 1210.Operation 1592 supports processing theaccess directive message 1240 based upon the receive-encryption mechanism 256 ofFIG. 8C to create theaccess directive 1210. - The discussion of the access
control identification mechanism 20 continues.FIG. 13 shows a detail flowchart ofoperation 1352 ofFIG. 10B further receiving theaccess identification 1220.Operation 1612 supports receiving theaccess identification 1220 from the accesscontrol card reader 310 ofFIG. 8C .Operation 1622 supports receiving theaccess identification 1220 from the access controlbiometric sensor 312.Operation 1632 supports receiving theaccess identification 1220 from a facialbiometric sensor 314.Operation 1642 supports receiving theaccess identification 1220 from a fragrancebiometric sensor 316.Operation 1652 supports receiving theaccess identification 1220 from a fingerprintbiometric sensor 318.Operation 1662 supports receiving theaccess identification 1220 from a skin residue DNAbiometric sensor 320 or a skin characteristicbiometric sensor 322. - The discussion of receiving the
access identification 1220 continues.FIG. 14A shows a detail flowchart ofoperation 1352 ofFIG. 10B , alternatively part of the accessidentification program system 3300 ofFIGS. 7B and 9 .Operation 1682 supports receiving a biometricaccess sensor identification 340 from the access controlbiometric sensor 312.Operation 1692 supports processing the biometricaccess sensor identification 340 based upon thebiometric sensor template 350 to create theaccess identification 1220. - The discussion of the
biometric sensor template 350 continues.FIG. 14B shows a detail flowchart of theprocessing program system 1300 ofFIGS. 6A, 6B and 9 .Operation 1712 supports receiving thebiometric sensor template 350 from the merged power-communication cable 50.Operation 1722 supports sending the biometric sensor template to the access control identification mechanism. - The discussion of managing the
electrical power 52 continues.FIG. 15A shows a detail flowchart ofoperation 1312 ofFIG. 10A .Operation 1742 supports providing a firstelectrical power 22 to the accesscontrol identification mechanism 20.Operation 1752 supports providing a secondelectrical power 82 to the access controlleddoor lock 80. - The discussion of the use of various aspects of the invention in a
security network 5002 continues.FIG. 16B shows thedoor 10 made with a first instance 2000-1 of theaccess control module 2000 coupled by a first cable instance 50-1 of the merged power-communication cable 50. The first cable instance 50-1 is routed through thedoor conduit 300 to thesecurity network 5002. The first cable instance 50-1 may be seen in network diagrams to be a direct part of thesecurity network 5002. - In
FIG. 16B , the second instance 2000-2 of theaccess control module 2000 is shown to couple by a second cable instance 50-2 of the merged power-communication cable 50 to a Power overEthernet switch 3920. The Power overEthernet switch 3920 may communicatively couple 3902 to acontroller 3900, all of which may be included in a local security closet. Thecontroller 3900 may be shown in network diagrams communicating over thesecurity network 5002 with aserver 5000. Theserver 5000 may have dedicated security activities, or else provide a transfer point to a security management station which may be located at a distance from thedoor 10 and/or theserver 5000. - The preceding embodiments have been provided by way of example and are not meant to constrain the scope of the following claims.
Claims (20)
1. An access control module for controlling access through a door, comprising:
a power interface coupled to a merged power-communication cable, and controllably coupled to a processing computer in a processing module;
said power interface providing electrical power to an access controlled door lock a communication interface;
wherein said processing module, further comprises:
said processing computer accessibly coupled with a processing memory containing at least one program step of a processing program system;
said processing computer communicatively coupling with said communications interface with a merged power-communication cable;
said processing computer coupling with said merged power-communication cable, to a door position sensor, with a request-to-exit switch, and with said access controlled door lock;
wherein said processing program system comprises the program step of:
managing said power interface to distribute said electrical power; and
controlling said access controlled door lock based upon interactions with said door position sensor, with said request-to-exit switch, and with said merged power-communication cable.
