WO2018109482A1 - Améliorations relatives à des mécanismes de contrôle d'accès - Google Patents

Améliorations relatives à des mécanismes de contrôle d'accès Download PDF

Info

Publication number
WO2018109482A1
WO2018109482A1 PCT/GB2017/053753 GB2017053753W WO2018109482A1 WO 2018109482 A1 WO2018109482 A1 WO 2018109482A1 GB 2017053753 W GB2017053753 W GB 2017053753W WO 2018109482 A1 WO2018109482 A1 WO 2018109482A1
Authority
WO
WIPO (PCT)
Prior art keywords
signal
binary
access
code
visitor
Prior art date
Application number
PCT/GB2017/053753
Other languages
English (en)
Inventor
Alexandre Abousaid YSSA
Charles Abousaid YSSA
Hady Abdel NOUR
Original Assignee
Smarke Limited
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Smarke Limited filed Critical Smarke Limited
Publication of WO2018109482A1 publication Critical patent/WO2018109482A1/fr
Priority to US16/552,044 priority Critical patent/US11089165B2/en

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M11/00Telephonic communication systems specially adapted for combination with other electrical systems
    • H04M11/02Telephonic communication systems specially adapted for combination with other electrical systems with bell or annunciator systems
    • H04M11/025Door telephones
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/30Individual registration on entry or exit not involving the use of a pass

