The application pertains to door access control systems and methods of providing more convenient access. More particularly, the application pertains to such systems and methods which enable individuals to unlock a door using a wireless device, such as a smart phone or a PDA.
Access control systems and methods restrict access to resources, areas and properties, allowing only privileged entities access. Generally, access control systems include an interconnected set of controllers, managing the entrance and exit of people through secure areas, with electronic key cards, and enable key/card administration without having to change locks. Controllers, readers and cards are indispensable components in known access control systems. Magnetic, optical and RFID technologies are used in connection with readers and key cards.
Known door access control systems, while permitting controlled access do exhibit some drawbacks. These include, costs for the door readers as well as associated control devices. For enterprise level systems, there can be large numbers of readers, and installations, as a result are expensive. Usually the readers will be continuously active, drawing electrical energy, so as to be able to immediately respond to an inserted or swiped key card. Additionally, at times, authorized individuals forget to take their keycard with them to the office or work facility and cannot obtain access to their work areas. This can of course represent a major inconvenience.
While disclosed embodiments can take many different forms, specific embodiments thereof are shown in the drawings and will be described herein in detail with the understanding that the present disclosure is to be considered as an exemplification of the principles thereof as well as the best mode of practicing same, and is not intended to limit the application or claims to the specific embodiment illustrated.
In one aspect, embodiments hereof use wireless devices such as smart phones, or personal digital assistants (PDAs) to provide access to controlled areas. Lap top or tablet computers could also be used without limitation. Advantageously, the requirement to install a reader at each door is eliminated. This provides a direct initial cost reduction, and also reduces operational costs.
In another aspect, the required authorization control circuits can be simplified providing a further cost reduction. Finally, users do not need a separate access card, and only need to remember to bring their phone or PDA to work.
Embodiments hereof assign a unique code, such as a 2D barcode, to each door/door frame to incorporate a specific door into an access system. No separate reader/door is needed. Advantageously, a passive, code carrying element can be associated with a respective door or frame. Other than as set forth herein, neither the details of the selected code, or the type of element with which the code is associated are limitations hereof.
An interface unit, which is less expensive than the cost of the controller boards, used in known systems functions as a bridge between a system host and the door accessories such as an exit button, door status monitoring, and a controllable locking/unlocking device for the door.
A wireless device such as a smart phone, PDA or computer, will read the code associated with the door, via magnetics, optics or near field RF for example and without limitation, and, then transmit the door specifying code, and device identify information to the host. The host can then make a decision to allow access or not, based on authorization provided by a mapping of the door code and wireless device information. If access is authorized, the host sends a wired or wireless command to the interface board which implements the door open function, or, action.
The code 14 can be sensed, or read, using a wireless device 18, perhaps with a downloaded barcode reading app. The device 18 can be implemented as a smart phone, PDA, tablet computer, lap top computer or the like all without limitation.
Device 18 then transmits the barcoded information, obtained from door mounted code 14, to an Internet or wireless enabled host 22. The host 22, using the bar coded information, as well as identification information from device 18, makes an access determination.
If access is authorized, the host 22 notifies the relevant interface unit, such as 26, in the vicinity of door D. Those of skill will understand that the host 22 can be in wired or wireless communication with unit 26, all without limitation. Host 22 can also be in communication with numerous other interface units such as 26-1 . . . 26-i which are associated with other doors. Units such as 26-i can each control access to a plurality of doors.
Unlike the prior art systems, as in
In the embodiment of
As those of skill will understand, various alternate embodiments come within the spirit and scope hereof. For example, tickets or other authorizing documents can carry a printed code. That code can be read by a wireless device, as noted above, to obtain authorization feedback from a displaced data base. Finally, the access code might be required for all or only for specific doors.
Access or other forms of acceptance can be provided based on feedback from searching the data base. Near field communications can be used, without limitation, to sense, or read, information stored on an identifying indicium. Examples include, without limitation, a label or other form of code carrying element, for example, passive RFID chips, attached to or carried on the respective door, document or product.
In a further aspect, the bar codes, one or two dimensional versions, could be printed with either visible or infra-red inks. It will also be understood that other printed material, quite different from bar codes, such as pictures or other images, could be associated with the various doors and would be sensed and recognized by the access system.
In yet another embodiment, specific shapes which give characteristic echoes to a sound stimulus produced by the smart phone or other device could be used to identify the specific door as discussed above.
From the foregoing, it will be observed that numerous variations and modifications may be effected without departing from the spirit and scope hereof. It is to be understood that no limitation with respect to the specific apparatus illustrated herein is intended or should be inferred. It is, of course, intended to cover by the appended claims all such modifications as fall within the scope of the claims. Further, logic flows depicted in the figures do not require the particular order shown, or sequential order, to achieve desirable results. Other steps may be provided, or steps may be eliminated, from the described flows, and other components may be add to, or removed from the described embodiments.