WO2004011746A1 - 通信装置 - Google Patents
通信装置 Download PDFInfo
- Publication number
- WO2004011746A1 WO2004011746A1 PCT/JP2003/009755 JP0309755W WO2004011746A1 WO 2004011746 A1 WO2004011746 A1 WO 2004011746A1 JP 0309755 W JP0309755 W JP 0309755W WO 2004011746 A1 WO2004011746 A1 WO 2004011746A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- information
- electronic key
- cpu
- communication
- user
- Prior art date
Links
Classifications
-
- E—FIXED CONSTRUCTIONS
- E05—LOCKS; KEYS; WINDOW OR DOOR FITTINGS; SAFES
- E05B—LOCKS; ACCESSORIES THEREFOR; HANDCUFFS
- E05B49/00—Electric permutation locks; Circuits therefor ; Mechanical aspects of electronic locks; Mechanical keys therefor
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07C—TIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
- G07C1/00—Registering, indicating or recording the time of events or elapsed time, e.g. time-recorders for work people
- G07C1/10—Registering, indicating or recording the time of events or elapsed time, e.g. time-recorders for work people together with the recording, indicating or registering of other data, e.g. of signs of identity
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07C—TIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
- G07C9/00—Individual registration on entry or exit
- G07C9/00174—Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
- G07C9/00309—Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated with bidirectional data transmission between data carrier and locks
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07C—TIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
- G07C9/00—Individual registration on entry or exit
- G07C9/00174—Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
- G07C9/00563—Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys using personal physical data of the operator, e.g. finger prints, retinal images, voicepatterns
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07C—TIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
- G07C9/00—Individual registration on entry or exit
- G07C9/00174—Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
- G07C9/00896—Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys specially adapted for particular uses
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07C—TIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
- G07C9/00—Individual registration on entry or exit
- G07C9/00174—Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
- G07C9/00896—Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys specially adapted for particular uses
- G07C9/00904—Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys specially adapted for particular uses for hotels, motels, office buildings or the like
-
- G—PHYSICS
- G08—SIGNALLING
- G08B—SIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
- G08B25/00—Alarm systems in which the location of the alarm condition is signalled to a central station, e.g. fire or police telegraphic systems
- G08B25/01—Alarm systems in which the location of the alarm condition is signalled to a central station, e.g. fire or police telegraphic systems characterised by the transmission medium
- G08B25/04—Alarm systems in which the location of the alarm condition is signalled to a central station, e.g. fire or police telegraphic systems characterised by the transmission medium using a single signalling line, e.g. in a closed loop
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07C—TIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
- G07C1/00—Registering, indicating or recording the time of events or elapsed time, e.g. time-recorders for work people
- G07C1/20—Checking timed patrols, e.g. of watchman
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07C—TIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
- G07C1/00—Registering, indicating or recording the time of events or elapsed time, e.g. time-recorders for work people
- G07C1/32—Time-recording locks
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07C—TIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
- G07C9/00—Individual registration on entry or exit
- G07C9/00174—Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
- G07C2009/00753—Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated by active electrical keys
- G07C2009/00769—Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated by active electrical keys with data transmission performed by wireless means
- G07C2009/00777—Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated by active electrical keys with data transmission performed by wireless means by induction
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07C—TIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
- G07C2209/00—Indexing scheme relating to groups G07C9/00 - G07C9/38
- G07C2209/60—Indexing scheme relating to groups G07C9/00174 - G07C9/00944
- G07C2209/62—Comprising means for indicating the status of the lock
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L12/00—Data switching networks
- H04L12/28—Data switching networks characterised by path configuration, e.g. LAN [Local Area Networks] or WAN [Wide Area Networks]
- H04L12/2803—Home automation networks
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L12/00—Data switching networks
- H04L12/28—Data switching networks characterised by path configuration, e.g. LAN [Local Area Networks] or WAN [Wide Area Networks]
- H04L12/2803—Home automation networks
- H04L12/2823—Reporting information sensed by appliance or service execution status of appliance services in a home automation network
- H04L12/2825—Reporting to a device located outside the home and the home network
Definitions
- the present invention relates to a communication apparatus suitable for use in a door lock control system that controls locking and unlocking of a door using electronic key information.
- a door lock control system using an electronic key device that does not use such a key cylinder mechanism has attracted attention.
- the master unit compares and compares an ID code as electronic key information registered in advance with an ID code received from a slave unit as electronic key information. It is known that the door opening is controlled on the basis of the comparison result (for example, Patent Document 1 (see Japanese Patent Application Laid-Open No. Hei 9-42993)).
- the present invention can urge a child to go home when the child is scheduled to return home, for example, and notify the parent of the child's home return time, for example, by notifying the child. It is an object of the present invention to provide a communication device that can perform the communication. Disclosure of the invention
- a communication device has at least a first communication means for communicating with an electronic key device that stores electronic key information, and a device for transmitting information through a communication network.
- a second communication unit a storage unit for storing electronic key information, an electronic key information received from the electronic key device through the first communication unit, and an electronic key information stored in the storage unit.
- a door opening / closing control unit for controlling a door opening / closing mechanism based on the comparison result, and the electronic key based on the information received from the electronic key unit through the first communication unit.
- User recognition means for recognizing the user of the device; and information on the entry and exit of the user of the electronic key device based on the recognition result of the user recognition means.
- 2 communication hands And transmission control means for controlling transmission via a stage.
- the invention according to claim 2 is the communication device according to claim 1, wherein a setting of a user of the electronic key device to which information regarding entry and exit is to be transmitted to the notification destination.
- Setting control means for receiving and storing the setting, the transmission control means transmits the information on the entry and exit of the user of the electronic key device set in advance to the notification destination via the second communication means. It is characterized by transmitting.
- the user recognizing means recognizes who has opened and closed the door by communicating with the electronic key device.
- the transmission control means transmits information on the entry / exit of the user of the electronic key device to a preset notification destination.
- the invention according to claim 3 is the communication device according to claim 2, wherein the setting storage means accepts and stores a time information setting input corresponding to the user together with the user of the electronic key device.
- the transmission control means when the user corresponding to the set electronic key device has not been recognized by the user recognition means even after the time corresponding to the time information set and input as described above has elapsed.
- the electronic key device is controlled so as to transmit information regarding that the user of the electronic key device has not been entered or exited to the notification destination via the second communication means.
- the scheduled return time is set, and the report destination is set to the returnee, so that the returnee does not return even after the set time has elapsed. From time to time, it is possible to notify the prospective returnee of that fact. Also, if the report destination is set to a person other than the person who is going to return, for example, the parent, the parent can be notified that the person who is going to return has not returned home.
- FIG. 1 is a block diagram of a door lock control system according to an embodiment of the present invention. It is a figure for explaining an outline of another information.
- FIG. 2 is a diagram showing an example of identification information used in the embodiment of the present invention.
- C FIG. 3 is a diagram for explaining an outline of a communication system to which the embodiment of the door opening control system according to the present invention is applied.
- FIGS. 4A and 4B are diagrams showing an embodiment of the electronic key device according to the present invention.
- FIG. 5 is a block diagram showing a configuration example of an embodiment of an electronic key device according to the present invention.
- FIG. 6 is a flowchart for explaining the operation of one embodiment of the electronic key device according to the present invention.
- FIG. 7A and 7B are diagrams showing another embodiment of the electronic key device according to the present invention.
- FIG. 8 is a block diagram showing a configuration example of another embodiment of the electronic key device according to the present invention.
- FIG. 9 is a flowchart for explaining the operation of another embodiment of the electronic key device according to the present invention.
- FIG. 10A and FIG. 10B are diagrams for explaining a main part of an example of a door opening device that constitutes the door opening control system of the embodiment.
- FIG. 11 is a block diagram showing a configuration example of a door opening control device of the door lock device of FIGS. 10A and 10B.
- FIG. 12 is a diagram illustrating an example of a monitoring control device used in a security system.
- FIG. 13 is a block diagram showing a configuration example of the monitoring control device of FIG.
- FIG. 14 is a diagram showing an example of personal profile information.
- FIG. 15 is a diagram for explaining the contents of the security mode.
- FIG. 16 is a diagram for explaining the contents of the security mode.
- FIG. 17 is a block diagram illustrating a configuration example of the management server device.
- FIG. 18 is a flowchart for explaining the message recording and reproduction functions of the monitoring control device of FIG.
- FIG. 19 is a flowchart for explaining the setting operation of the door opening control mode.
- FIG. 20 is a flowchart illustrating the setting operation of the door opening control mode.
- FIG. 21 is a part of a flowchart for explaining a door lock control operation in an auto lock mode which is one example of the door lock control mode.
- FIG. 22 is a part of a flowchart for explaining a door opening control operation in an auto rotter mode which is one example of a door lock control mode.
- FIG. 23 is a part of a flowchart for explaining a door opening control operation in an auto lock mode which is one example of the door lock control mode.
- 'FIG. 24 is a part of a flowchart for explaining the door opening control operation in the auto lock mode, which is one example of the door opening control mode.
- FIG. 25 is a part of a flowchart for explaining a door opening control operation in an automatic lock mode, which is one example of the door lock control mode.
- Figure 26 shows a part of the door lock for explaining the door lock control operation in the auto lock mode, which is one example of the door lock control mode.
- Figure 27 shows the sequential lock mode, which is one example of the door lock control mode.
- 5 is a part of a flowchart for explaining the door opening control operation in FIG.
- FIG. 28 is a part of a flowchart for explaining the door opening control operation in the sequential opening mode, which is one example of the door opening control mode.
- FIG. 29 is a part of a flowchart for explaining the door opening control operation in the sequential opening mode, which is one example of the door opening control mode.
- FIG. 30 is a flowchart for explaining the operation of the monitoring control device for receiving a signal from a remote commander.
- FIG. 31 is a part of a flowchart for describing the operation of the monitoring control device when the security mode is on.
- FIG. 32 is a part of a flowchart for explaining the operation of the monitoring control device when the security mode is on.
- FIG. 33 is a diagram for explaining the cooperative operation of the monitoring control device with the door opening device.
- FIG. 34 is a diagram showing a flowchart for explaining registration of the key information in the embodiment of the present invention.
- FIG. 35 is a diagram showing a system configuration for explaining registration of the key information in the embodiment of the present invention.
- FIG. 36 is a diagram showing a part of a flowchart for explaining the process of setting a home return schedule or a home leave schedule in the embodiment of the present invention.
- FIG. 37 is a diagram showing a part of a flowchart for describing a process of setting a return-to-home schedule or going-out schedule in the embodiment of the present invention.
- FIG. 38 is a diagram showing a part of a flowchart for explaining a notification communication process for a person who is going home or going out in the embodiment of the present invention.
- FIG. 39 is a diagram showing a part of a flowchart for explaining a notification communication process for a person who is going to return or going out in the embodiment of the present invention.
- FIG. 40 is a diagram showing a part of a flowchart for explaining a notification communication process for a person who is going to return home or a person who is going to leave in the embodiment of the present invention.
- a door-opening control system is provided at the front door of the house to control locking and unlocking by communicating electronic key information with the electronic key device.
- a security monitoring system was set up in the house to detect the intrusion of thieves from windows and entrance doors, the occurrence of fires, and gas leaks, and to take measures in response to each abnormal situation.
- the security monitoring system and the door opening control system are communicably connected and operated in conjunction with each other.
- the security monitoring system is connected to the management server device through a communication network to constitute a communication system as a whole.
- a communication device of this embodiment is configured by a door lock device described later, which configures the door lock control system, and a monitoring control device described below, which configures the security monitoring and system.
- the electronic key device includes a biometric information acquisition unit, a control IC (Integrated Circuit), and communication means, and various forms can be used.
- a control IC Integrated Circuit
- Specific examples of the electronic key device include a mobile phone terminal, a PDA (Personal Digital Assistant) terminal, and the like, in addition to an IC card.
- the control IC mounted on the electronic key device includes an electronic key information memory, and the electronic key information memory stores the electronic key information.
- the electronic key information identification information that is centrally managed so that the same information does not exist is stored.
- the IC chip serial number is used as the identification information.
- one or more IC chip manufacturers 1001 manufacture IC chips 100 Numbers are assigned. If there are multiple IC chip manufacturers 1001, for example, a serial number to be assigned to the control IC chip 1002 is assigned to each IC chip manufacturer 1001 in advance. By doing so, they will be centrally managed. Therefore, in the memory of the manufactured control IC chip 1002, different IC chip serial numbers are stored as identification information.
- the control IC chip 1002 is used for an IC card manufacturing plant (or manufacturing company) 1003, a mobile phone terminal manufacturing plant (or manufacturing company) 1004, and a PDA terminal manufacturing plant (or manufacturing company).
- IC card manufacturing plant or manufacturing company
- mobile phone terminal manufacturing plant or manufacturing company
- PDA terminal manufacturing plant or manufacturing company
- FIG. 2 is a diagram for explaining an example of an IC chip serial number used in this embodiment.
- the IC chip serial number in this example is made up of a total of 10 digits (including symbols) consisting of a three-digit manufacturer number, a three-digit category code, and a four-digit serial number.
- the identification information is not limited to the IC chip serial number, and any information can be used as long as the information is centrally managed so that the same information does not exist.
- the identification information may be stored separately in the memory of the IC together with the IC chip serial number.
- non-contact communication means using electromagnetic induction or radio waves is used as the communication means of the electronic key device.
- the communication means only needs to be capable of communicating within a range of, for example, a few millimeters to a few tens of centimeters, and a small power is sufficient.
- a door lock device is attached to the entrance door so that the door can be locked and unlocked by an electronic key device.
- communication of electronic key information is performed between the electronic key device and the door lock device, and the door lock device controls locking and unlocking of the door based on the communication.
- communication between the electronic key device and the door lock device is performed by non-contact communication using electromagnetic induction, and as described later, a part of the door lock device is configured.
- the communication is performed via the read-Z writing unit of the electronic key device.
- the identification information including the above-mentioned Ic chip serial number is used.
- the identification information of the electronic key device in which the identification information centrally managed as described above is written in the internal memory is registered as the electronic key information in the management server device. This ensures that each family member owns and uses his or her own electronic key device.
- the management server device stores the electronic key information for each registered family member in the electronic key information storage of the door opening device. Transfer the electronic key information to the door lock device.
- the door lock device compares the registered electronic key information with the electronic key information received from the electronic key device as a communication device, performs authentication, and controls locking and unlocking of the door according to the result. .
- each member of the family can register the main key information and the backup key information as their own electronic key information in the management server device.
- the registration of the main key information and the backup key information is equivalent to the registration of the main key device and the backup key device.
- the key device given to each person is an IC card provided by a door lock control system provider.
- the identification information of the IC card as the key device is registered in advance in the management server device as electronic key information of the owner of the IC card. You.
- the IC card is provided from the provider only for the number of family members, and all the identification information of the plurality of IC cards is used for the installed door opening control system. Is registered in the management server device as the electronic key information of the management server.
- the management server device collects personal information on each family member of the house where the door lock control system is installed, and, in accordance with the personal information, the respective family members The identification information of the member's IC capability is registered. Therefore, by searching the electronic key information, the door opening / closing control system can determine whose electronic key information it is. That is, in the communication system of this example, the electronic key information can be used as personal identification information of family members. Then, the real key information of each family member registered in the management server device is After the lock control system has been installed in the house, the business operator or user of the system issues an initial registration request to the management server device and is registered in the storage unit of the door lock device. It will be used for information authentication.
- the backup key information can be registered in consideration of the case where the key device is lost.
- the backup key information is “1”, and each member of the family provides the identification information (in this example, the IC serial number) of the electronic key device that the family member wants to use as the backup key device. Registration is possible by registering at.
- the entry / exit of each family member from the entrance door is managed by utilizing that the identification information used as the electronic key information can also be used as personal identification information.
- the electronic key information as personal identification information in this way, it is possible to manage the entry and exit of each family member who lives in the house from the entrance door, and the time to return to the person who will return home It is possible to notify the parent of the status of the child returning home, such as notification of excess, and to reflect the entry / exit information in the security system, and to build a more sophisticated security system. it can.
- FIG. 3 is a diagram for explaining an outline of a communication system of this embodiment including a door lock control system and a security system.
- the front door 1 of the house is provided with a door opening device 2 for communicating with the electronic key device.
- a monitoring control device 3 constituting a security system is provided and connected to the door lock device 2.
- the connection device 2 and the monitoring control device 3 may be connected by a force S connected by a connection line or wirelessly.