Definitions

  • the present invention concerns a system and method for controlling access mechanisms. More particularly, though not exclusively, the present invention concerns a controller configured to be retrofitted to an existing intercom access system to permit access to a restricted area even when a building occupant is unavailable to allow such access.
  • this scenario may apply to an office building in which a plurality of companies each hire a particular number of rooms in the building, or an apartment building in which a plurality of distinct residences are situated.
  • a centralised access control system which allows individuals access to required areas of the single location whilst preventing their access to other areas of the single location.
  • an apartment building it is necessary to provide a system in which an occupant is allowed access to a main entrance of the building whilst also preventing their access to the residences of other occupants.
  • a commonly used solution to the above problem is to provide an intercom system, in which an external user who requires temporary access is required to interact with a base interface unit which connects them to a specific occupant of the building. Upon subsequent communication, typically once the user has identified themselves to the occupant the occupant is able to enable temporary access for the external user, so that the external user may enter the location.
  • Known intercom systems as described briefly above are typically reliant on an occupant of a particular residence being present in order to enable temporary access to an external user. This known type of system has particular advantages for enabling temporary location access which are explained in greater detail below
  • FIG. 1 there is shown a known centralised access control system 10 (door entry system) for a plurality of private occupancies in a single location or building, and in particular, a mechanism which utilises an intercom system.
  • the system 10 comprises a base interface unit 12 (gate control module) which is configured to receive input from an external user (visitor) 14.
  • the base interface unit 12 is located in an area which is accessible to a visitor 14 without requiring access rights, such as adjacent to a main building entrance door having an electronic door lock 20 which is used to prevent undesired access to the location.
  • the first input to be received by the base interface unit 12 will typically be of the form of the visitor 14 pressing an interface button 15 which is provided on the base interface unit 12.
  • the base interface unit is further communicably coupled to an intercom telephone handset 16 (user control module) which is located in the residence which the visitor 14 is attempting to access. This coupling is typically achieved through a suitable wired communications means.
  • an intercom telephone handset 16 user control module
  • This coupling is typically achieved through a suitable wired communications means.
  • a signal will be sent by the base interface unit 12 to the intercom telephone handset 16 which notifies an occupant of the residence 18 that the visitor 14 wishes to gain access to the residence.
  • the way in which the intercom telephone handset 16 is configured to provide such a notification to the occupant of the residence 18 will be described in greater detail below with reference to Figures 2 and 3.
  • the occupant 18 will then be required to decide whether to allow the visitor 14 access to the residence. If such access is deemed allowable, the occupant of the residence 18 will then be required to enable such access.
  • the intercom telephone handset 16 has a door release button 36 which when activated by the occupant of the residence 18 indicates that access to the residence has been deemed allowable. Once this has been activated, a signal is sent to the base interface unit 12 which instructs the base interface unit 12 to send a control signal to the electronic door lock 20 instructing it to disengage and permit the visitor 14 to enter the location.
  • the intercom telephone handset 16 also comprises a speaker 34 which is coupled to the base interface unit 12 and in use, receives the audio input from the base interface unit 12 and generates an audio output signal for the occupant of the residence 18.
  • a speaker 34 which is coupled to the base interface unit 12 and in use, receives the audio input from the base interface unit 12 and generates an audio output signal for the occupant of the residence 18.
  • the actuator 36 of the telephone handset 16 in use is activated when the occupant of the residence 18 decides that they wish to allow the visitor 14 access to the location.
  • the actuator 36 will often take the form of an interface button which the occupant of the residence 18 presses to allow such access.
  • the actuator 36 is additionally coupled to a door unlock instruction generator 38.
  • a signal is sent to the instruction generator 38 indicating that input has been received.
  • the instruction generator 38 then generates an instruction to unlock the electronic door lock 20.
  • the instruction generator 38 is coupled to the base interface unit 12 and the generated instruction is then transmitted to the base interface unit 12, where it is converted into a control signal which is passed to the electronic door lock 20 instructing it to disengage and permit the visitor 14 to enter the location, as described above.
  • FIG 3 shows a known method of operation 40 of the centralised access control system 10 of Figure 1 in detail.
  • the method 40 begins when the base interface unit 12 receives an input, at Step 42, from the visitor 14. This input is, in this instance, the visitor 14 pressing the interface button 15 on the base interface unit 12 as described with reference to Figure 1 above. Once this input is received, a signal is sent, at Step 43, from the base interface unit 12 to the intercom telephone handset 16. Upon receipt of this signal, the buzzer 30 is then activated, at Step 44, generating an audible tone which is used to notify the occupant of the residence 18 that the visitor 14 wishes to gain access to the location.
  • the microphone 32 will then receive, at Step 46, an input from the occupant of the residence 18.
  • this input typically comprises audio input from the occupant of the residence 18, which is provided in order to allow the occupant of the residence 18 to communicate with the visitor 14 in order to ascertain their identity and the reason that they wish to gain access to the location.
  • the base interface unit 12 will then receive, at Step 48, further input from the external unit 14, where the input is typically audio input. As described above, this enables the visitor 14 to communicate with the occupant of the residence 18 in a complementary process to the occupant of the residence 18 communicating with the visitor 14. Once this input has been received it is transmitted to the intercom telephone handset 16 where, at Step 49, the speaker 34 generates the audio input for the occupant of the residence 18.
  • Step 50 if it is decided that the visitor 14 is to be permitted access to the location, the actuator 36 is then activated, at Step 52; namely the interface button is pressed. Once the interface button has been pressed, the actuator 36 then sends, at Step 54, a signal to the door unlock instruction generator 38 in order to generate an instruction and send it to the base interface unit 12. The instruction is then received, at Step 56, by the base interface unit 12 which causes the base interface unit 12 to generate a control signal. Once the control signal is generated, it is sent, at Step 58, to the electronic door lock 20, which is configured to temporarily disengage and consequently permit access to the location to the visitor 14.
