This invention relates to a security system, and more particularly to a security system having a number of unique features.
Various security systems, such as access control systems, are known in the art. Typically, an access control security system includes a controller at each access point, such as a door or gate, which interfaces with the access point to selectively allow or deny access to a certain area that is accessible through the access point. The controller is typically hardwired in a network run by a server, and acts in accordance with commands provided by the server to allow or deny requests for access through the access point.
While systems such as this are functional, they entail a number of drawbacks. For example, when the controller at a certain access point fails or otherwise becomes inoperable, it is necessary to send a skilled service technician with a replacement controller to the site at which the access point controller requires replacement. The technician must disconnect wires and cables from the failed controller, remove it from the wall, mount the new controller to the wall, and then connect the wires and cables to the new controller. This can be a laborious and time consuming exercise. In addition, the operator of the facility must maintain an inventory of each type of controller installed in the system to ensure that a replacement controller is available when required.
The present invention is designed to overcome these and other drawbacks in the prior art. In accordance with one aspect of the present invention, a security system includes a number of security controllers, each of which includes a removable and replaceable security control module. Each security control module is interchangeable with other security control modules in the security system. In one form, each security controller includes a housing within which the removable and replaceable security control module is contained. Representatively, the housing is mounted to a wall, and one or more cables from security-controlled components are located within the wall and have ends that extend from the wall into an interior defined by the housing. The ends of the one or more cables are adapted for connection to the security control module. Each security control module may include a first connector for connecting the security module in a communication system and a second connector for receiving inputs from and providing outputs to a security component controlled by the security controller. Representatively, each security control module may further include a third connector for receiving inputs from or providing outputs to an auxiliary device other than the security component.
In accordance with another aspect of the present invention, a security system includes a central control or server and a number of individual security controllers, each of which is associated with a security component at an individual security control location; and an auxiliary device that is interconnected with at least one of the security controllers. The auxiliary device provides an input to the security controller or receives an output from a security controller independent of the security component. Each security controller includes a removable and replaceable security control module, and each security control module includes a first connector for connecting the security module in a communication system interconnected with the central control or server, a second connector for receiving inputs from and providing outputs to the security component controlled by the security controller, and a third connector for receiving inputs from or providing outputs to the auxiliary device.
In accordance with yet another aspect of the invention, a security system includes a number of security controllers, each of which includes an accelerometer for providing a tamper evident feature. Representatively, each security controller includes a housing and a removable and replaceable security control module contained within the housing, with the accelerometer being contained within the security control module.
The security system in accordance with the present invention may be used in any number of applications. For example, the security system may be used for a number of individual control points in a single building. Alternatively, the security system may be used for multiple individual control points for a number of buildings in one location. Further, the security system may be used for multiple individual control points in multiple buildings in multiple locations.
These and other objects, advantages, and features of the invention will become apparent to those skilled in the art from the detailed description and the accompanying drawings. It should be understood, however, that the detailed description and accompanying drawings, while indicating preferred embodiments of the present invention, are given by way of illustration and not of limitation. Many changes and modifications may be made within the scope of the present invention without departing from the spirit thereof, and the invention includes all such modifications
A representative embodiment of the subject matter disclosed herein is illustrated in the accompanying drawings in which like reference numerals represent like parts throughout, and in which:
In describing the representative embodiments of the invention which are illustrated in the drawings, specific terminology will be resorted to for the sake of clarity. However, it is not intended that the invention be limited to the specific terms so selected and it is understood that each specific term includes all technical equivalents which operate in a similar manner to accomplish a similar purpose. For example, the word “connected,” “attached,” or terms similar thereto are often used. They are not limited to direct connection but include connection through other elements where such connection is recognized as being equivalent by those skilled in the art.
A representative application of the security system in accordance with the present invention is shown in
In a representative application as shown, the servers S1, S2 and operator controls C1, C2 communicate with the security control structures through a computer network, which representatively may be the Internet. The locations L1 and L2 may be on the same grounds, or alternatively may be within the same city or region, or may be geographically far removed from each other, such as in different cities or even on different continents.
Within each security control structure, such as within each building B1, B2, B3 and B4, there are one or more access control points which can operate individually and/or simultaneously.
