WO2013051921A1 - Access and environment control system - Google Patents

Access and environment control system Download PDF

Info

Publication number
WO2013051921A1
WO2013051921A1 PCT/MX2011/000121 MX2011000121W WO2013051921A1 WO 2013051921 A1 WO2013051921 A1 WO 2013051921A1 MX 2011000121 W MX2011000121 W MX 2011000121W WO 2013051921 A1 WO2013051921 A1 WO 2013051921A1
Authority
WO
WIPO (PCT)
Prior art keywords
access
environment
equipment
environment control
control system
Prior art date
Application number
PCT/MX2011/000121
Other languages
Spanish (es)
French (fr)
Inventor
Marco Antonio GAXIOLA MICHEL
Original Assignee
Gaxiola Michel Marco Antonio
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Gaxiola Michel Marco Antonio filed Critical Gaxiola Michel Marco Antonio
Priority to PCT/MX2011/000121 priority Critical patent/WO2013051921A1/en
Publication of WO2013051921A1 publication Critical patent/WO2013051921A1/en

Links

Classifications

    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/20Individual registration on entry or exit involving the use of a pass

Definitions

  • the following invention refers to an access and environment control system, which aims to allow access control of individuals to a certain space that is required to be restricted, as well as also manipulate the environment of such space.
  • the technical field of the access and environment control system is that of the electrical and electronic system because it is an automated system, which has a wide field of application, since it is possible to implement it in any place where it is required to restrict the entrance to a space due to the importance of what is contained in it, as well as controlling the devices used in that space to regulate its environment.
  • This invention is very robust so it allows you to control from a simple access and the environment of a residence, to more complex places such as an educational institution or a macro-company.
  • This access and environment control system is based on an access control equipment which has a small embedded database, an environment control equipment that has a means of communication via TCP (Transmission Control Protocol) / IP ( Internet Protocol), a means of loading information, a means to send reports on various events presented in the system and a computer equipment that allows the administration of said system
  • TCP Transmission Control Protocol
  • IP Internet Protocol
  • this system is capable of operating on its own without the need for an external database located on a server, however, it also allows the use of an external database to expand its operating capabilities.
  • the present invention has certain differences with respect to the aforementioned patents because it is based on an independent system which does not require external equipment to allow access and environmental control of a space, due to the technology it uses and its implementation. of home automation as one of its main characteristics.
  • the access and environment control system of spaces or places uses two devices that communicate with each other to perform the following operations:
  • the access control team allows access to the individual depending on whether he or she has permissions based on various authorization processes, both for access and for the control of the environment of the space itself.
  • the environmental control equipment is based on the authorizations received from the access control equipment or module to operate any external electrical / electronic device to regulate the environment to the comfort of the individual.
  • access events and permissions are generated in an internal database that has the same access control equipment.
  • teams are able to generate sabotage events in the accesses or general problems in them.
  • These devices have a communication system through a serial port.
  • these devices are capable of communicating with an administration and database software through a communication port via TCP / IP that is located within the environment control team, in order to expand their storage capacities as operation
  • this software allows the control of each of the electrical / electronic devices that are connected to the environmental control equipment, in addition to allowing the devices to be shared between different access control systems. Accesses connected to them, this means that an access control A, may be able to control the access of an access control B or a device connected in the environment control equipment interconnected to the access control C.
  • Other functionality of the software is that it allows to send the events stored in the database of the access control team to an email and / or by a message via GPRS using the short message service (SMS).
  • SMS short message service
  • the equipment of the access and environment control system is capable of receiving energy from different media, such as alternating current, an internal rechargeable battery or a POE (Power Over Ethernet) power system.
  • media such as alternating current, an internal rechargeable battery or a POE (Power Over Ethernet) power system.
  • POE Power Over Ethernet
  • Figure 1 shows the interaction between a personal RFID identification (la) and the access control equipment (Ib), where the procedure to allow access to a space is shown.