  • the present invention provides a very low-cost solution to the problem of providing unattended entry to general entrances of communal buildings for example.
  • the invention can be realised in a simple electronic module which can be readily wired to an existing user control module without the need to replace an existing door entry system. This is advantageous not only because of the low cost but also because the solution can be implemented on an individual user basis, not requiring for example the permission of other occupiers of the building who also have control of the door access at a communal entrance to a building. Other higher cost solutions which require replacement of the existing system also require the permission of all the communal occupiers of the building which can be difficult and time consuming.
  • the present invention can be retrofitted to any conventional door access control system because it only requires the essential components of every system, thus making it a universal solution.
  • the creating step may comprise producing a binary signal in Morse code using temporal assertions of the buzzer.
  • the duration of an asserted level of the binary signal being longer than a predetermined period can determine one of the binary states of the binary signal, and the duration of the asserted level of the binary signal being shorter than the predetermined level can determine the other binary state of the binary signal.
  • the receiving step may comprise receiving the access request signal from a remote device via a wide-area communications network.
  • the requests may be received via the internet and possibly over a wireless link. This provides the least disruptive way of connecting the adapter unit to the outside world.
  • the receiving step may comprise receiving the access request signal from a mobile telecommunications device, for example a smart phone. In this way an app can be used on a visitor's mobile telecommunications device to make access requests and on an occupier's device to manage the set-up of access rights in a very simple manner.
  • the method may further comprise determining if the programming signal includes a new binary code, and if so adding the new binary code to the plurality of stored binary codes. Clearly if a binary code is provided in a programming signal it is intended to be used to populate the plurality of stored binary codes and so this action can be taken quickly without further steps being required. Conversely if the determining step concludes that the programming signal does not include a new binary code, the method can further comprise sending a request to the source of the programming signal for a new binary code if required.
  • the present invention also extends to a combination of an adapter unit as described above and a door entry system comprising a user control module and a remotely-located base interface unit operatively coupled to an electronic door lock, wherein the base interface unit is arranged to unlock the electronic door lock on receipt of a control signal from the user control module.
  • Figure 1 is a schematic block diagram showing a known centralised access control system for a plurality of private occupancies in a single location which uses an intercom system;
  • Figure 3 is a flow diagram showing a method of enabling access to a location using the centralised access control system of Figure 1 ;
  • FIG. 5 is a schematic block diagram showing an intercom telephone handset used in the centralised access control system of Figure 4;
  • Figure 6 is a schematic block diagram showing an unattended entry controller used in the intercom telephone handset of Figure 5;
  • Figure 7 is a schematic block diagram showing an entry microcontroller board used in the unattended entry controller of Figure 6;
  • Figure 10 is an illustrative diagram showing a translation between a visitor input and a representation of the input as a code pattern.
  • FIG 4 there is shown a centralised access control system 70 according to a first embodiment of the present invention, which enables an occupant of one residence of a plurality of residences located in a single location to permit an visitor 14 access to the single location without the occupant 18 needing to be present in the location.
  • the system 70 is designed to be installed as a modification to pre-existing intercom system architecture, as described with reference to Figures 1 , 2 and 3.
  • the system 70 therefore operates in an environment which is the same as that described previously in relation to Figure 1 .
  • the following description will only focus on the differences between the centralised access control system 10 of Figure 1 and of the current embodiment shown in Figure 4.
  • present system 70 As part of the design of the present system 70, the functionality of the known system described previously is retained by the present system 70, with further functionality additionally provided. Such additional functionality is enabled by the differences between the present system 70 and the known system 10.
  • the present system 70 is designed to be retrofittable to existing systems as previously described and therefore to provide a low cost solution to the previously identified drawbacks.
  • the centralised access control system 70 comprises a base interface unit 12 and an electronic door lock 20 which are communicably coupled. These two features are, by design, substantially similar to the corresponding features in the system 10 of Figure 1 .
  • the base interface unit is configured to receive input from a visitor 14, in accordance with the description given in the background section.
  • the base interface unit 12 is also communicably coupled with the electronic door lock 20 and is configured to send a control message to the electronic door lock 20 enabling said lock to be disengaged. Such a control message is sent upon receipt of an instruction to do so from a modified intercom telephone handset 72.
  • a control message is sent upon receipt of an instruction to do so from a modified intercom telephone handset 72.
  • the intercom telephone handset 72 is also configured to receive input from the base interface unit 12 in accordance with embodiments of the known system described previously. Similarly, the intercom telephone handset is also configured to receive input from the occupant of the residence 18, again in accordance with embodiments of the known system described previously.
  • a system by which access to the location by a visitor 14 is enabled upon determination of entry of a predetermined code pattern into the system 70. More specifically, the code pattern is entered via temporal interaction with the interface button 15 on the provided base interface unit 12. Once it is determined that a code pattern has been entered that matches the predetermined code pattern, the system is configured 70 to disengage the electronic door lock 20, thereby permitting access to the visitor 14. The method by which this is achieved is described in greater detail below, with respect to Figure 8. It is to be appreciated that there may be a plurality of predetermined codes which may be entered by a visitor 14 which permit access to the location.
  • the system 70 may be adapted such that any suitable form of code entry device may be used, and that the form of the code pattern may be adapted in concurrence with the code entry method.