- the monitoring control device 3 can also be a device that receives the electronic key information from the door opening device 2 and authenticates the electronic key information, that is, an authentication device. However, in this example, the authentication of the electronic key information is performed in the door lock device 2 itself.
- a fire sensor 4 for detecting a fire occurrence a gas sensor 5 for detecting a gas leak, window sensors 6a and 6b for detecting a door lock, and a television 7 are provided in the room, Each is connected to the monitoring control device 3.
- the monitoring control devices 3 and their connection are also connected by connection lines, but they may be connected wirelessly.
- the fire sensor 4 detects the occurrence of a flame
- the fire sensor 4 detects the location near the scene where the fire occurred
- the window sensors 6a and 6b detect the intrusion of a thief.
- Surveillance sights can be provided where the pirates can be photographed.
- the monitoring cameras are connected to the monitoring control device 3, and the images captured by the monitoring cameras are supplied to the monitoring control device 3.
- the monitoring control device 3 is also connected to a management server device 10 operated by a security system management company through a communication network 9 through a telephone line 8.
- the management server device 1 ⁇ can also be a device that authenticates the electronic key information by receiving the electronic key information from the door lock device 2 via the monitoring control device 3.
- the communication network 9 also includes a mobile phone network, and as will be described later, when an abnormal condition occurs, the monitoring control device 3 generates the abnormal condition in the pre-registered mobile phone terminals 11 a and 11. It is possible to inform. Furthermore, the communication network 9 includes the Internet, The computer 12 is capable of accessing the management server device 10 via the Internet. In addition, the management server device 10 can be accessed from the mobile phone terminals 11a and 11b.
- control device in the claims is configured by a door opening control device and a monitoring control device of the door opening device 2 which will be described later.
- a mobile phone terminal, a PDA terminal, or the like can be used as the electronic key device in addition to the IC card.
- the electronic key device is common in that it includes a biometric information acquisition unit, a control IC chip, and communication means.
- An example of the configuration when the electronic key device is an IC card is shown below.
- the electronic key device of the first example is an example of an IC card using a fingerprint as biometric information.
- FIG. 4A shows the surface of the IC card 40 F of this example. The name of the owner and the ID number are displayed on the surface, and the fingerprint reading window 4 of the fingerprint reading section 41 is displayed. 1 W is formed.
- FIG. 4B shows an example of the internal configuration of the IC card 40F.
- a fingerprint reader 41 and an electronic key lead Z of the door opening device 2 described later are provided in the IC card 40F.
- An electromagnetic induction antenna 42 for communicating with the light unit, a control IC 43, and an information transmission / reception circuit unit 44 are built-in.
- the fingerprint reading section 41 reads the fingerprint of the finger placed in the fingerprint reading window 41W, and sends information of the read fingerprint to the control IC 43.
- the control IC 43 compares the fingerprint information of the owner of the IC card 40F, which is registered and stored in advance, with the read fingerprint information, and determines whether or not they match.
- the electronic key information stored in advance in the memory in the control IC 43 is read out and transmitted to the outside through the information transmitting / receiving circuit section 44 and the electromagnetic induction antenna 42. .
- the stored fingerprint information is compared with the read fingerprint information, and when it is determined that they do not match, sending out the electronic key information to the outside is prohibited.
- FIG. 5 shows an internal block configuration of the IC card 40F in the case of the first example.
- a ROM (Read Only Memory) 403 in which programs and data are recorded via a system path 402 for a CPU (Central Processing Unit) 401, and a work area RAM ( R andom Access Memory 404, an identification information memory 405 in which identification information serving as electronic key information is stored, a communication history memory 406, a transmission / reception interface 407, and a fingerprint registration memory 4 08, a fingerprint reading unit interface 409, and a fingerprint matching unit 4110 are connected.
- ROM Read Only Memory
- the identification information memory 405 stores identification information including the above-mentioned IC serial number. In addition to the name and address of the owner of the IC card 40, other necessary personal information of the owner can also be stored. This personal information is structured so that the father, mother, child, etc. can be distinguished.
- the communication history memory 406 stores the time and history of communication with the electronic key read / write unit described later by the owner of the door lock device 2 (either the inner or outer electronic key read / write). It is possible to write information such as information on whether or not it communicated with the light department), the history of each owner going out and returning home. In addition, this As will be described later, these pieces of history information are also stored in an area corresponding to each family member in the memory of the door lock device 2 and the memory of the monitoring control device 3.
- An information transmission / reception circuit section 44 connected to the electromagnetic induction antenna 41 is connected to the transmission / reception interface 407.
- the fingerprint registration memory 408 fingerprint information of the owner of the IC card 40F is previously registered and stored.
- the fingerprint reading unit interface 409 is for taking in fingerprint information read by the fingerprint reading unit 41.
- the fingerprint collating unit 410 compares the fingerprint information obtained through the fingerprint reading unit interface 409 with the fingerprint information of the owner read from the fingerprint registration memory 408, and It determines whether or not they match, and sends the result of the determination to the system bus 402.
- the fingerprint collating unit 410 may be configured not by hardware but by software based on CPU 401.
- the CPU 410 based on the determination result of the fingerprint collating unit 410, determines that the fingerprint matches, that is, when the fingerprint collation is OK, the identification information read from the identification information memory 405.
- the electronic key information is transmitted through the transmission / reception interface 407, the information transmission / reception circuit 408, and the electromagnetic induction antenna 41, and the result of the judgment by the fingerprint collation unit 410 does not match the fingerprint. If this is the case, transmission of electronic key information is prohibited.
- the CPU 401 captures information received by the electromagnetic induction antenna 42 through the information transmission / reception circuit section 44 and the transmission / reception interface 407, and writes the information to the communication history memory 406. Is also performed.
- FIG. 6 is a flowchart for explaining the processing operation of the CPU 401 at this time.
- the CPU 401 waits for reception of fingerprint information from the fingerprint reader 41 via the fingerprint reader interface 409 (step S 1). If it determines that the fingerprint information has been received, it registers the fingerprint. The fingerprint information of the owner registered in the memory 408 is read out, and the fingerprint matching section 410 performs the fingerprint matching (step S 2).
- the CPU 410 determines whether or not the result of the fingerprint matching from the fingerprint matching unit 4.10. Is a fingerprint match (step S3). If the fingerprint is not matched and the matching is NG, The process is terminated without sending the electronic key information.
- the CPU 401 reads out the identification information from the identification information memory 405, and as the electronic key information, the information transmitting / receiving circuit section 44 and the electromagnetic induction antenna 4 It is transmitted through step 2 (step S4).
- the CPU 401 determines whether or not communication has been performed with the read / write unit of the other party (step S5), and the electromagnetic induction antenna 42, the information transmission / reception circuit unit 44, and the transmission / reception interface 40
- predetermined information is received from the other party through step 7
- step S5 If it is determined in step S5 that no information has been received from the other party's read / write unit and communication has not been performed, the CPU 401 transmits electronic key information and then transmits the electronic key information for a predetermined period of time. It is determined whether or not the time has elapsed (step S7). If it is determined that the predetermined time has not elapsed, the process returns to step S4, where the electronic key information is sent again and information from the other party is waited for. When it is determined in step S7 that the predetermined time has elapsed, this processing routine is terminated. As described above, according to the IC card 40F as the electronic key device in this example, the fingerprint of the owner registered in advance is compared with the fingerprint of the user, and if the collation is OK. Since only the electronic key information is transmitted, only users registered in advance can use the electronic key device, and even if the electronic key device is lost, it prevents other users from using it. be able to.
- the electronic key device of the second example is an example of an IC card using an iris as the biological information.
- Figure 7A shows the surface of the IC card 40I in this example, which shows the owner's name and ID number, as well as a means for reading the user's iris.
- a CCD (Charge Couled Device) camera 45 is provided.
- FIG. 7B shows an example of the internal configuration of the IC card 40 I.
- the IC card 40 I like the IC card 4 OF of the first example, an electromagnetic induction antenna 42 and A control IC 43 and an information transmission / reception circuit 44 are built in, and an imaging signal processing circuit for processing the imaging signal from the CCD camera 45 and supplying it to the control IC 43 4 6 are built-in.
- the user causes the CCD camera 45 to photograph his or her eyes (iris).
- the CCD camera 45 captures the iris information of the photographed user through the imaging signal processing circuit section 46, and sends the captured iris information to the control IC 43.
- the control IC 43 compares the iris information of the owner of the IC card 40 I, which is registered and stored in advance, with the captured iris information, and determines whether or not they match.
- the electronic key information stored in advance in the memory of the control IC 43 is read out and transmitted to the outside through the information transmitting / receiving circuit 44 and the electromagnetic induction antenna 42. I do.
- the information is compared with the captured iris information, and if it is determined that they do not match, sending out the electronic key information to the outside is prohibited.
- FIG. 8 shows an internal block configuration of the IC card 40I in the case of the second example.
- the iris information registration memory 4 is replaced with the fingerprint registration memory 408, the fingerprint reading unit interface 409, and the fingerprint collation unit 410 of the first example in FIG. 11, an imaging signal interface 4 12, and an iris matching section 4 13 are provided.
- the image signal interface 412 is connected to the CCD camera 45.
- Other configurations are the same as those in FIG. 5 of the first example.
- iris information registration memory 411 iris information of the owner of the IC card 401 is registered and stored in advance.
- the imaging signal interface 4 12 is for taking in iris information from the imaging signal processing circuit section 46.
- the iris collating unit 4 13 compares the iris information captured through the imaging signal interface 4 12 with the iris information of the owner read from the iris information registration memory 4 11, and determines whether they match. Is determined, and the result is sent to the system path 402.
- the iris collating unit 4 13 can be configured not by a hardware due to software but by a CPU 410.
- the CPU 410 stores the electronic key information including the identification information read from the identification information memory 405.
- the transmission / reception interface 407, the information transmission / reception circuit 44, and the electromagnetic induction antenna 41 transmit the signal. If the determination result of the iris matching unit 413 does not match the iris, that is, if the iris matching is NG, the electronic key information Prohibit sending.
- FIG. 9 is a flowchart for explaining the processing operation of the CPU 401 at this time.
- the CPU 401 waits for reception of the iris information from the imaging signal processing circuit unit 46 through the imaging signal interface 412 (step S11).
- the iris information The iris information of the owner registered in the registration memory 411 is read, and the iris is compared in the iris matching section 413 (step S12).
- the CPU 410 determines whether or not the iris matching result from the iris matching unit 4 13 is iris matching (step S 13), and if the iris does not match and the matching is NG. If so, the process is terminated as it is, and the electronic key information is not sent.
- the CPU 401 reads the identification information from the identification information memory 405, and as the electronic key information, the information transmitting / receiving circuit section 44 and the electromagnetic induction antenna 4 It is transmitted through step 2 (step S14).
- the CPU 401 determines whether or not communication has been performed with the other party's read / write unit (step S15), and the electromagnetic induction antenna 42, the information transmission / reception circuit unit 44, and the reception / reception unit
- the communication with the other party is assumed to have been performed, and the communication history is written into the communication history memory 406 (step S16).
- step S15 If it is determined in step S15 that no information has been received from the other party's read Z-write unit and communication has not been performed, the CPU 401 sends the electronic key information and then sets a predetermined value. It is determined whether or not the time has elapsed (step S17). If it is determined that the predetermined time has not elapsed, the process returns to step S14, where the electronic key information is transmitted again and information from the other party is waited for. Then, when it is determined in step S7 that the predetermined time has elapsed, this processing routine ends as it is.
- the IC card 401 as the electronic key device of the second example, the iris of the owner registered in advance and the iris of the user are collated, and the collation is OK. Since the electronic key information is transmitted only in certain cases, only the registered user can use the electronic key device, and even if the electronic key device is lost, other users can use it. Can be blocked.
- the fingerprint and the iris are described as the biometric information, but the biometric information is not limited thereto.
- the vein pattern of the back of the hand can be used as biological information.
- the vein pattern of the back of the owner's hand is registered and stored in place of the iris information, and the vein pattern of the back of the hand is captured and captured by the CCD camera 45, thereby obtaining the second example.
- the configuration of the IC card 401 can be used as it is.
- the present invention is not limited to the above example, and it is needless to say that any biometric information that can be identified and that can be obtained by a predetermined means can be used.
- FIGS. 10A and 10B are diagrams for explaining an example of the configuration of the door opening device 2.
- Figure 10A shows the door lock device for entrance door 1 from outside the house
- FIG. 3 is a view of the vicinity of a mounting portion of FIG.
- FIG. 10B is a view of the vicinity of a portion where the door lock device 2 is attached to the entrance door 1 as viewed from the end face side of the entrance door 1.
- an outside electronic key reader for communicating with an IC card 40F or 401 as an example of an electronic key device is provided outside the entrance door 1 (outside door).
- / Writer part 2 1 eX and electronic key information authentication Outlet Led (Light Emitting Diode) 2 2 e X as an example of a display element for visually indicating whether the door is locked or unlocked, and the authentication result of the Neiko key information
- An external speed 23 eX for notifying the locking or unlocking of the entrance door 1 by voice and an external door knob 24 eX are provided.
- an inside electronic key reader Z writer 21 in for communicating with an IC card 40F or 40I as an example of an electronic key device, and an electronic key reader.
- Inner LED 2 2 in as an example of a display element for visually notifying the authentication result of the key information and the locking / unlocking of the entrance door 1.
- the entrance door 1 is further provided with an entrance door locking piece 25, a locking piece 26, and a door open / close sensor 27. Further, inside the entrance door 1, a door opening control device 100 for controlling the operation of the door opening device 2 is provided, and the electronic key reader Z writer section 2 1 ex and 2 1 in, LED 2 2 ex and 22 in, speaker 23 ex and 23 in, door open / close sensor 27 and a door opening mechanism driving unit (not shown) are provided by the door opening control device 10. Connected to 0.
- the entrance door locking piece 25 is a member that slides and moves in a direction perpendicular to the end surface 1a of the entrance door according to the operation of the door knob 24 eX or the door knob 24 in. This is because even when the door 1 is not locked in a case other than the auto lock mode which will be described later, even when the door 1 is not locked, the door 1 is engaged with the recess provided on the end face side of the wall opposite to the end face 1a. Door 1 is to be locked.
- the lock piece 26 is a member constituting a part of the door lock mechanism.
- the door lock mechanism is driven by a door lock mechanism driving unit (not shown), so that the door is slid in a direction perpendicular to the end surface 1a of the entrance door.
- a door lock mechanism driving unit not shown
- a recess is formed on the end face of the wall facing the end face 1 a of the entrance door 1 to be fitted when the lock piece 26 is in a protruding state.
- the state in which 6 is fitted into the recess is the locked state of the entrance door. Then, when the lock piece 26 is retracted toward the entrance door 1 and is not fitted in the concave portion, the locked state is released and the locked state is established.
- an optical sensor is used as the entrance door opening / closing sensor 27.
- the entrance door 1 is opened by detecting external light, and when the entrance door 1 is closed, the entrance door 1 is closed.
- the external light is cut off by the end face 1a of 1 abutting against the end face of the wall, this is detected, and the opening and closing of the entrance door 1 is detected.
- FIG. 11 shows an electrical configuration example of the door lock device 2 centering on the door lock control device 100.
- the electronic key device the IC card 40F of the first example that performs fingerprint collation authentication is used.
- the door opening control device 100 has a microcomputer configuration, and is configured to program data to the CPU (Central Processing Unit) 101 via the system path 102.
- ROM Read Only Memory
- RAM Random Access Memory
- ry 104, a family information memory 120 that stores identification information (in this example, an IC serial number) serving as electronic key information for each family member, and communication with the monitoring control device 3.
- a communication interface 122 for performing the operation and a clock circuit 122 are connected.
- the real key information / backup key information registered in the management server device 10 is registered and stored as electronic key information for each family member. I have. Also, information for identifying each family member, for example, name, age, gender, relationship, and other personal information may be stored in the family information memory 120 together. The registration of the electronic key information into the family information memory 120 will be described later.
- the system bus 102 has an inner electronic key read / write section 21 in and an outer electronic key read Z write section 21 eX via interfaces 105 and 106. Connected, the inner LED 22 in is connected via the inner LED driver 107, the outer LED 22 ex is connected via the outer LED driver 108, and the audio output interface The inner speaker 23 in is connected via the space 109, and the outer speaker power 23 eX is connected via the audio interface 110.
