CA2409293A1 - Access control system in seamless communication with personnel management systems and the like - Google Patents

Access control system in seamless communication with personnel management systems and the like Download PDF

Info

Publication number
CA2409293A1
CA2409293A1 CA002409293A CA2409293A CA2409293A1 CA 2409293 A1 CA2409293 A1 CA 2409293A1 CA 002409293 A CA002409293 A CA 002409293A CA 2409293 A CA2409293 A CA 2409293A CA 2409293 A1 CA2409293 A1 CA 2409293A1
Authority
CA
Canada
Prior art keywords
access
general purpose
purpose computer
control unit
main control
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Abandoned
Application number
CA002409293A
Other languages
French (fr)
Inventor
Wayne B. Dow
Harvey Stone
Vikki W. Pitts
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Chamberlain Group Inc
Original Assignee
Chamberlain Group Inc
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Chamberlain Group Inc filed Critical Chamberlain Group Inc
Publication of CA2409293A1 publication Critical patent/CA2409293A1/en
Abandoned legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N7/00Television systems
    • H04N7/18Closed-circuit television [CCTV] systems, i.e. systems in which the video signal is not broadcast
    • H04N7/183Closed-circuit television [CCTV] systems, i.e. systems in which the video signal is not broadcast for receiving images from a single remote source
    • H04N7/186Video door telephones
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/20Individual registration on entry or exit involving the use of a pass
    • G07C9/27Individual registration on entry or exit involving the use of a pass with central registration

Abstract

An access control system such as a telephone entry system (TES) capable of seamless communication with a general purpose computer. Entries made in the TES
are seamlessly transferred to the general purpose computer and updated in corresponding databases stored therein. Likewise entries made in selected databases within the general purpose computer or in other types of selected files are reflected in the TES, seamlessly, and without requiring manual intervention. Thus, for Example, employees may be added or removed from the factory personnel logs in the general purpose computer and, as each is entered or removed, the corresponding entry code in the TES is added or deleted.