  • the predetermined codes may be configured such they are supplied upon installation of the centralised access control system 70 and are unmodifiable.
  • the list of predetermined codes may be configured such that they are amendable, such that more codes may be added or that existing codes may be modified or removed.
  • This input may be achieved by a signal being sent wirelessly from a suitably configured communications device which identifies the user 14 to the intercom telephone handset 72.
  • the configuration of the system 70 to allow access to this user may comprise the occupant of the residence 18 specifying that the visitor 14 is to be allowed access upon request.
  • Such specification may be achieved by a signal being sent wirelessly from a suitably configured communications device which enables the occupant of the residence 18 to alter the settings of the intercom telephone handset 72 such that access rights are granted to the visitor 14. It is to be understood that throughout the following description, references to the occupant of the residence 18 are given purely as examples of a user who may be afforded the ability to assign access rights, and that any suitable person may be afforded these privileges.
  • the above embodiments provide a system by which an visitor 14 is able to access the location without requiring that the occupant of the residence be present within the residence. This allows for known visitors 14 who should be allowed such access to enter the location when necessary. Additionally, due to the nature of the modifications, the advantages which are present in the known systems are retained in the present system, since all of the functionality remains intact. Namely, this allows for access to be permitted to known visitors 14, whilst still requiring explicit verification from unknown visitors and without requiring that existing systems be removed and replaced with alternative and more expensive solutions.
  • the centralised access control system 70 may be configured to be powered by any suitable means, such as a battery pack or through being attached to a power supply. Alternatively, the system 70 may also draw power directly from pre-existing system architecture.
  • the unattended entry controller 80 is additionally communicably coupled to the communications network 74 and is configured to receive suitable input from external sources via the communications network 74 in accordance with embodiments described above. This input may be used to determine whether access is to be permitted to the visitor 14. The nature of the input will be described in greater detail with reference to Figure 7.
  • the unattended entry controller 80 is further communicably coupled to an actuator 82 within the intercom telephone handset 72.
  • the actuator is configured to receive a notification signal from the unattended entry controller 80 upon determination by the unattended entry controller 80 that and visitor 14 is to be permitted access to the location, in accordance with the embodiments described above.
  • the actuator Upon receipt of the notification signal, the actuator is configured to send a signal to the door unlock instruction generator 38 indicating that the electronic door lock 20 is to be disengaged, in accordance with the description given above with reference to the known system.
  • the actuator 82 of the present system is additionally configured to receive direct input from the occupant of the residence 18, as previously described with reference to Figure 2.
  • FIG. 6 there is shown in further detail an unattended entry controller 80 of an embodiment of the intercom telephone handset 72 of Figure 5.
  • a code recognition relay 90 which is communicably coupled to the buzzer 30.
  • the code recognition relay 90 is configured to switch from an off position to an on position upon sensing that the buzzer 30 has been activated. The result of this is that an electric signal is generated by the relay which can be used to interpret when the buzzer 30 has been activated. Furthermore, the length of time that the electric signal is generated for can be used to determine how long the buzzer 30 has been held down for.
  • the code recognition relay 90 may be replaced by any suitable component which allows for a determination of how often the buzzer 30 has been asserted, such as a microphone which is able to determine via audio identification when the buzzer 30 has been activated, and generate an electric signal in dependence upon this determination.
  • the code recognition relay 90 is additionally communicably coupled to an entry microcontroller board 92.
  • the entry microcontroller board 92 is configured to analyse the electric signals generated by the code recognition relay 90, in order to associate the signals with a binary code which has been entered via assertion of the buzzer 30, in accordance with any of the embodiments described above. Further, the entry microcontroller board 92 is configured to compare the binary code associated with the electric signals with one or more predetermined binary code patterns.
  • the one or more predetermined binary code patterns are code patterns which are used by the entry microcontroller board 92 to enable access to the location if they match the code pattern associated with the electric signals generated by the code recognition relay 90. Typically, these predetermined binary code patterns will be stored on the entry microcontroller board 92 and will be provided to the entry microcontroller board 92 at a point in time prior to the attempted access by the visitor 14.
  • the entry microcontroller board 92 is additionally communicably coupled to a receiver 94.
  • the receiver 94 is configured to receive communications from external sources via the
  • the communications which are received may comprise a signal sent wirelessly from a suitably configured communications device of the occupant of the residence 18 where the signal is configured to alter the settings of the intercom telephone handset 72.
  • the communications may also comprise the receipt of a signal from a visitor 14 requesting access to the location, in accordance with embodiments described above.
  • the altering of settings may comprise the occupant of the residence 18 amending, appending or removing predetermined binary code patterns which are stored on the code recognition relay 90, to change, add or remove codes which enable access rights for an visitor 14 as required.
  • the altering of settings may comprise the occupant of the residence 18 amending, appending or removing access rights associated with a particular visitor 14 as required.
  • the settings in this embodiment may also include a means of identifying the visitor 14, such as a username or a mobile identification number (MIN) which is associated with the device that the visitor 14 will request access from.
  • MIN mobile identification number
  • the communications network 74 to the visitor 14 notifying them that they must provide an access code, via a suitable software application. Upon receipt of this message, the visitor 14 may then provide such a code, which is transmitted to the receiver 94 via the communications network 74. This code will then be passed to the entry microcontroller board 92 where the code is stored, in accordance with embodiments described previously.
  • the composition of the entry microcontroller board 92 of the unattended entry controller 80 is shown in more detail in Figure 7.
  • the entry microcontroller board 92 comprises a processor 100 (convertor) which is configured to receive input from the receiver 94 and electrical signals from the code recognition relay 90, where the input may be any input as described above.
