The invention pertains to regional access control systems and methods. More particularly, the invention pertains to such systems and methods where individuals in a region are sensed and identified and responsive thereto, a security level and alarm state of the region can be adjusted.
Various types of door, or, regional access control systems are known. One such system is disclosed in US Published Patent Application No. 2008/0086758 A1 published Apr. 10, 2008 and entitled, “Decentralized Access Control Framework.” The '758 application is assigned to the Assignee hereof and incorporated by reference.
While known systems have been effective for their intended purpose, open issues remain. For example, traditional access control systems can not detect if an unauthorized cardholder has ‘piggybacked’ into a secure area, and thus they do not increase the level of security in the area and sub-areas. Further, known intrusion systems can identify if a person is in a secure area, but they can not accurately identify whether the person is a valid cardholder. This problem may occur when an employee is working late, and the intrusion system is turned on while he/she is still in the building or region being monitored. Finally, if the intrusion system is set up to disarm when a valid card holder enters an area, then the level of security in that area is reduced.
In would be desirable to address the above noted issues so as to provide more effective security to a monitored region than is currently available. It would also be desirable to do so in a way such that existing systems might be upgradable.
While embodiments of this invention can take many different forms, specific embodiments thereof are shown in the drawings and will be described herein in detail with the understanding that the present disclosure is to be considered as an exemplification of the principles of the invention, as well as the best mode of practicing same, and is not intended to limit the invention to the specific embodiment illustrated.
In a disclosed embodiment of the invention, card holders and intruders within an area are identified. Identified individuals can be classified as authorized, unauthorized or an unrecognized intruder. Control of the area, or, region can then be based on the identification and classification of the individual(s).
A method which embodies the invention classifies individuals as they enter, exit, and are present in monitored areas with different levels of security and alarm states. In accordance therewith, situations can be automatically established in which certain alarm states may be indicated, and the security level of an area may be raised or lowered automatically.
A system which embodies the invention identifies known personnel as they pass through one or more areas. Access can be provided by various forms of credentials. These include without limitation, contact-type or wireless access cards, or physiological characteristics or the like, all without limitation.
For example, battery-assisted passive (BAP) access cards can be used without departing from the spirit and scope of the invention. Such access cards can communicate with door controllers as well as access points in an area. If an access card is communicating with an access point, then it is assumed that the card holder is within a predefined area of the access point. Other forms of identification devices come within the spirit and scope of the invention.
In another example, physiological, or biometric, identification devices such as solid state cameras can be used without departing from the spirit and scope of the invention. Such identification devices can communicate with video surveillance controllers which process physiological data of individuals in an area. If the physiological data of an individual in an area matches pre-recorded data of a known individual, then it is assumed that a card holder is within a predefined area of the physiological identification device.
Additionally, the presence of a person within a given area, regardless of whether or not they are a card holder can be established. Motion, or, intrusion sensors can be incorporated in accordance with the invention. The intrusion sensor or sensors is/are positioned to monitor the same area as a corresponding access point or door controller. Hence, motion around an access point or door may be detected.
In accordance with an embodiment of the invention, areas and sub-areas that are monitored by both an access point and an intrusion sensor can be defined. When the intrusion sensor detects a person in the area, the system can place the individual into one of three categories:
An authorized individual is a person carrying a valid credential, such as a card, and is allowed in the area;
An unauthorized individual is a person carrying an identifiable credential, or card, but is not allowed in the area; and
An unrecognized individual is a person without a credential, such as an intruder.
Depending on the categorization of the individual embodiments of the invention can control the alarm state or change a security level of an area or group of areas. For example, the security level of an area and its sub-areas may remain constant if authorized personnel are moving in the area. In an aspect of the invention, an intrusion alarm system for an area would not need to be disabled when valid personnel are in the area. Any event generated from the movement of authorized personnel would be shunted and not emitted or transmitted to a common control unit or other control units, such as an intrusion controller or video surveillance controller.
In yet another aspect of the invention, the security level(s) of sub-areas may be controlled by the presence of a particular authorized individual. For example, the security level of a medicine cabinet in a pharmacy may decrease when the supervisor is within a certain distance of the cabinet, and this decrease may unlock the cabinet or allow access to trainees. The security level may then automatically increase again when the supervisor walks away from the cabinet.
In a further aspect of the invention, a high security area or sub-area may be locked down if an unauthorized person enters the area. For example, an unauthorized person may ‘piggyback’ on an authorized person through a portal and gain access to a secure area. If this occurs, in accordance with the invention, the security level of the area can automatically be increased to the level of ‘lockdown’ in the secure area and its sub-areas. Alternatively, the coverage and responses of intrusion alarm and video surveillance controllers may be altered if an unauthorized person is in a secure area.
Alternately, systems or methods which embody the invention can increase the security level of an area or group of areas upon the detection of an intruder. This event occurs when motion is detected in an area, and there is not an authorized individual in the area. The security level may increase to the level of ‘lockdown,’ and an alarm may be raised.