- a door opening / closing sensor 27 is connected to the system bus 102 via an interface 111, and a lock piece 26 is slidably driven via a door lock mechanism driving unit 112. Mechanism 28 is connected.
- the electronic key read / write unit 21 ex or 21 in constitutes a communication unit that communicates with the IC card 40F (or 401).
- the electronic key lead Z light unit 21 eX or 21 in includes an electromagnetic induction antenna and an information transmitting / receiving unit.
- the door lock control device 100 of this example has two control modes of the door lock control mode: an auto lock mode and a sequential lock mode.
- the door lock control device 100 unlocks the entrance door 1 based on communication with the IC card 40F via the electronic key read / write unit 21 ex, 21 in. In this mode, the entrance door is automatically locked after a predetermined period of time. In the auto-lock mode, both the inner and outer electronic key readout Z-write units 21ex and 21in are always used.
- the door In the sequential lock mode, the door is locked and unlocked based on communication with the IC card 4OF at least through the electronic key lead Z light section 21 eX outside the entrance door 1. In this mode, the state is reversed. Even in this sequential lock mode, the force that can use both the inner and outer electronic key read / write sections 21ex and 21in can be used when the inside is locked by a separate manual locking means.
- the door lock / unlock operation can be performed only by communication with the IC card 40F through the outer electronic key reader / writer 21 eX.
- This sequential lock mode is a mode adapted to a conventional locking and unlocking method using a general key.
- the setting for selecting whether the door lock control mode of the door lock device 2 is the auto lock mode or the sequential lock mode is described later, for example, when the door lock device 2 is attached.
- the monitoring is performed by the operator through the monitoring control device 3.
- the control device 100 controls the nonvolatile memory.
- the memory information of the memory it is possible to recognize whether the device is in the door opening control mode mode or the automatic lock mode mode and the sequential lock mode. The setting operation of the door opening control mode through the monitoring control device 3 will be described later.
- the selection of whether to set the door lock control mode of the door lock device 2 to the auto lock mode or the sequential lock mode is not performed through the monitoring control device 3 but to the door lock device 2. It can be done directly. For example, when the door lock device 2 is shipped, the setting of which door lock control mode to use may be set in the door lock device 2 in advance.
- the door lock device 2 is provided with input operation means, such as a dip switch, which can be operated by an installer of the door lock device 2, and the door lock control mode is set through the input operation means. You may do so.
- FIG. 12 is an external view for explaining the configuration of a monitoring and control device 3 for a security system provided in a room.
- the monitoring and control device 3 is controlled by a remote commander 50 using, for example, infrared rays or radio waves. It is configured to be controllable.
- a video camera 31 is incorporated in a housing 30 of the monitoring control device 3.
- the video camera 31 is attached to the housing 30 by a mechanism that can take either a horizontal position at a solid line position or a vertical position at a dotted line position.
- the video camera 31 starts photographing in response to an instruction from the monitoring control device 3 when the security mode is turned on.
- the video camera 31 since the video camera 31 has a structure in which the video camera can be adjusted in the swing direction, it can be changed by the adjustment. Has been. Therefore, the user can adjust the shooting direction with the video camera 31 before turning on the security mode.
- the housing 30 is provided with a shooting lamp 32 for brightly illuminating a portion to be shot by the video camera 31.
- the housing 30 is provided with a human sensor 33 for detecting a person by detecting, for example, far infrared rays. As will be described later, when the human detection sensor 33 detects a person in the security mode on, the monitoring control device 3 detects the intrusion of a thief, turns on the photographing lamp 32, and Send the shot image to the notification destination.
- the housing 30 is further provided with a microphone 34 and a speech force 35.
- the microphones 34 are for picking up the voice of a pirate—the sound of the room when the pirate enters.
- the speaker 35 is used, for example, to emit a sound that intimidates an invading intruder.
- the housing 30 is further provided with an electronic key lead Z-light unit 36.
- the electronic key read Z write unit 36 is used for recording and reproducing a message. That is, in this example, the monitoring and control device 3 is configured to also serve as a message device, and the electronic key read / write unit 36 reads the IC card 40F as the electronic key device. Then, press the message recording button on the remote commander 50 as described later to leave a message for the set partner (anybody in the family), and press the message playback button on the remote commander 50. Press to play the message addressed to you.
- the housing 30 is provided with a plurality of LEDs 37 for use in, for example, notifying whether or not this message is recorded.
- the housing 30 further includes a remote control signal receiving unit from the remote commander 50. 3 8 are provided.
- a video output terminal connected to the video input terminal of the television receiver 7 is provided on the rear panel of the monitoring control device 3. Further, the monitoring control device 3 is provided with a remote control transmitting unit 39 for controlling turning on / off of the power of the television receiver 7. Further, the monitoring control device 3 includes a fire sensor 4, a gas sensor 5, window sensors 6a and 6b, and a sensor hub for connecting a monitoring force sensor. Further, as described in FIG. 3, the monitoring control device 3 is configured to be able to access the management server device 10 operated by the security system management company via a telephone line.
- Fig. 13 shows an example of the internal configuration of the monitoring and control device 3 and the connection state between the monitoring and control device 3 and peripheral devices.
- the monitoring control device 3 has a microcomputer configuration.
- the CPU 201 has a ROM 203 storing programs and data via a system bus 202 and a work area RAM.
- the electronic key information of the whole family who owns the IC card 400F or 410I as the electronic key device is stored.
- a family information memory 205 storing the following identification information; a door opening device communication interface 206 for communicating with the door opening control device 100; a sensor hub 200; Image for storing the image captured by the video camera 31 and the voice collected by the microphone 34 'Sound memory 208 and communication for communicating with the management server device 10 etc. via a telephone line Interface 209 is connected.
- a video camera 31 is connected to the system bus 202 via a camera interface 210, and a shooting The illumination mechanism 3 20 of the switch 3 2, the human sensor 3 3 via the interface 2 1 2, the electronic key read / write unit 3 6 via the interface 2 1 4, and the interface 2 5
- the remote control receiving section 38, the remote control transmitting section 39 via the interface 216, the microphone 34 via the voice input interface 218, and the LED 3 via the interface 219 7 power S and voice power 35 are connected via voice output interface 220 respectively.
- system bus 202 is connected to the television receiver 7 via a television interface 217 comprising a video signal output terminal.
- a clock circuit 221 and a notification communication setting memory 222 are connected to the system bus 202.
- the family information memory 205 is composed of, for example, EEPROM (Electrica11yErasableleProgramammable ROM).
- the family information memory 205 stores identification information for each family member and personal information.
- information composed of identification information and personal information will be referred to as personal profile information.
- the installation manager requests the personal registration information to the management server device 10 when the door lock device 2 and the monitoring control device 3 are installed.
- the information is sent from the management server device 10 and automatically registered in the monitoring control device 3.
- the monitoring control device 3 transfers the personal identification information of at least the personal profile information to the door opening control device 100 as electronic key information.
- the door lock control device 100 registers the electronic key information in the family information memory 120.
- Figure 14 shows an example of personal profile information for one person. As shown in FIG. 14, personal profile information is information in which personal identification information and personal information are associated with each other and stored.
- the personal identification information is: As described above, the identification information stored in each memory of the electronic key device is used. By associating the personal identification information with the personal information, it is possible to determine who the identification information is. As described above, this identification information has a role of electronic key information. As shown in FIG. 14, as the electronic key information, the main key information and the backup key information can be registered. . A plurality of pack-up key information may be registered.
- personal information is information other than personal identification information, including password information, name, address, date of birth, age, relationship, registration date, bank account number, telephone number, and e-mail address. , IP address, hobby / taste information, entry / exit history information from the entrance 8 of the house, electronic key registration / loss history information, etc. are stored in the family information memory 205.
- the entry / exit history information of this example stores the time of going out and the time of returning home, and also includes the power of going out and the presence / absence flag indicating whether or not the person is at home.
- the entry / exit history information is used by the monitoring control device 3 to manage the entry / exit of the family through the entrance door 7.
- the electronic key registration and loss history information is stored when the backup registration request or the deletion request for the electronic key information from the management server device 10 arrives and the backup registration or deletion processing is performed.
- the backup key information and the deleted electronic key information are recorded together with the time and time, distinguishing between backup registration and deletion.
- the family information memory 205 also stores information for the security mode. That is, in this example, the monitoring control device 3 is configured to be able to change the security level in accordance with the home status of the family members.
- Figure 15 shows the security level. 7 is a table showing a relationship between the home and the home status of family members.
- Figure 16 is a table showing the correspondence between security levels and security contents.
- the security levels are Level ⁇ , Level ⁇ , Level C, and Level D in order of security level, and at Level A, the windows and entrance doors Monitoring, fire monitoring, gas leak monitoring, and video camera 31 monitoring, and at level B, without monitoring by video camera 31, monitoring windows and doors And level C, monitoring for fires and gas leaks only, and level D does not.
- each security level is assigned to each family member's home status. That is, in this example, when the father is at home, the level is set to D, which is not monitored. In the situation where the father is absent but the mother is at home, it is Level C which only monitors for fires and gas leaks. In addition, when only children are at home, monitoring of windows and entrance doors is performed at level B, which monitors fire and gas leaks, and when all are absent, monitoring is performed at level A. It is said.
- the monitoring control device 3 When the security mode is turned on or the security level is changed, the monitoring control device 3 refers to the tables in FIGS. 15 and 16 and determines the security level according to the home situation. I do.
- the relationship between the security level in Fig. 15 and the home status of family members can be set in advance, or the user can input and set it to the monitoring control device 3 using, for example, a remote commander 50. Is configured so that the settings can be changed. It goes without saying that the table information in FIGS. 15 and 16 may be stored in another memory instead of the family information memory 205.
- the door opening device communication interface 206 is connected to the door opening control device 100.
- a fire sensor 4, a gas sensor 5, window sensors 6a and 6b, and one or more surveillance cameras 13 are connected to the sensor hub 207.
- the image and sound memory 208 includes a monitoring information area for buffering image information captured by the video camera 31 and sound information collected by the microphone 34 when the security mode is on, and a message. And a message information area for storing image information and audio information recorded as a message (the surveillance information area is also provided with an image storage area for the surveillance camera 13).
- the monitoring information area stores image information and audio information for a predetermined time, for example, 30 seconds, in a so-called ring buffer format. It should be noted that the monitoring information area and the message information area may have different memory configurations.
- the communication interface 209 is connected to the router 61 in this example.
- the router 61 is connected to a telephone line 65 through an ADSL modem 62 and a splitter 63.
- the telephone terminal 64 is connected to the splitter 63.
- the clock circuit 222 sends information on the current time to the system path 202.
- the current time information includes so-called calendar information such as year, month, day, and day of the week.
- the notification communication setting memory 222 stores a person who is going to return, who is going to go out, and who Stores setting information such as scheduled home time, scheduled home time, and notification contact. Based on this setting information, the CPU 201 notifies the set notification contact person of the status of returning to home or the time of going home, the status of going out, the time of going out, etc. .
- the setting operation and notification notification operation will be described later.
- the remote commander 50 for the monitoring and control device 3 includes a security button 51, an off button 52, a message recording button 53, a message playback button 54, and a menu button 55. And a cursor button 56 composed of four keys for selecting up, down, left and right and a decision key at the center thereof.
- registration of a personal ID as electronic key information for the management server 10, setting of the door lock control mode of the door lock device 2, and other menu items are provided in this example.
- An application program for executing a process corresponding to each menu item is stored in the ROM 203 of the monitoring control device 3.
- the management server device 10 has a computer configuration.
- the CPU 301 has a ROM 303 storing programs and data via a system bus 302 and a work area RAM. 304, door lock device management database 305, electronic key registration / lost history memory 306, and communication interface 307 for communication through a communication network such as the Internet Have been. Further, to the system bus 302, a homepage memory 308 and an image / audio memory 309 are connected.
- the door occupation device management database 3005 contains the serial numbers of the door occupation device 2 and the monitoring and control device 3, the address where the door occupation device 2 and the monitoring and control device 3 are installed, and the telephone number.
- the information necessary for the management of the door lock device 2 such as the IP address, the name of the user of the door lock device, the registered electronic key information and personal profile information, is stored.
- the telephone number and the IP address are address information on the communication network 9 of the door opening device 2 and the monitoring control device 3.
- Electronic key registration and loss history memory 303 stores the history of electronic key information registration and loss for each door lock device 2.
- display information of each page of the homepage is stored.
- display information of a necessary page is read out from the memory 308 and transmitted. It is transmitted to the communication network through the interface 307.
- the image / audio memory 309 stores the image / audio information sent from the security monitoring system, as described later.
- the management server device 10 checks the image and sound from the security monitoring system, notifies the security company, and provides the image and sound information through the home page at the request of the user.
- the monitoring control device 3 in this example is an electronic key device, in this example, an IC card 4OF, and a remote commander 5 Using 0, you can specify a specific family member and record the message.
- the LED 37 is lit or blinks to notify the user.
- the person who came home reads the IC card 40 F as his / her own electronic key device by the electronic key read / write unit 36.
- FIG. 18 is a flowchart for explaining the processing of the monitoring control device 3 for the message recording and reproduction. The processing of each step S in FIG. 18 is executed by the CPU 201 in accordance with a program stored in the ROM 203.
- the user holds his or her own IC card 40F over the electronic key read / write unit 36 to perform communication.
- the CPU 201 determines whether or not the electronic key read / write unit 36 has communicated with the IC card 40F (step S21). With this, it is recognized who the IC card 40F communicated with (step S22).
- step S23 it waits for the arrival of a remote control signal from the remote commander 50 (step S23), confirms that the remote control signal has been received, and checks whether the remote control signal is from the operation of the message recording button 53. It is determined whether or not the message is recorded (step S24). If it is determined that the message is due to the operation of the message recording button 53, the CPU 201 performs a message recording operation (step S33). ).
- the supervisory control device 3 captures the image information of the message taken by the video camera 31 through the camera interface 210 and stores it in the message recording area of the image / voice memory 208.
- the message voice information (message message) collected by The image is captured through the interface 218 and stored in the message recording area of the image ⁇ ⁇ voice memory 208.
- the image information and the audio information are associated with the identification information read from the electronic key device 40 and stored in the image / audio memory 208 together with the identification information.
- the CPU 201 refers to the personal profile information of the family stored in the family information memory 208, and displays a list of message partners other than the operator attempting to record a message on the television receiver 7. (Step S34). At this time, when the power of the television receiver 7 is not turned on, a remote control signal for turning on the power is supplied to the television receiver 7 through the remote control transmitter 38, and the power of the television receiver 7 is turned on. Keep it.
- the list screen of the message partner may be superimposed on the image of the television program, for example, by superimposing, or may be a single screen without overlapping the image of the television program. .
- the operator uses the cursor keys 56 of the remote commander 50 to select and input a message from the list of messages, and presses the center decision key of the cursor keys 56.
- the CPU 201 of the supervisory control device 3 receives the selection input of the message partner (Step S35), and stores the information of the message partner in the message recording area of the image / voice memory 208, as described above. It is stored and registered in association with the image information and the message voice message (step S36). Then, one LED 37 is turned on to notify that the message has been recorded (step S37). As shown in FIG. 12, a plurality of LEDs 37 are provided, and the LEDs 37 are turned on by the number of recorded messages.
- step S24 If it is determined in step S24 that the remote control signal is not due to the operation of the message recording button 53, it is determined whether or not the signal is due to the operation of the message playback button 54 (step S25).
- step S25 Message playback port
- the CPU 201 performs a process according to the operated button (step S26).
- step S25 when it is determined that the message is due to the operation of the message playback button 54, the CPU 21 uses the identification information recognized in step S22 as a searcher, and sets the image / voice memory 20 The contents stored in the message recording area 8 are searched to determine whether there is a message addressed to the operator holding the IC card 40 F over the electronic key read / write section 36 (step S 27). ), And in step S27, when it is determined that there is no message to the operator, the CPU 201 reads, for example, the character information of "there is no message" prepared in the ROM 203 in advance. The information is displayed on the screen of the television receiver 7 and is emitted as sound through the speaker 35 to notify the operator (step S28).
- step S27 When it is determined in step S27 that there is a message addressed to the operator, the message image and the message voice addressed to the operator are read out from the image / voice memory 208 and displayed on the television receiver 7. At the same time, the sound is reproduced from the speaker 35 (step S29).