  • the individual shows his personal RFID identification (the) to the access control team (Ib), and quickly makes a reading in his database (le) to verify that his personal RFID identification (the) presented grants sufficient permissions to the individual to access the corresponding space.
  • Figure 2 shows the interaction between the access control equipment (2b) and the environment control equipment (2d), connected by serial wiring (2f). After verifying the individual's permissions in the system database (2c) to access a space, it also verifies if it has permissions to control the environment (2d) through one or more electrical / electronic devices or sensors (2e) connected to the environment control equipment (2d) for the benefit of the individual.
  • Figure 3 shows the interaction between access control equipment (3b), environment control equipment (3d) and computer equipment (3f). This process explains how the access control equipment (3b) communicates to a computer equipment (3f) through a connection via TCP / IP (3j), through the environment control equipment (3d).
  • This connection is necessary only for monitoring, administration and expansion of access control capabilities (or an access control network (3b)) through the use of a second database (3g) located on the computer equipment. It allows to manage the individuals registered in the database of the access control team (3c), as well as receive reports of the access control about the events that happen in the terminal, being these of the accesses allowed or denied, sabotages to the access or failures in the same access control equipment (3b) and environment control (3d). It also allows you to send these same reports to a system administrator through the short message or SMS service (3i) and by email (3h). This interconnection also allows the monitoring of one or more electrical / electronic devices or sensors (3e) that are connected to the environmental control equipment.
  • FIG. 4 shows the access and environment control system in a complete way, this system is made up of a network of access and environment control equipment (4x, 4y, 4z) managed by a single computer equipment (4f) and its base of data (4g).
  • An extra capacity of such access and environment control equipment connected in network with a computer equipment (4f) is to control one or more electrical / electronic devices and / or access through any of the access control equipment and environment, through the personal RFID identification provided by the individual to one of the access and environment equipment.
  • the access control equipment (Ib) consists of a programmable electronic card which stores the personal RFID identification of the individual (as), as well as calendars, schedules and a series of permits for the same. This equipment by itself is capable of allow access or deny it to individuals who present their personal RFID identification (the), and keep a record of the event in their database (le).
  • the access control equipment (Ib) When the access control equipment (Ib) is connected to an environment control equipment (2d) by means of serial wiring (2f), it increases its functionality, because it is now able to control the devices by itself controllable (2e) that are connected to the environment control (2d), as well as being able to monitor the status of the devices or sensors (3e) that in the same way are connected to this environment control equipment (2d ).
  • the access control (Ib) is able to turn on or off the controllable devices (2e) from any event or schedule that has been configured to it, in addition to keeping a record of all these events in its database ( 3c or 3g).
  • the access control equipment (Ib) is capable of being powered by the same environment control (2d), which can receive it from different sources, such as It is AC DC (Alternating / Direct Current), by means of a rechargeable battery that is inside this same equipment or a PoE power supply, which uses an Ethernet port to receive power.
  • AC DC Alternating / Direct Current
  • the access control (Ib) can send reports to a computer (3f) about the status of the same, the status of all devices or sensors (3e) connected to the environment control (2d), as well as the records of all the individuals that have accessed the corresponding space, system failures or attempts to sabotage the corresponding access.
  • Another capacity that allows the interconnection of access control equipment (Ib) and environment (2d) with a computer equipment (3f) is to administer to individuals who will have access through their personal RFID identification (la) their schedules and corresponding calendars, as well as allows a technical configuration of the access control (Ib) and environment (2d) equipment.
  • the computer equipment (3f) it is possible to control each of the controllable devices (2e) that are connected to the environment control (2d), as well as to allow access control, all This remotely.
  • Another functionality that allows this interconnectivity is to be able to link several access and environment controls (4x, 4y, 4z), and allow them to share their accesses and controllable devices (2e) when a certain event occurs.