Description

ACCESS CONTROL SI'STEM IN SEAMLESS
COMMUNICATION WITH PERSONNEL
MANAGEMENT SYSTEMS AND THE LIKE
DESCRIPTION
BACKGROUND OF THE INVENTION
Field of the Invention The present invention is related to access control systems and more particularly to a communication interface for an access control system.
20 Background Description Apartment buildings, office buildings, condominium complexes, gated residential communities; industrial parks and other secured locations often include an entrance access control system. One type of access control system, known as a telephone entry system (TES), provides building security as well as tenant access control to a particular building., apartment complex, ere. The access control system controls entry at one or more other building entry points, e.g., doors, garage doors, etc. A typical access control system includes a main control unit located at a primary entrance and, depending on the size of the structure or area being monitored, additional remote units may be provided to control remotely located doors. The access control system may also monitor the connected entry points for unauthorized access. For a TES type access control system visitors wishing to enter the building/complex contact tenants or other building personnel over the TES, that are capable of admitting the visitor by remotely unlocking the entrance, e.g., from the tenant's apartment.
The main control unit controls the main building entrance and may include a keypad and auto-dialer and be connected to a public telephone line. Remote units, ypically communicate with the main unit to provide remote access to authorized 1 ~ persormel. The main unit can identify tenants seeking entry by a personal access code, authorize entry, monitor for unauthorized entr?~ at the remote doors, etc. A
tenant directory may be displayed on the control unit itself or on an adjacent sign.
The directory includes tenant codes that are corresponding directory code numbers for each person, business or for other entities in the building (e.g., corporate departments, business employees, or other building tenants) authorized to unlock the entrances.
When a visitor enters a tenant code into the keypad, the main control unit automatically dials the corresponding tenant's telephone number. Then, the called 2~ tenant has an opportunity to establish the identity of the visitor. The tenant, using the same everyday telephone upon which the call was received, unlocks the entrance, e.g., by pressing a predetermined number on the telephone keypad.
Interfacing a security or bookkeeping system, that may simply be running on a general purpose computer, to a prior art access control system, such as a TES, is not a simple task. Typically, this requires a custom software interface written for the specific access control system. Further, prior art access control systems were not directly interfaced to other systems. So, for example, a typical prior art access control system may control access to corporate premises. Corporate personnel S records and bookkeeping data may be maintained using a typical state of the art personnel management systetn. Personnel changes require entries into both systems.
Adding personnel records for new hires to the bookkeeping data must, then, be followed with a corresponding entry for each new hire to the business's access control system. Likewise, when employees leave, entries must be removed from each system. Passing timekeeping information from the access control system to the personnel management system may require printing out the information from the access control system and, manually entering the printed information into the personnel management system. This multiple entry process is time consuming, error prone and very inefficient.
Further, only a very limited number of ways are available to enter data, such as directory entries, into prior art access control systems. Entry may be manually, e.g., individually adding a code for each apartment number and an associated telephone number for the tenant in aparunent. A database may be prepared and maintained remotely, coding binary for the particular access control system, and then providing the binary which is stored in the system for subsequent access.
Another approach is to use specially developed custom software for particular access control system, such as for example, the SPSWin software from Sentex Systems. SPSWin provides personal computer type graphical user interface (GUI) to make data entry and system data maintenance more user friendly, but still in complete isolation from other systems.
In addition, upgrading a prior art access control system to a next generation control system, for example, requires rewriting or re-engineering the interface. Thus, whenever one of for these prior art systems is upgraded, changed, replaced or otherwise altered, the system owner is faced v~~ith a daunting task. Either the directory file is reformatted, if possible, or regenerated and provided in binary form or, a new interface program is written for the new system and the data is re-entered.
Re-entering entries by hand is an error prone task. Manipulating binary data offers numerous opportunities for errors, even when only single entries are changed in the entire file. Each of these approaches can produce less than favorable results such as storing wrong odes and/or tenant information. Coding a new interface program is a long, tedious and expensive process and is still not free from errors.
So, not only is entering data in prior art entry control systems time consuming and difficult but, as set forth above, passing information from these prior art systems to other non-related systems (e.g., a bookkeeping system) is even more awkward. Thus, there is a need for a standard access control system interface to pass information to and from access control systems and that simplifies data retrieval as well as system updates/migration without adding significantly to system cost.
StIhI~~IaR~' OF THE INVENTION
The present invention is an access control system such as a telephone entry system (TES) capable of seamless communication with a general purpose computer.
Entries made in the TES are seamlessl}~ trat,sferred to the general purpose computer and updated in corresponding databases stored therein. Likewise entries made in selected databases within the general purpose computer or in other types of selected files are reflected in the TES, seamlessly, and without requiring manual intervention.
Thus, for example, employees may be added or removed from the factory personnel logs in the general putposc computer and. as each is entered or removed, the corresponding entry code in the TES is added or deleted.
2~ Accordingly, using the architecture and protocol of the preferred embodiment of the przsent invention, general purpose program steps and appropriate routines may be written to interface the TES with the general purpose computer. Thus, for example, routines may be written and integrated in an accounting package such that when employees are entered into the accounting package, a corresponding entry is made into the TES for the employee. When employees are removed, a corresponding employee entry is removed from the TES codes. Also, as an envy is added to the accounting package for each new employee, access codes are added to the TES automatically. A Human Resources person sitting at a terminal using a personal management system, for example, may delete an employee from a list of employees in the general purpose computer. Upon such deletion, the general purpose computer contacts the TES using a modem, a direct serial interface, or another communications medium, and corresponding employee records stored in the main control unit are deleted. Furthermore, these TES entries may be added coincident with entries in the accounting database or, as pan of periodic updates, e.g., along with backups and other housekeeping that may be done on the general purpose computer.
13RII:F DESCRIPTION OF THE DRAWINGS
The foregoing and other objects, aspects and advantages will be better understood from the following dztailzd preferred embodiment description with reference to the drawings, in which:
Figure 1 shows an example of a typical building such as a factory with access controlled by a simple telephone entry system (TES) according to the preferred embodiment of the present invention;
Figure 2 shows an example of a main control unit;
Figure 3 is an example of a peripheral control unit;
Figure -1 shows an example of a minimum TES configuration;
Figure 5 is an example of a building with a multiple access point TES;
_j_ Figure 6 shows a main control unit upper electronics assembly in an internal view;
Figure 7 is an expanded view of the detachable handheld keypad:
Figure 8 shows a block diagram of a motherboard enclosed in the main S control electronics assembly.
DESCRIPTION OF THE PREFERRED EMBODII~TENTS
Turning now to the drawings and, more particularly, Figure I shows an example of a typical site, a factory building 90 in this example, with access controlled by a preferred embodiment telephone entry system (TES) in communication with one or more general purpose computer 92 according to the present invention. A computer terminal 94, such as a personal computer or the like, and a modem 96 are attached to the general purpose computer 92. Product assembly lines 98, shown for example only, are located at one end of thz factory 90. A
parking lot 100, e.g., for c,mplovec parking, is located at the front of the buildinv 90.
16 The building 90 includes a from entrance 102, a rear entrance 104 and an emergency exit 106 with attached sensors (not shown) indicating w°hether the door at emergency exit 106 is open or closed. Its this example, the front building entrance 102 provides passage to/from the parking lot 100 and a gate 108 provides auto entry/exit to the parking lot 100. A code entry unit, remote entry keypad 110, is located at rear entrance 104 for entering access codes. 'hhe gate 108 includes entry and exit code entry units, external card reader 11 ~' for requesting entry and internal card reader 114 for requesting exit. A main control unit 116 controls building entry directly at each of the ti-ont entrance 102 and rear entrance 104 and monitors sensors at the rear emergency exit 106. Further, to allow for the distance of the gate 108 from the main unit 116, a peripheral unit 118 controls the gate 108 and communicates with the main unit 116. 'hhe peripheral unit 118 passes entry/exit requests from the gate card readers l l 2, I 14 to the main unit 1 16 and, upon receipt of an authorization response to such a request, opens/closes the gate 108.
Card readers 112, 114 may include well known Weigand protocol card readers, Barrium Ferrite and Proximity Readers or ClikCard Receivers, for example.
Access control system and TES are used interchangeably herein. The present invention is described herein with reference to a TCS type of access control system, for example only and not as a limitation. Further, although general purpose computer 9? is shown here as being located on site, this is for example only.
It is understood that computer 92 may be located at a remote site (not shown) and in communication with the access control system over public or private telephone lines using a modem or anv other appropriate communications media.
According to the preferred embodiment of the present invention, the TES and the general purpose computer 92 communicate with each other seamlessly.
Entries made in th~: TES are szamlessly transferred to the general purpose computer 92 and updated in corresponding databases stored therein. Likewise entries made in selected databases within the general pwpose computer or in other types of selected files are reflected in the TES, seamlessly, and without requiring manual intervention.
Thus. for example. employees may be added or removed from factory personae!
logs stored in the general purpose computer and, as each is entered or removed, the corresponding entry code in the TES is added or deleted. in a more particular example, a Human Resources person sitting at a terminal 94 may delete an employee from a list of employees in the general purpose computer 92. Upon such deletion, the general purpose computer 92 contacts the TES using modem 96, and corresponding employee records stored in the main unit 116 are deleted.
Furthermore. other ypes of entries, such as holidays, may be changed in the main computer 92 and those changes reflected in the TES. So, for example, in a first year Independence I~ay may fall on a Tuesday. That year the company may decide to also make Monday. the third of July, a holiday. A Human Resources person enters _7_ the selection of July 3'~ and =1'" as holidays in the personnel system and those holidays are automatically communicated to the main unit 116. In the following year, which is a leap year, Independence Day falls on a Thursday. So, this following year the fifth of July is also selected as a holiday. Thus, the Human Resources person deletes July 3'° as a holiday in the personnel system and adds July a'" as a holiday. T'he personnel system causes computer 92 to transmit the deletion of July 3"' and the addition of July ~'" as holidays to the main control unit I 16. In response to each set of holiday dates, the TES restricts access to the main building during holidays to selected management personnel, e.g., to the factory manager and assistant manager. On normal work days, the TES opens the front gate 108 at 8:00 a.m.
and closes it at 6:30 p.m. However, during the selected holidays, July 3'~ and 4'"
of the first year and July -~'" and ~'" of the second, the front gate 108 remains closed with access provided only through the card reader 11? and exit only through card reader 11:1.
In addition, information may be passed the other way as well from the TES to the main computer 92. The TES, monitoring rear entrance 106 may receive an indication that the rear door is open, e.g., from the door ajar sensor.
Immediately, the TES transmits that information to the general purpose computer 9?. In response, the genzral purpose computer 92 displa~.r a message on the computer terminal 9-1 to a security guard, alerting the guard that the rear door has been opened. In addition, in response to the rear door 106 being opened, the TES may sound a building alarm and dial an emergency number, to call the fire department for example.
Coincidentally as the TES sounds the alarm and calls the fire department, it reports this information to the general purpose computer 92 which may display the information to appropriate personnel.
Contact codes such as fur contacting departments within a business or tenants in an apartment comply, may be displayed on the main unit 116. The code sequence length for granting access is arbitrary and depends on the conrtguration of the particular unit. So for example, where the preferred TES controls access to an _g_ apartment complex, a visitor may locate a tenant's code and then, using the code, place a telephone call to the tenant without knowing the tenant's telephone number.
The przfewed embodiment TES manages the admission process, recalling and dialing tenant telephone numbers and then, responding to signals from their telephones to unlock a door, open a gate or open another connected device.
A visitor arriving at the building or complex, can find a tenant's contact code on the main control unit I 16 directory, enter the directory code, and the preferred embodiment system will dial an associated telephone number. Upon answering the call, the tenant may initiate one of four actions by dialing a number on the telephone.
rI~hese actions may include activating a first relay, for example, to open a front door or entry gate; activating a second relay to open another door or enable whatever device is controlled by the second relay, e.g., an elevator; continue to talk to the visitor by extending the talk time; and, terminate the call:
In addition, building tenants can access the building using the preferred 1 ~ embodiment TES, which controls entrances and selectively grants access.