- the CPU 201 displays an inquiry as to whether or not to delete the message on the screen of the television receiver 7, so that the operator can use the “YE S”, “ “NO” is selected using the cursor key '56 of the remote commander 50.
- the CPU 201 determines from the operator's selection input whether or not to delete the message (step S 30). If it is determined that the message is to be deleted, the CPU 201 determines whether the message is to be deleted. The information is erased (step S31), and one of the lit LEDs 37 is turned off (step S32). Then, the message recording / reproducing processing routine ends.
- step S30 If it is determined in step S30 that the message is not deleted, Then, the message recording / reproducing process routine ends.
- the door opening control mode can be set through the monitoring control device 3, and the setting operation will be described with reference to the flowchart of FIG.
- the CPU 201 of the monitoring control device 3 monitors the received signal of the remote control receiving unit 38 to determine whether a specific button operation for the setting menu including the setting of the door opening control mode has been performed. It is determined whether or not it is (step S41).
- the specific button operation is an operation that is not performed by a normal user, for example, a simultaneous operation of the security button 51 and the menu button 55.
- Such a specific button operation is defined for the installer of the door lock device 2 to perform setting work. This is to prevent the setting of the door lock control mode from being easily changed.
- step S41 If it is determined in step S41 that the specific button operation is not performed, other processing such as processing corresponding to a single button operation is performed (step S42).
- step S41 When it is determined in step S41 that the specific button operation has been performed, a list of setting menus is displayed on the screen of the television receiver 7 in the same manner as in the above-described message recording / playback. Yes (step S43).
- step S44 the operator selects a setting menu item to be performed using the cursor keys of the remote commander 50.
- the CPU 201 monitors the received signal of the remote control receiver 38 to determine whether or not a menu item has been selected (step S44), and has determined that the menu item has been selected. In some cases, for example, the currently selected item that is highlighted is changed according to the selection operation (step S45). Then, it is determined whether or not the setting item determination operation has been performed (step S46). If it is determined in step S44 that a menu item selection operation has not been performed, the process immediately proceeds to step S46 to determine whether a setting item determination operation has been performed.
- step S46 If it is determined in step S46 that the setting item is not determined, the process returns to step S44. If it is determined in step S46 that the setting item has been determined, it is determined whether the selected setting item is the setting of the door opening control mode (step S47). If not, the processing routine for the other selected setting item is executed (step S48).
- step S47 If it is determined in step S47 that the selected setting item is the setting of the door opening control mode, the CPU 201 displays the auto rotator mode and the sequential opening mode on the screen of the television receiver 7. Is displayed (step S49). The operator performs any selection input on this selection screen using the cursor keys 56.
- the CPU 201 monitors the remote control receiver 38 to determine whether or not the automatic lock mode has been selected (step S 50). A setting operation for setting the lock device 2 to the auto lock mode is performed (step S51).
- the CPU 201 stores the information indicating the automatic lock mode in the storage area of the door lock control mode of the door lock device 2 of the nonvolatile memory unit built in the monitoring control device 3. At the same time, an instruction to switch to the auto lock mode is sent to the door opening device 2 through the door opening device communication interface 206.
- step S50 If it is determined in step S50 that the automatic lock mode is not set, the CPU 201 determines that the sequential lock mode has been selected, and A setting operation is performed to sequentially set the door opening device 2 to the opening mode (step S52).
- the CPU 201 stores the information indicating the sequential lock mode in the storage area of the door lock control mode of the door lock device 2 in the nonvolatile memory unit built in the monitoring control device 3, and An instruction to switch to the lock mode is sent to the door opening device 2 through the door opening device communication interface 206.
- the operation of the door lock control device 100 that has received the instruction information of the door lock control mode transmitted through the door lock device communication interface 206 will be described with reference to the flowchart of FIG. It will be described with reference to FIG.
- the CPU 101 of the door lock control device 100 determines whether or not the setting instruction information of the door lock control mode has been received from the monitoring control device 3 (step S61). (Step S62).
- step S61 when it is determined that the door lock control mode setting instruction information has been received from the monitoring control device 3, the CPU i01 selects the door lock control mode selected and instructed in the auto lock mode and the sequential lock mode. Is determined (step S63).
- step S63 When it is determined in step S63 that the selected door opening control mode is the automatic lock mode, the CPU 101 resets the door opening control mode of the door lock device 2 to the automatic mode. A process for setting the lock mode is performed (step S64).
- step S64 the door lock control device 100
- the CPU 10i sets the door lock based on the auto lock mode setting instruction.
- An application that activates both the inner electronic key read / write section 21 in of the device 2 and the outer electronic key read / write section 21 eX, and also controls the door lock of the program ROM 13 For the auto lock mode.
- the CPU 101 stores information indicating the auto lock mode in the storage area of the door lock control mode of the nonvolatile memory unit provided in the door lock control device 100.
- step S63 If it is determined in step S63 that the selected door lock control mode is the sequential lock mode, the CPU 101 sets the door lock control mode of the door lock device 2 to the sequential lock mode. Is performed (step S65).
- step S65 the CPU 101 of the door lock control device 100, based on the sequential lock mode setting instruction, determines in this example that the inner electronic key read Z-write portion of the door lock device 2 Activate both 21 in and the outer electronic key read / write unit 21 eX, and make the application for door lock control of the program ROM 13 for sequential lock mode. . Then, the CPU 101 stores information indicating that the door lock control mode is the sequential lock mode in the storage area of the door lock control mode of the nonvolatile memory unit included in the door lock control device 100.
- both the inner electronic key read Z-write section 21 in and the outer electronic key read / write section 21 eX are used.
- locking from the inside of the house is a problem.
- the entrance door 1 is locked in a steady state. Then, the electronic key device 40 is held over the inner electronic key read / write unit 21 in or the outer electronic key read / write unit 21 eX, and communication is performed between the two, and identification information and That is, when the electronic key information is authenticated, the door is unlocked only for a predetermined time, and after a predetermined time, the door 1 automatically returns to the locked state. Is controlled by
- the CPU 101 monitors the inner electronic key lead Z-light part 21 in and the outer electronic key lead Z-light part 21 ex via the interfaces 105 and 106, and Waiting for key device 40 to be held over and communication between electronic key device 40 and inner electronic key lead Z-write section 21 in or outer electronic key read / write section 21 eX (Step S71).
- step S71 when it is determined that the IC card 40F is held over and the communication with the read Z write unit 21in or 21ex has been performed, the CPU 101 determines the identification information.
- the data is received from the IC card 400 and temporarily stored in, for example, the RAM 104 (step S72).
- the time information of the clock circuit 122 provided in the door lock control device 100 is also stored in the RAM 104 together with the identification information as the communication time, and the time information is stored in the IC 104. It is given to the card 40F and written to the memory of the control IC 42.
- the inner electronic key lead Z-light part 21 in or the outer electronic key lead / Light part 2 The information of the lex
- the CPU 101 determines whether communication with the IC card 40 F has been performed using the inner electronic key read Z-write section 21 in or the outer electronic key read Z-write section 21 ex. (Step S73).
- the result of the determination and the communication time information are also written as communication history information in the family's memory area of the family information memory 120 corresponding to the identification information.
- the identification information, communication time, and the result of determining which of the inner electronic key read / write unit 21 in and the outer electronic key read / write unit 21 eX communicated with the IC card 40 F. Is also transferred to the monitoring control device 3 for storage in the family information memory 205.
- step S73 When it is determined in step S73 that the communication with the IC card 40F is performed on the inside electronic key read / write unit 21in, the CPU 101 determines whether or not the resident is going out. If so, perform the following processing. In this example, when the resident unlocks the entrance door 1 and opens the entrance door 1, the security mode is turned off even if the security mode is on by then. And
- the CPU 101 compares the identification information stored in the family information memory 120 with the identification information received from the IC card 40F, and stores the identification information in the family information memory 120. Depending on whether any of the identification information as the electronic key information matches the identification information received from the IC card 40 F, the IC card 40 F is registered in the door opening device 2 depending on whether or not the identification information is received from the IC card 40 F. It is determined whether or not the device is a key device, and the IC card 40F is authenticated (step S74). Then, the authentication result is determined (step S75), and if there is no identification information stored in the family information memory 120 that matches the identification information received from the IC card 40F.
- the CPU 101 drives the inner LED driver 107 to blink the inner LED 22 in in red, A warning sound is emitted from the inside speaker 2 3 in, and the certification is NG. The user of the force 40F is notified (step S76). Then, the process returns to step S71 with the door lock mechanism 28 kept in the locked state.
- step S75 if there is any of the identification information stored in the family information memory 120 that matches the identification information received from the IC card 40F, the authentication is OK.
- the CPU 101 drives the inner LED driver 107 to turn on the inner LED 2 in for 1 second in green, and uses the IC card 40F to confirm that the authentication is OK. Is notified (step S77). At this time, the message “Authentication was successful” may be emitted from the inside speaker 23 in using CPU 101.
- the CPU 101 controls the drive of the door lock mechanism drive unit 112 so that the entrance door 1 is unlocked by the door lock mechanism 28.
- a message "door unlocked” is emitted from the inside speed 23 in (Step S79).
- the inner LED 22 in may be blinked, for example, in green to notify the user of the IC card 40F of the unlocked state of the door.
- the CPU 101 recognizes that the entrance door 1 has been unlocked from the inside by the IC card 40F, and the user (resident) of the IC card 4OF Recognize that you are going out. And An inquiry about the open / closed state of the window is sent to the monitoring control device 3 (step S81 in FIG. 22).
- the monitoring control device 3 obtains the sensor outputs of the window sensors 6a and 6b through the sensor hub 207 and checks whether the windows are open or closed. In other words, check the lock. Then, the confirmation result about the open / close state of the window is returned to the door opening control device 100 through the door opening device interface 206.
- the door opening / closing control device 100 receives the result of confirmation of the open / closed state of the window through the communication interface 121 (step S82). Then, the CPU 101 analyzes the received confirmation result and determines whether the window is open (step S83).
- the CPU 101 warns that the window power S is open by a sound output from the inside speed 23 in (step S84).
- the CPU 101 notifies that the door closing is OK by using a sound emitted from the inside speed 23 in (step S85).
- the CPU 101 captures the sensor output of the door open / close sensor 27 through the interface 111, and monitors whether the entrance door 1 has been opened (step S86). Then, the CPU 101 determines whether or not a predetermined time, for example, 10 seconds has elapsed without opening the entrance door 1 (step S87), and when it is determined that 10 seconds has elapsed, the entrance door 1 1 is automatically returned to the locked state (step S888). Then, the CPU 101 flashes the inside LED 22 in green in green to notify that the entrance door 1 has returned to the locked state (step S89).
- a predetermined time for example, 10 seconds has elapsed without opening the entrance door 1
- the CPU 101 flashes the inside LED 22 in green in green to notify that the entrance door 1 has returned to the locked state (step S89).
- step S86 If it is determined in step S86 that the entrance door 1 has been opened within 10 seconds after the unlocking in step S78, the CPU 101 It recognizes that the resident at home indicated by the identification information taken in S72 has gone out.
- the personal information including the identification information and the time information is transferred to the monitoring control device 3 as the out-of-home information (step S90) ). At this time, the time information is not included in the information transferred to the monitoring control device 3, and the time at which the monitoring control device 3 receives such information may be recognized from the time of the clock circuit 22 1. .
- the CPU 101 confirms that the entrance door 1 is closed by referring to the sensor output of the door opening / closing sensor 27 (step S91), and after the entrance door 1 is closed,
- a predetermined time for example, 3 seconds
- the door lock mechanism drive section 112 is driven and controlled so that the door lock mechanism 28 returns the entrance door 1 to the locked state.
- the CPU 101 flashes the outer LED 22 eX in green to notify the user of the IC card 40F that the entrance door 1 has returned to the locked state (step S102).
- the green blinking of the outer LED 22 ex is continued for a predetermined time, for example, 10 seconds.
- the CPU 101 determines whether or not the predetermined time, for example, 10 seconds, has elapsed (step S103). If it is determined that the predetermined time has not elapsed, the CPU 101 determines in step S71. It is determined whether or not the IC card 40 F determined to have communicated with the outside electronic key read / write unit 21 eX again (step S 104). When it is determined that the operation is not performed, the process returns to step S103.
- the predetermined time for example, 10 seconds
- step S103 If it is determined in step S103 that the IC card 40F has not communicated with the outer electronic key read / write unit 21eX and that the predetermined time has elapsed, the CPU 101 Assuming that the lock control operation of the entrance door started by the application of the IC force 40 F to the inside electronic key lead Z-light section 21 in has stopped, the step S7 in FIG. Return to 1 You.
- step S104 the IC card determined to have communicated in step S71 after the entrance door has been locked and before the predetermined time has elapsed before the green LED 2 2e X stops blinking green. If it is determined that communication has been performed between 40F and the outer electronic key read / write unit 21ex, the door lock confirmed in steps S101 to S63 is reconfirmed (step S10). Five ) .
- step S105 When it is determined in step S105 that the closing is OK, the CPU 101 transmits a request to turn on the security mode to the monitoring control device 3 through the communication interface 121 (step S105). 106). In response to this request, the monitoring control device 3 checks the home status at that time and determines which of the levels shown in FIG. 15 the security level will be. Then, as a result of the determination, when the security level is level D, the security mode cannot be turned on, so the monitoring control device 3 returns the fact to the door opening control device 100, and When the security level is other than level D, the security mode can be turned on, and the fact is returned to the door lock controller 100.
- the CPU 101 of the door opening control device 100 analyzes the response to the security mode on request from the monitoring control device 3 and determines whether the security mode can be turned on (step S 1). 0 7). If the CPU 101 determines that the security mode can be turned on from the monitoring control device 3, the CPU 101 issues a message "turn on the security mode" from the outside speed 23 ex. Is emitted (step S108).
- step S107 If it is determined in step S107 that a response to the effect that the security mode cannot be turned on has been received from the monitoring control device 3, the CPU 101 Sounds a message stating that the security mode cannot be turned on because a resident is present (step S109). Then, the process returns to step S71.
- step S105 If it is determined in step S105 that the window is open and the doors are not closed, the CPU 101 indicates, "The security mode cannot be turned on because the window is open. Is emitted (step S110). Then, the process returns to step S71.
- step S71 If it is determined in step S71 that communication with the IC card 40F has been performed by the outer electronic key read / write unit 21ex, the CPU 101 determines whether the householder has returned home or The following processing is performed assuming that the request is for a person outside the office.
- the CPU 101 compares the identification information stored in the family information memory 120 with the identification information received from the IC card 40F, and stores the identification information in the family information memory 120. Depending on whether any of the identification information matches the identification information received from the IC card 40F, the IC card 40F is registered in the It is determined whether the IC card is F or not, and the IC card 40F is authenticated (step S122).
- step S122 the authentication result is determined (step S122), and if there is no identification information stored in the family information memory 120 that matches the identification information received from the IC card 40F. Then, when it is determined that the authentication has not been obtained (authentication NG), the CPU 101 drives the outer LED driver 108 to blink the outer LED 22 eX in red. With, outside A warning sound is emitted from the side speech force 23 eX to notify the user of the IC card 40F that the authentication is NG (step S123). Then, the door lock mechanism 28 remains locked, and the process returns to step S71.
- step S122 the identification information stored in the family information memory 120 matches the identification information received from the IC card 40F, and the authentication is OK.
- the CPU 101 determines that the authentication is OK, the CPU 101 drives the outer LED driver 108 to light the outer LED 22 eX for 1 second in green.
- the user of F is notified (step S124). At this time, the message “Authentication has been successfully completed” may be emitted from the external speaker 23 ex by the CPU 101.
- the CPU 101 controls the drive of the door lock mechanism driving unit 112 so that the door lock mechanism 28 unlocks the entrance door 1.
- the message "door unlocked” is emitted from the outside speaker 23e (Step S126).
- the outer LED 22 ex may blink in green, for example, to notify the user of the IC card 40F of the release state of the door lock.
- the CPU 101 captures the sensor output of the door open / close sensor 27 through the interface 111 and monitors whether the entrance door 1 has been opened (step S127). Then, the CPU 101 determines whether or not a predetermined time, for example, 10 seconds has elapsed without opening the entrance door 1 (step S128). If it is determined that 10 seconds has elapsed, the entrance door 1 is determined. 1 is automatically returned to the locked state (step S129). Then, the CPU 101 flashes the outer LED 22 eX in green to notify that the entrance door 1 has returned to the locked state (step S130). Thereafter, the CPU 101 determines whether or not a predetermined time, for example, 10 seconds, has elapsed (step S 13 1).