Landscapes

  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Telephonic Communication Services (AREA)

Abstract

The present invention relates to an access and environment control system which includes an access control system using RFID technology for controlling access to a given space, keeping a record of same and other events that occur in the access, in addition to being capable of sending said events over TCP/IP to a computer system which, in turn, can send same via GPRS or e-mail. The invention also includes an environment control system which monitors sensors located in the space, which are capable of monitoring temperature levels, light levels and movement, among others; the system is also capable of controlling various electronic devices located in the space in order to control the environment thereof by means of electric cables or an infrared emitter. Likewise, the invention includes a means for loading and sending information which is capable of keeping track of events detected by the access and environment control systems.

Description

SISTEMA DE CONTROL DE ACCESO Y AMBIENTE  ACCESS AND ENVIRONMENT CONTROL SYSTEM
CAMPO TÉCNICO TECHNICAL FIELD
La siguiente invención, según se expresa en el título de la presente memoria descriptiva, se refiere a un sistema de control de acceso y ambiente, el cual tiene como objetivo permitir el control de acceso de individuos a cierto espacio que se requiera restringir, así como también manipular el ambiente de tal espacio. The following invention, as expressed in the title of the present specification, refers to an access and environment control system, which aims to allow access control of individuals to a certain space that is required to be restricted, as well as also manipulate the environment of such space.
El campo técnico del sistema de control de acceso y ambiente es el de la eléctrica y electrónica debido a que se trata de un sistema automatizado, el cual tiene un amplio campo de aplicación, ya que es posible implementarlo en cualquier lugar donde se requiera restringir la entrada a un espacio debido a la importancia de lo que se encuentre contenido en el mismo, así como controlar los dispositivos utilizados en ese espacio para regular su ambiente. The technical field of the access and environment control system is that of the electrical and electronic system because it is an automated system, which has a wide field of application, since it is possible to implement it in any place where it is required to restrict the entrance to a space due to the importance of what is contained in it, as well as controlling the devices used in that space to regulate its environment.
Este invento es muy robusto por lo que permite controlar desde un simple acceso y el ambiente de una residencia, hasta lugares más complejos como una institución educativa o alguna macro-empresa. This invention is very robust so it allows you to control from a simple access and the environment of a residence, to more complex places such as an educational institution or a macro-company.
Este sistema de control de acceso y ambiente se basa en un equipo de control de acceso el cual cuenta con una pequeña base de datos embebida, un equipo de control de ambiente que posee un medio de comunicación vía TCP (Transmisión Control Protocol) / IP (Internet Protocol), un medio de carga de información, un medio para enviar informes sobre diversos eventos presentados en el sistema y un equipo informático que permite la administración de dicho sistema This access and environment control system is based on an access control equipment which has a small embedded database, an environment control equipment that has a means of communication via TCP (Transmission Control Protocol) / IP ( Internet Protocol), a means of loading information, a means to send reports on various events presented in the system and a computer equipment that allows the administration of said system
Además, este sistema es capaz de funcionar por sí solo sin la necesidad de una base de datos externa situada en un servidor, sin embargo, también permite utilizar una base de datos externa para expandir sus capacidades de operación ANTECEDENTES DE LA INVENCIÓN In addition, this system is capable of operating on its own without the need for an external database located on a server, however, it also allows the use of an external database to expand its operating capabilities. BACKGROUND OF THE INVENTION
El control de acceso a espacios no es un tema nuevo, debido a la necesidad de las empresas o individuos por querer restringir el acceso al público a un determinado espacio dada la importancia de los recursos, materiales o información que se encuentren en el mismo, se han creado diferentes métodos para la restricción de los mismos. The control of access to spaces is not a new issue, due to the need of companies or individuals for wanting to restrict access to the public to a certain space given the importance of the resources, materials or information found therein, They have created different methods for restricting them.
En primer lugar, conocemos el método de utilizar llaves para el acceso a un edificio, hogar u cualquier otro lugar, a pesar de que este método es el más sencillo, es también el menos seguro debido a la facilidad para perder o duplicar la llave. First, we know the method of using keys for access to a building, home or any other place, although this method is the simplest, it is also the least secure due to the ease of losing or duplicating the key.
En segundo lugar, tenemos otro método más utilizados por las empresas, que es la tradicional caseta de seguridad, en la que existe un guardia de seguridad que mantiene el orden de los individuos que acceden al espacio, ya sea por medio de credenciales que el personal de la empresa le presenta o algún otro identificador que los mismos puedan presentar, este método es también muy sencillo y mantiene en gran parte el control de los accesos, sin embargo, debido a que se requiere de un individuo que mantenga el orden, este método resulta tan confiable como lo es el mismo guardia de seguridad. Second, we have another method more used by companies, which is the traditional security booth, in which there is a security guard that maintains the order of individuals who access the space, either through credentials than staff of the company presents you or some other identifier that they may present, this method is also very simple and largely maintains access control, however, because an individual is required to maintain order, this method It is as reliable as the security guard itself.
Debido a la poca fiabilidad de los métodos tradicionales anteriormente descritos, se han creado diversos sistemas de control de acceso electrónicos, como lo son sistemas de control de acceso por medio de lectores biométricos o de radiofrecuencia Estos sistemas presentan un grado más de confiabilidad, debido a que son sistemas automatizados que realizan una verificación personal del individuo que desee acceder al espacio. Due to the low reliability of the traditional methods described above, various electronic access control systems have been created, such as access control systems by means of biometric or radiofrequency readers. These systems have a higher degree of reliability due to which are automated systems that perform a personal verification of the individual who wishes to access the space.