  • the processor 100 is configured to process the electrical signals received from the code recognition relay 90 so that the signals may be interpreted as a code which has been input by a visitor 14. Following this, the processed information is then passed to a comparator 104 which is communicably coupled to the processor 100.
  • the comparator 104 is configured to compare information which has been received from the processor relating to a request for access with information relating to visitors 14 who are permitted access to the location and/or codes which grant access to the location. To that end, the comparator 104 is also coupled to the data store 102, and upon receipt of a request, will request relevant information be retrieved from the data store 102. This request may comprise requisitioning all available information. Alternatively, it may comprise requisitioning a subset of the contained data which is most relevant to the request. For example, if the request is in the form of an entered code, the comparator 104 may only requisition from the data store 102, information pertaining to predetermined binary access codes.
  • the comparator 104 may only requisition from the data store 102 information pertaining to a list of visitors 14 who are permitted access and their corresponding identifiers.
  • the comparator 104 will compare information which has been received from the processor 100 with the relevant information retrieved from the data store 102 to determine whether a match can be made. If it cannot, then no further action will be taken by the comparator 104. If a match is found, then the comparator 204 is configured to send a signal to a controller 106 to which it is communicably coupled.
  • the controller 106 is further communicably coupled to the entry command relay 96, and upon receipt of a suitably configured signal from the comparator 104, will send a control signal to the entry command relay 96, thereby engaging the relay in accordance with embodiments described above.
  • the method 120 described relates to an embodiment in which an visitor 14 inputs a code pattern in accordance with a predetermined binary code pattern in order to gain access to the location. It is to be understood that this method 120 may be used in a manner which is complementary to the known method 40 described with reference to Figure 3.
  • the present method 120 begins when the base interface unit 12 receives, at Step 122, input from the visitor 14 which is representative of a predetermined binary code. This input may be provided by the visitor 14 interacting with an interface button 15 provided on the base interface unit 12, where the frequency and duration of each interaction and the length of time between interactions is designed to mimic a pattern which has previously been designated as allowing access to the location.
  • the buzzer 30 is configured to engage, at Step 126, in a way which mimics the input pattern received by the base interface unit 12.
  • the signals and the buzzer 30 may be configured so that the buzzer is activated for the same length and duration of each of the interactions received by the base interface unit 12, with the buzzer 30 being deactivated in the intermediary time corresponding to the periods in which there is no interaction with the base interface unit 12.
  • the comparator 104 Upon receipt of the code pattern representation, the comparator 104 then retrieves, at Step 134, the list of predetermined binary codes from the data store 102.
  • the comparator 104 may be configured to retrieve all of the predetermined binary codes. Alternatively, the comparator 104 may be configured to only retrieve a subset of these codes, in dependence upon their relevance to the presented code pattern. By way of example, if the presented code pattern comprises a pattern which is in total 10 seconds long, the comparator 104 may only retrieve predetermined binary code patterns which are 9 - 1 1 seconds long, as they will be the most likely predetermined binary codes which will match the presented code.
  • the comparator 104 then proceeds to compare, at Step 136, the presented code pattern with the retrieved list of predetermined binary code patterns. This may be achieved by known computerised comparative methods of comparing signals and patterns.
  • the method 150 then proceeds to send, at Step 166, a request to the user 14 informing them that they must input a binary access code which is assigned to their profile.
  • the system 70 may be provided with a suitable notification system which is configured to send a message to a suitable communications device of the visitor 14, such as a smartphone provided with appropriate software.
  • This software may also be configured to allow the visitor 14 to input a code pattern which may be replicated upon interaction with the base interface unit 12. Following this, the user 14 will then be required to send a further request to amend the settings with this binary access code.
  • the method 150 returns to Step 152, where the receiver receives the request.
  • the signal 210 received by the processor 100 from the code recognition relay 90. It is to be appreciated that the signal displayed is assumed to be in direct correspondence with the input received from the visitor 14 by the base interface unit 12, with no loss or degradation of information between the base interface unit 12, the buzzer 30, the code recognition relay 90 and the processor 100. Where the signal 210 is shown to be peaking, this is to be interpreted as the code recognition relay 90 being energised and where the signal 210 is at its lowest point, this is to be interpreted as the code recognition relay 90 being de-energised. In accordance with this embodiment, it is assumed that the electric signal is configured to have only two states (high or low). In further embodiments, the system 70 may be adapted that there are more than two states which may allow for further distinctions between visitor 14 inputs, which may be achieved for example by the pressure applied to an interface button 15 on the base interface unit 12.
  • the translation of the signal 210 can only begin upon an input from the visitor 14 being received, however in separate embodiments, the system 70 may be adapted that the translation of the signal 210 can be initiated in an alternative manner, such as by a proximity sensor detecting that a user has approached the base interface unit 12.
  • the processor 100 is configured to define distinct time intervals 214A, 214B, 214C, 214D, 214E, 214F, 216A, 216B, 216C, 216D within which it is determined whether the buzzer 30 is activated or deactivated.
  • the processor 100 will interpret the buzzer 30 as being activated and will subsequently translate the signal as being equivalent to a ⁇ .
  • the processor 100 is configured to only translate these multiple signals a single ⁇ .
  • the processor 100 is configured to interpret the buzzer 30 as being deactivated and will subsequently translate the signal as being equivalent to a ⁇ .
  • time period 214A, 214B, 214C, 214D, 214E, 214F, 216A, 216B, 216C, 216D are provided.
  • the first variant 214A, 214B, 214C, 214D, 214E, 214F is the time period which is begun upon the receipt of a signal indicating the buzzer 30 is activated.
  • the processor is configured to only translate this as a single ⁇ .' Following the first variant 214A, 214B, 214C, 214D, 214E, 214F, the second variant time period 216A, 216B, 216C, 216D begins.
  • the first time period variant 214A, 214B, 214C, 214D, 214E, 214F is configured to be 350ms
  • the second time period variant 216A, 216B, 216C, 216D is configured to be 500ms.

