This invention relates generally to methods and devices for controlling movable barriers. More specifically, it relates to entry control systems for actuating movable barriers.
Individuals who work during the 9-to-5 hours typically are not at home when home access is desired for delivery of goods or for performance of home repair services. Work schedules for many people make it difficult, if not impossible, to be at home to accept goods being delivered or allow service people into their homes. In addition to delivery or service individuals, it may be desirable to permit some routine or frequent visitors to have conditional access to one's home, such as a home cleaning service or dry-cleaning pick-up and drop-off, to note a few.
Furthermore, when such delivery and service appointments are made, it is often requested that an individual be available for delivery or service during a time period lasting several hours. When trying to arrange a time for delivery and services, these providers usually require someone to be at the home for nearly half a day and will not, or cannot, pinpoint a specific arrival time.
Many homes have entry systems which control various access points for the home, such as, for example, an automatic garage door operator which raises and lowers the garage door after it receives an appropriate signal from the associated control circuitry. Generally, such control systems include input devices such as wall mounted keypads, hand held radio frequency transmitters, or simple actuating buttons. In some installations, security measures are imposed to prevent unauthorized access to the garage area. For example, a keypad mounted on an exterior wall may require the entry of a secrete code to permit operation of the garage door operator. Additionally, garage door operator hand held transmitter units may communicate with the control circuitry of the garage door operator via encoded signals, thereby attempting to ensure that only authorized vehicles are granted access to the garage area. Further, these types of systems are not limited to garage door operators but maybe extended to entry gates, alarm systems, or even the front door lock mechanism of a house itself.
With a garage door entry system a homeowner could give the delivery service a programmable code that can be entered in a keypad on an outside wall of the door. Nonetheless, for security reasons, a homeowner may not wish to give such third parties a permanent means to gain access to their home. However, the codes and/or transmitters given to third parties do not typically require any further verification. Thus, one seeking to gain unauthorized accesses need only to obtain the code and/or transmitter from the authorized third party to gain access.
As suggested by the availability of numerous features for electronic devices, consumers desire a primary wireless device that can function as a cell phone, a personal data assistant, a camera, and a GPS device, among other desired functionalities. To that end, consumers would like to have the ability to use to their primary wireless devices to gain access to their homes such as through wireless operation of their garage doors or security system. However, the use of such long-range communication devices has a variety of attendant concerns. With long-range capabilities, the potential for improper and inadvertent access grows. For example, it is not uncommon for an improperly stowed cell phone to accidentally transmit a telephone call. Further, if the signal transmitted was sent to an entry control system, it could operate a movable barrier. In such circumstances, the homeowner may be miles away from the location and may be completely unaware of the activation of the movable barrier operator.
Generally speaking, a convenient method and system is provided for operating a movable barrier by providing conditional allowance of access such that access is not granted unless another condition is met. In one illustrative embodiment, a first signal is received and, if a second signal is received within a set time frame relative to receipt of the first signal, a movable barrier is then operated by the movable barrier operator. By one approach, the first signal may be a long-range transmission and the second signal may be a visual-range transmission. Further, the long-range transmission may be received before, during, or after receipt of the short-range transmission signal as long as the two transmissions are received within the given time frame.
By one approach, the long-range transmission may include a cell phone transmission, an internet transmission, an e-mail receipt, a security system transmission, a long-range radio transmission, a local area network transmission, and/or a plain old telephone system (POTS) transmission. Further, an e-mail receipt may be comprised of a local area network transmission and/or an internet transmission. It is contemplated that the visual-range transmission may be detected by a magnetic detector such as a loop detector or a magnetic anomaly detector, a motion detector device, a short-range transmission detector, a capacitive detector, a weight-based detector, a push button detector, and a keypad.
Further, while the long-range transmitters may be employed in a number of locations, a visual-range transmission ensures that the long-range transmission has been verified by the presence of a visual-range signal. In the same manner, a short range transmission is also verified by a long-range transmission. The conditional allowance provided by one of the transmission signals is, therefore, verified by the additional signal. In such a manner, improper and inadvertent access from long-range transmission devices is reduced but also grants the user increased flexibility in granting third parties access to their homes without the risk of giving away too much security.
In another aspect, a method and system is provided for operating a home security system such as one with an alarm by providing conditional allowance to disarm or rearm such a system wherein such action is not taken by the security system until and unless another condition is met. In another aspect, the receivers receiving the transmissions may be contained within or outside of the secured area. By another approach, the movable barrier operator may control or be in communication with peripheral systems such as a security system. In such a configuration, the controller of the movable barrier operator may communicate with the alarm entry control such that operation of either device may be accomplished through control signals received by and sent from the other device.
The above needs are at least partially met through provision of the method and system of conditionally operating a movable barrier described in the following detailed description, particularly when studied in conjunction with the drawings, wherein:
Skilled artisans will appreciate that elements in the figures are illustrated for simplicity and clarity and have not necessarily been drawn to scale. For example, the dimensions and/or relative positioning of some of the elements in the figures may be exaggerated relative to other elements to help to improve understanding of various embodiments. Also, common but well-understood elements that are useful or necessary in a commercially feasible embodiment are often not depicted to facilitate a less obstructed view of these various embodiments. It will further be appreciated that certain actions and/or steps may be described or depicted in a particular order of occurrence while those skilled in the art will understand that such specificity with respect to sequence is not actually required. It will also be understood that the terms and expressions used herein have the ordinary technical meaning as is accorded to such terms and expressions by persons skilled in the technical field as set forth above except where different specific meanings have otherwise been set forth herein.
