The field of the invention relates to moveable barrier operators and, more specifically, to actuating moveable barrier operators.
Different types of moveable barrier operators have been sold over the years and these barrier operator systems have been used to actuate various types of moveable barriers. For example, garage door operators have been used to move garage doors and gate operators have been used to open and close gates.
Such barrier movement operators may include various mechanisms to open and close the barrier. For instance, a wall control unit may be coupled to the barrier movement operator and sends signals to a head unit thereby causing the head unit to open and close the barrier. In addition, operators often include a receiver unit at the head unit to receive wireless transmissions from a hand-held code transmitter or from a keypad transmitter, which may be affixed to the outside of the area closed by the barrier or other structure.
The keypads and other transmitter devices may utilize various types of interfaces to allow a user to actuate the barrier and these different interfaces may provide security features that prevent unauthorized users from accessing the system. In one example, a fingerprint sensing device can be used to allow the user to actuate the barrier and to provide security when conducting barrier actuation operations.
In these previous fingerprint-based barrier actuation systems, an administrator solely controlled access to the system. More specifically, this single administrator had complete control when adding new users and deleting current users.
Unfortunately, problems relating to the single administrator architecture of previous systems have occurred. For example, if the administrator was not present or available to conduct their duties and/or was uncooperative in the performance of their duties, the ability to add or delete users was unavailable. For example, in households undergoing a divorce, the administrator (i.e., either the husband or wife) was sometimes unwilling to cooperate with the other person in order to add or delete users. These problems created user frustration with the system and situations where a user could not gain access to the system.
In other situations when actuating a moveable barrier, it is sometimes necessary or desirable to alter or adjust the actuation of the barrier after a previous actuation has been selected and/or is being implemented. For example, when a door is in the process of being opened, it may be later decided that the movement of the door should be halted or reversed. In previous fingerprint-actuated systems, the initial reading and verification of a fingerprint allowed a door to be opened. However, in order to close or halt movement of the door, a second time-consuming fingerprint reading and verification were required to halt the movement of the door. This second required reading and verification created problems in emergency situations where quick action (e.g., halting movement of the door when an object is in the pathway of the door) was required. As with the other problems described above, user frustration with the system developed and the efficiency of the system decreased in these situations.
Approaches are provided whereby once a previously learned first fingerprint has been verified, within a predetermined period of time another command can be sent to the barrier operator by sensing a second fingerprint of any user without having to verify the second fingerprint. In so doing, valuable time is saved in sending the additional command. Advantageously, these approaches enhance the safety of the system, lead to more efficient system operation, and significantly reduce or eliminate user frustration with the system.
In many of these approaches, the presence of a first human fingerprint is detected at the fingerprint scanner. The first human fingerprint is analyzed to determine whether the first human fingerprint has been previously learned by the barrier movement operator. When the first human fingerprint is determined to be previously learned, a first command is sent to actuate a moveable barrier operator.
Within a predetermined time period after the first human fingerprint has been determined to be previously learned, the presence of a second human fingerprint is sensed at the fingerprint scanner. Without analyzing the second fingerprint, a second command is sent to actuate the moveable barrier operator. The first fingerprint and the second fingerprint may be from the same or different users.
The first command and the second command may be selected from a variety of different commands. For example, the first command and the second command may be an open command, a close command, or a halt movement command. Other examples of commands are possible.
Thus, approaches are provided that allow any user to issue one or more commands to a moveable barrier operator within a predetermined amount of time after a previously verified fingerprint has been sensed. In so doing, the safety of the system is improved while still maintaining adequate system security.
Skilled artisans will appreciate that elements in the figures are illustrated for simplicity and clarity and have not necessarily been drawn to scale. For example, the dimensions and/or relative positioning of some of the elements in the figures may be exaggerated relative to other elements to help to improve understanding of various embodiments of the present invention. Also, common but well-understood elements that are useful or necessary in a commercially feasible embodiment are often not depicted in order to facilitate a less obstructed view of these various embodiments of the present invention. It will further be appreciated that certain actions and/or steps may be described or depicted in a particular order of occurrence while those skilled in the art will understand that such specificity with respect to sequence is not actually required. It will also be understood that the terms and expressions used herein have the ordinary meaning as is accorded to such terms and expressions with respect to their corresponding respective areas of inquiry and study except where specific meanings have otherwise been set forth herein.