Abstract

L'invention concerne des améliorations relatives à des mécanismes de contrôle d'accès (120) servant à contrôler un système d'entrée de porte (12, 72) à l'aide d'une unité d'adaptation (80) montée en rattrapage sur un module de commande d'utilisateur (72) du système d'entrée de porte. Le système d'entrée de porte est conçu pour déverrouiller une porte située à distance (20) à réception d'un signal de commande provenant du module de commande d'utilisateur (72). Le procédé consiste à : recevoir un signal de demande d'accès (210) à l'unité d'adaptation montée en rattrapage (80), et convertir le signal de demande d'accès (210) en un code binaire (218) ; comparer le code binaire (218) à une pluralité de codes binaires mémorisés (103A, 103B) ; et en cas de correspondance entre le code binaire (218) et l'un quelconque de la pluralité de codes binaires mémorisés (103A, 103B), commander au module de commande d'utilisateur (72) de générer le signal de commande pour déverrouiller la porte située à distance (20).
PCT/GB2017/053753 2016-12-14 2017-12-14 Améliorations relatives à des mécanismes de contrôle d'accès WO2018109482A1 (fr)

Priority Applications (1)

Application Number Priority Date Filing Date Title
US16/552,044 US11089165B2 (en) 2017-12-14 2019-08-27 Retrofitable internet-enabled access control system and method

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
GB1621293.8 2016-12-14
GBGB1621293.8A GB201621293D0 (en) 2016-12-14 2016-12-14 Improvements relating to access control mechanisms

Publications (1)

Publication Number Publication Date
WO2018109482A1 true WO2018109482A1 (fr) 2018-06-21

Family

ID=58222117

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/GB2017/053753 WO2018109482A1 (fr) 2016-12-14 2017-12-14 Améliorations relatives à des mécanismes de contrôle d'accès

Country Status (2)

Country Link
GB (2) GB201621293D0 (fr)
WO (1) WO2018109482A1 (fr)