- a predetermined time for example, 10 seconds
- step S 71 When it is determined that the predetermined time has not elapsed, the CPU 101 determines in step S 71. It is determined whether or not the electronic key device that has been determined to have communicated has communicated with the outer electronic key read / write unit 21 eX (step S1332). Return to S1 3 1. Then, in step S131, when it is determined that a predetermined time has elapsed without communication between the electronic key device and the outer electronic key read / write unit 21eX, the CPU 101 sets the outer Electronic key read Z-light section 21 1 eX It is assumed that the lock control operation of the entrance door, which was started by the electronic key device being held over the eX, has stopped, and the process returns to step S71 in Fig. 21. .
- step S132 the electronic key device determined to have communicated in step S71 and the external electronic key read / write unit 2 1 ex When it is determined that the communication has been performed with, the door lock is confirmed (step S133).
- the confirmation of the door closing in step S133 is performed in the same manner as the processing described in steps S121 to S123. That is, the door lock control device 100 inquires the monitoring control device 3 about the open / closed state of the window, and acquires the inquiry result from the monitoring control device @ 3. Then, based on the result of the inquiry, it is determined whether the closing is OK. If it is determined in step S.133 that the closing is OK, the CPU 101 transmits a request to turn on the security mode to the monitoring control device 3 through the communication interface 121 (step S.133). S 1 3 4). In response to this request, the monitoring control device 3 checks the home status at that time, and determines which security level is shown in FIG. 15. Then, as a result of the determination, when the security level is level D, the supervisory control device 3 turns on the security mode. The security mode can be turned on when the security level is other than level D, and the effect is returned to the door opening control system 100. return.
- the CPU 101 of the door lock control device 100 analyzes the response to the security mode on request from the monitoring control device 3 and determines whether or not the security mode can be turned on (step S 13). Five ) .
- the CPU 101 determines that a response to the effect that the security mode can be turned on has been received from the monitoring control device 3, the CPU 101 outputs the message "turn on the security mode" from the outside speed force 23 eX force. The message is emitted (step S136).
- step S135 If it is determined in step S135 that a response to the effect that the security mode cannot be turned on has been received from the monitoring control device 3, the CPU 101 determines from the external speed 23 eX that "the presence of a resident The security mode cannot be turned on because of the error message. "(Step S137). Then, the process returns to step S71.
- step S133 When it is determined in step S133 that the window is open and the doors are not closed, the CPU 101 indicates, "The security mode cannot be turned on because the window is open. Is emitted (step S138). Then, the process returns to step S71.
- steps S131 to S138 the electronic key device is held over the external electronic key read / write unit 2lex within a predetermined time after the entrance door 1 is unlocked from the inside.
- the security mode can be turned on by holding the electronic key device over the outer electronic key read Z-write section 21 eX again.
- the security mode in order to set the security mode to ON, it is necessary to unlock the door, enter the room, and start over by holding the electronic key device 40 over the inside electronic key read / write part 21 in. Not convenient.
- step S127 when it is determined that the entrance door 1 has been opened within 10 seconds after the unlocking in step S125, the CPU 101 determines in step S7 that the entrance door 1 has been opened. Recognizes that the outsider indicated by the identification information captured in 2 has returned home, and transfers the identification information and personal information including the time information when communication with the electronic key device was performed to the monitoring control device 3 as returnee information. (Step S 14 1 in FIG. 26). At this time, the time information is not included in the information transferred to the monitoring control device 3, and the time at which the monitoring control device 3 receives the information can be recognized from the time of the clock circuit 22 1. .
- the CPU 101 confirms that the entrance door 1 is closed by referring to the sensor output of the door opening / closing sensor 27 (step S142), and after the entrance door 1 is closed, When it is confirmed that the time, for example, 3 seconds, has elapsed (step S144), the door opening mechanism drive unit 112 is driven and controlled, and the door opening mechanism 28 locks the entrance door 1. (Step S144). Then, the CPU 101 flashes the inside LED 2 2 in green to notify that the entrance door 1 has returned to the locked state (Step S145). Thereafter, the CPU 101 sends an instruction to change the security level to the monitoring control device 3 based on the fact that the home condition has changed due to the return of the person (step S146).
- the monitoring control device 3 Upon receiving the security level change instruction, the monitoring control device 3 recognizes the change in the home status due to the information on the returnees in step S141, and associates the home status with the security level shown in Fig. 15. Refer to the table. Determine whether the security level needs to be changed, and if so, change the security level. Then, the monitoring control device 3 notifies the door opening control device 100 whether or not the security level has been changed.
- the CPU 101 of the door opening control device 100 receives the notification regarding the change in the security level from the monitoring control device 3 (step S 1 147), and determines whether or not the security level has been changed. (Step S1 4 8).
- step S148 when it is determined that the security mode has been changed, the CPU 101 emits a message "The security level has been changed" from the inner speaker 23 in when the IJ is performed. (Step S149). Then, the process returns to step S71.
- the door lock control device 100 sends a security level change instruction to the monitoring control device 3 at step S146 in step S146.
- the control device 3 receives the return-to-home information in step S141, so that the security level is automatically set without receiving a security level change instruction from the door lock control device 100. It may be determined whether or not the security level needs to be changed, and if necessary, the security level may be automatically changed. In such a case, when the security level is changed, the To the network controller 100.
- the operation in the sequential lock mode will be described with reference to the flowcharts of FIGS. 27 to 29.
- the IC card 40C is held over the inner electronic key lead Z-write section 21in or the outer electronic key read / write section 21eX, and communication is performed between the two.
- the door lock mechanism 28 is provided with the door lock mechanism 28 so that the state of the entrance door 1 at the time is unlocked or locked. It is controlled by the control device 100.
- the CPU 101 monitors the inner electronic key read Z-write section 21 in and the outer electronic key read / write section 21 ex via the interfaces 105 and 106, and the IC 101 Card 40 C is held up, 1. It waits for communication between the card 40 and the inner electronic key read / write unit 21 in or the outer electronic key read / write unit 21 eX (step S 15 1).
- step S151 when it is determined that the IC card 4OF is held over and the communication with the IC card 40F is performed, the CPU 101 receives the identification information from the IC card 40F. For example, it is temporarily stored in RAM 104 or the like (step S152). At this time, the time information and the like are written in the IC card 40F and the time information and the like are written in the family information memory 120 and the family information memory 205 of the monitoring control device 3 as described above. Done.
- step S153 It is determined which of the inner electronic key read / write unit 21in and the outer electronic key read / write unit 21ex communicated with the IC card 40F (step S153).
- step S153 When it is determined in step S153 that the communication with the IC card 40F was performed by the electronic key read / write unit 21in, the CPU 101 causes the resident to go out. In this case, or when the entrance door 1 is locked for security, the following processing is performed.
- the CPU 101 compares the identification information stored in the family information memory 120 with the identification information received from the IC card 40F and stores the identification information in the family information memory 120. Depending on whether any of the identification information matches the identification information received from the IC card 40F, the IC card 40F is registered in the door lock device 2 by the electronic key. It is determined whether the device is a device or not, and the IC card 40F is authenticated (step S154).
- the authentication result is determined (step S155), and there is no identification information stored in the family information memory 120 that matches the identification information received from the IC card 40F. Then, when it is determined that the authentication has not been achieved (authentication NG), the CPU 101 drives the inner LED driver 107 to flash the inner LED 22 in red and Then, a warning sound is emitted from the inner speaker 23 in to inform the user of the IC card 4OF that the authentication is NG (step S156). Then, the door opening mechanism 28 returns to the step S151, keeping the state before that.
- step S.155 some of the identification information stored in the family information memory 120 match the identification information received from the IC card 40F, and the authentication is OK. If it is determined that there is, the CPU 101 drives the inner LED driver 107 to turn on the inner LED 2 in for 1 second in green, and confirms that the authentication is OK. The user of F is notified (step S157). At this time, due to the CPU 101, • The message "Authentication was successful" may be emitted from the speaker with a speed of 23 in.
- step S 158 determines whether the lock state of the entrance door 1 by the current door lock mechanism 28 is in a locked state.
- step S158 when it is determined that the locked state of the entrance door 1 by the door lock mechanism 28 is in the unlocked state, the door is closed so as to be in the opposite state of the locked state.
- the drive mechanism drive section 112 is driven (step S159).
- the CPU 101 caused the inner LED 22 in to blink, for example, in green, and the inner speaker 23 in to emit a message stating that the entrance door was locked, and the inner LED 22 in was locked. Is notified to the user of the IC card 40F (step S160). .
- the CPU 101 recognizes that the person indicated by the identification information captured in step S152 has been locked for security and replaces the personal information including the identification information with the resident information. And transfers it to the supervisory control device 3 (step S1661).
- step S158 when it is determined that the current lock state of the door lock mechanism 28 is the locked state, the CPU 101 sets the door lock mechanism drive unit 112 to the lock state. By driving control, the door lock mechanism 28 is unlocked (step S 16 2), the inside LED 22 in blinks green, for example, and the door lock 23 Has been released. ”(Step S163).
- the CPU 101 recognizes that the person indicated by the identification information captured in step S152 has unlocked and went out, and the personal information including the identification information Is transferred to the supervisory control device 3 as out-of-home information (step S164). [In the case of communication with the outer electronic device read / write section 21 eX; Figs. 28 to 29]
- step S153 If it is determined in step S153 that communication with the IC card 40F has been performed on the outer electronic key read Z-write unit 21eX, the CPU 101 returns to the home. The following processing is performed assuming that the lock is unlocked or the house is locked for going out.
- the CPU 101 compares the identification information stored in the family information memory 120 with the identification information received from the IC card 40F, and stores the comparison information in the family information memory 120. Depending on whether any of the identification information matches the identification information received from the IC card 40F, the IC card 40F is registered in the door lock device 2 by the electronic key. It is determined whether the IC card is a device or not, and the IC card 40F is authenticated (step S171).
- the authentication result is determined (step S172), and if there is no identification information stored in the family information memory 120 that matches the identification information received from the IC card 4OF. If it is determined that the authentication has not been achieved (authentication NG), the CPU 101 drives the outer LED driver 108 to blink the outer LED 22 eX in red, A warning sound is emitted from the external speech force 23 eX to notify the user of the IC card 40F that the authentication is NG (step S173). Then, the process returns to step S151, leaving the door opening mechanism 28 in the locked state. In step S172, the identification information stored in the family information memory 120 matches the identification information received from the IC card 40F, and the authentication is OK.
- the CPU 101 determines that the authentication is OK, the CPU 101 drives the outer LED driver 108 to light the outer LED 22 ex in green for one second, and confirms that the authentication is OK. Notify users of (Step S174). At this time, the message “Authentication successful” may also be emitted from the outside speaker 23 eX by the CPU 101.
- the CPU 101 determines whether or not the current door lock state of the door lock mechanism 28 is locked (step S175).
- step S175 when it is determined that the lock state of the entrance door 1 by the current door lock mechanism 28 is in the locked state, the CPU 101 sets the door lock mechanism drive section 11 1 Then, the front door 1 is unlocked by the door opening mechanism 28 (step S176), and the inside LED 2 2 in is blinked in green, for example, and the inside speaker 2 3 From "in”, a message "The door lock has been released” is emitted (step S177).
- the CPU 101 recognizes that the person indicated by the identification information taken in step S152 has unlocked to return home, and recognizes the identification information and the return time information (communication with the electronic key device). Is transferred to the monitoring control device 3 as return-to-home information (step S 178).
- the time when the monitoring control device 3 receives the information may be recognized from the time of the clock circuit 221, and the time may be used as the return time. .
- step S175 If it is determined in step S175 that the current locked state of the entrance door 1 is in the unlocked state, the door lock mechanism driving unit 1 1 2 is changed to the opposite state, that is, the locked state. , And the front door 1 is locked by the door lock mechanism 28 (step S179).
- the CPU 101 flashes, for example, the green LED 2 in on the green side, emits the message “The front door is locked” from the inside speaker 23 in, and indicates that the lock state is established.
- IC card 4 0 F The user is notified (step S180).
- the CPU 101 recognizes that the person indicated by the identification information acquired in step S152 has been locked for going out, and replaces the personal information including the identification information with the outsider information. Is transferred to the monitoring control device 3 (step S181).
- step S182 the CPU 101 determines whether or not a predetermined time, for example, 10 seconds, has elapsed. It is determined whether or not the IC card 40F determined to have performed communication in S171 communicates again with the outer electronic key rewrite unit 21ex (step S183). If it is determined that no communication is made, the process returns to step S182.
- a predetermined time for example, 10 seconds
- step S183 after the entrance door is locked, and before the predetermined time has elapsed, the electronic key device determined to have performed communication in step S71 and the outer electronic key lead Z-light unit 21 eX If it is determined that the communication has been performed with, the lock is confirmed (step S184).
- step S184 The confirmation of door closing in step S184 is performed in the same manner as the processing described in steps S101 to S103. That is, the door lock control device 100 inquires the monitoring control device 3 about the open / closed state of the window, and acquires the inquiry result from the monitoring control device 3. Then, based on the result of the inquiry, it is determined whether the closing is OK. When it is determined in step S184 that the closing is OK, the CPU 101 transmits a request to turn on the security mode to the monitoring control device 3 through the communication interface 121 (step S1). 8 5). In response to this request, the monitoring control device 3 checks the home status at that time, and determines which security level is shown in FIG. 15.
- the monitoring control device 3 When the security level is level D, the security mode cannot be turned on. Therefore, the security mode is returned to the door lock control device 100, and when the security level is other than level D, the security mode is turned on. This is returned to the door lock controller 100.
- the CPU 101 of the door opening control device 100 analyzes the response to the security mode on request from the monitoring control device 3 and determines whether the security mode can be turned on (step S 1). 8 6). When it is determined that a response indicating that the security mode can be turned on has been received from the supervisory control device 3, the CPU 101 outputs the external speed force 23 ex, a message stating that the security mode is turned on. Is emitted (step S 1 8 7).
- step S186 when it is determined that a response to the effect that the security mode cannot be turned on has been received from the supervisory control device 3, the CPU 101 determines from the outside speed 23 eX that The security mode cannot be turned on because it is present "(step S188). Then, the process returns to step S151.
- step S184 If it is determined in step S184 that the window is open and the doors are not closed, the CPU 101 indicates, "The security mode cannot be turned on because the window is open. Is output (step S189). Then, the process returns to step S 171.
- the monitoring control device 3 turns on the security mode in response to the instruction from the door lock control device 100, but the security is also possible by pressing the security button 51 of the remote commander 50.
- the mode can be turned on.
- the security control device 3 The remote mode on state can be turned off by operating the off button 52 of the remote commander 50.
- FIG. 30 is a flowchart for explaining an operation of controlling the security mode of the monitoring control device 3 on / off by operating the remote commander 50.
- the CPU 201 monitors a remote operation signal from the remote commander 50, and determines whether or not an operation input has been performed by the remote commander 50 (step S191). If it is determined that the operation input has been performed, the CPU 201 determines whether or not the operated is the security button 51 (step S 192).
- step S 192 If it is determined in step S 192 that the operation is the operation of the security button 51, the CPU 201 transmits the remote control signal of the remote control transmission unit 39 and the power on to the television receiver 7. And turn on the TV receiver 7 (step S193).
- the CPU 201 sends the image information generated based on the data read from the ROM 203 to the television receiver 7 through the television interface 2.17, and the security mode is displayed on the screen of the television receiver 7. A confirmation screen for turning on is displayed (Step S194). After that, the CPU 201 sends a remote control signal for turning off the power of the television receiver 7 from the remote control transmission unit 39 to turn off the television receiver 7 (step S195).
- step S 196 the CPU 201 turns on the security mode (step S 197) and executes the security monitoring operation (step S 196). 198).
- the predetermined time in step S196 is a time that takes into account the time from when the user who operates the security button 51 sets the security mode on until the user exits the entrance door. If it is determined in step S192 that the button operated by the remote commander 50 is not the security button 51, the CPU 201 determines whether or not the operated button is the off button 52. (Step S 199). If it is determined in step S 199 that the button is not the off button 52, the CPU 201 executes a process based on the other button being pressed (step S 200).
- step S 199 If it is determined in step S 199 that the button is off button 52, the CPU 201 sends the power-on remote control signal from the remote control transmitting section 39 to the remote control receiving section of the television receiver 7. To turn on the television receiver 7 (step S201).