As shown in
The construction of security controller 24 facilitates quick and easy installation, service, repair and/or replacement. Specifically, in the event the control module 40 of a security controller 24 requires service, repair or replacement, the user simply disengages connectors 52, 56a, 56b, 58a and 58b as shown in
Communication cable 50 establishes communication between control module 40 and the network in which the security system of the present invention is connected. In this manner, control module 40 is able to receive signals from, and transmit signals to, the security system servers such as S1, S2 (
While the overall construction of security controller 24 is unique in that control module 40 is adapted for quick and easy installation, removal and replacement, the operation of security controller 24 in connection with the access control point, such as door D, is relatively conventional. Security controller 24 functions to operate in conjunction with access controller 22 to selectively allow door D to be opened by or for authorized users.
Auxiliary i/o connectors 62a, 62b enable control module 40 to receive signals from and communicate signals to one or more auxiliary devices. The types of auxiliary devices that can be connected to control module 40 via connectors 62a, 62b are virtually unlimited and can be operated individually and/or simultaneously. In this manner, a wide variety of functions and operations can be integrated with the security system of a building. For example, auxiliary device 28 may be a sensor associated with a machine or piece of equipment located within a room. In the event the sensor determines that operating characteristics of the machine or piece of equipment are not within acceptable limits, control module 40 can send a signal through communication cable 50 that is processed by one of the servers. Appropriate personnel can then be alerted or the machine or piece of equipment can be shut down. In another example, auxiliary device 28 may be an elevator controller. In an arrangement such as this, when a person with certain credentials is detected at the door D, such as by use of a card reader or other identifier as is known, the access controller 22 is operated and at the same time a signal is sent to the elevator to bring the elevator cab to a certain location. In another example, the auxiliary device 28 may be a garage door opener so that a garage door is automatically opened when a certain person is allowed to pass through the door D. Another example may involve automatic operation of a security camera or the like in response to an input to or output from an access point controller 22. The device 28 may alternatively be a temperature sensor, so that the temperature of a sensed condition or parameter, such as room temperature, machine operating temperature, etc. can be monitored for compliance with established parameters or ranges. User-defined commands can be sent directly to any IP device in the system in response to an event.
This aspect of the present invention provides numerous advantages, in that signals to and from virtually any machine, equipment or device can be provided to and from the security system controller 24, and therefore can be integrated or coordinated with the various components of the security system. Accordingly, an event at any particular location or node in the security system may be used to trigger another event or operation at any other location, either locally or at a remote location. It is understood, however, that the signals provided to the security system controller 24 from the auxiliary machine, equipment or device need not necessarily be integrated or coordinated with the security system components, and instead the security system network may simply be used to transmit or receive signals to and from the auxiliary machine, equipment or device.
The circuitry contained within control module 40 allows any control module 40 to be used with a security controller 24 at any location, and for any purpose, within the security system. In this manner, when necessary, a user can simply swap out one control module 40 for another control module 40, and the replacement control module 40 can then perform all the operations and functions of the original control module 40.
The i/o connectors 60a, 60b and 62a, 62b have both analog input as well as digital input and output capabilities. This enables the control module 40 to receive and transmit digital signals and to receive analog signals from the devices with which the connectors 60a, 60b and 62a, 62b are connected. The control module 40 may also receive digital signals from devices with which the connectors 60a, 60b and 62a, 62b are connected.
Accelerometer 94 provides an input signal when control module 40 is moved. The input signal from accelerometer 94 is used as a tamper-indicating feature. For example, in connection with an operating and installed control module 40, any movement of the control module 40 that is sensed by operation of accelerometer 94 may be communicated to the security system control. Appropriate action can then be taken.
Control module 40 will be configured upon installation. In this regard, when a control module 40 is installed initially or as a replacement in a security controller 24 and is connected to the network via engagement of cable 50, the installed control module 40 is programmed to immediately broadcast a signal over the network that indicates its presence within the network. The server, which has stored the settings and the parameters for all of the security controllers 24 in the security system, can then communicate with the installed control module 40 so as to provide the installed control module 40 with the appropriate settings and parameters for that security control point. Alternatively, when a new security controller 24 is being installed in the security system, such as when a new security control point is added due to facility expansion, remodeling or the like, the new security controller 24 includes a new control module 40. When the new control module 40 is connected in the security system, it immediately broadcasts a signal over the network that indicates its presence within the network. The server then detects the new security module 40, and the operator can then configure the settings of the new security module 40 for the security control point at which the new security module 40 is installed. Alternatively, the settings for the new control module 40 can be programmed into the control module 40 at the site of the new security controller 24.