Entre estos sistemas de control de acceso automatizados se encuentra la patente US 2006111053 "RFID System using Mobile Phone as Device of Access Control and Security Response" la cual utiliza una etiqueta RFID incrustada en un teléfono móvil para dar acceso a los individuos a un determinado espacio, esta etiqueta es leída por un transpondedor al momento de encontrarse dentro de cierto rango, y automáticamente se envía un mensaje SMS, MMS o correo electrónico por medio del teléfono celular a un administrador, este sistema de control de acceso está pensado más que nada para los pequeños que asisten a una institución educativa, por lo que es también un sistema de seguridad. Otro de estos sistemas de control de acceso automatizado es la patente JP 2008123026 "Access Control System", la cual utiliza la tecnología RFID para reconocer un vehículo y los pasajeros que lo abordan, y así informarlo a un guardia de seguridad por una pantalla incrustada en un bastón policial. Among these automated access control systems is US Patent 2006111053 "RFID System using Mobile Phone as Device of Access Control and Security Response" which uses an RFID tag embedded in a mobile phone to give individuals access to a certain space , this label is read by a transponder at the time of being within a certain range, and an SMS, MMS or email message is automatically sent by means of a cell phone to an administrator, this access control system is designed more than anything to the little ones who attend an educational institution, so it is also a security system. Another of these automated access control systems is JP 2008123026 "Access Control System", which uses RFID technology to recognize a vehicle and passengers who board it, and thus inform a security guard by a screen embedded in A police baton
La presente invención tiene ciertas diferencias respecto a las patentes antes mencionadas debido a que se basa en un sistema independiente el cual no requiere de un equipo extemo para permitir el acceso y control de ambiente de un espacio, debido a la tecnología que utiliza y la implementación de la domótica como una de sus características principales. The present invention has certain differences with respect to the aforementioned patents because it is based on an independent system which does not require external equipment to allow access and environmental control of a space, due to the technology it uses and its implementation. of home automation as one of its main characteristics.
DESCRIPCIÓN DE LA INVENCIÓN DESCRIPTION OF THE INVENTION
Los detalles característicos de este novedoso sistema de control de acceso y ambiente se muestran claramente en la siguiente descripción y en los dibujos que se acompañan, así como una ilustración de aquella y siguiendo los mismos signos de referencia para indicar las partes y las figuras mostradas. The characteristic details of this novel access and environment control system are clearly shown in the following description and in the accompanying drawings, as well as an illustration of that and following the same reference signs to indicate the parts and figures shown.
El sistema de control de acceso y ambiente de espacios o lugares, utiliza dos equipos que se comunican entre sí para realizar las siguientes operaciones: The access and environment control system of spaces or places uses two devices that communicate with each other to perform the following operations:
• El equipo de control de acceso, permite el acceso al individuo dependiendo si el mismo tiene permisos en base a varios procesos de autorización, tanto de acceso como del control del ambiente del espacio mismo. · El equipo de control de ambiente, se basa en las autorizaciones recibidas de parte del equipo o módulo de control de acceso para operar cualquier dispositivo eléctrico/electrónico extemo para regular el ambiente a la comodidad del individuo.  • The access control team allows access to the individual depending on whether he or she has permissions based on various authorization processes, both for access and for the control of the environment of the space itself. · The environmental control equipment is based on the authorizations received from the access control equipment or module to operate any external electrical / electronic device to regulate the environment to the comfort of the individual.
En base a las operaciones realizadas por estos equipos del sistema de control de acceso y ambiente, se generan eventos de acceso y permisos en una base de datos interna que posee el mismo equipo de control de acceso. De la misma manera, los equipos son capaces de generar eventos de sabotaje en los accesos o problemas generales en ellos. Estos equipos cuentan con un sistema de comunicación por medio de un puerto en serie. Based on the operations performed by these equipment of the access and environment control system, access events and permissions are generated in an internal database that has the same access control equipment. In the same way, teams are able to generate sabotage events in the accesses or general problems in them. These devices have a communication system through a serial port.
Así mismo, estos equipos son capaces de comunicarse con un software de administración y base de datos a través de un puerto de comunicación vía TCP/IP que se encuentra dentro del equipo de control de ambiente, con el fin de expandir sus capacidades tanto de almacenamiento como operación. Dentro de las capacidades de operación, cabe destacar que este software permite el control de cada uno de los dispositivos eléctricos/electrónicos que se encuentran conectados al equipo de control de ambiente, ademas de que permite compartir entre distintos sistemas de control de acceso los dispositivos o accesos conectados a los mismos, esto quiere decir que un control de acceso A, puede ser capaz de controlar el acceso de un control de acceso B o un dispositivo conectado en el equipo de control de ambiente interconectado al control de acceso C. Otra funcionalidad del software es que permite enviar los eventos almacenados en la base de datos del equipo de control de acceso a un correo electrónico y/o por un mensaje vía GPRS utilizando el servicio de mensajes cortos (SMS). Likewise, these devices are capable of communicating with an administration and database software through a communication port via TCP / IP that is located within the environment control team, in order to expand their storage capacities as operation Within the operating capabilities, it should be noted that this software allows the control of each of the electrical / electronic devices that are connected to the environmental control equipment, in addition to allowing the devices to be shared between different access control systems. Accesses connected to them, this means that an access control A, may be able to control the access of an access control B or a device connected in the environment control equipment interconnected to the access control C. Other functionality of the software is that it allows to send the events stored in the database of the access control team to an email and / or by a message via GPRS using the short message service (SMS).