- the CPU 201 sends image information generated based on the data read from the ROM 203 to the television receiver 7 through the television interface 217, and secures the image on the screen of the television receiver 7.
- a mode-off confirmation screen is displayed (step S202).
- the CPU 201 sends a remote control signal for turning off the power of the television receiver 7 from the remote control transmission unit 39 to turn off the television receiver 7 (step S203).
- step S204 the CPU 201 performs a process of turning off the security mode.
- the processing routine of FIG. 30 ends.
- FIG. 31 and FIG. 32 show the processing operation when the security mode is turned on in the monitoring and control device 3. This is activated when the security command 51 is operated with the remote commander 50 described above.
- the security level at this time is level A.
- a security mode ON instruction is issued from the door lock control device 100, as described above, the security level is determined in consideration of the situation of the resident. The security mode is turned on at the determined security level.
- the CPU 201 starts capturing an image captured by the video camera 31 (step S211). At this time, the sound picked up by the microphones 34 is also captured.
- the monitoring information area for the security mode provided in the image / audio memory 208 is a ring buffer format. In this example, the latest 30 seconds of image / audio information for 30 seconds are stored. It is always stored in the image / audio memory 208. The same applies to the captured image from the surveillance camera 13.
- the CPU 201 starts monitoring the sensor output of the sensor hub 207, the sensor outputs of the window sensors 16a and 16b, and the sensor output of the door open / close sensor 27 of the entrance door 1. Control (step S2 1 2). Further, the CPU 201 controls so as to start monitoring the sensor outputs of the fire sensor 4 and the gas sensor 5 (step S213).
- the surveillance camera 13 turns on and off according to the on and off of the fire sensor 4 and the gas sensor 5.
- the CPU 201 monitors the sensor output of the motion sensor 33 to check whether there is any intruder (step S2114). If it is determined that there is no intruder, it is determined whether or not an abnormality has been detected based on the sensor outputs of the window sensors 16a and 16b and the sensor output of the door opening / closing sensor 27 (step S23 in FIG. 32). 1).
- step S231 determines from the sensor outputs of the fire sensor 4 and the gas sensor 5 whether or not an abnormality has been detected (step S232). If it is determined in step S232 that no abnormality is detected, the process returns to step S214.
- step S 2 1 an intruder is detected by the motion sensor 33. If it is determined that the lighting has occurred, the CPU 201 controls the lighting mechanism 320 to turn on the lighting 32 (step S215). Then, 30 seconds of image and audio information from 10 seconds before the intruder detection point to 20 seconds after the detection point is read from the image and audio memory 208, and the first image is read. Is transferred to the management server 10 (step S2 16). The management server device 10 can recognize the intruder based on the transferred image and sound information and take appropriate measures.
- the CPU 201 sends a power-on remote control signal to the television receiver 7 from the remote control transmitting unit 39 to turn on the television receiver 7 (step S2117). Then, the CPU 201 sends the information of the threat image and the threat sound prepared in advance to the television receiver 7, and outputs the threat image and the threat sound (step S218).
- This intimidating image and voice can intimidate the invading pirates and allow them to escape.
- the CPU 201 notifies the contact registered in advance in the monitoring control device 3, for example, a security company, a police station, and the registered mobile phone of the registered household about the abnormality detection (Step S). 2 1 9).
- the CPU 201 repeatedly transmits the image and audio information for 30 seconds stored in the ring buffer of the image and audio memory 208 to the management server device 10 at intervals of several seconds. (Step S220). Then, the CPU 201 determines whether or not the human sensor 33 has stopped detecting the intruder (step S221), and waits for 30 seconds for the image and voice until the detection stops. The process of transferring the information to the management server 10 is continued.
- step S2 2 When the CPU 201 determines that the human sensor 33 has stopped detecting an intruder, the CPU 201 stops transferring image and sound information for 30 seconds to the management server device 10 (step S2 2 2). Then, returning to step S231, security monitoring is continued. If it is determined in step S231 that an abnormality has been detected, the CPU 201 sets the surveillance camera 13 installed near the window sensors 6a and 6b and the door open / close sensor 27 as the target. The image is transferred to the management server device 10 as the first time, which is the image for 30 seconds from 10 seconds before the detection time to 20 seconds after the detection time from (step S2334).
- the CPU 201 sends a power-on remote control signal from the remote control transmitting unit 39 to the television receiver 7 to turn on the television receiver 7 (step S2355). Then, the CPU 201 sends the information of the threat image and the threat sound prepared in advance to the television receiver 7, and outputs the threat image and the threat sound (step S236). This intimidating image and sound can intimidate and invade the invading pirate.
- the CPU 201 notifies an abnormality detection to a contact registered in advance in the monitoring control device 3, for example, a security company, a police station, and a registered mobile phone of a householder (step S2). 3 7).
- the CPU 201 repeatedly transmits the image and audio information for 30 seconds stored in the ring buffer of the image and audio memory 208 to the management server device 10 at intervals of several seconds. (Step S238). Then, the CPU 201 waits for an off instruction by the off button 52 of the remote commander 50 (step S239), and when there is an off instruction, turns off the security mode.
- step S232 If it is determined in step S232 that an abnormality has been detected by the fire sensor 4 or the gas sensor 5, the CPU 201 sets and registers the monitoring and control device 3, for example, a security company, a fire department, or the like. Then, the abnormality detection is notified to the registered mobile phone of the housekeeper (step S233). Then, the process proceeds to step S239.
- the monitoring and control device 3 for example, a security company, a fire department, or the like.
- the management server device that receives the image and audio information from the monitoring control device 3
- the device 10 puts those image and sound information on the Web page. Therefore, the owner of the mobile phone that has received the notification from the monitoring control device 3 can access the web page of the management server device 10 to know what kind of abnormality has occurred, and take appropriate countermeasures. Can be taken.
- the CPU 201 of the supervisory control device 3 performs a cooperative operation as shown in FIG. 33 according to the information and instructions received from the door lock control device 100.
- the security level is not changed by the CPU 201 in response to a change instruction from the door lock control device 100, but by an individual from the door lock control device 100. This is the case where the change in the home situation due to the result of receiving the information is checked and made as necessary. That is, the CPU 201 determines whether or not the security mode ON instruction has been received from the door lock control device 100 (step S224). 1 performs other processing (step S2422).
- step S241 When it is determined that the security mode on instruction is received in step S241, the CPU 201 refers to the information stored in the family information memory 205 to check the home status (step S211). 4 3). Then, referring to the table shown in FIG. 15, the security level according to the home situation is recognized, and it is determined whether or not the security mode can be turned on (step S2444).
- step S244 If it is determined in step S244 that the security mode cannot be turned on, the CPU 201 notifies the door lock control device 100 of the fact (step S245).
- security mode can be turned on in step S2 If it is determined that the security mode can be turned on, the door lock control device 100 is notified that the security mode can be turned on (step S246), and waits for a predetermined time to elapse (step S2). 4 7).
- step S2 After confirming that the predetermined time has elapsed, the CPU 201 turns on the security mode at a security level corresponding to the at-home situation (step S248). Then, the security monitoring operation is started (step S 2
- step S250 it is determined whether or not personal information including identification information has been received from the door opening / closing control device 100. If not received, the process proceeds to step S249. Return to continue the security monitoring operation.
- step S251 the change in the home status as a result is checked (step S251), and it is necessary to change the security level. Judgment is made (step S252).
- step S2 When it is determined that the security level does not need to be changed, the CPU 201 returns to step S249 to continue the security monitoring operation. If it is determined in step S25 2 that the security level needs to be changed, it is determined whether or not the security mode should be turned off as a result of the change (step S2 53). If not, change the security level according to the home situation (step S2
- step S253 If it is determined in step S253 that the security mode should be turned off, the security mode is turned off (step S256), and the fact is notified to the door lock control device 100. Yes (step S2570). Then, the process returns to step S241.
- step S253 since locking and unlocking are performed using a non-contact electronic key device, there is no keyhole and there is a so-called picking prevention security effect.
- the electronic key device checks (authenticates) whether or not the user of the electronic key device is the owner. Since only the electronic key information is transmitted, even if the electronic key device is lost, it is impossible for anyone other than the owner to control the door lock using the electronic key device. Very high safety.
- the door lock device 2 can be used in an automatic lock mode or a sequential lock mode, so that the user can select which mode to use according to his / her own convenience. It is very convenient.
- the inner electronic key read / write section 21 in is provided, and the inner electronic key read / write section 21 in can also control the locked state of the door with the electronic key device. It can prevent a suspicious person who has entered from the entrance from leaving the entrance door.
- the security mode can be set at the time of opening the door, so in the past, it was set in the house to eliminate the hassle of having to go out of the house after a predetermined time. be able to.
- the security mode level can be changed according to the age, gender, etc. of the family members, an effective security level can be set even when the resident is vulnerable. Another advantage is that the security level can be changed by grasping changes in the home situation in cooperation with the opening and closing of the door lock.
- the registration of the identification information as the electronic key information is performed by a method that emphasizes security as follows. For example, it is performed by a distributor or an installer or a user of the door opening device 2.
- the electronic key device that stores the identification information that is the initial main key information is an IC card
- the door lock device 2 is sold by the door lock device 2 or the door lock device. Handed over to the user when installing device 2 in each house.
- Profile information The information is stored in advance in the door opening device management database 305 of the management server device 10. That is, the real key information of each family member is included in the personal profile information of each family member and registered in the management server device 10 in advance.
- the personal profile information of the family members is stored corresponding to the address information on the communication network of the monitoring control device 3.
- a telephone number or an IP address is used as the address information.
- the real key information and personal profile information of each family member registered in the management server device 10 are managed by the door lock device 2 installer or dealer when the door lock device 2 installation is completed.
- the request is transferred from the management server device 10 to the monitoring control device 3 and written into the family information memory 205 of the monitoring control device 3. be registered.
- at least the real key information among the information registered in the monitoring control device 3 is transferred to the door lock control device 100, so that it is registered in the family information memory 120.
- FIG. 34 shows the operation of the management server device 10 when receiving the initial registration request.
- the operation of each step in FIG. 34 is mainly performed by CPU 301.
- the CPU 310 determines whether or not an initial registration request has been received (step S2661).
- the initial registration request is accompanied by device identification information such as the serial number of the door lock device 2, and is transmitted from the personal computer or the like to the management server device 10 through the communication network.
- the operator who has received the initial registration request inputs the information by input means (not shown) by telephone or the like.
- the CPU 301 When the CPU 301 receives this initial registration request, it detects the device identification information. Searches the door lock device database as a cord, reads out address information on the communication network 9 of the door lock device 2 and the monitoring control device 3 registered in advance, and makes a call including an initial registration request. . That is, a call for an initial registration request is made to the monitoring control device 3 to which the door opening device 2 to which the initial registration request has been connected is connected (step S262).
- the CPU 301 confirms the response from the monitoring control device 3 and forms a communication path with the monitoring control device 3 ( Step S2 6 3).
- the CPU 301 stores the door lock device in the door lock device database 205 of the management server device 10 as described above in relation to the door lock device 2.
- the door lock device is installed.
- the personal profile information including the real key information on all the family members of the house is sent to the monitoring control device 3 (step S264).
- the CPU 301 waits for the completion of all the information to be transmitted to the monitoring control device 3 and the arrival of a registration completion notification from the monitoring control device 3 (step S2655).
- the communication path with the monitoring control device 3 is disconnected (step S266), and the processing routine of the initial registration ends.
- the CPU 201 of the monitoring control device 3 determines whether or not an incoming call has been received from the management server device 10 (step S 271), and determines that the incoming call has not been received from the management server device 10. If so, other processing is performed (step S272).
- the CPU 201 When determining that an incoming call from the management server device 10 has been received, the CPU 201 automatically responds to the incoming call and communicates with the management server device 10. A road is formed (step S27). Then, it is determined whether or not the received call is an initial registration request (step S274). If it is determined that the request is an initial registration request, the CPU 201 waits for registration information from the management server device 10, and upon receiving the registration information (step S 275), stores the received registration information in the family information memory 2. Write to 05 (step S2776).
- a registration completion notification is returned to the management server device 10 (step S2777), and the communication path with the management server device 10 is disconnected (step S277). S 278).
- the CPU 201 performs door opening / closing control on identification information, which is the real key information of at least each of the family members, out of the personal profile information written and registered in the family information memory 2 ⁇ 5. Transfer to device 100
- Step S279 Upon receiving this information, the door lock control device 100 registers the received real key information in the family information memory 120. It goes without saying that, in addition to the identification information as the main key information, necessary personal information about family members may be transferred to the door lock control device 100. Note that the registration operation in the door lock control device 100 is the same as the key registration operation in the above-described monitoring control device, and therefore the description is omitted here.
- the CPU 201 confirms that the transfer of the main key information and the necessary information to the door lock control device 100 has been completed (step S280), the processing routine ends.
- step S274 When it is determined in step S274 that the registration is not the initial registration, the CPU 201 determines whether or not the request is a registration request for a backup key (step S2801), and If it is determined that the request is a registration request, the backup registration process is executed (step S282). Detailed description of the backup registration process is omitted in this specification.
- step S281 it is determined in step S281 that the request is not a backup registration request.
- the CPU 201 determines whether or not the request is for deleting a lost key (step S2833). If the CPU 201 determines that the request is not a lost key deletion request, the CPU 201 executes other processing (step S284), and if it determines that the request is a lost key deletion request, The deletion request processing is executed (step S285). A detailed description of this deletion process is omitted in this specification. Thus, the processing in FIG. 35 ends.
- the user can set, in advance, the person who is going to return, the person who is going to go, the time to return home, the time to go out, the notification contact, etc., in the monitoring control device 3.
- the control device 3 stores the set information in the notification communication setting memory 222. Then, as will be described later, the monitoring control device 3 monitors the set expected return home time and the set expected leave time, and notifies the set expected return home, the set expected leave, and the set notification contact.
- the information on the entry / exit of the person who intends to return home and the person who intends to go out, that is, the information relating to returning home and going out is notified and notified.
- the CPU 201 of the monitoring and control device 3 monitors the reception signal of the remote control receiving unit 38 to determine whether or not the remote commander 50 has operated the button (step S291). If it is determined in this step S291 that the button is not operated, other processing is performed (step S292). When it is determined in step S291 that a button has been operated with the remote commander 50, the CPU 201 determines whether the button operated with the remote commander 50 is the menu button 55. (Step S293). If it is determined that the menu button is not 5 5, the CPU 20 1 executes a process corresponding to the operated button (step S294).
- step S293 when it is determined that the operated button is the menu button 55, the CPU 201 turns on the power of the television receiver 7 when the television receiver 7 is not turned on. Is turned on (step S295), and a list of menus is displayed on the screen of the television receiver 7 in the same manner as in the case of the message recording / playback described above (step S295).
- the operator selects the setting menu item to be performed using the cursor key of the remote commander 50.
- the CPU 201 receives the reception signal of the remote control receiver 38. Is monitored to determine whether a menu item selection operation has been performed (step S297). If it is determined that a menu item selection operation has been performed, for example, the currently selected item that is highlighted is selected. Changes depending on the operation (Step S 2 9 8). Then, it is determined whether or not a setting item determination operation has been performed (step S299).
- step S299 If it is determined in step S299 that the menu item selection operation has not been performed, the CPU 201 immediately proceeds to step S299 to determine whether the setting item determination operation has been performed. . Then, in step S299, when it is determined that the setting item determination operation is not performed, the process returns to step S297.
- step S299 determines whether or not the selected setting item is a notification setting relating to a scheduled return home (see FIG. 3).
- step S301) of step 7 if not, it is determined whether or not the selected setting item is a setting of a notification relating to an outing schedule (step S303). Then, when it is determined that the notification is not the setting of the notification relating to the outing schedule, the processing routine for the other setting items is executed (step S305). If it is determined in step S301 that the notification is to be set for the notification of going home, the CPU 201 sets the screen for setting the time to return home, the person who will return home, the contact person for notification of returning home, etc.
- Step S302 the return notification communicator requested to be set by the user on the setting screen is other than the expected returnee.
- the monitoring control device 3 notifies the returnee who does not return home at the scheduled return time to the returnee. Since it is sent, the actual return notification contact person includes the person who is going to return home in advance.
- step S306 the CPU 201 determines whether or not the setting input of all the setting items has been completed with respect to the notification regarding the return home schedule (step S306).
