Field of the Invention
The instant system relates generally to systems for remote actuation, validation and secure access, and more specifically to a system which allows secure access to buildings, rooms and the like.
Description of Related Art
Existent systems for hands free operation of doors currently rely on optical or mechanical sensors. While such systems may provide convenience, many such systems allow any person possessing a pass to actuate the sensor access to the associated door mechanism. These systems also lack the ability to track which person or persons have entered that door access mechanism.
Other means of secure access through doorways involve taping or sliding a key card to a card reader that identifies the card and allows the user through the door when the user credentials authorize access. Such systems provide a modicum of security, but can be inconvenient by requiring a user to physically locate a card and verify the user credentials.
Many people can relate to the inconvenience of accessing a secure area while their hands are full, which inevitably leads to an awkward attempt to access the area or forcing the user to place their items on the ground to take out their card. A key card system is also slower than an automatic system.
The instant system, as illustrated herein, is clearly not anticipated, rendered obvious, or even present in any of the prior art mechanisms, either alone or in any combination thereof. A versatile security access system which can be applied doorways and can be adapted to compensate for the aforementioned drawbacks and limitations would afford significant improvement to numerous useful applications. Thus the several embodiments of the instant invention are illustrated herein. It is therefore a primary objective of the system to provide an automatic, hands free door access system that maintains a high level of security.
The instant system utilizes Bluetooth low energy [BTLE] signals to determine when a user is close to an access point and determines whether that user has valid credentials to access the area. If the credentials are valid the user has quick, hands free access to the area.
There has thus been outlined, rather broadly, the more important features of the versatile systems, apparatuses and accompany methods for electronic access, accreditation, validation and tracking, in order that the detailed description thereof that follows may be better understood, and in order that the present contribution to the art may be better appreciated. There are additional features of the system that will be described hereinafter and which will form the subject matter of the claims appended hereto.
In this respect, before explaining at least one embodiment of the system in detail, it is to be understood that the system is not limited in its application to the details of construction and to the arrangements of the components set forth in the following description or illustrated in the drawings. The system is capable of other embodiments and of being practiced and carries out in various ways. Also, it is to be understood that the phraseology and terminology employed herein are for the purpose of description and should not be regarded as limiting.
These, together with other objects of the system, along with the various features of novelty, which characterize the system, are pointed out with particularity in the claims annexed to and forming a part of this disclosure. For a better understanding of the interactive systems, apparatuses and accompany methods, the operating advantages and the specific objects attained by usage, reference should be made to the accompanying drawings and descriptive matter in which there are illustrated preferred embodiments of the system.
The system may be more completely understood in consideration of the following detailed description of the various embodiments of the system in connection with the accompanying drawings, in which:
For the following defined terms, these definitions shall be applied, unless a different definition is given in the claims or elsewhere in this specification. All numeric values are herein assumed to be modified by the term “about”, whether or not explicitly indicated. The term “about” generally refers to a range of numbers that one of skill in the art would consider equivalent to the recited value (i.e., having the same function or result). In many instances, the terms “about” may include numbers that are rounded to the nearest significant figure.
As used in this specification and the appended claims, the singular forms “a”, “an”, and “the” include plural referents unless the content clearly dictates otherwise. As used in this specification and the appended claims, the term “or” is generally employed in its sense including “and/or” unless the content clearly dictates otherwise.
The following description should be read with reference to the drawings wherein like reference numerals indicate like elements throughout the several views. The drawings, which are not necessarily to scale, depict illustrative embodiments of the claimed system.
The OneKey™ software runs the BILE of the OneKey™ device's 2 to detect the beacon 4. The OneKey™ device 2 receives a unique credential number from the beacon 4. Next the device 2 communicates with the authorization server 6. The authorization server 6 receives and coordinates which device credential numbers have access to each beacon number from the master server 20.
If the device credential number is associated with the beacon credential number the authorization server 6 sends a signal to the Wiegand controller 8. The Wiegand controller 8 converts the signal to Wiegand security protocol and communicates with the access panel 10. The access panel 10 then opens the door associated with the beacon credential number.
The master server 20 is communicatively attached to a plurality of authorization servers 6. Each authorization server is communicatively attached to a plurality of beacons 4 and a plurality of Wiegand controllers 8. When an authorization server has verified that a device 2 is authorized to access the door 1 associated with the beacon 4 ID it sends a signal to a plurality of Wiegand controllers 8. The signal to the plurality of Wiegand controllers 8 may be encrypted using a number of encryption methods. The plurality of Wiegand controllers 8 send a Wiegand encrypted signal to a plurality of access panels 10. The access panels 10 open the relevant doors 1.
When the authorization server 6 receives a signal 34 it verifies 35 with the master server 20 that that device 2 is authorized to access the door 1 associated with that beacon 4. In this embodiment, the device is being used to access a door 1, however in other embodiments the device 2 may be used to access other mechanical devices. The authorization server 6 then sends a signal 36B to a door access server 24 associated with the beacon 4 ID signal 7. The signal 36A may also be sent to a Wiegand controller 26 or other security protocol to ensure that the signal 36A is secure. If the signal is sent to a Wiegand controller 26 the Wiegand controller sends a signal 37 to an access sever 24. The door access server 24 then opens or unlocks 38 the door 1.
The door access server 24 may be utilized to receive network direct open requests. Upon receipt of the network direct open requests, the access server may handle and distribute the load to a set of door access panels 25. The access panel may be characterized as a less “smart” device that handles requests for one or more doors and may comprise a large user list. The set of door access panels 25 may typically be located closer to the individual door or set of doors that the set of door access panels 25 control (at least in the same building or even within feet of an individual door). Thus, a campus of buildings may have as many as 100-1,000 door access panels 25, or even more, as building requirements demand.
The authorization server 6 is tasked to verify 48 that the device 2 credentials it receives are authorized to access the specific door 1 associated with the beacon 4 credentials with the master server 20. If the device 2 is authorized to access the door 1 associated with the beacon 4 credentials the master server 20 transmits 49 an approval signal to a door control device. Next the door control device opens the door 1.
This application takes priority from and claims the benefit of U.S. Provisional Application Ser. No. 62/022,420 filed on Jul. 9, 2014, the contents of which are herein incorporated by reference.
Filing Document | Filing Date | Country | Kind |
---|---|---|---|
PCT/US15/39725 | 7/9/2015 | WO | 00 |
Number | Date | Country | |
---|---|---|---|
62022420 | Jul 2014 | US |