Los equipos del sistema de control de acceso y ambiente son capaces de recibir energía de distintos medios, como lo es corriente alterna, una batería interna recargable o un sistema de alimentación POE (Power Over Ethernet). The equipment of the access and environment control system is capable of receiving energy from different media, such as alternating current, an internal rechargeable battery or a POE (Power Over Ethernet) power system.
Descripción de las figuras Description of the figures
La figura 1 muestra la interacción entre una identificación RFID personal (la) y el equipo de control de acceso (Ib), en donde se muestra el procedimiento para permitir el acceso a un espacio. El individuo muestra su identificación RFID personal (la) al equipo de control de acceso (Ib), y rápidamente este hace una lectura en su base de datos (le) para verificar que su identificación RFID personal (la) presentada le conceda permisos suficientes al individuo para acceder al espacio correspondiente.  Figure 1 shows the interaction between a personal RFID identification (la) and the access control equipment (Ib), where the procedure to allow access to a space is shown. The individual shows his personal RFID identification (the) to the access control team (Ib), and quickly makes a reading in his database (le) to verify that his personal RFID identification (the) presented grants sufficient permissions to the individual to access the corresponding space.
La figura 2 muestra la interacción entre el equipo de control de acceso (2b) y el equipo de control de ambiente (2d), conectados por un cableado serial (2f). Después de verificar los permisos del individuo en la base de datos del sistema (2c) para acceder a un espacio, este también verifica si el mismo tiene permisos para realizar un control del ambiente (2d) a través de uno o más dispositivos eléctricos/electrónicos o sensores (2e) conectados al equipo de control de ambiente (2d) para el beneficio del individuo. La Figura 3 muestra la interacción entre los equipos de control de acceso (3b), equipo de control de ambiente (3d) y un equipo informático (3f). Este proceso explica como el equipo de control de acceso (3b) se comunica a un equipo informático (3f) a través de una conexión vía TCP/IP (3j), por medio del equipo de control de ambiente (3d). Esta conexión es necesaria solo para monitoreo, administración y expansión de las capacidades del control de acceso (o una red de control de acceso (3b)) por medio del uso de una segunda base de datos (3g) ubicada en el equipo informático. Permite administrar los individuos registrados en la base de datos del equipo de control de acceso (3c), así como también recibe informes del control de acceso acerca de los eventos que suceden en la terminal, siendo estos de los accesos permitidos o denegados, sabotajes al acceso o fallos en el mismo equipo de control de acceso (3b) y control de ambiente (3d). Además permite enviar estos mismos informes a un administrador del sistema por medio del servicio de mensajes cortos o SMS (3i) y por correo electrónico (3h). Esta interconexión también permite el monitoreo de uno o más dispositivos eléctricos/electrónicos o sensores (3e) que se encuentren conectados al equipo de control de ambiente. Figure 2 shows the interaction between the access control equipment (2b) and the environment control equipment (2d), connected by serial wiring (2f). After verifying the individual's permissions in the system database (2c) to access a space, it also verifies if it has permissions to control the environment (2d) through one or more electrical / electronic devices or sensors (2e) connected to the environment control equipment (2d) for the benefit of the individual. Figure 3 shows the interaction between access control equipment (3b), environment control equipment (3d) and computer equipment (3f). This process explains how the access control equipment (3b) communicates to a computer equipment (3f) through a connection via TCP / IP (3j), through the environment control equipment (3d). This connection is necessary only for monitoring, administration and expansion of access control capabilities (or an access control network (3b)) through the use of a second database (3g) located on the computer equipment. It allows to manage the individuals registered in the database of the access control team (3c), as well as receive reports of the access control about the events that happen in the terminal, being these of the accesses allowed or denied, sabotages to the access or failures in the same access control equipment (3b) and environment control (3d). It also allows you to send these same reports to a system administrator through the short message or SMS service (3i) and by email (3h). This interconnection also allows the monitoring of one or more electrical / electronic devices or sensors (3e) that are connected to the environmental control equipment.
La figura 4 muestra el sistema de control de acceso y ambiente de manera completa, este sistema está conformado por una red de equipos de control de acceso y ambiente (4x, 4y, 4z) administrada por un solo equipo informático (4f) y su base de datos (4g). Una capacidad extra que tienen tales equipos de control de acceso y ambiente conectados en red con un equipo informático (4f), es la de controlar uno o más dispositivos eléctricos/electrónicos y/o accesos a través de cualquiera de los equipos de control de acceso y ambiente, por medio de la identificación RFID personal proporcionada por el individuo a uno de los equipos de acceso y ambiente. Esto quiere decir que al mostrar un individuo su identificación RFID personal en el equipo de control de acceso y ambiente 4x, este puede accionar un dispositivo eléctrico/electrónico o el acceso que se encuentran administrados por el equipo de control de acceso y ambiente 4y o 4z dependiendo del número de equipos que se desee incorporar al sistema de control de acceso y ambiente. Figure 4 shows the access and environment control system in a complete way, this system is made up of a network of access and environment control equipment (4x, 4y, 4z) managed by a single computer equipment (4f) and its base of data (4g). An extra capacity of such access and environment control equipment connected in network with a computer equipment (4f) is to control one or more electrical / electronic devices and / or access through any of the access control equipment and environment, through the personal RFID identification provided by the individual to one of the access and environment equipment. This means that by showing an individual their personal RFID identification on the 4x access and environment control equipment, this can trigger an electrical / electronic device or the access that is managed by the 4y or 4z environment and access control equipment. depending on the number of equipment that you want to incorporate into the access and environment control system.