In another embodiment, a security level may be increased, or, an alarm may be raised in an area, or region in response to the triggering of a ‘distress’ or personal emergency event. Such events are often manually triggered by an individual needing emergency assistance in response to accidental physical danger or intentional violence. However these events may also be triggered by the occurrence of personal industrial hazards such as the activation of fall arresting gear. Distress events may be triggered in other various ways as would be understood by those of skill in the art.
In yet another embodiment, the security levels may be controlled between areas to prevent the interaction of a threat with credential carrying personnel. The threat may be identified through the intrusion system or a supplementary system that generates known alarms. For example, if a fire is identified in an area of a building, then the security level may be controlled so that credential carrying personnel may only exit the area and not enter it. The security level of other areas may also be controlled, which would funnel all credential carrying personnel to safety in the quickest way possible. Other examples of threats that may initiate this automated security level control could include armed intruders, chemical spills or contamination, all without limitation. Likewise the security level of other areas may also be controlled, so as to enable the access and infrastructure (e.g. lighting, HVAC, etc.) needed by emergency responders to such events in order to re-establish security and/or safety.
In a stand alone mode, as in
Controller 22, in addition to responding to a wireless access card 24 to provide access to the respective region, can also be in wireless communication, via repeaters 28a,b with a control unit or panel 30. It will be understood that controller 22 can operate substantially in a stand-alone mode and provide access via door D1 and feed access related data to unit 30, or can communicate information as to card 24 to unit 30 to obtain authorization to release door D1, all without limitation.
Control unit 30 can include control circuits 32. Circuits 32 can be implemented in part by a programmable processor 32a, associated control software 32b, executed by processor 32a and a wireless interface 32c for communication with controller 22. System 20 can also include a plurality of additional controllers, indicated generally at 36, which provide access to different regions than does controller 22.
One or more intrusion sensors, such as motion sensor 28 can be located in the vicinity of access controller 22, or configured as part of controller 22. Sensors such as sensor 28 can be coupled to an intrusion sensing system, such as system 40 which can also be in communication with control panel 30. A fire alarm system, such as 44, coupled to one or both systems 30, 40 can provide audible/visible alarms in the region being monitored indicative of detected individuals in the absence of authorization.
Housing 42 can also carry a short range capacitive motion sensor 48a and a longer range motion sensor, for example a passive infra-red-type sensor 48b. Other types of sensors of individuals, such as thermal sensors, solid state cameras with associated processing to detect motion, without limitation, come within the spirit and scope of the invention. Further as noted above, such sensors can but need not be incorporated into the respective access control unit.
Outputs from one or both sensors 48a, b in combination with information from an associated wireless card, such as 14, or 24, can be used by circuitry 44 to determine if a respective door, such as D or D1 should be released, or access levels changed, as described above in accordance with the invention. Such sensors can also be used, in combination with local processing, or processing by intrusion sensing system 40 in identifying intruders. Where motion as been sensed, but no authorized credential carrying personnel are in the area, the motion would have been caused by an intruder.
It will be understood that the controller 40 is exemplary only and other variations or configurations, including wired controllers come within the spirit and scope of the invention. Similarly, the particular details of the type of card being used to obtain access are not limitations of the invention. For example, RFID-type cards as well as optical or magnetic cards all come within the spirit and scope of the invention.
The access control units 22-I could be coupled (wired or wirelessly) to control unit 30. The intrusion sensors could be coupled to system 40, discussed above. Sensors 28-I can be included in, or displaced from respective access control units 22-i. As would be understood by those of skill in the art, multiple intrusion sensors can be installed throughout areas 1-4 as appropriate without departing from the spirit and scope of the invention. Regions illustrated in
Alternatives to the card based access control units, such as 22-i, also come within the spirit and scope of the invention. These include without limitation, access control units with key pads, or that recognize one or more physiological, or biometric, characteristics of an individual such as fingerprints, retinal prints, facial characteristics, speech and the like all without limitation. Sensors can include video, or other forms of cameras without limitation.
Thus embodiments of the invention can sense that an individual is present. The individual can then be identified. One or more sensors can be used without departing from the spirit and scope of the invention. The details of such sensors are not limitations of the invention.
From the foregoing, it will be observed that numerous variations and modifications may be effected without departing from the spirit and scope of the invention. It is to be understood that no limitation with respect to the specific apparatus illustrated herein is intended or should be inferred. It is, of course, intended to cover by the appended claims all such modifications as fall within the scope of the claims.
Number | Name | Date | Kind |
---|---|---|---|
5650800 | Benson | Jul 1997 | A |
5992094 | Diaz | Nov 1999 | A |
7295119 | Rappaport et al. | Nov 2007 | B2 |
20070008111 | Tice et al. | Jan 2007 | A1 |
20070083915 | Janakiraman et al. | Apr 2007 | A1 |
20070140494 | Kumoluyi et al. | Jun 2007 | A1 |
20080086758 | Chowdhury et al. | Apr 2008 | A1 |
Number | Date | Country | |
---|---|---|---|
20100245087 A1 | Sep 2010 | US |