- the set item information is written into the notification communication setting memory 222 (step S307), and then the television receiver 7 is turned off ( Step S308), the setting processing routine ends.
- step S303 If it is determined in step S303 that the notification is to be set for an outing schedule, the CPU 201 sets a screen for setting an outing schedule time, a planned outgoing person, an outgoing notification contact, and the like to a television image. Display on the screen of the machine 7 (step S304).
- the out-of-home notification communicator requested to be set by the user on the setting screen is not the person who is going to go out.
- the monitoring control device 3 notifies the prospective outgoing person to the outgoing person who does not go out even at the scheduled time to go out. Since it is sent, the actual out-of-home notification contact person includes the prospective out-going person in advance.
- step S306 following step S304, the CPU 201 completes the setting input for all the setting items related to going out. It is determined whether or not the setting has been completed (step S306). When it is determined that all setting inputs have been completed, the set item information is written to the notification communication setting memory 222 (step S307). Thereafter, the power of the television receiver 7 is turned off (step S308), and the setting processing routine is terminated.
- the monitoring control device 3 is in a state of waiting for a notification notification regarding returning home or going out (step S310).
- the security mode may be on, or the security mode may be off.
- the CPU 201 determines whether or not information has been received from the door lock control device 100 (step S311). Then, when determining that the information has been received from the door lock control device 100, the CPU 201 determines whether the received information is the return-to-home information or the out-of-home information (step S 3 1 2).
- step S312 When it is determined in step S312 that the received information is out-of-home information, the CPU 201 stores the identification information of the person who is going out and the door lock stored in the notification communication setting memory 222.
- the system compares the out-of-home person information included in the out-of-home person information received from the control device 100 with the out-of-home person, and determines whether or not the out-of-home person is the set out-going person (step S 3 13) If the person is not going to go out, the process returns to step S 310 to be in a standby state.
- step S 3 13 When it is determined in step S 3 13 that the out-of-home person is the set out-going person, the CPU 201 sets the notification communication setting memory 2 2 2 The information of the out-of-home notification contact stored in the information is read out. Then, in this example, the personal information of the out-of-home notification contact stored in the family information memory 205 is searched, the mail address thereof is read out, and the out-of-home notification contact is read to, for example, the mobile phone terminal. On the other hand, a notification is sent by e-mail notifying that the set person who is going out has gone out (step S314). This notification message includes information on the time when the user went out.
- the CPU 201 deletes the setting information on the notification relating to the going-out schedule stored in the notification notification setting memory 222 (step S315), and executes this processing routine. To end.
- step S312 When it is determined in step S312 that the information received from the door opening / closing control device 100 is return-to-home information, the CPU 201 returns to the home
- the identification information of the expected returnee is compared with the identification information of the returnee included in the returnee information received from the door lock J control device 100, and the returnee is set based on the comparison result. It is determined whether or not the person is a person (step S316). If the person is not going to return home, the process returns to step S310 and enters a standby state.
- step S316 when it is determined that the returnee is the set returnee, the CPU 201 retrieves the information of the return notification contact stored in the notification contact setting memory 222. read out. Then, in this example, the personal information of the out-of-home notification contact stored in the family information memory 205 is searched, the mail address thereof is read out, and the out-of-home notification contact is read to, for example, the mobile phone terminal.
- the set return-to-home notification contact person is notified by e-mail that the set return-to-home person has returned home (step S3117).
- the notification includes information on the time of return.
- the CPU 201 deletes the setting information for the notification regarding the coming home schedule stored in the notification communication setting memory 222 (step S3115), and performs this processing. End the routine.
- step S311 when it is determined in step S311 that information from the door lock control device 100 has not been received, the CPU 201 stores the information in the notification communication setting memory 222.
- the expected home return time is compared with the current time indicated by the clock circuit 221 to determine whether the expected home return time has elapsed (step S3118).
- step S 3 18 If it is determined in step S 3 18 that the scheduled return time has not elapsed, the CPU 201 sets the scheduled out-of-home time and the clock circuit 22 stored in the notification contact setting memory 222. The current time indicated by 1 is compared to determine whether or not the scheduled outing time has elapsed (step S319). If it is determined in step S319 that the current time has not passed the scheduled departure time, the process returns to step S310 to enter a standby state.
- step S318 If it is determined in step S318 that the current time has passed the scheduled return time, the CPU 201 sends a notification contact urging the returnee to return home (step S3 in FIG. 39). twenty one ) . That is, the e-mail address of the person returning home stored in the family information memory 205 is read out. Encourage them to return home.
- the CPU 201 reads out the information of the return notification contact stored in the notification notification setting memory 222, and reads out the personal information of the return notification notification stored in the family information memory 205. And retrieves the e-mail address.
- a notification is sent by e-mail notifying that the prospective returnee has not yet returned home (step S322).
- the CPU 201 waits for the return-home information from the door lock control device 100 (step S3233), and waits for a predetermined time, for example, 10 minutes without receiving the return-home information. It is determined whether or not the time has elapsed (step S324). If it is determined that the predetermined time has not elapsed, the process returns to step S323 and waits for arrival of the returnee information. If it is determined in step S324 that the predetermined time has elapsed, the process returns to step S321, and sends an e-mail prompting the returnee to return home again.
- a predetermined time for example, 10 minutes without receiving the return-home information. It is determined whether or not the time has elapsed (step S324). If it is determined that the predetermined time has not elapsed, the process returns to step S323 and waits for arrival of the returnee information. If it is determined in step S324 that the predetermined time has elapsed, the process returns to step S321, and
- step S32 23 If it is determined in step S32 23 that the return-to-home information has been received from the door lock control device 100, the CPU 201 determines the identification included in the return-to-home information from the door lock control device 100. It is determined whether or not the returnee identified by the signal is the set returnee (step S325). If it is determined in step S325 that the returnee is not the set returnee, the CPU 201 proceeds to step S324, waits for the elapse of a predetermined time, and proceeds to step S3. The above operation after 24 is repeated.
- the CPU 201 determines the return notification notification person stored in the family information memory 205.
- the personal information is retrieved, the e-mail address is read out, and an e-mail is sent to the contact person of notice of returning home, for example, a mobile phone terminal, that the person set to return to the contact person of notice of returning home has returned.
- the notification includes information on the time of return. 'Then, after making the notification communication, the CPU 201 deletes the setting information relating to the expected returnee stored in the notification communication setting memory 222 (step S315), and performs this processing. End the routine.
- step S319 If it is determined in step S319 that the current time has passed the scheduled time of going out, the CPU 201 sends a notification notification to the person planning to go out to step out (step S3 in FIG. 40).
- step S3 in FIG. 40 the CPU 201 sends a notification notification to the person planning to go out to step out (step S3 in FIG. 40).
- step S3 in FIG. 40 the CPU 201 sends a notification notification to the person planning to go out to step out (step S3 in FIG. 40).
- step S3 in FIG. 40 the CPU 201 sends a notification notification to the person planning to go out to step out (step S3 in FIG. 40). 3 1). That is, the e-mail address of the person who intends to go out is stored in the family information memory 205, and a notification that the person is going to go out is immediately sent by e-mail to, for example, a mobile phone terminal of the person who intends to go out. To encourage As a result, a person who is going out
- the CPU 201 reads the information of the out-of-home notification contact stored in the notification communication setting memory 222, and reads out the personal information of the out-of-home notification contact stored in the family information memory 205. Then, the e-mail address is read out, and an e-mail is sent to the out-of-home notice contact person, for example, a mobile phone terminal, notifying that the set out-going person has not yet gone out (step S33). 2).
- the out-of-office contact person who receives the notification can call the person at home and encourage the person who is going out to go out.
- the person who intends to go out is encouraged by a telephone call from an outside notification person even if no notification is received in step S331, because the mobile phone is not turned on. Then, it is possible to go out at the scheduled outing time.
- the CPU 201 waits for outsider information from the door lock control device 100 (step S3333), and receives no outsider information for a predetermined time, for example, 10 minutes. It is determined whether or not the time has elapsed (step S334), and if it is determined that the predetermined time has not elapsed, the process returns to step S333 to wait for arrival of outsider information.
- step S334 If it is determined in step S334 that the predetermined time has elapsed, the process returns to step S331, and sends an e-mail prompting the person who is going out to go out again. If it is determined in step S333 that the outsider information has been received from the door opening control device 100, the CPU 201 determines that the outsider identified by the identification signal included in the outsider information is Then, it is determined whether or not the person is set to go out (step S335). If it is determined in step S335 that the out-of-home person is not the set out-going person, the CPU 201 proceeds to step S334, waits for the elapse of a predetermined time, and proceeds to step S335. The above operation after 3 3 4 is repeated.
- the CPU 201 determines the out-of-home notification contact person stored in the family information memory 205.
- the personal information is searched, the mail address is read out, and the out-of-home notification contact, for example, a mobile phone terminal, is notified to the out-of-home notification contact, and an e-mail is sent to the set out-going person.
- a notification is sent to the user (step S3 1 4).
- the notification includes information on the time of leaving.
- the CPU 201 sets the notification communication setting memory 2
- the parent sets the child as the person who will return home, sets the expected return time, and further sets the parent as the return notification contact person.
- the parent can check whether the child has returned home at the scheduled return time, and can prompt the child to return home promptly.
- a person who intends to return home or a person who intends to leave home and a preset notification contact person for returning home or a notification member to leave home, are notified of the homecoming status of the person returning to home or the person planning to leave home.
- the information on the person who goes out or goes home by communicating with the door lock control device 100 and the electronic key device is sent to a preset notification contact person.
- notification may be made.
- the communication device includes the door lock device 2 and the security system monitoring and control device 3, but the door lock for the purpose of only locking and unlocking the door is provided.
- the monitoring control device 3 is unnecessary, and the communication device can be configured only with the door lock device 2.
- the door lock device 2 has a function of making an e-mail or a call to the mobile phone terminal through the telephone line.
- the method of notification notification was e-mail, but by using voice synthesis, etc., the telephone was dialed to a mobile phone terminal or a fixed telephone terminal with a predetermined telephone number, and when returning home or going out as voice information You can also provide a reminder to inform you of the status of returning home or going out.
- the electronic key information is used as the personal identification information by associating the electronic key information with the serial number of the IC chip and the personal information, but together with the electronic key information, Personal identification information is determined in advance and registered in the electronic key device, door lock control device, monitoring control device, etc., and when the electronic key device communicates with the read / write unit, the personal The identification information may be exchanged.
- identification information is set for each individual, and stored in the memory of the electronic key device, as well as the door opening control device and the monitoring control device. It is stored by being included in the personal profile information of the memory.
- one electronic key information is stored in one door lock device as one electronic key information common to all family members living in the house.
- Each person may have an electronic key device for storing the common key information.
- the information for contacting the notification contact person for example, an e-mail address, or a telephone number or an IP address when notifying a personal computer is transmitted to a monitoring control device or a door lock.
- the information stored in advance in the control device is read and used, the information may be obtained from the electronic key device when communicating with the electronic key device.
- the management server device 10 since the configuration of the communication system also includes the security monitoring system, the management server device 10 exists, but the configuration of the communication system in which the security monitoring system does not exist is also possible.
- the electronic key information is not transferred from the management server device to the storage unit of the electronic key information of the door lock device, and is not registered. Instead, the electronic key information is registered in the door lock device before installation in the dwelling unit. Of course, it may be stored. In particular, when the door lock control system is used alone without using the security monitoring system as in the above-described embodiment, this is the case.
- the security mode is set to ON when the electronic key device is held over the outer electronic key lead Z-light unit 21 eX within a predetermined time after the door is locked.
- the door lock control device 100 or the monitoring control device 3 manages entry and exit from the entrance door 1. Therefore, when the resident is gone, the security mode can be automatically turned on at security level A.
- the security control device 3 may request that the security mode be turned on.
- the security mode may be turned on when nobody is detected.
- the security mode is turned off even if the security mode is on by then.
- the outsider is recognized by the identification information obtained by communicating with the electronic key device, and the monitoring control device 3
- the security level can be automatically changed in response to a change in the home situation in exactly the same way as when there is a returnee.
- the identification information is authenticated by the door lock device, but the door lock device 2 sends the key information to the monitoring control device 3 or to the management server device 10 via the monitoring control device 3 to perform the monitoring.
- the authentication work is performed by the control device 3 or the management server device 10, and the authentication result is returned to the door lock device 2 (in the case of the management server device 10, the authentication result is returned via the monitoring control device 3). good. In that case, there is no need to transfer key information from the monitoring control device 3 to the door lock control device 100 or to send an erasure instruction.
- the identification information of the unlocking person and the locking person may be sent not to the monitoring control device 3 but to the management server device 10, and the security management may be performed by the management server device 10.
- the door lock control device 100 determines whether a person is out of the house or a person who comes home. Since the setting information of the door lock control mode in the control device 100 is provided, the door lock control device 100 is configured such that the IC card 40F is connected to the inside electronic key read / write section 21 in or Outer electronic key read / write unit 21 1 When communication is performed between both parties by holding it over eX and identification information is authenticated, the identification information and the inner electronic key read / write unit are used.
- the electronic key device is not limited to the IC card.
- the electronic key device may be an IC chip similar to the IC card, a communication unit, and a biometric information acquisition unit. It is possible to use a mobile phone terminal or PDA (Personal Digital Assistant) equipped with such as.
- PDA Personal Digital Assistant
- the electronic key device is not limited to a device that communicates electronic key information in a non-contact manner as in the above-described embodiment, but is a device that communicates electronic key information in a contact format. Of course, it is good. Industrial applicability
- the communication device of the present invention by managing the individual who locks and unlocks the door, it is possible to encourage a person who is going to go home or a person who is going to go home to go home and go out. It will be possible to notify the out-of-office contact person of the situation and outing situation.