Descripción de una Realización Preferente Description of a Preferred Embodiment
El equipo de control de acceso (Ib) consiste en una tarjeta electrónica programable la cual almacena la identificación RFID personal del individuo (la), así como también calendarios, horarios y una serie de permisos para la misma Este equipo por sí mismo es capaz de permitir el acceso o denegarlo a los individuos que presenten su identificación RFID personal (la), y guardar un registro del evento en su base de datos (le). The access control equipment (Ib) consists of a programmable electronic card which stores the personal RFID identification of the individual (as), as well as calendars, schedules and a series of permits for the same. This equipment by itself is capable of allow access or deny it to individuals who present their personal RFID identification (the), and keep a record of the event in their database (le).
Cuando el equipo de control de acceso (Ib) se conecta a un equipo de control de ambiente (2d) por medio de un cableado serial (2f), este incrementa su funcionalidad, debido a que ahora es capaz de controlar por si solo los dispositivos controlables (2e) que se encuentran conectados al control de ambiente (2d), así como también es capaz de monitorear el estado de los dispositivos o sensores (3e) que de la misma manera se encuentran conectados a este equipo de control de ambiente (2d). El control de acceso (Ib) es capaz de encender o apagar los dispositivos controlables (2e) a partir de algún evento u horario que se le haya configurado al mismo, además de que lleva un registro de todos estos sucesos en sus base de datos (3c ó 3g). When the access control equipment (Ib) is connected to an environment control equipment (2d) by means of serial wiring (2f), it increases its functionality, because it is now able to control the devices by itself controllable (2e) that are connected to the environment control (2d), as well as being able to monitor the status of the devices or sensors (3e) that in the same way are connected to this environment control equipment (2d ). The access control (Ib) is able to turn on or off the controllable devices (2e) from any event or schedule that has been configured to it, in addition to keeping a record of all these events in its database ( 3c or 3g).
Al conectarse a este equipo de control de ambiente (2d), el equipo de control de acceso (Ib) es capaz de alimentarse de energía por medio del mismo control de ambiente (2d), el cual la puede recibir de distintas fuentes, como lo es AC DC (Corriente Alterna/Directa), por medio de una batería recargable que se encuentra dentro de este mismo equipo o una fuente de alimentación PoE, la cual utiliza un puerto Ethernet para recibir energía. By connecting to this environment control equipment (2d), the access control equipment (Ib) is capable of being powered by the same environment control (2d), which can receive it from different sources, such as It is AC DC (Alternating / Direct Current), by means of a rechargeable battery that is inside this same equipment or a PoE power supply, which uses an Ethernet port to receive power.
Al conectarse a una red por medio del puerto Ethernet situado en el control de ambiente (2d), el control de acceso (Ib) puede enviar informes a un equipo informático (3f) acerca del estado del mismo, el estado de todos los dispositivos o sensores (3e) conectados al control de ambiente (2d), así como también el registros de todos los individuos que han accedido al espacio correspondiente, fallas en el sistema o intentos de sabotaje al acceso correspondiente. When connecting to a network through the Ethernet port located in the environment control (2d), the access control (Ib) can send reports to a computer (3f) about the status of the same, the status of all devices or sensors (3e) connected to the environment control (2d), as well as the records of all the individuals that have accessed the corresponding space, system failures or attempts to sabotage the corresponding access.
Otra capacidad que permite la interconexión de los equipos de control de acceso (Ib) y ambiente (2d) con un equipo informático (3f) es la de administrar a los individuos que tendrán acceso por medio de su identificación RFID personal (la) sus horarios y calendarios correspondientes, así como también permite una configuración técnica de los equipos de control de acceso (Ib) y ambiente (2d). Además de este tipo de administraciones y configuraciones, por medio del equipo informático (3f) es posible controlar cada uno de los dispositivos controlables (2e) que se encuentran conectados al control de ambiente (2d), así como también permite controlar el acceso, todo esto de manera remota. Otra funcionalidad que permite esta interconectividad, es la de poder enlazar varios controles de acceso y ambiente (4x, 4y, 4z), y permitir que estos compartan sus accesos y dispositivos controlables (2e) al presentarse determinado evento. Por ejemplo, tenemos un control de acceso y ambiente (4x) y un control de acceso y ambiente (4y), un individuo muestra su identificación RFID personal (la) al equipo de control de acceso y ambiente (4x), entonces este equipo envía un informe al equipo informático (3f) acerca de lo ocurrido para que realice un análisis de la información y envíe una señal al control de acceso y ambiente (4y) para que este encienda uno de sus dispositivos controlables (2e). Another capacity that allows the interconnection of access control equipment (Ib) and environment (2d) with a computer equipment (3f) is to administer to individuals who will have access through their personal RFID identification (la) their schedules and corresponding calendars, as well as allows a technical configuration of the access control (Ib) and environment (2d) equipment. In addition to this type of administrations and configurations, through the computer equipment (3f) it is possible to control each of the controllable devices (2e) that are connected to the environment control (2d), as well as to allow access control, all This remotely. Another functionality that allows this interconnectivity is to be able to link several access and environment controls (4x, 4y, 4z), and allow them to share their accesses and controllable devices (2e) when a certain event occurs. For example, we have an access control and environment (4x) and an access control and environment (4y), an individual shows his personal RFID identification (the) to the access and environment control team (4x), then this equipment sends a report to the computer team (3f) about what happened to perform an analysis of the information and send a signal to the access and environment control (4y) so that it turns on one of its controllable devices (2e).