Typically, each tenant has an assigned access code and%or card to access the complex. As the tenant enters a corresponding access code on a keypad or, cards in using a card reader (connected to one of the main control units I 16 or peripheral unit 118). The system checks to determine if the entered access code is valid. If the code is valid and access is not restricted for the particular entrance, the system grants access by unlatching the entrance, e.g., opening a front gate or garage door.
Access codes are enabled programmably to allow tenants to enter or ex it through one ar more gates) or door(s). Entrances are symbolically linked to the tenant's access code and links may be dzleted when a tenant moves out. Entry cards, like access codes, autharize entry. Thus, sw -iping the card through an entry card reader or touching a smart card to a smart card reader, provides access at an authorized entrance. Authorizations for entry cards as well as access codes may be restricted to certain entrances and for selected time periods or generally authorized for all building entrances and at any time. A valid door structure (V DS) grants tenant access to a set number of doors, and may deny access to other doors.
So, for example, a VDS may be created authorizing tenant access to the front and back door, but not to a manager's door or a garage door. A second VDS may be created for the manager to authorize access to all doors.
Also, access restrictions may be placed on codes to reduce the possibility of a card or code being used by more than one person. Period restricted or time zone access may limit the times of day that access is allowed through a particular entry location, e.g., access may be restricted only to the front entrance of a building during night hours. An anti-pass back restriction may be one of two types, either true or timed anti-pass back. True anti-pass back requires that each entry be matched by an exit before re-entry is allowed. Timed anti-pass back requires that a defined period of time pass before the same card or code may be used again for re-entry by the same reader or keypad. If the tinned anti-pass back feature is set to time out in sixty 1 S seconds, for example, the system will not grant access to anyone trying to re-enter using the same code or card at the same reader until, for example, sixty seconds have elapsed from the most recent entrap. An anti-pass back forgiveness feature may be used, such that after expiration of the forgiveness period, entry using the same code or card may be resumed. So, for example, aftzr midnight entry may be made re-using a blocked code or card to the same building.
Likewise, a Strikes-And-Out feature may be included to prohibit unauthorized persons from guessing an entry code. The Strikes-And-Out feature allows a selected number of erroneous code entries before temporarily disabling a code reader at a particular door for a specified amount of time.
2~ For convenience, use frequency limits or period limits may be placed on cards or access codes, to allow issuance of temporary cards or access codes that are authorized for limited numbers of uses or for a limited period of time. Use limited codes or cards grant entry for set number of uses. Thus, a code or card may be authorized for sixty uses over the course of a month, for example. Once the card use exceeds that sixty-use limit, the code or card is no longer valid and the card may be discarded. Period limits may include date limitation wherein cards or access codes are authorized for entry until a specitied date, i.e., an expiration date. For example, a tenant may be scheduled to move out of the building on December 15' of the current year. The expiration date for that tenant's card or access code may be set for December 15' and thereafter, access to the building; is not authorized for either the card or access code. First-Use time limited cards or access codes authorize entry for a set number of days/hours!minutes after first use. For example, a tenant may have access for an unspecified week which begins to run upon the first entry. After the first entry, the tenant can use the card/code to enter and exit the building for a week until the period expires and is no longer valid. Start-Now time limited cardslcodes are similar to Ffirst-Usz tulle limited cards%codes providing authorized access over a period of days!hours; minutes beglnmng immediately.
1 ~ As noted above, directory codes prompt the system to call a particular tenant.
Each directory code entered into the main control keypad points to the telephone number of a corresponding tenant. .A visitor may enter a directory code into the main unit to call and communicate with an associated tenant. Directory codes can be linked to the tenant's card or entry code; and may be deleted once the tenant leaves the building, e.g., moves out, thereby removing the tenant's building access authorization. Thus, each tenant must be associated with at least one individual directory code.
Figure 2 shows an example of a main control unit 116 and Figure 3 shows an example of a peripheral unit 118. The main control unit 116 houses a main system motherboard (not shown) as well as TES software and building/tenant related data.
A keypad 1?0 is included on the main unit 116 for numeric code entry, e.g., entering access codes or tenant phone numbers to contact tenants. A display 122 is provided for displaying telephon a numbers stored in the system, as well as providing interactive information and for view ding any diagnostic information that might be displayed during entry or normal maintenance. E3oth the main control unit 116 and the peripheral unit 118 include keyed access points 124, 126. Unlocking each unit's housing provides access to system circuits contained within the particular unit 1 16, 1 18.
Besides pedestrian access control, relays can by employed for generating alarms, bypassing an alarm, providing elevator access control, controlling close circuit television (CCTV), controlling a gate operator and, for heating and air-conditioning system control. Each of the main control unit 116 and peripheral units 118 also include an interface for an exit request sensor and door position sensor.
Vv.'hen attached, the exit rzquest sensor senses when a request is placed for exit through the door, e.g., a button is pushed to request exit. A door position sensor senses when a door has been pried open or is othewise open and,'or remains open, e.g., for more than a minute after a relay deactivation.
l~lessages such as greetings, gen oral information or warnings may be programmed ltlt0 the II13111 Lllllt 1 18 for display on the display 1?2. A
series of system menus are provided on the display 122 for manually programming the preferred embodiment TES. These menus are navigable using a menu prompt, scrolling through each menu level to id~ntiy and select an active value that corresponds to a desired menu action. The menus may be navigated by pressing numbers or characters on the keypad 120 that prompt a currently displayed option.
Command prompts may be identified as appropriate, such as using a designated character, underscoring, highlighting or placing a cursor below the prompt.
Further, depending tin the number of displayable lines on the main control unit display 122, scrolling up and down the menu lines may be required as the number of current 2~ menu lines may exceed the number of lines that may be displayed. Further, the preferred embodiment TES may convert messages to a foreign language, e.g., by pressing a main control kzypad 120 number to select displaying messages in Spanish.
-1?-Figure 4 shows an example of a building 130 with a minimum TES
configuration. Building I 30 includes a front door 132 and a rear door 134, access through both of which i~ controlled directly by a main control unit 116. In this example, a card reader 136 is provided at the front door 132 for requesting access and a remotz keypad 138 is at the rear entrance 136 for exit. Also, in this example of a simple TES, a card reader 140 is included at the rear entrance 136. Remote entry relays 1-1?, 1=I-1 are provided, each controlled by the main control unit I
16, to remotely opevlock the respective front entrance 132 and rear entrance 134.
Additionally, the access control system of this example includes a printer 146, a computer terminal 148 and a telephone 1 ~U connected to the main unit 116.
'the printer 146 is included for printing out periodic reports, periodic system dumps or diagnostics information. The computer terminal 148 may be used with SPSWin for example, to program the control unit 1 16 and maintain data in databases.
Telephone 1 ~0 provides another point of internal access to the system telephonically 1 ~ and, corrosp~ndingly, to building tenants connected to the system. Also, the main control unit 116 accesses an external telephone system, e.g. for modem communications functions.
The '1~L;~ records all transactions including telephone calls and any other system activity and may send a report in any number of ways. For example, the printer may print the report locally, the display may display the report or, the modem may send the report to a remote computer terminal. Logged transactions may include activity such as visitor directory calls, tenant entry references (whether granted or denied), card or code activity and any other activities that the system manager may select. Further, reports may be scheduled for automatic transmission, 2~ at a previously selected time to a previously selected destination.
Figure 5 shows an example of an expanded access control system controlling multiple access points in Building 1 ~0. In this example, a single main control unit 116 communicates with two peripheral units I 18 to control remote entry. Main unit 1 16 controls both periph c;ral liIllLJ 1 18 and directly controls access to central doors 152, 1 ~~. Each peripheral unit 1 18 controls access to a remote pair of doors 156, 158 and 160, 16?. Further. each of a remote keypad 1 ~~lk, 1 ~6k, 1 ~8k, 160k, 162k and a card reader 1 S~c, 1 ~6c, 1 p8c, 160c, 162c is located at each of the entrances 1 ~~, 1 ~6, 158, 160 and 16?. In this example. a closed circuit television camera (CCTV)16~ connected to main unit 116 is located at entrance 152, for monitoring activity at that entrance. .~ button i66 may be located at door l~? to request exit from the building. A closed circuit TV monitor 168 is located internally to the building for monitoring activity at entry 1 ~~'. e.g.. by a guard and for granting access to entrance 15?. The guard may authorize entw through telephone 170, through a dedicated input device (s.g.. a button), though a computer or through any other appropriate device. Each of remote peripheral units 118 and main unit 116 controls a pair of relays labeled A and B. each of which remotey opens.'closes or locks; unlocks a respective one of the da:~r~.
1 ~ Each of the main control unit 1 l6 and any connected peripheral units 1 18 may be configured for one-door control or nvo-door eontrol. For one-door configuration, the unit controls am doc,r for entry ~r evil and includes three other relays that are available for other functions such as. shunting or bypassing an alarm, triggering an alarm or activatin~~ a closed circuit ~l'~'. For a two-door configuration two relays are available for shunting or rerouting an alarm.
When a tenant swipes a card or enters a code, the TES response may include one or more relay actions, e.g., a door will cycle, the CCTV will cycle on, etc. A
relay activation structure (RAS i controls relay responses to entry cards or codes.
Each RAS defines one or more relay responses and is associated with an entry card or code. Relay commands are provided for programmable individual relay control and select relay response to an entry request. ~1 cycle command causes a selected relay to respond by opening and then closing after a period of tithe, e.g., buzzing in someone to a locked building. A latch-open command ener~,_izes the relay, for example, to unlock the door and leave the door unlocked until prompted to re--1-t-energize the relay, thereby re-locking the door. A latch release command returns the relay action to a default setting, e.g., if the door is open after responding to a latch open command, issuing the latch release command returns the corresponding relay to the cycle state. An initial default state may be selected such that relay control is set to that default state upon system power up.
The system may monitor door status to determine whether it is held open more than a predefined maximum time and, otherwise, determine whether a controlled door is stuck open, i.e., a building security breach has occurred.
An open door condition may elicit an alarm call wherein using the modem, the system transmits an alarm message to a designated computer or to a fax machine.
Alternately, the system response to an open door may be to close a relay that turns on an alarm light or that sounds a siren to inform a monitoring station of the perimeter breach.
When an alarm is triggered (e.g., because a door has been forced open), the 1 ~ preferred embodiment TES automatically sends an alarm message over the modem to a designated recipie~a e.g., a computer terminal. The alarm message typically includes an alarm unit ID to identify the open door so that the message recipient luows the alarm origination point. The alarm call unit ID is programmable in the TES as is the number of retry times for dialing the number. Also, alarms may be enabled or disabled, e.g., for maintenance purposes. In the event of an alarm, the preferred embodiment TES reports the alarm by calling a previously designated location, which may be a terminal connected through a modem, an alarm company or to a pager. if the location does not answer the call or the number is busy, the control unit repeatedly hangs up and redials the same number until the system connects or, 2~ until the redial retry number is met. If, alternately, a direct connection is provided to a computer, printer or other reporting device, the TES reports the alarm condition occurrence directly, posting or printing a message that indicates the occurrence, e.g., on the attached printer.
-I ~-Figure 6 shows upper electronics assembly 180 in an internal view of an open main control unit 116. The upper electronics assembly 180 includes a detachable handheld keypad 18? and a display 18-1~ which may be a liquid crystal diode (CCD) display. A pluggable memory module 186 is shown inserted at the top of the upper electronics assembly 180. The pluggable memory module 186 is, preferably, flash electronically programmable read only memory (Flash EPROM). Local audio communications may be effected in an intercom-like or speaker phone fashion through the faceplate of the main control unit 116 using a microphone 188 (in Figure 2) and speaker 189.
Two types of data that may be saved or reloaded into the main control unit using the pluggable memory module 186. These two types of data include, unit data and operating data necessary for normal operation and is inserted during initial installation. Unit data includes user-generated data for the particular control unit.
Such user-generated data may include code entries for tenants. Operating data includes any data required by the main control unit to operate. A bacKUp module may be inserted periodically to backup:'restore unit or operating data from'to the control unit memoy. The backup module also may be used for upgrading the control unit operating system.
Figure 7 is an expanded v°iew of the detachable handheld keypad 182 which is an alphanumeric keypad. The detachable handheld keypad 18? includes a numeric section 190 and an alphabetic section 192. The numeric section 190 includes several cursor keys 190c, a backspace key 190b, an escape key 190e and a clear key 190c1.
The cursor keys 190c facilitate navil;ating between displayed menu entries, e.g., on the display 181 in Figure 5. The backspace key 190b functions to eliminate a single previously entered number or character at a time. The escape key 190e may be used for canceling an erroneously entered command key sequence and/or terminating a command, i.e., aborting. A single stroke of the clear key 192c1 clears displayed entries.