Landscapes
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Business, Economics & Management (AREA)
- Emergency Management (AREA)
- Lock And Its Accessories (AREA)
Abstract
Description
Claims
Priority Applications (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US10/523,171 US7212114B2 (en) | 2002-07-31 | 2003-07-31 | Communication apparatus |
EP03771460A EP1536087A1 (en) | 2002-07-31 | 2003-07-31 | Communication device |
Applications Claiming Priority (8)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
JP2002-223700 | 2002-07-31 | ||
JP2002223700A JP3975345B2 (ja) | 2002-07-31 | 2002-07-31 | セキュリティシステムおよび監視制御装置 |
JP2002-278436 | 2002-09-25 | ||
JP2002278436A JP2004116052A (ja) | 2002-09-25 | 2002-09-25 | 通信装置、通信システム、制御装置および認証装置 |
JP2002298309A JP4106543B2 (ja) | 2002-10-11 | 2002-10-11 | ドアロック制御装置およびドアロック制御システム |
JP2002-298309 | 2002-10-11 | ||
JP2002302996A JP4340839B2 (ja) | 2002-10-17 | 2002-10-17 | 通信装置 |
JP2002-302996 | 2002-10-17 |
Publications (1)
Publication Number | Publication Date |
---|---|
WO2004011746A1 true WO2004011746A1 (ja) | 2004-02-05 |
Family
ID=31192288
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/JP2003/009755 WO2004011746A1 (ja) | 2002-07-31 | 2003-07-31 | 通信装置 |
Country Status (5)
Country | Link |
---|---|
US (1) | US7212114B2 (ja) |
EP (1) | EP1536087A1 (ja) |
KR (1) | KR20050030217A (ja) |
CN (1) | CN1671938A (ja) |
WO (1) | WO2004011746A1 (ja) |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US8264322B2 (en) | 1999-03-12 | 2012-09-11 | Stanley Security Solutions, Inc. | Wireless security control system |
Families Citing this family (69)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US11244545B2 (en) | 2004-03-16 | 2022-02-08 | Icontrol Networks, Inc. | Cross-client sensor user interface in an integrated security network |
US11916870B2 (en) | 2004-03-16 | 2024-02-27 | Icontrol Networks, Inc. | Gateway registry methods and systems |
US20090077623A1 (en) | 2005-03-16 | 2009-03-19 | Marc Baum | Security Network Integrating Security System and Network Devices |
US12063220B2 (en) | 2004-03-16 | 2024-08-13 | Icontrol Networks, Inc. | Communication protocols in integrated systems |
GB2428821B (en) | 2004-03-16 | 2008-06-04 | Icontrol Networks Inc | Premises management system |
US20170118037A1 (en) | 2008-08-11 | 2017-04-27 | Icontrol Networks, Inc. | Integrated cloud system for premises automation |
US9729342B2 (en) | 2010-12-20 | 2017-08-08 | Icontrol Networks, Inc. | Defining and implementing sensor triggered response rules |
US10721087B2 (en) | 2005-03-16 | 2020-07-21 | Icontrol Networks, Inc. | Method for networked touchscreen with integrated interfaces |
US11368429B2 (en) | 2004-03-16 | 2022-06-21 | Icontrol Networks, Inc. | Premises management configuration and control |
US10237237B2 (en) | 2007-06-12 | 2019-03-19 | Icontrol Networks, Inc. | Communication protocols in integrated systems |
US10522026B2 (en) | 2008-08-11 | 2019-12-31 | Icontrol Networks, Inc. | Automation system user interface with three-dimensional display |
US11343380B2 (en) | 2004-03-16 | 2022-05-24 | Icontrol Networks, Inc. | Premises system automation |
US11811845B2 (en) | 2004-03-16 | 2023-11-07 | Icontrol Networks, Inc. | Communication protocols over internet protocol (IP) networks |
KR100652587B1 (ko) * | 2004-09-23 | 2006-12-06 | 엘지전자 주식회사 | 로봇청소기를 이용한 화재 경보 알림 시스템 및 방법 |
JP2006211343A (ja) * | 2005-01-28 | 2006-08-10 | Renesas Technology Corp | 認証方式及び認証システム |
US11615697B2 (en) | 2005-03-16 | 2023-03-28 | Icontrol Networks, Inc. | Premise management systems and methods |
US11496568B2 (en) | 2005-03-16 | 2022-11-08 | Icontrol Networks, Inc. | Security system with networked touchscreen |
US20120324566A1 (en) | 2005-03-16 | 2012-12-20 | Marc Baum | Takeover Processes In Security Network Integrated With Premise Security System |
US20170180198A1 (en) | 2008-08-11 | 2017-06-22 | Marc Baum | Forming a security network including integrated security system components |
US11700142B2 (en) | 2005-03-16 | 2023-07-11 | Icontrol Networks, Inc. | Security network integrating security system and network devices |
US20110128378A1 (en) | 2005-03-16 | 2011-06-02 | Reza Raji | Modular Electronic Display Platform |
US7439850B2 (en) * | 2005-04-27 | 2008-10-21 | Superb Industries, Inc. | Keyless entry system |
US10079839B1 (en) | 2007-06-12 | 2018-09-18 | Icontrol Networks, Inc. | Activation of gateway device |
US12063221B2 (en) | 2006-06-12 | 2024-08-13 | Icontrol Networks, Inc. | Activation of gateway device |
US20100060414A1 (en) * | 2006-07-07 | 2010-03-11 | Doo Man Im | Electric door lock device |
US11706279B2 (en) | 2007-01-24 | 2023-07-18 | Icontrol Networks, Inc. | Methods and systems for data communication |
US7633385B2 (en) | 2007-02-28 | 2009-12-15 | Ucontrol, Inc. | Method and system for communicating with and controlling an alarm system from a remote server |
US8451986B2 (en) | 2007-04-23 | 2013-05-28 | Icontrol Networks, Inc. | Method and system for automatically providing alternate network access for telecommunications |
US10523689B2 (en) | 2007-06-12 | 2019-12-31 | Icontrol Networks, Inc. | Communication protocols over internet protocol (IP) networks |
US11212192B2 (en) | 2007-06-12 | 2021-12-28 | Icontrol Networks, Inc. | Communication protocols in integrated systems |
US11423756B2 (en) | 2007-06-12 | 2022-08-23 | Icontrol Networks, Inc. | Communication protocols in integrated systems |
US11316753B2 (en) | 2007-06-12 | 2022-04-26 | Icontrol Networks, Inc. | Communication protocols in integrated systems |
US11646907B2 (en) | 2007-06-12 | 2023-05-09 | Icontrol Networks, Inc. | Communication protocols in integrated systems |
US12003387B2 (en) | 2012-06-27 | 2024-06-04 | Comcast Cable Communications, Llc | Control system user interface |
US11218878B2 (en) | 2007-06-12 | 2022-01-04 | Icontrol Networks, Inc. | Communication protocols in integrated systems |
US10223903B2 (en) | 2010-09-28 | 2019-03-05 | Icontrol Networks, Inc. | Integrated security system with parallel processing architecture |
US11831462B2 (en) | 2007-08-24 | 2023-11-28 | Icontrol Networks, Inc. | Controlling data routing in premises management systems |
US11916928B2 (en) | 2008-01-24 | 2024-02-27 | Icontrol Networks, Inc. | Communication protocols over internet protocol (IP) networks |
US20170185278A1 (en) | 2008-08-11 | 2017-06-29 | Icontrol Networks, Inc. | Automation system user interface |
US10530839B2 (en) | 2008-08-11 | 2020-01-07 | Icontrol Networks, Inc. | Integrated cloud system with lightweight gateway for premises automation |
US11729255B2 (en) | 2008-08-11 | 2023-08-15 | Icontrol Networks, Inc. | Integrated cloud system with lightweight gateway for premises automation |
US11758026B2 (en) | 2008-08-11 | 2023-09-12 | Icontrol Networks, Inc. | Virtual device systems and methods |
US11792036B2 (en) | 2008-08-11 | 2023-10-17 | Icontrol Networks, Inc. | Mobile premises automation platform |
US8749347B1 (en) * | 2009-01-29 | 2014-06-10 | Bank Of America Corporation | Authorized custodian verification |
US8502644B1 (en) | 2009-01-29 | 2013-08-06 | Bank Of American Corporation | Physical item security: tracking device activation |
JP5520517B2 (ja) * | 2009-02-25 | 2014-06-11 | 京セラ株式会社 | 携帯電子機器 |
US8638211B2 (en) | 2009-04-30 | 2014-01-28 | Icontrol Networks, Inc. | Configurable controller and interface for home SMA, phone and multimedia |
US9197736B2 (en) * | 2009-12-31 | 2015-11-24 | Digimarc Corporation | Intuitive computing methods and systems |
US8836467B1 (en) | 2010-09-28 | 2014-09-16 | Icontrol Networks, Inc. | Method, system and apparatus for automated reporting of account and sensor zone information to a central station |
US11750414B2 (en) | 2010-12-16 | 2023-09-05 | Icontrol Networks, Inc. | Bidirectional security sensor communication for a premises security system |
US9147337B2 (en) | 2010-12-17 | 2015-09-29 | Icontrol Networks, Inc. | Method and system for logging security event data |
DE102012022761B4 (de) * | 2012-11-22 | 2015-07-02 | Andreas Manz | Lesegerät, Zutrittskontrollsystem und Verfahren zum Betreiben eines Lesegeräts |
CN103906229B (zh) * | 2012-12-28 | 2018-06-26 | 中国移动通信集团江苏有限公司 | 一种基于家庭基站的定位系统和方法 |
US9311640B2 (en) | 2014-02-11 | 2016-04-12 | Digimarc Corporation | Methods and arrangements for smartphone payments and transactions |
US9978254B2 (en) * | 2013-07-17 | 2018-05-22 | BOT Home Automation, Inc. | Wireless speaker devices for wireless audio/video recording and communication devices |
KR102077223B1 (ko) * | 2013-10-11 | 2020-02-14 | 삼성전자주식회사 | 도어 락 장치, 디스플레이 장치, 모바일 디바이스 및 그 제어 방법 |
US11405463B2 (en) | 2014-03-03 | 2022-08-02 | Icontrol Networks, Inc. | Media content management |
US9353551B2 (en) * | 2014-03-19 | 2016-05-31 | Meghan Martinez | Wireless door locking system |
TWI602978B (zh) * | 2014-07-31 | 2017-10-21 | 鴻海精密工業股份有限公司 | 感應鑰匙及其校正系統、校正方法 |
TW201608101A (zh) * | 2014-08-27 | 2016-03-01 | 中興保全股份有限公司 | 電子鎖系統 |
CN104703147B (zh) * | 2015-01-15 | 2018-05-18 | 小米科技有限责任公司 | 信息发送方法及装置 |
EP3440854B1 (en) | 2016-04-06 | 2020-09-16 | Otis Elevator Company | Mobile visitor management |
KR102372191B1 (ko) * | 2017-03-16 | 2022-03-08 | 삼성전자주식회사 | 전자장치 및 그를 이용한 도어락 제어 방법 |
CN109212947A (zh) * | 2017-06-29 | 2019-01-15 | 上海共联通信信息发展有限公司 | 用于孩童定位的便携式定位装置及定位系统、方法 |
US20190325677A1 (en) * | 2018-04-24 | 2019-10-24 | Carrier Corporation | Home security system with automatic authorization functionality |
US11521445B2 (en) | 2018-08-03 | 2022-12-06 | Therma-Tru Corporation | Integrated electronic entry door systems |
CN112412180B (zh) * | 2020-12-17 | 2021-07-13 | 德清县杰创机械有限公司 | 一种具有语音播报和智能控温的门锁装置 |
JP2022133896A (ja) * | 2021-03-02 | 2022-09-14 | アイホン株式会社 | 集合住宅インターホンシステム |
US11884238B2 (en) * | 2021-10-21 | 2024-01-30 | Zoox, Inc. | Vehicle door interface interactions |
Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JPH1145392A (ja) * | 1997-07-28 | 1999-02-16 | Matsushita Electric Works Ltd | 生活情報監視システム |
JP2000259971A (ja) * | 1999-03-05 | 2000-09-22 | Shinshakai Shihon Joho Kaihatsu Center:Kk | 介護監視システム |
JP2000268273A (ja) * | 1999-03-19 | 2000-09-29 | Aichi Tokei Denki Co Ltd | キーホルダーを用いた在宅、外出検出装置と該装置を使用した生活異変検知システム |
JP2002016714A (ja) * | 2000-06-28 | 2002-01-18 | Matsushita Electric Works Ltd | 集合住宅監視システム |
JP2002071478A (ja) * | 2000-09-04 | 2002-03-08 | Toyoda Mach Works Ltd | トルクセンサ |
JP2002070377A (ja) * | 2000-09-04 | 2002-03-08 | Yokogawa Electric Corp | 電子錠制御システム |
Family Cites Families (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US5397884A (en) * | 1993-10-12 | 1995-03-14 | Saliga; Thomas V. | Electronic kay storing time-varying code segments generated by a central computer and operating with synchronized off-line locks |
JPH094293A (ja) | 1995-06-16 | 1997-01-07 | Omron Corp | 解錠装置及び解錠システム |
US5960085A (en) * | 1997-04-14 | 1999-09-28 | De La Huerga; Carlos | Security badge for automated access control and secure data gathering |
JP3112076B2 (ja) * | 1998-05-21 | 2000-11-27 | 豊 保倉 | ユーザ認証システム |
DE19844360A1 (de) * | 1998-09-28 | 2000-04-13 | Anatoli Stobbe | Zugangskontrollsystem |
JP2002071378A (ja) | 2000-09-05 | 2002-03-08 | Hitachi Koukiyou Syst Eng Kk | 自動集合判別システム |
-
2003
- 2003-07-31 CN CNA03818026XA patent/CN1671938A/zh active Pending
- 2003-07-31 WO PCT/JP2003/009755 patent/WO2004011746A1/ja not_active Application Discontinuation
- 2003-07-31 KR KR1020057001624A patent/KR20050030217A/ko not_active Application Discontinuation
- 2003-07-31 US US10/523,171 patent/US7212114B2/en not_active Expired - Fee Related
- 2003-07-31 EP EP03771460A patent/EP1536087A1/en not_active Withdrawn
Patent Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JPH1145392A (ja) * | 1997-07-28 | 1999-02-16 | Matsushita Electric Works Ltd | 生活情報監視システム |
JP2000259971A (ja) * | 1999-03-05 | 2000-09-22 | Shinshakai Shihon Joho Kaihatsu Center:Kk | 介護監視システム |
JP2000268273A (ja) * | 1999-03-19 | 2000-09-29 | Aichi Tokei Denki Co Ltd | キーホルダーを用いた在宅、外出検出装置と該装置を使用した生活異変検知システム |
JP2002016714A (ja) * | 2000-06-28 | 2002-01-18 | Matsushita Electric Works Ltd | 集合住宅監視システム |
JP2002071478A (ja) * | 2000-09-04 | 2002-03-08 | Toyoda Mach Works Ltd | トルクセンサ |
JP2002070377A (ja) * | 2000-09-04 | 2002-03-08 | Yokogawa Electric Corp | 電子錠制御システム |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US8264322B2 (en) | 1999-03-12 | 2012-09-11 | Stanley Security Solutions, Inc. | Wireless security control system |
US8665064B1 (en) | 1999-03-12 | 2014-03-04 | Stanley Security Solutions, Inc. | Wireless security control system |
Also Published As
Publication number | Publication date |
---|---|
KR20050030217A (ko) | 2005-03-29 |
US7212114B2 (en) | 2007-05-01 |
EP1536087A1 (en) | 2005-06-01 |
CN1671938A (zh) | 2005-09-21 |
US20060007005A1 (en) | 2006-01-12 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
WO2004011746A1 (ja) | 通信装置 | |
US8653969B2 (en) | Home security system | |
WO2004011747A1 (ja) | 集合住宅共用玄関装置、集合住宅戸別ドアホン装置、戸別収納ボックス管理装置および通信システム | |
EP1806703A2 (en) | Access authentication system and method using smart communicator | |
CN204754706U (zh) | 电子猫眼 | |
CN106427869A (zh) | 车辆控制方法及装置 | |
JP2004180140A (ja) | 集合住宅共用玄関装置、集合住宅戸別ドアホン装置、戸別収納ボックス管理装置および通信システム | |
KR102328402B1 (ko) | 스마트 도어락 제어 시스템 및 제어 방법 | |
JP2004172680A (ja) | ドアホン装置および通信システム | |
JP4449641B2 (ja) | ドアホン装置 | |
JP4318021B2 (ja) | ドアロックシステムおよびドアロック管理方法 | |
JP4340839B2 (ja) | 通信装置 | |
JP4135071B2 (ja) | 通信システムおよび通信方法 | |
CN213904428U (zh) | 一种门禁机和考勤门禁系统 | |
KR101025830B1 (ko) | 지문인식 방범시스템 | |
JP4318020B2 (ja) | 通信システム、制御装置および管理装置 | |
JP4106543B2 (ja) | ドアロック制御装置およびドアロック制御システム | |
JP3975345B2 (ja) | セキュリティシステムおよび監視制御装置 | |
KR100666008B1 (ko) | 인텔리전트 도어록 시스템 | |
JP2004116052A (ja) | 通信装置、通信システム、制御装置および認証装置 | |
JP2008293437A (ja) | ホームセキュリティシステム及びアクセス許可システム | |
CN118612333A (zh) | 手机安全预警智能报失的实现方法 | |
KR20050023208A (ko) | 집합 주택 공용 현관 장치, 집합 주택 호별 도어폰 장치,호별 수납 박스 관리 장치 및 통신 시스템 | |
CN118869866A (zh) | 公私安全划分手机界面的实现方法 | |
KR20220040596A (ko) | 다기능 스마트 도어 |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
AK | Designated states |
Kind code of ref document: A1 Designated state(s): CN KR US |
|
AL | Designated countries for regional patents |
Kind code of ref document: A1 Designated state(s): AT BE BG CH CY CZ DE DK EE ES FI FR GB GR HU IE IT LU MC NL PT RO SE SI SK TR |
|
121 | Ep: the epo has been informed by wipo that ep was designated in this application | ||
WWE | Wipo information: entry into national phase |
Ref document number: 2003771460 Country of ref document: EP |
|
WWE | Wipo information: entry into national phase |
Ref document number: 2003818026X Country of ref document: CN |
|
ENP | Entry into the national phase |
Ref document number: 2006007005 Country of ref document: US Kind code of ref document: A1 |
|
WWE | Wipo information: entry into national phase |
Ref document number: 1020057001624 Country of ref document: KR Ref document number: 10523171 Country of ref document: US |
|
WWP | Wipo information: published in national office |
Ref document number: 1020057001624 Country of ref document: KR |
|
WWP | Wipo information: published in national office |
Ref document number: 2003771460 Country of ref document: EP |
|
WWP | Wipo information: published in national office |
Ref document number: 10523171 Country of ref document: US |
|
WWW | Wipo information: withdrawn in national office |
Ref document number: 2003771460 Country of ref document: EP |