Claims

REIVINDICACIONES Habiendo descrito suficientemente ésta invención, considero como una novedad y por lo tanto reclamo como de mi exclusiva propiedad, lo contenido en las siguientes cláusulas: CLAIMS Having sufficiently described this invention, I consider as a novelty and therefore claim as my exclusive property, the content of the following clauses:
1. El sistema de control de acceso y ambiente, caracterizado porque consta de un equipo de control de acceso, un equipo de control de ambiente, un equipo informático y unos medios de carga y envió de información. 1. The access and environment control system, characterized in that it consists of an access control equipment, an environment control equipment, a computer equipment and means for loading and sending information.
2. El sistema de control de acceso y ambiente descrito en la reivindicación 1, caracterizado porque el equipo de control de acceso consta de un lector de RFID unido a una tarjeta electrónica programable que tiene una base de datos que permite la autentificación de un individuo para otorgar o rechazarle la entrada a un lugar, además de contar con una interfaz audiovisual por la que retroalimenta su estado.  2. The access and environment control system described in claim 1, characterized in that the access control equipment consists of an RFID reader attached to a programmable electronic card that has a database that allows the authentication of an individual to grant or refuse entry to a place, in addition to having an audiovisual interface that feeds back its status.
3. El sistema de control de acceso y ambiente descrito en las reivindicaciones 1 y 2, caracterizado porque el equipo de control de ambiente consta de una tarjeta electrónica conectada al equipo de control de acceso que permite el monitoreo de sensores, también permite el control de dispositivos eléctricos y/o electrónicos controlables a través de cableado y un reproductor infrarrojo unido a un donador y un emisor infrarrojo, además cuenta con una salida a intranet/internet por medio de WI-FI o Ethernet. 3. The access and environment control system described in claims 1 and 2, characterized in that the environment control equipment consists of an electronic card connected to the access control equipment that allows sensor monitoring, also allows the control of electrical and / or electronic devices controllable through wiring and an infrared player attached to a donor and an infrared emitter, also has an intranet / internet output via WI-FI or Ethernet.
4. El sistema de control de acceso y ambiente descrito en las reivindicaciones 1 y 3, caracterizado porque la salida a intranet/internet por medio de WI-FI o Ethernet se utiliza para comunicarse con un equipo informático a través de una red de comunicaciones, además, en el caso de conexión por Ethernet, permite al dispositivo equipo de control de ambiente alimentarse de energía eléctrica a través de el por medio de tecnología PoE (Power over Ethernet).  4. The access and environment control system described in claims 1 and 3, characterized in that the intranet / internet output via WI-FI or Ethernet is used to communicate with a computer equipment through a communications network, In addition, in the case of an Ethernet connection, it allows the device to control the environment using electrical energy through the PoE (Power over Ethernet) technology.
5. El sistema de control de acceso y ambiente descrito en las reivindicaciones 1, 3 y 4, caracterizado porque el equipo informático consta de un ordenador precargado con un software mediante el cual se monitorea y se administran tanto el equipo de control de acceso y el equipo de control de ambiente, o en su defecto, un sinnúmero de controles de acceso y ambiente. 5. The access and environment control system described in claims 1, 3 and 4, characterized in that the computer equipment consists of a computer preloaded with software by means of which both the access control equipment and the device are monitored and managed. environment control equipment, or failing that, countless access and environment controls.
6. El sistema de control de acceso y ambiente descrito en las reivindicaciones 1, 2, 3 y 4, caracterizado porque los medios de carga de información constan de: • Una base de datos embebida en el equipo de control de acceso para llevar control de los individuos así como también una bitácora de todos los sucesos que se presenten en el mismo; 6. The access and environment control system described in claims 1, 2, 3 and 4, characterized in that the information loading means consist of: • A database embedded in the access control equipment to keep track of individuals as well as a log of all the events that occur in it;
• Una base de datos almacenada en el equipo informático, la cual sirve de expansión para la base de datos embebida en el equipo de control de acceso, así como también para llevar un control de información de un sinnúmero de equipos de controles de acceso y ambiente.  • A database stored in the computer equipment, which serves as an expansion for the database embedded in the access control equipment, as well as to keep track of information of countless access and environment control equipment .
El sistema de control de acceso y ambiente descrito en las reivindicaciones 1, 2, 3, 4 y 5 caracterizado porque los medios de envió de información constan de lo siguiente: The access and environment control system described in claims 1, 2, 3, 4 and 5 characterized in that the information sending means consist of the following:
• Un módulo de software precargado en el equipo informático por el cual se permite el envió de información por medio de correo electrónico y/o mensajes SMS al individuo para comunicarle acerca de algún suceso presentado en los equipos de control de acceso y de ambiente. • A software module preloaded on the computer equipment by which it is allowed to send information via email and / or SMS messages to the individual to communicate about an event presented in the access control and environment equipment.
El sistema de control de acceso y ambiente descrito en las reivindicaciones 1, 2 y 3, caracterizado porque el equipo de control de acceso, además de permitir el acceso a un individuo a un espacio al momento de autenticarlo, es capaz de concederle permisos de encendido o apagado de dispositivos eléctricos/electrónicos a través del equipo de control de ambiente. The access and environment control system described in claims 1, 2 and 3, characterized in that the access control equipment, in addition to allowing an individual access to a space at the time of authenticating it, is capable of granting power-on permits or shutdown of electrical / electronic devices through the environment control equipment.
El sistema de control de acceso y ambiente descrito en las reivindicaciones 1, 2, 3, 5 y 6, caracterizado porque el equipo de control de acceso es capaz de llevar una bitácora de los accesos permitidos y denegados, de los fallos y sabotajes presentados en sus propias bases de datos y de enviar esta información al equipo informático a través del equipo de control de ambiente mediante una conexión TCP/IP.  The access and environment control system described in claims 1, 2, 3, 5 and 6, characterized in that the access control equipment is capable of carrying a log of the allowed and denied accesses, of the failures and sabotages presented in their own databases and to send this information to the computer equipment through the environment control team through a TCP / IP connection.
El sistema de control de acceso y ambiente descrito en las reivindicaciones 1, 2 y 3, caracterizado porque al encontrarse en una red de controles de acceso y ambiente, es capaz de operar dispositivos que se encuentren controlados por otro de los sistemas de control de acceso y ambiente que se encuentren en la misma red, al autenticar a un individuo y comprobar sus permisos. The access and environment control system described in claims 1, 2 and 3, characterized in that being in a network of access and environment controls, is capable of operating devices that are controlled by another of the access control systems and environment that are in the same network, by authenticating an individual and checking their permissions.
PCT/MX2011/000121 2011-10-08 2011-10-08 Access and environment control system WO2013051921A1 (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
PCT/MX2011/000121 WO2013051921A1 (en) 2011-10-08 2011-10-08 Access and environment control system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
PCT/MX2011/000121 WO2013051921A1 (en) 2011-10-08 2011-10-08 Access and environment control system