2. An apparatus, comprising:
a door;
a door frame;
a strike plate attached to said door frame;
a position magnet attached to said strike plate;
one door conduit connected to said door and said door frame;
one merged power-communication cable passing through said door conduit, said merged power-communication cable comprising at least one communication channel;
an access control module positioned in said door on a latch side of said door, said access control module comprising:
a power interface connected to said merged power-communication cable;
a communication interface connected to said merged power-communication cable;
a processing module connected to said communication interface and to said power interface; and
an access controlled door lock connected to said processing module.
3. The apparatus of claim 2 , wherein said processing module is adapted to send an access directive message over said merged power-communication cable.
4. The apparatus of claim 2 , wherein said processing module further comprises:
a processing computer coupled to said power interface; and
a processing memory coupled to said processing computer.
5. The apparatus of claim 4 , wherein said processing computer creates an access identification message from an access identification.
6. The apparatus of claim 4 , further comprising a request exit switch coupled to said processing computer.
7. The apparatus of claim 4 , further comprising a door position sensor communicating with said processing computer, said door position sensor interacting with said magnet to form a sensed door position.
8. The apparatus of claim 4 , further comprising an encryption module coupled to said communication interface.
9. The apparatus of claim 4 , wherein said communication interface comprises a communication interface computer and a communication interface memory coupled to said communication interface computer.
10. The apparatus of claim 4 , wherein said communication interface comprises a channel interface.
11. The apparatus of claim 10 , where said processing computer is adapted to receive an access control directive from said channel interface.
12. The apparatus of claim 2 , wherein said processing module is adapted to send a security state of said door over said merged power-communication cable.
13. The apparatus of claim 12 , wherein said security state represents a condition of a said door selected from the group consisting of a secure door, a forced open door, a held open door, and an unlocked door.
14. The apparatus of claim 2 , where said processing module is adapted to control said access controlled door lock in response to an access directive received over said merged power-communication cable.
15. The apparatus of claim 2 , wherein said merged power-communication cable implements a form of Power Over Ethernet (POE) protocol.
16. The apparatus of claim 2 , wherein said processing module further comprises:
a processing computer; and
a processing memory containing at least one program step of a processing program system directing said processing computer,
wherein said processing program system comprises the program steps of:
managing said power interface to distribute electrical power; and
controlling said access controlled door lock.
17. The apparatus of claim 16 , wherein said processing program system further comprises the program steps of:
determining a security state for a door; and
receiving an access directive message from said merged power-communication cable.
18. The apparatus of claim 2 , further comprising an access control identification mechanism connected to said processing module, wherein said processing module is adapted to control said access controlled door lock in response to said access control identification mechanism.
19. The apparatus of claim 18 , wherein said access control identification mechanism comprises a card reader.