Referring now to
The fingerprint reading apparatus 102 is any device that is capable of reading and analyzing fingerprints. In this regard, the fingerprint reading apparatus 102 may be a scanner that reads and authenticates fingerprints according to any known approach or technique. For instance, the fingerprint reading apparatus 102 may include sensors to detect a fingerprint and a processor or processing device to compare the fingerprint to previously verified or learned fingerprints. The fingerprint reading apparatus 102 may be a fixed device (e.g., a keypad coupled to a building) or a portable device (e.g., a wireless transmitter).
The moveable barrier 108 may be any type of barrier including a garage door, a swinging door, a sliding gate, a swinging gate, or shutters. The moveable barrier operator 106 can be any type of operator used to actuate a barrier such as a garage door operator or gate operator. Other types of barriers and barrier operators are possible.
In one example of the operation of the system of
When the first human fingerprint is determined to have been previously learned, a first command is sent to actuate the moveable barrier operator 106. Within a predetermined time period after the first human fingerprint has been determined to be previously learned, the presence of a second human fingerprint is sensed at the fingerprint reading apparatus 102. Without analyzing the second fingerprint, a second command is sent to actuate the moveable barrier operator 106. Alternatively, the second command can be originated by setting a switch (or other input device) and the fingerprint sensor can be used for other purposes. The first fingerprint and the second fingerprint may be from the same or different users.
The predetermined time period selected may vary based upon the needs of the user or system. In one example, the time period may correspond to the time needed to open or close the door. In still other examples, the time period may be much longer, such as hours.
The first command and the second command may be selected from a variety of different commands. For example, the first command and the second command may be open commands, close commands, or halt movement commands. In some examples, the first command and the second command are different commands. However, in other situations, the first and second commands may be the same command.
In another example of the operation of the system of
Subsequently, the second fingerprint is re-sensed and authenticated by the fingerprint reading apparatus 102 and a third fingerprint of a third user is responsively sensed and stored at the fingerprint reading apparatus 102. The activation code is transmitted to the moveable barrier operator 106 upon subsequent authentications of the third fingerprint.
In this way, a trusted group of fingerprints can be created with each fingerprint associated with a different user. Once a fingerprint is included in the trusted group, that fingerprint can be used to add additional fingerprints (i.e., associated with new users) to the group and/or remove fingerprints (i.e., users) from the group. In other words, a single administrator is not used and any authorized user can add or delete other users.
Various modes of operation may also be used within the system. For example, a storage mode may be selected and entered after authenticating either the second fingerprint or the third fingerprint. In one example, the storage mode (or other modes) can be selected with actuators (e.g., buttons or switches) at the fingerprint reading apparatus 102.
In other approaches, all of the fingerprints stored at the fingerprint reading apparatus 102 may be erased and the activation code may be changed. In still other examples, one or more (but not all) of the fingerprints in storage in the memory of the fingerprint reading apparatus 102 can be erased and the activation code can be changed. In other examples, only the fingerprints are erased and the activation code is left unchanged.
The activation codes may assume a variety of forms. For example, the activation codes may be rolling codes or fixed codes. Other examples of codes and code combinations are possible.
In other approaches, the first fingerprint can be sensed and stored and an activation code authorized. Thereafter, the second fingerprint can be sensed and stored. Then, the first fingerprint can be re-sensed and authenticated. The activation code may be sent to the barrier operator based upon subsequent authentications of the second fingerprint. A third fingerprint can be subsequently sensed and stored, and the second fingerprint can be re-sensed and authenticated. Thereafter, the activation code is sent to the moveable barrier operator upon subsequent authentications of the third fingerprint.
In still other examples, the reading of the fingerprints by the system is order-independent. More specifically, a first fingerprint of a first user may be sensed and stored in memory at the fingerprint reading apparatus 102 and an authorization may be made to transmit the activation code and enable future activation code transmissions. Subsequently, a second fingerprint is sensed and the first fingerprint authorizes the storing of the second fingerprint at the fingerprint reading apparatus 102.
The activation code is transmitted to the moveable barrier operator 106 upon subsequent authentications of the second fingerprint by the fingerprint reading apparatus 102. Subsequently, a third fingerprint is sensed and the second fingerprint authorizes the storage of the third fingerprint at the fingerprint reading apparatus 102. The activation code is transmitted to the moveable barrier operator 106 upon subsequent authentications of the third fingerprint.
