Elevator systems provide a convenient way to transport passengers between different levels in a building. In most situations, there are very limited, if any, restrictions on individuals using elevators, provided that they are in service. There are some situations, however, where particular elevator system control is useful for security purposes.
For example, in some settings, it is desirable to limit who can use an elevator to leave a particular area or floor of a building. A hospital setting is one example. It has become desirable to provide security in post-natal areas of hospitals to ensure that babies are only taken home by a parent or another authorized individual. Another example hospital setting is on a floor where mentally ill patients should not be allowed to leave a particular area without an appropriate escort, for example.
Other situations involving security conditions exist. For example, incarcerated individuals may need to appear in court. It is desirable to prevent such an individual from freely moving about within a courthouse without an appropriate authoritative individual accompanying the incarcerated individual.
Another example involves restricted areas within businesses that are only accessible to authorized individuals. Elevators may be used to control such access. It would be useful to be able to control elevator systems to address such situations where such security concerns arise.
An exemplary method of controlling a plurality of elevator cars includes determining that there is a security violation condition involving at least one of the elevator cars at a landing. That elevator car is prevented from moving from the landing until the condition is resolved. The other elevator cars are controlled such that they do not provide elevator service to or from the landing until the condition is resolved.
An exemplary elevator system includes a plurality of elevator cars. A controller determines that there is a security violation condition involving at least one of the elevator cars at a landing. The controller responsively prevents that elevator car from moving from the landing until the condition is resolved. The controller also provides an indication for controlling the other elevator cars such that they do not provide elevator service to or from the landing until the condition is resolved.
The various features and advantages of the disclosed example will become apparent to those skilled in the art from the following detailed description. The drawings that accompany the detailed description can be briefly described as follows.
The example elevator system 20 is designed to address a security violation condition that involves unauthorized access to or use of one of the elevator cars, for example. The security condition may be one in which an individual attempts to enter or leave a particular area using one of the elevator cars without appropriate authorization. This may apply to a post-natal hospital setting, a mental health facility, a government building such as a courthouse or a private business in which security is required to protect particular individuals or information, for example.
Individuals can use hall call buttons 36 at the landing 30 to request service to another building level. Similarly, hall call buttons 38 and 40 allow for requesting service from the landings 32 and 34, respectively.
In the example of
A plurality of indicators 52 are schematically shown associated with each access point (e.g., hoistway doors) to the elevator cars. The indicators 52 in one example provide at least one of a visible or audible indication in the event that a corresponding sensor 50 detects unauthorized use of a corresponding elevator car.
For purposes of discussion, the elevator car 28 will be considered to be one that is accessed in an unauthorized manner giving rise to a security violation condition. The sensor 50 has detected an unauthorized access to the elevator car 28, which is at the landing 32 with its doors open. The corresponding indicator 52 provides an indication regarding the security violation condition.
In the example of
Once the security violation condition has been detected, a controller 60 of the elevator car 28 prevents the elevator car 28 from leaving the landing 32 until an authorized individual resets the controller 60 to operate in a normal service mode. Once the security violation condition is resolved such as by apprehending an individual attempting to improperly leave the floor of the landing 32, an authorized individual can reset the controller 60 so that the elevator car 28 can resume normal service operation. While there is a security condition, however, the elevator car 28 is prevented from moving from the landing 32. This type of control facilitates prohibiting an individual from improperly leaving or being taken from an area, for example.
In one example, the doors of an elevator car involved in a security violation condition are held open until the situation is resolved.
Once the security violation condition is determined to exist, the controller 60 not only controls operation of the car 28. In this example, the controller 60 also provides an indication to controllers 62, 64 and 66, which are each respectively responsible for controlling operation of the other elevator cars 26, 24 and 22, respectively. In this example, the other elevator cars are allowed to continue to operate to provide passenger service between various levels within the building with the exception of the landing 32 because that is where the security violation condition has been determined to exist. The elevator car 22, for example, is controlled by the controller 66 so that it may travel between the landings 30 and 34 without stopping at the landing 32. Similarly, the elevator car 26 is allowed to travel to various landings other than the landing 32. Such control prevents an individual from utilizing another one of the elevator cars because the elevator car 28 has effectively been taken out of operation given the determination regarding the security condition.
The elevator car 24 in this example is parked at the same landing 32 where the security violation condition has occurred. In one example, the elevator car 24 is prevented from leaving the landing 32 until the security condition is resolved. If the elevator car 24 has its doors open at the landing 32 when the condition is detected, the doors are controlled to remain open and the elevator car 24 is controlled to remain at the landing 32. If the car doors of the elevator car 24 were closed, however, in some examples, the car is allowed to leave the landing 32 to provide elevator service among other landings.