20. The apparatus of claim 18 , wherein said access control identification mechanism comprises a fingerprint biometric sensor.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US15/260,176 US20170032594A1 (en) | 2005-02-04 | 2016-09-08 | Method and apparatus for a merged power-communication cable in door security environment |
Applications Claiming Priority (6)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US65024705P | 2005-02-04 | 2005-02-04 | |
PCT/US2006/004263 WO2006084271A2 (en) | 2005-02-04 | 2006-02-06 | Method and apparatus for a merged power-communication cable in door security environment |
US88368907A | 2007-08-03 | 2007-08-03 | |
US13/609,106 US8937526B2 (en) | 2005-02-04 | 2012-09-10 | Method and apparatus for a merged power-communication cable in door security environment |
US14/601,113 US20150170449A1 (en) | 2005-02-04 | 2015-01-20 | Method and apparatus for a merged power-communication cable in door security environment |
US15/260,176 US20170032594A1 (en) | 2005-02-04 | 2016-09-08 | Method and apparatus for a merged power-communication cable in door security environment |
Related Parent Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US14/601,113 Continuation US20150170449A1 (en) | 2005-02-04 | 2015-01-20 | Method and apparatus for a merged power-communication cable in door security environment |
Publications (1)
Publication Number | Publication Date |
---|---|
US20170032594A1 true US20170032594A1 (en) | 2017-02-02 |
Family
ID=36778032
Family Applications (4)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US11/883,689 Active 2029-05-28 US8264323B2 (en) | 2005-02-04 | 2006-02-06 | Method and apparatus for a merged power-communication cable in door security environment |
US13/609,106 Active US8937526B2 (en) | 2005-02-04 | 2012-09-10 | Method and apparatus for a merged power-communication cable in door security environment |
US14/601,113 Abandoned US20150170449A1 (en) | 2005-02-04 | 2015-01-20 | Method and apparatus for a merged power-communication cable in door security environment |
US15/260,176 Abandoned US20170032594A1 (en) | 2005-02-04 | 2016-09-08 | Method and apparatus for a merged power-communication cable in door security environment |
Family Applications Before (3)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US11/883,689 Active 2029-05-28 US8264323B2 (en) | 2005-02-04 | 2006-02-06 | Method and apparatus for a merged power-communication cable in door security environment |
US13/609,106 Active US8937526B2 (en) | 2005-02-04 | 2012-09-10 | Method and apparatus for a merged power-communication cable in door security environment |
US14/601,113 Abandoned US20150170449A1 (en) | 2005-02-04 | 2015-01-20 | Method and apparatus for a merged power-communication cable in door security environment |
Country Status (5)
Country | Link |
---|---|
US (4) | US8264323B2 (en) |
EP (1) | EP1849100B1 (en) |
AU (1) | AU2006210412A1 (en) |
CA (1) | CA2597217C (en) |
WO (1) | WO2006084271A2 (en) |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
EP3882873A1 (en) * | 2020-03-19 | 2021-09-22 | LG Electronics Inc. | Smart gate |
Families Citing this family (44)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CA2597217C (en) * | 2005-02-04 | 2015-05-19 | Edmonds H. Chandler, Jr. | Method and apparatus for a merged power-communication cable in door security environment |
US20070075586A1 (en) * | 2005-10-05 | 2007-04-05 | Bogue Edward M | Ethernet powered device with an internaly controlled auxiliary power ouput |
US11557163B2 (en) | 2006-08-16 | 2023-01-17 | Isonas, Inc. | System and method for integrating and adapting security control systems |
US9153083B2 (en) | 2010-07-09 | 2015-10-06 | Isonas, Inc. | System and method for integrating and adapting security control systems |
US7775429B2 (en) | 2006-08-16 | 2010-08-17 | Isonas Security Systems | Method and system for controlling access to an enclosed area |
US9589400B2 (en) | 2006-08-16 | 2017-03-07 | Isonas, Inc. | Security control and access system |
US8207814B2 (en) | 2007-03-09 | 2012-06-26 | Utc Fire & Security Americas Corporation, Inc. | Kit and system for providing security access to a door using power over ethernet with data persistence and fire alarm control panel integration |