Multiple new entries can also be made with a single authorization. For example, a first fingerprint may be sensed and stored in memory at the fingerprint reading apparatus 102 thereby authorizing the system to transmit an activation code and enabling fingerprint authorizations. Subsequently, a second fingerprint of a second user and a third fingerprint of a third user are sensed at the fingerprint reading apparatus 102 and the first fingerprint authorizes the storage of the second fingerprint and the third fingerprint. The activation code is transmitted upon subsequent authentications of either the second fingerprint or the third fingerprint.
Referring now to
If the answer at step 206 is affirmative, then at step 208, a command is sent to the moveable barrier operator and a timer is started and set to expire after a predetermined time period has elapsed. The command may be any type of command such as a command to activate the barrier. The nature of the command may depend upon the state of the barrier/ barrier operator. For example, an open command may be sent if the barrier is closed or a close command may be sent if the barrier is open. At step 210, it is determined if the predetermined time period of the timer has expired. If the answer is affirmative, execution ends. If the answer is negative, execution continues at step 212.
At step 212, the presence of a second fingerprint is sensed. This fingerprint can be of any user. At step 214, a command is sent to the moveable barrier operator without verifying the second fingerprint. As before, the command may be any type of command such as a command to activate the barrier. The nature of the command may depend upon the state of the barrier/barrier operator. For example, an open command may be sent if the barrier is closed or a close command may be sent if the barrier is open. Execution then continues with step 210 as described above.
Referring now to
At step 310, the activation code is transmitted to a moveable barrier operator upon subsequent authentications of the second fingerprint. At step 312, the second fingerprint is re-sensed and authenticated and a third fingerprint of a third user is sensed, authenticated and stored in the memory. At step 314, the third fingerprint is re-sensed and authenticated. At step 316, the activation code is transmitted to the barrier operator upon subsequent authentications of the third fingerprint.
Referring now to
In other approaches, the reading of the fingerprints is order-independent. More specifically, a first fingerprint of a first user may be sensed and stored in memory and an authorization may be made to transmit the activation code and enable future fingerprint transmissions. Subsequently, a second fingerprint is sensed and the first fingerprint authorizes the storing of the second fingerprint. The activation code may be transmitted upon future authentication of the second fingerprint.
Multiple new entries can also be made with a single authorization. For example, a first fingerprint may be sensed and stored in memory authorizing the system to transmit an activation code and enabling fingerprint authorizations. Subsequently, a second fingerprint of a second user and a third fingerprint of a third user are sensed and the first fingerprint authorizes the storage of the second fingerprint and the third fingerprint. The activation code is transmitted upon subsequent authentications of either the second fingerprint or the third fingerprint.
Referring now to
At step 510, at a subsequent time, the fingerprints are re-sensed and re-authenticated. At step 512, a new activation code is used. In one example, this may be a new rolling code sequence.
Referring now to
In one example of the operation of the device 600, the controller 604 is adapted and configured to analyze and determine whether the first human fingerprint has been previously learned by the barrier movement operator. When the first human fingerprint is determined to be previously learned, a first command 616 (having an activation code) is sent to actuate a moveable barrier operator. Within a predetermined time period after the first human fingerprint has been determined to be previously learned, the presence of a second human fingerprint is sensed at the fingerprint sensing apparatus 602. Without analyzing the second fingerprint, a second command 618 is sent to actuate the moveable barrier operator. The first fingerprint and the second fingerprint may be from the same or different users.
In another example of the operation of the device of
As described elsewhere in this specification, the controller 604 can also be arranged and configured to read fingerprints in an order-independent sequence. In still other examples, multiple fingerprints can be sensed and stored in the memory 608 based upon a single fingerprint authorization.
Those skilled in the art will recognize that a wide variety of modifications, alterations, and combinations can be made with respect to the above described embodiments without departing from the spirit and scope of the invention, and that such modifications, alterations, and combinations are to be viewed as being within the scope of the invention.
SYSTEM AND METHOD FOR OPERATING A MOVEABLE BARRIER OPERATOR being filed on the same date as the present application and having attorney docket number 5569/90366, the contents of which are incorporated herein by reference in its entirety.