Publications (1)

Publication Number Publication Date
WO2013051921A1 true WO2013051921A1 (en) 2013-04-11

Family

ID=48043960

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/MX2011/000121 WO2013051921A1 (en) 2011-10-08 2011-10-08 Access and environment control system

Country Status (1)

Country Link
WO (1) WO2013051921A1 (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105208330A (en) * 2015-09-21 2015-12-30 威海北洋电气集团股份有限公司 RFID person passageway monitoring equipment and method
CN106023386A (en) * 2016-07-05 2016-10-12 合肥若涵信智能工程有限公司 Automatic induction entrance guard internet of things system

Citations (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20060111053A1 (en) * 2004-11-23 2006-05-25 Industrial Technology Research Institute RFID system using mobile phone as device of access control and security response

Patent Citations (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20060111053A1 (en) * 2004-11-23 2006-05-25 Industrial Technology Research Institute RFID system using mobile phone as device of access control and security response

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105208330A (en) * 2015-09-21 2015-12-30 威海北洋电气集团股份有限公司 RFID person passageway monitoring equipment and method
CN105208330B (en) * 2015-09-21 2018-05-25 威海北洋电气集团股份有限公司 RFID personnel channels monitoring device and method
CN106023386A (en) * 2016-07-05 2016-10-12 合肥若涵信智能工程有限公司 Automatic induction entrance guard internet of things system

Similar Documents

Publication Publication Date Title
US11799671B2 (en) Secure locking of physical resources using asymmetric cryptography
US11657365B2 (en) Secured parcel locker system with improved security
US11010995B2 (en) Access control system with dynamic access permission processing
ES2940450T3 (en) Method and system to allow remote registration and coordinate access control
ES2932380T3 (en) Physically Secured Authorization for Utility Applications
US10210686B2 (en) Electronic padlocks and related methods
US9437063B2 (en) Methods and systems for multi-unit real estate management
US20210319639A1 (en) System and method for managing electronic locks
Atamli et al. Threat-based security analysis for the internet of things
US8941465B2 (en) System and method for secure entry using door tokens
US20140002236A1 (en) Door Lock, System and Method for Remotely Controlled Access
ES2501516T3 (en) Distribution of access information to facilities
ES2874853T3 (en) Access control of an in-room safe
ES2713424T3 (en) Systems and methods for managing access to locks using wireless signals
CA2811317C (en) Systems and methods for accessing or managing secured storage space
ES2497515T3 (en) Improvements for remote parking supervision systems without parking meters
US20130214901A1 (en) System, station and method for mustering
ES2734404T3 (en) Credentials cache
CN109074682A (en) System and method for remotely accessing permission and verifying
US11256222B2 (en) Assistance for the causing of actions
ES2639135T3 (en) Asynchronous secondary fund authorization (SABA)
CN107578501A (en) Wireless electron door-locking system
WO2013051921A1 (en) Access and environment control system
CN113962577A (en) Multi-system intelligent park platform
US20170046895A1 (en) Resource management based on physical authentication and authorization

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 11873632

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 11873632

Country of ref document: EP

Kind code of ref document: A1