The controllers 62, 64 and 66 respond to an indication of the security violation condition by leaving a normal service mode and entering a security condition service mode that includes limited use of the elevator cars based on an indication of where the security condition has occurred. The controller 60, for example, knows or determines the location of the car 28 and provides an indication of that to the other controllers as part of the communication regarding the security violation condition.
In the illustrated example, the hall call buttons 36, 38 and 40 are also controlled in a security mode when there is a security violation condition. The hall call functionality of the hall call buttons 38 in one example is disabled once the security condition at the landing 32 has been detected. This prevents any other elevator car from being scheduled to stop at the landing 32 in response to a hall call placed once a determination is made that there is a security violation condition at that landing. The hall call buttons 36 and 40 may remain functional to allow an individual to request service at the corresponding landings. The controllers 62, 64 and 66 appropriately control whether their corresponding elevator car will respond to such a service request.
In the example of
The example of
Communications between the controllers 60-66 and the other components of the example elevator system 20 may occur over line-based connections or through wireless communications, for example. Specific communication links between the various devices is not shown in the drawing. Those skilled in the art who have the benefit of this description will realize how to configure an appropriate communication arrangement to meet their particular needs for realizing the security features of the disclosed example.
Any one of the controllers 60-66 can operate as a master controller in the event that the corresponding elevator car is the one involved in the security violation condition. Any one of the controllers can provide an indication to other controllers so that all elevator cars operate in a security mode until a particular condition is resolved. Depending on where the security violation condition has occurred and the location of the responsive elevator cars, the different controllers will determine which way to respond to the security condition and operate accordingly. Each of the controllers 60-66 is individually programmed with appropriate parameters to realize a normal operating function under most circumstances and a security operation function whenever a security violation condition exists.
In the example described above, the individual controllers communicate with each other. In another example, a master dispatch controller dictates the operation of each car directly or through appropriate signaling to the controllers. The various elevator control functions used in the disclosed examples may be coordinated among multiple controllers or a single controller to meet the needs and configuration of a particular elevator system.
The preceding description is exemplary rather than limiting in nature. Variations and modifications to the disclosed examples may become apparent to those skilled in the art that do not necessarily depart from the essence of this invention. The scope of legal protection given to this invention can only be determined by studying the following claims.
Filing Document | Filing Date | Country | Kind | 371c Date |
---|---|---|---|---|
PCT/US2008/068706 | 6/30/2008 | WO | 00 | 11/3/2010 |
Publishing Document | Publishing Date | Country | Kind |
---|---|---|---|
WO2010/002378 | 1/7/2010 | WO | A |
Number | Name | Date | Kind |
---|---|---|---|
4157133 | Corcoran et al. | Jun 1979 | A |
4341288 | Bass | Jul 1982 | A |
4979594 | Begle et al. | Dec 1990 | A |
5159163 | Bahjat et al. | Oct 1992 | A |
5200583 | Kupersmith et al. | Apr 1993 | A |
5317114 | Pullela et al. | May 1994 | A |
5932853 | Friedli et al. | Aug 1999 | A |
6707374 | Zaharia | Mar 2004 | B1 |
7093693 | Gazdzinski | Aug 2006 | B1 |
7190256 | Pieper | Mar 2007 | B2 |
7529646 | Lin et al. | May 2009 | B2 |
7581622 | Amano | Sep 2009 | B2 |
8061485 | Finschi | Nov 2011 | B2 |
8151943 | de Groot | Apr 2012 | B2 |
20040262093 | Forsythe et al. | Dec 2004 | A1 |
20120160613 | Friedli | Jun 2012 | A1 |
20120241259 | Flynn et al. | Sep 2012 | A1 |
Number | Date | Country |
---|---|---|
1707526 | Oct 2006 | EP |
01236184 | Sep 1989 | JP |
04197976 | Jul 1992 | JP |
9216773 | Aug 1997 | JP |
2000255915 | Sep 2000 | JP |
2001270665 | Oct 2001 | JP |
2008143686 | Jun 2008 | JP |
2008046173 | Apr 2008 | WO |
Entry |
---|
Translation Abstract JP 01236184 A. |
International Search Report and Written Opinion of the International Searching Authority for International application No. PCT/US2008/068706 mailed Mar. 27, 2009. |
International Preliminary Report on Patentability for International application No. PCT/US2008/068706 mailed Jan. 13, 2011. |
Number | Date | Country | |
---|---|---|---|
20110048865 A1 | Mar 2011 | US |