The alphabetic section 192 includes several hot keys 194, typical alphabetic keys and an enter key l96 as well. The hot keys 194 include a number of shortcut keys for bypassing menu navigation and directly selecting and initiating a previously stored procedure. Hot keys l94 may include, for example, an enter phone number key for adding a new phone number to the stored listing; a delete phone number key may be included for removing entries from the list; and, an enter code key and a delete code key may be included for adding/removing codes from the listing.
Card authorization may likewise bC managed with enter card and delete card keys. A
time/date key may be included for recalling and updating system time. A
transaction key may be included for recalling and viewing logged system activity such as for example, visitor to tenant directory calls, tenant entry (granted or denied) and card or code activity. While each of these corresponding commands may be otherwise effected through a series of alphanumeric key entries, hot keys 190 provide a much simpler faster shortcut.
1 ~ Figuri. 8 show s a blo~l: diagram of the motherboard 200 of the electronics assemble according to the preferred embodiment of the present invention. The motherboard '_'00, essentially. includes two subsystems, a control subsystem 202 and a signal processing subsystem ?0-4. Further, each subsystem 202, 204 includes an address hus 20?A, ?04:A and a dau: bus 20?D, 204D.
The control subsystem 202 includes a microcontroller 206, which may be a general purpose microprocessor or, preferably, is a 16-bit, single chip controller such as the XA-S3 microcontroller from Philips Semiconductors. The control subsystem 202 includes memory, preferably, both dynamic random access memory (DRA'~1) 208 and Flash EPROM 210. if necessary, a memory controller 212 may be included for controlling access to and refreshing the DRAM 208 or, if the mieroeontroller 206 is capable, the memory cuntrol function may be provided directly by the microcontroller 206. When installed in the main control unit 116 with the motherboard 200, the pluggable dash memory module 186 in Figure 7 is also included in the memory in the control subsystem 202. A real time clock (RTC) and peripheral interface 214 also is included in the control subsystem 20?.
The microcontroller 206 in control subsystem 202 manages a programable transaction auto reporting function to automatically send a record of all transactions that are currently stored in the main control unit memory at the preselected time to a selected destination, e.g., to a terminal or a printer. Transactions may include records of system activity such as a directory call, an open door, entry card or code activity, etc. .Auto reporting may be triggered by count number, a specified day or time or, a combination of transaction count and daytime. Count only scheduling triggers a report automatically when the count reaches a specified number of transactions, as selected by the complex manager, for example. When the transaction count reaches that number, the transactions report is transmitted to the destination. If day; time reporting is selected, all log transaction are transmitted on a selected day and time. Count and day~'time reporting allows transaction report l~ transmission if the count reaches a selected level prior to the scheduled day/tirne.
As noted above, system transactions or records of system activity include records of~events such as a directory call, an open door, entry card or code activity or anything else idzntilied as system acti ~ ity for logging or repot~ting.
Reports are transmitted. for example, to a printer or a computer terminal. Since computer terminals do not have identical modem transmission capabilities, the preferred embodiment TES has a programmable baud rate, selectable for a particular computer terminal or printer. Optionally, the preferred embodiment TES may send transaction information in real time. Further, real time transmission may be programmed to begin at some future time and continue until the system receives a termination command to end real time transmission. Also, interactive report transmission may be selected to require a response to a manual prompt at the time of transmission.
Thus, when the programmed transmission time occurs, the prompt is presented to an operator. e.g., the building manager, who may approve or deny transmission.
-l8-The heart of the signal processing; subsystem 204 is a digital signal processor (DSP) 216, preferably, 24-bit DSP X6303 from Motorola Corporation. The digital signal processor 216 is connected to memory such as, for example, static RAiI~I
(SRAM) 218 and Flash EPROM 220. The digital signal processor 216 interfaces externally to the main control circuit 200 through a communications interface 222.
1'he main control unit communicates with the outside world through any number of connected optional interface devices that may be connected to the real time clock (RTC) and peripheral interface 214 or to the communications interface 222. The DSP data bus ?04D is selectively connectable to the control data bus and the DSP address bus 20~4.a is selectively connectable to the control address bus 202A.
In particular, the RTC and peripheral interface ? 1-1 conununicates with connected relrsote units, e.g;., peripheral unit 118 above. Also, connected input/output {l,'0 j devices such as a display, e.g., an LCD display 18-~, an RS=t?2 1~ printer port, an RS~'3? serial port. keypads including; handheld keypad 18?, and card readers all communicate mith and are controlled by the microcontroller tlu-ough RTC
and peripheral interface 21=1. Further, a real time clock in the RTC and peripheral interface ?1-1 nlallltal,lS Current date alld time information that may be used, for example, in logging or in timed operation. Programmable Time Zones are defined as time periods during which particular access codes and card codes are enabled.
So, if a group of tenants is intended to have access to the complex only during certain hours and,'or on certain days of the week, a time zone may be identified for those specific periods and that time zone assigned to that group of tenants. Each time zone may have four different schedules 'segments. Further, holidays may be identified and included or excluded from particular time zones.
Also, a timid control system may be included for setting relay controls to automatically open/close or enable/disable certain connected functions or features at preselected periods. Thus, for example, the system may automatically unlock and _19_ open the front gate daily and later re-lock or close the gate, at times that are specified within the system. So, continuing this example, the front gate may automatically open at 7:00am and close at 7:OOpm. Further, typical holidays may be identified such that the gate does not automatically open even if a holiday falls on a weekday.
A free exit may be provided through any monitored door such that opening the door to exit does not cause a door forced opened condition during the exit. A post office and fire department entry feature referred to as a postal lock provides access using a special lock and key. The local fire department may have a common key that allows access to the complex. Access to the complex using either of these is through the access control system and treated as a normal entry.
Communication interface 2?? provides both audio and telephonic communications interface functions. Audio communications may include sound from the main control unit microphone and speaker. Both the microphone and speaker volume may be controlled programmably. Telephonic communications may l~ include providing a telephone handset interface for either or bath of touch tone or rotary dial t~~pe telephones.
The modern provides for both incoming as well as outgoing communications.
The modem may be set to answer an incoming call after a selected number of rings.
A preselected length may be set for visitor to tenant calls to prevent unintentionally tying up the line by leaving a call connected indefinitely, blocking other calls to the tenant as well as to the control unit. Dialing may be selected for either touch tone or a pulse dialing depending upon local telephone company capabilities. If Caller ID is available:, incoming telephone numbers may be logged for each call along with any corresponding systen~Jtenant response or action.
Ifa voicemail system is attached to the TES, voicemail may be configured from the main control unit. Also, voicemail may be programmed to intercept calls and to screen visitors for tenants. 1'o use this voicemail control feature of the preferred embodiment system, a visitor places a tenant call and the voice mail system -? 0-answers the call. Then, the visitor can bypass voicemail and contact the tenant by dialing an extension (a number with up to six digits) on the front panel keypad. If Caller ID is available through the local telephone service, the system may retrieve the caller's number for the tenant to return the call later. A PBX
enable!disab 1e and dial-in feature provides call configuration capability to dial a number far outside access, e.g., 9. A dial-up unit ID feature allows assignment of a 6-digit identification number such that a person dialing into the unit can retrieve the unit ID to determine whether the caller has contacted the correct unit.
The preferred embodiment access control system includes the capability to provide audible signals, e.g., beeps, in response to various inputs. So for example, an access granted beep may be provided by the main control unit speaker when granting tenant/visitor access. Also, talk time beeps on the telephone may indicate when visitor to tenant communication approaches the end of the selected talk period.
These audible alerts may be disabled or enabled as desired.
I ~ In addition, the access control system according to the preferred embodiment of the present invention facilitates information exchanges and other communications between itself and other systems such as a general purpose computer running a personnel or bookkeeping system. Such inter-system communications include two communications layers; a higher level, data layer and a lower level transport layer.
Systems communicate by passing packets back and forth in the transport layer.
A
packet may be either a command packet or a response packet. The higher level data layer contains intersystem message requests and responses. Messages from the data layer are formed into packets for transmission in the transport layer, where incoming packets are validated and messages are extracted from valid packets. Extracted 2s messages are passed up to the data layer. Also, each system can identify and negatively acknowledge a garbage reception in the transport layer and redirect packets destined for another unit. Otherwise, each system strips all other responses from packets as it receives them and sends the response to the data layer, where the response is handled.
_?1_ Each command packet begins with a Start of Packet (SOP) byte (Ox7E) which is followed by a length byte indicating the length of data layer message included in the packet. Fields and especially variable length fields within each packet are delimited by a field delimitor or separator character "I" byte (Ox7C). The length byte is followed by a I byrte long command field. The command field contains a literal selected from ASCII characters between 0x00 and 0x80 in Table 1, for example, wherein command literals correspond to ASCII codes, in particular uppercase characters. Program step literals (P,p) provide a flexible approach to designating special function commands and, although the maximum number of program steps or step number is limited only by packet length, typically, the actual number is less than 1,000,000, as designated by a following field delimiter ~
byte (Ox7C). Also, a preferred listing of 10 i program steps are provided in Appendix I.
An optional unit number (i.e., a destination and'or source address offset by 0x80) field of I or 2 bytes (one byte for each of the destination and source address) may be 1 ~ included immediately after the coIllrlland byre. A number of data bytes, determined by the value of the length byre, immediately follows the command byte or, if included, the unit number field. Each command packet ends with a checksum byte.