Referring now to the drawings, and in particular to
In the illustrative example of
The head unit 24 also may include a receiver 50 as illustrated in
Turning now to
As mentioned, receipt of one of the signals that is relative to receipt of the other signal may be before, during, or after receipt of either signal. Thus, either one of the long-range transmission or the visual-range transmission may be received prior to the other of the transmissions. Further, in one approach, a set time frame may be about ten minutes or less. By another approach, a set time frame is approximately five minutes or less. By yet another approach, a set time frame is about three minutes or less. In still another approach, a homeowner may select different time frames for different signals and different combinations of signals.
In one illustrative approach, a long-range transmission is one that may transmit beyond the distance that the unaided eye can see. For example, if the average unaided eye can see to a distance of 1,000 feet, then a long-range transmission is one that is capable of transmission beyond a distance of 1,000 feet. While a long-range transmission may transmit beyond that of a visual-range transmission, the transmission is not required to have come from farther away than visual-range. By one approach, a long-range transmission may include: a cell phone transmission including a text or short message service, an interne transmission, such as an e-mail, a short message service, a notification, a security system transmission, and a long-range radio transmission, to note but a few. Further, such a long-range transmission may be generated by a variety of devices. As illustrated in
An exemplary approach, shown in
It is anticipated that a number of different transmitters may be employed to generate the visual-range transmissions, even in a single embodiment. More particularly, the visual-range transmission may be detected via at least one of a magnetic detector such as a magnetic loop detector or magnetic anomaly detector as known in the art, a motion detector device, a capacitive detector, a weight-based detector, a push button detector, a keypad, or a short-range transmission detector, such as an infrared (IR) detector, radio frequency (RF) detector, to note but a few. In another embodiment, similar to that illustrated in
As illustrated in
In addition to the movable barrier operator discussed above, such a method may also be configured to operate a gate or alarm system to provide access to a home, compound, or other secure area. For example, if a home has an alarm system, a controller may have receiver(s) configured to receive a long-range transmission to operate an alarm and a visual-range transmission to operator an alarm. If the two signals are received within a set time frame, the alarm is operated by the controller. By operating the alarm system, the controller may be arming or disarming the alarm depending on the signals and system status. Further, the controller may be contained within the alarm system or may also be contained within another device, such as a movable barrier operator.
Turning now to
Though the searching 802 and operating 803 is in response to the condition of another step, such conditional allowance does not require that the response be immediate, though in some configurations the next step may immediately begin. In one illustrative embodiment, a start period for the operation of the movable barrier, after receipt of the later of the long-range transmission signal or the visual-range signal is less than about three minutes, though it is anticipated that the time may shorter, as mentioned. For example, the start period may, in one approach, be immediately upon processing of both signals within a given time period.
In yet another illustrative approach, a confirmation signal may be requested or sought once one of the signals is received. For example, a person may submit a visual-range transmission such as by pressing a doorbell or entering an alphanumeric combination into a keypad. Once that short-range signal is received by the operator, a signal may be sent to a long-range device to seeking to obtain a long-range verification transmission. Thus, in searching for a signal, the operator may send a notification that requests such a confirmation transmission. In such a configuration, the system may have a verification mode whereby the doorbell, keypad, or some other device configured to provide a short-range transmission may be placed in a mode that requests a verification signal from the long-range device.
In one aspect, receivers for the long-range and visual-range transmissions are located within a secure area, i.e., behind the gate or movable barrier. Further, it is anticipated that by one approach both the long-range transmission and visual-range transmission are transmitted from outside of the movable barrier or gated area. By another approach, one of the transmissions may be transmitted from behind the movable barrier and/or the gate.
So configured, a gate or other barrier entry system can be operated with increased confidence by a user remote from the gate through the receipt of two signals confirming that operation of the movable barrier operator is authorized. Accordingly, a user can open a barrier remotely upon notification or confirmation that an authorized person needs access to a secured area. Moreover, persons needing periodic access to a secured area can obtain limited access without an owner providing unlimited access for those persons.
Those skilled in the art will recognize that a wide variety of modifications, alterations, and combinations can be made with respect to the above described embodiments without departing from the scope of the invention, and that such modifications, alterations, and combinations are to be viewed as being within the ambit of the inventive concept.
Number | Name | Date | Kind |
---|---|---|---|
4573046 | Pinnow | Feb 1986 | A |
6002332 | King | Dec 1999 | A |
6404337 | Van Till et al. | Jun 2002 | B1 |
6427913 | Maloney | Aug 2002 | B1 |
20030193388 | Ghabra et al. | Oct 2003 | A1 |
20040257199 | Fitzgibbon et al. | Dec 2004 | A1 |
20060091998 | Fitzgibbon | May 2006 | A1 |
20060145811 | Nantz et al. | Jul 2006 | A1 |
20060164208 | Schaffzin et al. | Jul 2006 | A1 |
20070290792 | Tsuchimochi et al. | Dec 2007 | A1 |
20080061926 | Strait | Mar 2008 | A1 |
20080092443 | Herman et al. | Apr 2008 | A1 |
20080130791 | Fitzgibbon | Jun 2008 | A1 |
20090273438 | Sultan et al. | Nov 2009 | A1 |
20100242369 | Laird | Sep 2010 | A1 |
Number | Date | Country | |
---|---|---|---|
20110205013 A1 | Aug 2011 | US |