US8844200B2 (en) * | 2008-04-02 | 2014-09-30 | Globe Motors, Inc. | Electrical door operator |
US8261491B2 (en) * | 2008-04-02 | 2012-09-11 | Leon Yulkowski | Concealed electrical door operator |
US8653982B2 (en) | 2009-07-21 | 2014-02-18 | Openings | Door monitoring system |
US8325039B2 (en) | 2010-02-25 | 2012-12-04 | Sargent Manufacturing Company | Locking device with embedded circuit board |
US9617757B2 (en) | 2010-02-25 | 2017-04-11 | Sargent Manufacturing Company | Locking device with configurable electrical connector key and internal circuit board for electronic door locks |
US8952782B2 (en) * | 2010-03-18 | 2015-02-10 | Mark Kilbourne | Remotely actuatable locking system and method for forming doors for accommodating such systems |
KR101278974B1 (en) * | 2010-12-09 | 2013-07-02 | 주식회사 지트론 | Door lock system |
US8686869B2 (en) | 2010-12-29 | 2014-04-01 | Secureall Corporation | Alignment-related operation and position sensing of electronic and other locks and other objects |
US8690205B2 (en) | 2011-02-21 | 2014-04-08 | Yale Security Inc. | Door lockset |
FI123659B (en) * | 2012-05-25 | 2013-08-30 | Kone Corp | Automaattiovijärjestelmä |
CA2903675A1 (en) | 2013-03-13 | 2014-10-09 | Spectrum Brands, Inc. | Electronic lock with remote monitoring |
US9705265B2 (en) | 2013-03-15 | 2017-07-11 | Sargent Manufacturing Company | Configurable electrical connector key for electronic door locks |
US20150071274A1 (en) * | 2013-09-11 | 2015-03-12 | Emanate Wireless, Inc. | Cable assembly with integrated wireless proximity sensors |
FI125687B (en) * | 2013-10-01 | 2016-01-15 | Rollock Oy | Locking arrangement and method for determining the presence and position of a device transmitting a radio signal |
US10378262B2 (en) | 2014-10-23 | 2019-08-13 | Leon Yulkowski | Door operator and clutch |
US10026247B2 (en) * | 2015-07-06 | 2018-07-17 | Hanchett Entry Systems, Inc. | Request to exit two-wire control module |
US10350416B2 (en) * | 2015-07-28 | 2019-07-16 | Medtronic, Inc. | Intracardiac pacemaker with sensing extension in pulmonary artery |
EP3147870A1 (en) * | 2015-09-28 | 2017-03-29 | ILESO Engineering GmbH | Control panel for physical access control |
US9721413B2 (en) | 2015-10-13 | 2017-08-01 | Unikey Technologies Inc. | Wireless access control system operating in automatic calibration mode and including door position based lock switching and related methods |
US9524601B1 (en) | 2015-12-28 | 2016-12-20 | Unikey Technologies Inc. | Wireless access control system including door position based lock switching and related methods |
US9697661B1 (en) | 2015-12-28 | 2017-07-04 | Unikey Technologies Inc. | Wireless access control system including closed door position and exterior area remote access wireless communications device based lock switching and related methods |
US9697658B1 (en) | 2015-12-28 | 2017-07-04 | Unikey Technologies Inc. | Wireless access control system including closed door position and interior area remote access wireless communications device based lock switching and related methods |
US10044710B2 (en) | 2016-02-22 | 2018-08-07 | Bpip Limited Liability Company | Device and method for validating a user using an intelligent voice print |
US10339599B2 (en) * | 2016-06-27 | 2019-07-02 | Whiteboard, LLC | System and method for automated management of service industry and for-hire resources |
US11021892B2 (en) | 2016-08-17 | 2021-06-01 | Amesbury Group, Inc. | Locking system having an electronic keeper |
US10968661B2 (en) | 2016-08-17 | 2021-04-06 | Amesbury Group, Inc. | Locking system having an electronic deadbolt |
CN110546340A (en) | 2017-04-18 | 2019-12-06 | 埃美斯博瑞集团有限公司 | Modular electronic latch system |
US10808424B2 (en) | 2017-05-01 | 2020-10-20 | Amesbury Group, Inc. | Modular multi-point lock |
US11248396B2 (en) | 2017-07-24 | 2022-02-15 | Amesbury Group, Inc. | Sealed keeper sensors |
US11066850B2 (en) | 2017-07-25 | 2021-07-20 | Amesbury Group, Inc | Access handle for sliding doors |