Table 1 Literal Remarks ! Request identifier message, usually firmware version ? Request identifier message, usually firmware version A [Alert,) B

C

D [Do]

E [Event]

F Fetch. extended read (window+bank, offsetl6, count8) G Ciet calendar H

I
J

K

I.

W

N

O

P Prugram step 0-103 as provided in attached Appendix I

Q

R Read memory (address, count) S Stuff, extended wire (window+bank, offsetl6, data8, ...) T Transaction retrieve (index) ~

V Verbose mode (debugging) W V'rite memory address, data8, ...) X eXtended transaction retrieve (longlndex) Y

Z

0x01 <0x Used only on gate operator master/slave bus Response packets may have a structure that is substantially identical to command packets with two minor differences, i.e., a Start of Response {SOR) byte (Ox7D) and a response literal. So, each response packet bel;ins with a SOR
byte followed in order by a data length byte, an optional destination unit number, an optional source unit number, a response literal byrte, packet data and, finally, a checksum byte. Thus, for example, a response literal may be a lower case letter to a corresponding uppercase command literal, e.g., a program step command literal (P) would elicit a program response (p) literal.
Upon receipt of any sequence of bytes that cannot be formed into a packet, i.e., a garbage response, the system responds b~~ transmitting a single byte non-acknowledgment {NAK) packet (Ox7F). Otherwise, if the third byre of a packet is >0x80, it is treated as a unit number. If the packet unit number does not match a receiving unit number, the packet is transmitted toward the packet destination unit.
Otherv.4-isc. packet data is depacketized into a message and passed to the data layer.
l~ ~1'he selected start code values for N:~IL (Ox7F), SOP (Ox7E), and SOR
(Ox7D) are least likely, to occur as data values. l fowever, any other suitable values may be selected and substituted for these three values. Further, packet fields are described as byte wide fields for convenience anly. Fields ntay be narrower, e.g., =1 bit (nibble wide) or wider, e.g. w-ord wide ( 16 bit) or double wide (32 bit) without departing from the spirit or scope of the invention.
The length byte includes the number of byres to follow in the current packet (i.e., after the length byte) including any optional unit number bytes, the command (or response) character, all packet data bytes, and the checksum byte. Thus, the total byte count in each packet (i.e., the packet size), is ? more than the data length value and at least =1 bytes, i.e., SOPiSOR ~ length; cotnmand/response I, checksum.
Normally, the maximtnn size of any packet is limited by destination unit buffer length. Preferably, the maximum value of the data length byte is 2>j and the ma~:imum length of any packet is 2~7 bytes.