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109274693B (zh) * 2018-11-14 2021-10-01 广东小天才科技有限公司 一种基于摩尔斯电码的数据寄存方法及用户设备

Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
DE102004059224A1 (de) * 2004-12-09 2006-06-14 Ritto Gmbh & Co. Kg Türsprechanlage
EP2506548A1 (fr) * 2011-03-31 2012-10-03 Lifealike Ltd. Contrôleur pour système d'entrée de porte

Family Cites Families (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JPS6017913B2 (ja) * 1981-04-30 1985-05-07 日産自動車株式会社 電子錠
DE10127029C1 (de) * 2001-06-02 2002-10-24 Andreas Gronarz Einrichtung, die eine Klingelanlage und eine Türöffneranlage umfaßt
US9666006B2 (en) * 2011-09-10 2017-05-30 Mark Kramer Wireless radio frequency switch controller
RS20120345A1 (en) * 2012-08-13 2013-08-30 Trk Inovacije Doo Novi Sad ELECTRONIC DEVICE FOR RECORDING AND RECOGNITION OF DURATION OF SEQUENCE OF BELL SIGNAL IN INTERPHONE APPARATUS SENDING LOCK UNLOCKING SIGNAL ON THE BASIS OF RECOGNITION

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
DE102004059224A1 (de) * 2004-12-09 2006-06-14 Ritto Gmbh & Co. Kg Türsprechanlage
EP2506548A1 (fr) * 2011-03-31 2012-10-03 Lifealike Ltd. Contrôleur pour système d'entrée de porte

Also Published As

Publication number Publication date
GB2559672A (en) 2018-08-15
GB201720914D0 (en) 2018-01-31
GB201621293D0 (en) 2017-01-25

Similar Documents

Publication Publication Date Title
JP7216101B2 (ja) アクセス制御システムおよびこれを使用したアクセス制御方法
RU2631982C2 (ru) Система контроля доступа к транспортному средству и персонализации по биометрическим параметрам
KR102417682B1 (ko) 음성 인식을 이용한 닉네임 관리 장치 및 방법
AU2014331198B2 (en) Access control using portable electronic devices
US11089165B2 (en) Retrofitable internet-enabled access control system and method
CN109361642B (zh) 一种远程授权开锁的方法及系统
US20080215766A1 (en) Access, monitoring and communication device and method
KR102110768B1 (ko) 스마트키 권한 공유 시스템 및 그 방법
US20090164680A1 (en) Access, monitoring and communication device and method
CN103419790A (zh) 车辆驾驶员的分级识别和基于该识别的车辆设置激活选择
KR20220166237A (ko) 출입 관리 시스템 및 이를 이용한 출입 관리 방법
KR20230007986A (ko) 출입 관리 시스템 및 이를 이용한 출입 관리 방법
KR20230007984A (ko) 출입 관리 시스템 및 이를 이용한 출입 관리 방법
KR102063569B1 (ko) 휴대형 단말기를 이용한 출입문 개폐관리장치 및 방법
WO2018109482A1 (fr) Améliorations relatives à des mécanismes de contrôle d'accès
KR20230007985A (ko) 출입 관리 시스템 및 이를 이용한 출입 관리 방법
US20180343140A1 (en) Method and apparatus for remote control of operational characteristics of a premises
US11551496B1 (en) Access control systems, devices, and methods therefor
CN113763603B (zh) 信息处理装置、方法、计算机可读存储介质及便携终端
US11386728B2 (en) System and method for granting access to or for starting an object
CN112951224B (zh) 语音设备及其数据处理方法
KR20220012025A (ko) Ai 스피커를 이용한 디지털 기기 제어 방법 및 이를 이용한 디지털 기기 제어 시스템
KR102641878B1 (ko) 스마트 도어 언로크 시스템 및 그 동작방법
CA2629271C (fr) Systeme et methode de controle biometrique et de detection des contraintes
CN117475537A (zh) 指纹锁及其管理系统、管理方法、目标终端

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 17829685

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

32PN Ep: public notification in the ep bulletin as address of the adressee cannot be established

Free format text: NOTING OF LOSS OF RIGHTS PURSUANT TO RULE 112(1) EPC (EPO FORM 1205 DATED 25/09/2019)

122 Ep: pct application non-entry in european phase

Ref document number: 17829685

Country of ref document: EP

Kind code of ref document: A1