In the event the system server(s), such as S1 and S2, become inoperable for any reason, the individual security controllers 24 in the system continue to operate locally according to the security settings programmed into the control module 40. When the server(s) are back on line, data stored locally by the control module 40 for the period of server inoperability is uploaded to the server(s). In addition, the security controllers 24 in the security system are able to communicate with each other through the network without the presence of a server. This feature enables operation of the security system and cross-control of various functions in the event the system server(s) become inoperable. Representatively, each security controller 24 may create user defined TCP/IP packets within the control module 40 without server intervention, which can be stored and/or transmitted.
The modular construction of the security controller 24 allows a facility operator to quickly and easily replace a security controller 24 without the need for downtime and/or expensive service calls. When a security controller 24 requires service, the facility operator simply dispatches a person (who need not necessarily be a trained technician) to the site with a replacement control module 40, which may be taken from a stock supply of identically constructed control modules 40. The person then simply removes the cover 32, disconnects the existing control module 40 and replaces it with a replacement control module 40, connects the cables 26a, 26b, 30a, 30b and 50 to the replacement control module 40, and reinstalls the cover 32. The control module 40 that has been replaced can then be returned for service. In the meantime, the replacement control module 40 communicates its presence in the system and is programmed, and is then used to operate the security control point according to the settings stored in the server for that security control point.
The system of the present invention provides a number of unique functions, features and capabilities. For example, and without limitation, the system may be used to monitor the current draw of a door lock or strike to diagnose its condition using a comparison to selected baseline values over a selected period of time. The system has the capability to notify the operator when point values of certain characteristics or parameters exceed programmed limits. Such events can be treated as alarm events. The system may also be used to monitor the total power consumption of a specific node including the devices which receive power from that node over a designated time period. By monitoring operating characteristics of equipment or devices interconnected with the node, variations beyond normal operating limits may be identified as events that can be managed as alarm events, which can be used to prompt a programmed response from the system and its operator. The system has the ability to monitor the voltage of designated input points to detect connection aging and other deterioration events for a selected time period. Information from such monitoring can be made available in trending formats with which the system can provide periodic evaluation of the monitored points for threshold adjustment, maintenance, resetting to the original condition values, or to replace the monitored equipment.
While the system has been shown and described respect to control via a CPU, it is contemplated that security controller 24 may incorporate a field programmable gate array (FPGA) system for configuring the controller 24 upon initial installation and/or replacement.
It should be understood that the invention is not limited in its application to the details of construction and arrangements of the components set forth herein. The invention is capable of other embodiments and of being practiced or carried out in various ways. Variations and modifications of the foregoing are within the scope of the present invention as defined in the appended claims. It also being understood that the invention disclosed and defined herein extends to all alternative combinations of two or more of the individual features mentioned or evident from the text and/or drawings. All of these different combinations constitute various alternative aspects of the present invention. The embodiments described herein explain the best modes known for practicing the invention and will enable others skilled in the art to utilize the invention.
This application claims the benefit of U.S. Provisional Application No. 61/502,658.
Number | Name | Date | Kind |
---|---|---|---|
2709249 | Sperry | May 1955 | A |
5854831 | Parsadayan | Dec 1998 | A |
20020183882 | Dearing et al. | Dec 2002 | A1 |
20030071715 | Lavelle | Apr 2003 | A1 |
20030095385 | Holliday | May 2003 | A1 |
20060103520 | Clark | May 2006 | A1 |
20080071426 | Perez et al. | Mar 2008 | A1 |
20080256445 | Olch et al. | Oct 2008 | A1 |
20090058641 | DeMarco | Mar 2009 | A1 |
20090231091 | Burwell et al. | Sep 2009 | A1 |
20100032332 | Davis et al. | Feb 2010 | A1 |
20100237984 | Zenaty | Sep 2010 | A1 |
20110167268 | Baykal | Jul 2011 | A1 |
20130120138 | Hicks, III | May 2013 | A1 |
Entry |
---|
European Appln. No, 12803902.1, Supplementary European Search Report dated Feb. 9, 2015, 7 pages. |
Number | Date | Country | |
---|---|---|---|
20130003318 A1 | Jan 2013 | US |
Number | Date | Country | |
---|---|---|---|
61502658 | Jun 2011 | US |