The value of the chc;cksum byte is the twos complement of the least significant 8 bits of the sum of all packet byte values, excluding the SOP (or SOR) and the checksum.
To further facilitate understanding of the prefewed embodiment protocol, S typical packet structures for command and response packets are provided hereinbelow. Examples of minimum sized packets and typical packets follow the typical packet description. Further, typical data layer messages are provided, illustrative of both data layer command and responses.
Typical Packet Structure A typical command packet with implied unit numbers may have the following form:
~ SOP( Ox7E) ~ a length byre ~ a command character (0xU0 to Ox7F) ~ data b~-~tes ~ and a checksum byte.
_~ typical con:mat:d packet, mcluumg an optional specified destination unit number may have the following form:
~ SOP (Ox7E) ~ a length byte ~ destination unit number (0x00 to Ox7F offset by 0x80) ~ a command character, (0x00 to Ox7F) ~ data byres ~ and a checksum byrte.
A typical command packet, including both optional destination and source unit numbers, may have the following form:
~ SOP (0x7E) ~ a length byte ~ destination unit number (0x04 - Ox7F offset by 0x80) ~ source unit number (0x00 - Ox7F offset by 0x80) ~ a command character (0x00 to Ox7F) ~ data bytes ~ and a checksum bye.
A typical response packet with implied unit numbers may have the following form:
~ SOR (Ox7D) ~ a length b~~te ~ a response character ~ data bytes ~ and a checksum byc.
A typical response packet, in::luding an optional specified destination unit I S number, may have the following form:
~ SOR (0x71)) ~ a length byte ~ destination ut:it nurnber (0x00 - 0x'F offset b~~ 0x80) ~ a response character ~ data bytes ~ and a checksum byte.
A typical response packet, including both optional destination and source unit numbers, may have the following form:
~ SOR (Ox7D) ~ a length bytC
~ destination unit number (0x00 - Ox7F offset by 0x80) ~ source unit number (0x00 - Ox7F offset by 0x80) ~ a response character ~ Data bytes ~ And a checksum byte.
Packet Examples So, for example, a command packet that queries for firmware version includes 2 bytes for the command. Since the command includes no data, the packet has a length byte with a value of 3 (each corresponding byte designated ''L") and may have the form:
SOP, len=3, cmd 'P', emd= '!', checksum OxBC
which corresponds to L L L
7E 03 ~0 21 8C
+ + +
In accordance with the above description, the checksum for this example is the twos complement of the sum of the mo messagzs bytes (designated "-~-"), i.e., I~ (Ux03+Ox~O-~Ox?1=Ox7-I, Oa100-Ox7=4=OxBC).
In yet anothCr example with tiel~is as defined in Table ? below, a response packet to the above command may have the form:
p!TEv(v] ~ d[d] ~fjf] ~n(n]
Table 2 Field Name Remarks TE 2 alpha characters identifying the type of TES system V up to 6 characters identifying the firmware version "j" hexadecimal 7C field separator d up to 1 ~ characters identifying the firmware creation date 2~ f 6 digits for the unit serial number n reserved field _?7_ Indicating each character included in the length count by L and each character included in the checksum calculation by +, for this particular example, a typical response may be:
SOR,1en=32,cmd 'p', cmd '!'. TE, 1.00 I, 960229 t 123~1~6 ; 123456789 and L L I. L L. L L L L L L L L L L I.

p ! T E 1 . 0 0 ~ 9 6 0 2 2 9 7D32 70 21 5.14~ 31 2E 30 30 7C 39 36 30 3232 39 7C

+ + + + + + + + + + + + + + + +- +

I_.L L I_ L I. L L L L L L L. L L L L

1 2 3 =I ~ 6 1 2 3 4 5 6 7 8 9 313? 33 3:~33 36 7C 31 3? 33 3~ 35 36 37 3839 23 + + + + + r + + + + + + + + + +

1 ~ Example Mlessa~es:
l~~lost message conuoand'r~spunst literals control data transfer, e.g., storing/retriev°ing information toifrom memory and are initiated by program steps.
Program step conunands are used, typically, for purposes other than retrieving ami%or displaying data, and may be issued to set date and time. Program step command messages may have the form "Ps[s] ~ nn ...'', where P is the command literal (0x50) indicating that a sequence or programming bytes follows and s[s] is an ASCII
numeric sequence representing the program step. Normally nn ... is a collection of ASCII data characters. A typical response message to a program step may have the form "ps ~ e" where "p" is the program response literal (0x70) and s is the same ASCII numeric sequence representing the programming step. The final field indicated by a is a result (error) code. Accordingly, program step examples are provided for typical such data transfer transactions, e.g., a ''Verify Clock"
message and response, a transaction retrieval message and response, memory access or Read/Write messages and responses and, finally, an add directory record message and response.
Verifv Clock So, for examplC, a Verify Clock command may be issued to initiate retrieval S of the date, including current year, month, date, day as well as time including hours, minutes, and seconds from a TES system. Specifically, this command may be used to retrieve system clock information (e.g., from the real time clock) included in the unit. The Verify Clock command is initiated by the programming command packet:
SOI', len=3, cmd 'P', step '1', checksum Ox7C
L L L
7103 ~0 31 7C
+ n- +
~ typical system response message w°ith fields defined as in Table 3 below may have the form:
SOR, len=?, p0 i ee YY~C'~'VIVIDDhhmmw!
Table 3 Field Name Remarks Ee an error response code YYYY year MM month DD day of month Hh hour Mm minute W day of week, 1=Sunday, 2=Monday, etc.

So, a response indicating the following:

Error Code 0, no error Year 1996 Month 02. February Dav of I~fonth?9 Hour 14, 2:00 P.h-I.

Minute ~ 1 Day of Week 2, Sunday=1, Monday=?

may have the form:
SOR len p 0 I ; 0 7D l~ 70 30 31 7C 0 7C
1 9 9 6 0 ? 2 9 1 -1 ~ 1 2 ~ checksum 31 i9 39 36 30 3? 3'? 39 31 3-4 3~ 31 3? 7C 03 Retrieve Transrction In yet another example with fields defined in Table ~ below, a command n;essage to retrieve a transaction may have the form: P6~ ~ d j t , n[nj j I[IJ

Table 4 Symbol Field Name Field Contents d direction 0=forwards (oldest to newest) I=backwards (newest to oldest) t type 0=based upon date/time I=based upon index number n number number of transaction to fetch I[1J if type=0, based upon date/time YYYYMMDDI-IHmm YYYY - year MM - month DD - day HH - hour (optional) I~Tm - minute (optional) If type = l, based upon index number Rangy 0 - 1,000,000 _31-So, a command may indicate forward direction, oldest to newest (d=0), type based upon date/time (t=0), fetch ~ transactions (n=5), and that the start date is January l, 1996 at 12:01 A.M. (I[I]: Year = 1996; lvlonth = Ol, January; Day = Ol; Hour (optional) = not specified, use default 12:01 A.M.; Minute (optional) = not specified, use default 12:01 A.M.) In this example. the command is wrapped around the transport layer for following sequence:
P 6 8 ~ 0 ~ 0 ~ S ~ 1 9 9 6 0 1 0 5 7E 13 50 36 38 7C 30 7C 30 7C 3~ 7C 31 39 39 36 30 31 30 35 OB
A possible response to this command may include the following information:
response p68 transaction year 1996 transaction month 0?, February transaction date 10 1 ~ transaction 1-1, ?:00 P.?~1.
hour transaction minute 12, 2:12 P.1\~1.

transaction day 2, Sunday=l, 1-fonda5=?

Source Code 04, keypad entry Result Code 00, Access Granted Door used 0?, Door 2 Entry Code 123-h User Name Jones and have the following form:
p 6 8 ; 1 9 9 6 0 2 1 0 I 4 1 2 2 7D 28 70 36 38 7C 31 39 39 36 30 32 31 30 31 3~t 31 32 32 7C