CA3036398A1 (en) | 2018-03-12 | 2019-09-12 | Amesbury Group, Inc. | Electronic deadbolt systems |
WO2019183340A1 (en) | 2018-03-23 | 2019-09-26 | Schlage Lock Company Llc | Power and communication arrangements for an access control system |
US11176791B2 (en) | 2018-06-28 | 2021-11-16 | Invue Security Products Inc. | Security systems and methods for consumer products |
US11834866B2 (en) | 2018-11-06 | 2023-12-05 | Amesbury Group, Inc. | Flexible coupling for electronic deadbolt systems |
US11661771B2 (en) | 2018-11-13 | 2023-05-30 | Amesbury Group, Inc. | Electronic drive for door locks |
EP3899178A1 (en) * | 2018-12-19 | 2021-10-27 | ASSA ABLOY Entrance Systems AB | Automatic door operator and method of operating automatic door operator |
US11680423B2 (en) * | 2019-05-01 | 2023-06-20 | Vbc Tracy Llc | Electromechanical locking apparatus and method and apparatus for controlling the same in a real property monitoring and control system |
Citations (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US8264323B2 (en) * | 2005-02-04 | 2012-09-11 | Chandler Jr Edmonds H | Method and apparatus for a merged power-communication cable in door security environment |
Family Cites Families (20)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
DE3881637T2 (en) * | 1987-10-30 | 1994-01-05 | R Heinen N V Sa Ets | Electrical energy transmission device. |
US5749253A (en) * | 1994-03-30 | 1998-05-12 | Dallas Semiconductor Corporation | Electrical/mechanical access control systems and methods |
US5903225A (en) * | 1997-05-16 | 1999-05-11 | Harris Corporation | Access control system including fingerprint sensor enrollment and associated methods |
US5867107A (en) * | 1997-06-03 | 1999-02-02 | Masco Corporation | Variation coded electro-mechanical lock and method of using same |
US5936544A (en) * | 1997-09-30 | 1999-08-10 | Pittway Corporation | Wireless access system |
US6259352B1 (en) * | 1998-03-02 | 2001-07-10 | Leon Yulkowski | Door lock system |
US6049287A (en) * | 1998-03-02 | 2000-04-11 | Yulkowski; Leon | Door with integrated smoke detector and hold open |
US7046983B2 (en) * | 1999-08-02 | 2006-05-16 | Powerdsine, Ltd. | Integral board and module for power over LAN |
US6714977B1 (en) * | 1999-10-27 | 2004-03-30 | Netbotz, Inc. | Method and system for monitoring computer networks and equipment |
US6784784B1 (en) * | 2001-06-22 | 2004-08-31 | Zehrung Raymond E | Request to exit switch for door alarm system |
US6792323B2 (en) | 2002-06-27 | 2004-09-14 | Openpeak Inc. | Method, system, and computer program product for managing controlled residential or non-residential environments |
US7225345B2 (en) * | 2003-05-19 | 2007-05-29 | Powerdsine, Ltd. | Employing sense resistor as safety fuse in limited power source applications |
US7194639B2 (en) * | 2003-06-30 | 2007-03-20 | Tellabs Vienna, Inc. | Power adapter and broadband line extender system and method |
US7113103B2 (en) * | 2003-09-11 | 2006-09-26 | General Electric Company | Modular security, monitoring, and control devices and methods |
US7747286B2 (en) * | 2004-01-20 | 2010-06-29 | Harrow Products Llc | Wireless access control system with energy-saving piezo-electric locking |
US7091857B2 (en) * | 2004-02-12 | 2006-08-15 | Mi-Jack Products, Inc. | Electronic control system used in security system for cargo trailers |
US7548151B2 (en) * | 2005-01-27 | 2009-06-16 | Inncom International Inc. | Power management lock system and method |
US7734572B2 (en) * | 2006-04-04 | 2010-06-08 | Panduit Corp. | Building automation system controller |
US7775429B2 (en) * | 2006-08-16 | 2010-08-17 | Isonas Security Systems | Method and system for controlling access to an enclosed area |
US7967197B2 (en) * | 2007-07-24 | 2011-06-28 | Honeywell International Inc. | Integrated online door via electronic door handle |
-
2006
- 2006-02-06 CA CA2597217A patent/CA2597217C/en active Active
- 2006-02-06 US US11/883,689 patent/US8264323B2/en active Active
- 2006-02-06 EP EP06720431.3A patent/EP1849100B1/en active Active