0 4 j 0 0 ! 0 2 j 1 2 3 4 5 30 3=1 7C 30 30 7C 30 3? 7C 31 32 33 34 3~ 7C
J o n a s ( checksum l~temoro Access 7~ypical memory access commands may include a Read (peek) and a Write Step P103 (poke) and may be invoked using the Read literal (R), the Write literal {Vv') or program step P 103. Thus, using the program step P 103, the Read command message or request may have the form:
P 103 j 2 j n j a[a) Where, the number of bytes to read is designated n and the Read (peek) starting address is designated a[a]. So. for e~:ample, a command to read 8 bytes starting at hexadecimal address A 1 ?3-1 may hav ~ thc: follow-ing command sequence:
p 1 0 3 p ? ! 4 I A I 2 3 4 j checksum 7E 10 s0 31 30 3 7C 3_' 7C 34 7C -ll 31 32 33 34 ?C AB
A typical response packet may loathe the form "p103 a[a) ' data', where the Read (peek) start address is designated a[a] and information fetched is designated data. A response to the above read command example might have the following form p 1 0 3 ~ A 1 2 3 4 j data checksum 7D 10 70 31 30 33 7C 41 31 3? 33 34 7C AO C3 I31 09 CC
Similarly. the Write (poke) command message may have the form "P103 j 3 ~ a[a] ~ data", where the Write (poke) starting address is designated a[a) and the information to be written is designated data. An example of a command packet to write ~ bytes of data, the character sequence HELLO, into locations starting at 80010 embedded within the transport layer may have the following form:
P 1 0 3 ( 3 I B 0 0 1 0 t H E L L O checksum 7E 13 50 31 30 33 7C 33 7C 4? 30 30 31 30 7C 48 45 4C 4C 4F EB
A typical write response to the Write command may have the form ''p 103 a[a] ~ n[n]" where the write starting address is designated a[a] and the number of bytes written is designated n[n]. 50, a response to the above Write command rnay be:
p 1 0 3 ( B 0 0 1 0 ( 5 checksum 7D OF 70 31 30 33 7C ~43 30 30 31 30 7C 05 3E
Add Directory Entr<
A program step command to add a directory record (step number 20 in this example) may hare fields as defined in Table ~ and ma)' have the form "P?0 ; t I
~l~] . s ~ t[t] ; a[n] ; d ' L[L]".
1 S Table ~
Name Variable Remarks Entry type t =3 for directory code Code c 0-634 Do not disturbs . 0=unrestricted ~Celephone# t 0-9,comma,dash,asterisk, pound and space Name n up to 20 characters Display name d 0=no, 1=yes Link L 0=no, 1=yes So, for a tenant code of 1234, correspondinb to telephone number I-818-700-for a tenant named Jones, the program step may have corresponding selected field entries as in Table 6.
Table 6 Name Variable Contents Entry type t =3 for directory code Code c 12345 Do not disturbs 0=unrestricted Tclephone# t t-818-700-X009 Name n Jones Display name d 1=yes Link L 0=no 1 S and in this example, the resulting program step, prior to being embedded in a packet may have the form:
P 2 0 j 3 ~ 1 2 3 4 ~ ~ 0 p 50 3? 30 ?C 33 7C 31 3_' 33 3-I 33 7C 3U 7C' I - 8 1 8 - 7 0 0 - ~ 0 0 9 31 2D 38 31 38 ?D 37 30 30 ?D 3~ 30 30 39 7C
J o n a s ~ I ~ 0 4:1 6F 6E 6~ 73 7C 31 7C 30 A typical response w-ould have the form p?0 ; ee ~ t j c(c) ~ s ~ t[t) j n(n) ~ d ~ [L) ~ , where ee is an error code and other fields have the meanings set forth in Table 5 and in this example, the resulting program step may have the form:
_3 J-p 2 0 ~ 0 I 3 ~ 1 2 3 4 5 ~ 0 70 32 30 7C 0 7C 33 31 3? 33 3-I 35 7C 30 7C

J o n a s ; I ~ 0 Accordingly, using the above described architecture and protocol and general propose program steps, appropriate routines may be written to interface the TCS with the general purpose computer. Thus, for example, routines may be written and integrated in an accounting package such that when employees are entered into the accounting package, a corresponding entry is made into the TES for the employee.
When employees are removed, a corresponding employee entry is removed from the TES cods. Also, as an entry is adJed to the accounting package for each new employee, access codes are automatically added to the TES. Furthermore, these TES
entries may be added coincident mith entries in the accounting database or, as part of periodic updates, e.g., along with backups and other housekeeping that may be done on the ge~,eraa pl;rpose computer.
Having thus described preferred embodiments of the present invention, various modifications and changes will occur to a person skilled in the art without departing from the spirit and scope of the invention. It is intended that all such variations and modifications fall within the scope of the appended claims.
Examples and drawings are, accordingly, to be regarded as illustrative rather than restrictive.

Claims (22)

1. An access control system in seamless communication with a general purpose computer, said access control system comprising:

a main control unit telephonically in communication with entities within a building, said main control unit being mountable at an entrance to said building;

at least one code entry unit receiving access codes, each said code entry unit providing received said access codes to said main control unit; and at least one controlled door, access through each said controlled door being provided by said main control unit in response to a correct access code entered at one said code entry unit;

whereby adding or removing access codes from said main control unit seamlessly causes said main control unit to communicate code changes to a general purpose computer and said general purpose computer makes a corresponding entry or deletion, and correspondingly entries or deletions made in said general purpose computer arc seamlessly communicated to said main control system and said main control unit makes corresponding additions or removals of access codes in said access control system.
2. An access control system in seamless communication with a general purpose computer as in claim 1, wherein one of said at least one code entry units is a keypad located on said main control unit.
3. An access control system in seamless communication with a general purpose computer as in claim 2 wherein said at least one controlled door is two or more controlled doors, said main control unit controlling access through said controlled doors at entrances to said building, at least one of said entrances including a remote said code entry unit.
4. An access control system in seamless communication with a general purpose computer as in claim 3 wherein said remote code entry unit is a keypad.
5. An access control system in seamless communication with a general purpose computer as in claim 3 wherein said remote code entry unit is a card reader.
6. An access control unit in seamless communication with a general purpose computer as in claim 3 further comprising a peripheral control unit in communication with said main control unit, said peripheral control unit controlling at least one remotely controlled door at an entrance remotely located from said main control unit.
7. An access control unit in seamless communication with a general purpose computer as in claim 6 further comprising a remote said code entry unit at said remotely controlled door, said remote code entry unit communicating with said main control unit through said peripheral unit.
8. An access control system in seamless communication with a general purpose computer as in claim 7 wherein said remote cods entry unit is located external to said building, entry requests being placed by entering an access code at said remote code entry unit.
9. An access control unit in seamless communication with a general purpose computer as in claim 8 wherein said remote code entry unit is a card reader.
10. An access control system in seamless communication with a general purpose computer as in claim 8 wherein said remote code entry unit is a keypad.
11. An access control unit in seamless communication with a general purpose computer as in claim 8 further comprising a second remote code entry unit located internal to said building, access code entries to said second remote code entry unit requesting exit from said building. said main control unit authenticating access codes, said peripheral unit opening said remote controlled door responsive to authenticated access codes being entered in either said remote code entry unit.
12. An access control system in seamless communication with a general purpose computer as in claim 2 further comprising a monitor connected to said main control unit, said main control unit displaying system information on said monitor.
13. An access control unit in seamless communication with a general purpose computer as in claim 2 further comprising a closed circuit TV camera, said closed circuit TV camera being remotely controlled by said access control system.
14. An access control system in seamless communication with a general purpose computer as in claim 2 wherein said main control further comprises a display, said display selectively displaying a menu of available options.
15. An access control system in seamless communication with a general purpose computer as in claim 14 the main control unit further comprising:

a microphone receiving a voice communications from persons requesting building access; and a speaker providing audio responses to said persons requesting building access.
16. An access control system in seamless communication with a general purpose computer as in claim 14, the main control unit further comprising:

a memory module;

an electronics assembly adapted to receive said memory module, said memory module being pluggable into said electronics assembly, said display being attached to said electronics assembly; and an alphanumeric keypad, said access control system being programmed directly from said alphanumeric keypad, access control codes being programmed into said main control unit using said alphanumeric keypad, program entries being selectively communicated, seamlessly, to said general purpose computer.
17. An access control system in seamless communication with a general purpose computer as in claim 16 wherein said electronics assembly unit comprises:

a control subsystem controlling connected peripheral units and controlled doors, receiving and authenticating access codes and monitoring unauthorized accesses; and a communication subsystem passing voice communications telephonically between said entities within said building and individuals seeking building access.
18. An access control system in seamless communication with a general purpose computer as in claim 17 wherein said control subsystem comprises:

a microcontroller controlling building access, communicating access authorization changes to the general purpose computer and changing access code data in response to communications from said general purpose computer;

memory storing current access codes, system related program code, data and system logs:

a handheld interface and real time clock communicating with said general purpose computer; and said memory module, program initialization data and operating codes contained in said memory module.
19. An access control system in seamless communication with a general purpose computer as in claim 18 wherein said memory includes Flash EPROM and dynamic random access memory.
20. An access control system in seamless communication with a general purpose computer as in claim 17 wherein said communication subsystem comprises:

a digital signal processor;

memory storing code for said digital signal processor; and a communications interface providing a voice interface with said microphone and audio interface with said speaker at said main control unit and providing a telephonic interface to a connected telephone system responsive to said digital signal processor.
21. An access control system in seamless communication with a general purpose computer as in claim 20 wherein said memory in said communication subsystem comprises Flash EPROM and random access memory.
22. An access control system in seamless communication with a general purpose computer, said access control system comprising:

a main control unit telephonically in communication with entities within a building, said main control unit being mountable at an entrance to said buildings;

at least one code entry unit receiving access codes, each said code entry unit providing received said access codes to said main control unit; and at last one controlled door, access through each said controlled door being provided by said main control unit in response to access codes entered at one said code entry unit;

whereby controlled door related data is seamlessly transmitted by said main control unit to a general purpose computer and said general purpose computer records the controlled door related data and correspondingly, controlled door related data in said general purpose computer is seamlessly communicated to said main control unit and said main control unit makes corresponding additions or removals of controlled door related data in said access control system.
CA002409293A 2001-10-29 2002-10-22 Access control system in seamless communication with personnel management systems and the like Abandoned CA2409293A1 (en)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
US09/984,344 US20030132830A1 (en) 2001-10-29 2001-10-29 Access control system in seamless communication with personnel management systems and the like
US09/984,344 2001-10-29

Publications (1)

Publication Number Publication Date
CA2409293A1 true CA2409293A1 (en) 2003-04-29

Family

ID=25530474

Family Applications (1)

Application Number Title Priority Date Filing Date
CA002409293A Abandoned CA2409293A1 (en) 2001-10-29 2002-10-22 Access control system in seamless communication with personnel management systems and the like

Country Status (6)

Country Link
US (1) US20030132830A1 (en)
CA (1) CA2409293A1 (en)
DE (1) DE10250135A1 (en)
FR (1) FR2831748B3 (en)
GB (1) GB2382444A (en)
MX (1) MXPA02010667A (en)

Families Citing this family (18)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7630721B2 (en) * 2000-06-27 2009-12-08 Ortiz & Associates Consulting, Llc Systems, methods and apparatuses for brokering data between wireless devices and data rendering devices
US7908603B2 (en) * 2004-01-29 2011-03-15 Klingman Edwin E Intelligent memory with multitask controller and memory partitions storing task state information for processing tasks interfaced from host processor
US7882504B2 (en) * 2004-01-29 2011-02-01 Klingman Edwin E Intelligent memory device with wakeup feature
US7823161B2 (en) * 2004-01-29 2010-10-26 Klingman Edwin E Intelligent memory device with variable size task architecture
US8108870B2 (en) * 2004-01-29 2012-01-31 Klingman Edwin E Intelligent memory device having ASCII-named task registers mapped to addresses of a task
US7984442B2 (en) * 2004-01-29 2011-07-19 Klingman Edwin E Intelligent memory device multilevel ASCII interpreter
US7856632B2 (en) * 2004-01-29 2010-12-21 Klingman Edwin E iMEM ASCII architecture for executing system operators and processing data operators
US7823159B2 (en) * 2004-01-29 2010-10-26 Klingman Edwin E Intelligent memory device clock distribution architecture
IL190232A (en) * 2008-03-17 2013-05-30 Fst21 Ltd System and method for automated/semi-automated entry filtering
US8451120B2 (en) * 2009-08-14 2013-05-28 Accenture Global Services Limited System for relative positioning of access points in a real time locating system
EP2779117A1 (en) * 2013-03-15 2014-09-17 Inventio AG Access control for areas with multiple doors
US11122241B2 (en) * 2013-12-24 2021-09-14 My Door View, Llc Method and system of controlling access to access points
CN107000969A (en) * 2014-12-02 2017-08-01 因温特奥股份公司 The access control system of feedback is provided to portable electric appts
JP6401069B2 (en) * 2015-01-30 2018-10-03 アイホン株式会社 Intercom system for housing complex
US10742938B2 (en) * 2015-03-07 2020-08-11 Skybell Technologies Ip, Llc Garage door communication systems and methods
US10679248B1 (en) * 2015-09-28 2020-06-09 Verizon Media Inc. Systems and methods for storing and sharing telephone call data using online advertising systems
US10699505B2 (en) * 2016-08-04 2020-06-30 Tiburon Lockers Inc. Marking for authentication and access
US10642727B1 (en) * 2017-09-27 2020-05-05 Amazon Technologies, Inc. Managing migration events performed by a memory controller

Family Cites Families (13)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US4216375A (en) * 1979-03-12 1980-08-05 A-T-O Inc. Self-contained programmable terminal for security systems
US4839640A (en) * 1984-09-24 1989-06-13 Adt Inc. Access control system having centralized/distributed control
US4721954A (en) * 1985-12-18 1988-01-26 Marlee Electronics Corporation Keypad security system
US6041106A (en) * 1996-07-29 2000-03-21 Elite Entry Phone Corp. Access control apparatus for use with buildings, gated properties and the like
US5936544A (en) * 1997-09-30 1999-08-10 Pittway Corporation Wireless access system
US6408391B1 (en) * 1998-05-06 2002-06-18 Prc Inc. Dynamic system defense for information warfare
US6738772B2 (en) * 1998-08-18 2004-05-18 Lenel Systems International, Inc. Access control system having automatic download and distribution of security information
US6119179A (en) * 1998-08-28 2000-09-12 Pda Peripherals Inc. Telecommunications adapter providing non-repudiable communications log and supplemental power for a portable programmable device
US6233588B1 (en) * 1998-12-02 2001-05-15 Lenel Systems International, Inc. System for security access control in multiple regions
US6580815B1 (en) * 1999-07-19 2003-06-17 Mandylion Research Labs, Llc Page back intrusion detection device
US6625729B1 (en) * 2000-03-31 2003-09-23 Hewlett-Packard Company, L.P. Computer system having security features for authenticating different components
US6504479B1 (en) * 2000-09-07 2003-01-07 Comtrak Technologies Llc Integrated security system
US20040003257A1 (en) * 2002-06-26 2004-01-01 Mitchell Ernst Kern Network accessible and controllable security system for a multiple of electronic door locks within a multi-room facility

Also Published As

Publication number Publication date
FR2831748A1 (en) 2003-05-02
GB2382444A (en) 2003-05-28
FR2831748B3 (en) 2004-01-09
DE10250135A1 (en) 2003-06-18
US20030132830A1 (en) 2003-07-17
GB0225152D0 (en) 2002-12-11
MXPA02010667A (en) 2004-07-30

Similar Documents

Publication Publication Date Title
US6728351B2 (en) Access control system having tenant codes that may be selectively displayed
US6748061B2 (en) Access control system having a programmable automatic notification feature
CA2409293A1 (en) Access control system in seamless communication with personnel management systems and the like
US7170998B2 (en) Door access control and key management system and the method thereof
US7123142B2 (en) Integrated intercom and security system
US7065196B2 (en) Entrance intercom system
GB2285365A (en) High security entry system for a building or car park
WO2002005220A1 (en) Integrated telephone/proximity access control system
US6606260B2 (en) Switch mode power supply for a telephone entry system or the like
JP3880202B2 (en) Apartment house monitoring call system
CA2360120C (en) Door access control and key management system and the method thereof
CN1568022A (en) Entrance guard intercommunication system
Lau et al. A microprocessor-based gate security system
JP2006345444A (en) Locking/unlocking device and locking/unlocking system using the same
KR100332286B1 (en) System and method for controlling gate of apartment complex
JP3079280B2 (en) Surveillance call system for apartment buildings
KR20070033859A (en) Entrance management system and method of multi-unit housing using caller ID
JPH05214856A (en) Electric lock system
JP3090288B2 (en) Collective entrance management system
JPS60203784A (en) Automatic door controller
KR20190020708A (en) Digital Door Locks with Text Display Display Liquid Crystal
KR20180087221A (en) Digital Door Locks with Text Display Display Liquid Crystal
JP2002281161A (en) Responding system to visitor
JPH0573788A (en) Apartment house management system
KR20020007547A (en) System and Method for Controlling Remotely Located Building Using Communication Device

Legal Events

Date Code Title Description
FZDE Dead