- 2006-02-06 WO PCT/US2006/004263 patent/WO2006084271A2/en active Application Filing
- 2006-02-06 AU AU2006210412A patent/AU2006210412A1/en not_active Abandoned
-
2012
- 2012-09-10 US US13/609,106 patent/US8937526B2/en active Active
-
2015
- 2015-01-20 US US14/601,113 patent/US20150170449A1/en not_active Abandoned
-
2016
- 2016-09-08 US US15/260,176 patent/US20170032594A1/en not_active Abandoned
Patent Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US8264323B2 (en) * | 2005-02-04 | 2012-09-11 | Chandler Jr Edmonds H | Method and apparatus for a merged power-communication cable in door security environment |
US8937526B2 (en) * | 2005-02-04 | 2015-01-20 | Edmonds H. Chandler, Jr. | Method and apparatus for a merged power-communication cable in door security environment |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
EP3882873A1 (en) * | 2020-03-19 | 2021-09-22 | LG Electronics Inc. | Smart gate |
Also Published As
Publication number | Publication date |
---|---|
EP1849100A4 (en) | 2016-04-27 |
US20150170449A1 (en) | 2015-06-18 |
CA2597217A1 (en) | 2006-08-10 |
CA2597217C (en) | 2015-05-19 |
US20130002397A1 (en) | 2013-01-03 |
AU2006210412A1 (en) | 2006-08-10 |
WO2006084271A2 (en) | 2006-08-10 |
WO2006084271A3 (en) | 2009-05-07 |
EP1849100B1 (en) | 2020-04-08 |
EP1849100A2 (en) | 2007-10-31 |
US8937526B2 (en) | 2015-01-20 |
US20080209228A1 (en) | 2008-08-28 |
US8264323B2 (en) | 2012-09-11 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US8937526B2 (en) | Method and apparatus for a merged power-communication cable in door security environment | |
US5749253A (en) | Electrical/mechanical access control systems and methods | |
US7669054B2 (en) | Legacy access control security system modernization apparatus | |
EP2515497B1 (en) | Method for performing authentication in a distributed authentication system and authentication system | |
CN102096957A (en) | Access control management system and configuration method thereof | |
CN202003423U (en) | Security access control system | |
CN106470184A (en) | Safety certifying method, apparatus and system | |
CN103295296B (en) | Method for controlling access control system by utilizing embedded motherboard and embedded motherboard | |
CN113724429A (en) | Access control | |
CN111862435B (en) | Configuration method of multi-door interlocking, door opening method and access control system | |
CN107038490A (en) | Self-service booking system and its method of work based on third party's internet platform | |
US8060589B1 (en) | System and method for monitoring equipment over a network | |
AU2014262233B2 (en) | Method and apparatus for a merged power-communication cable in door security environment | |
CN109818783A (en) | Configuration method, device and the building control system of controller | |
CN117221490A (en) | Entrance guard and ladder control linkage control system and method based on resident response | |
KR100894421B1 (en) | Fingerprint authentication terminal, access control system thereof, and user authentication method | |
CN201498026U (en) | Hierarchical access card recognition system | |
CN103366433A (en) | System and method for monitoring state of one-card entrance guard in real time | |
KR100476179B1 (en) | Access control system using finger-print identification | |
CN209118379U (en) | A kind of access control system | |
US8233386B2 (en) | Device that uses parameters to provide multi-channel serial data transmissions and method thereof | |
CN1276573A (en) | System for ensuring computer network information safety and corresponding method thereof | |
KR20030088082A (en) | A certificate automatic issue system and method thereof | |
CN209692796U (en) | A kind of multiple domain switch | |
CN108494770A (en) | A kind of intelligent network power-supply management system and method |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
STCB | Information on status: application discontinuation |
Free format text: ABANDONED -- FAILURE TO RESPOND TO AN OFFICE ACTION |