The invention generally relates to wireless access control system. More particularly, the invention relates to a wireless access control system including a door-mounted panic bar.
The present application presents improvements on various aspects of a wireless access system that is disclosed in greater detail in the following patent applications: application Ser. No. 11/039,010, entitled “Wireless Access Control System With Energy-Saving Piezo-Electric Locking” filed on Jan. 20, 2005; application Ser. No. 10/261,933, entitled “RF Channel Linking Method and System” filed on Sep. 30, 2002; application Ser. No. 10/262,207, entitled “Energy Saving Motor-Driven Locking Subsystem” filed on Sep. 30, 2002; application Ser. No. 10/262,509 entitled “Cardholder Interface for an Access Control System” filed on Sep. 30, 2002; application Ser. No. 10/262,196, entitled “System Management Interface for Radio Frequency Access Control” filed on Sep. 30, 2002; application Ser. No. 10/262,194 entitled “Power Management for Locking System” filed on Sep. 30, 2002; application Ser. No. 10/262,507, entitled “General Access Control Features for a RF Access Control System” filed on Sep. 30, 2002; application Ser. No. 10/262,077, entitled “RF Wireless Access Control for Locking System” filed on Sep. 30, 2002; and application Ser. No. 10/262,508, entitled “Maintenance/Trouble Signals for a RF Wireless Locking System” filed on Sep. 30, 2002; application Ser. No. 10/262,249, entitled “RF Dynamic Channel Switching Method” filed on Sep. 30, 2002.
Present day door locking systems typically include a lock on a first side of a door (typically the outside of the door) and a release bar, often called a panic bar, on the second side of a door (typically the inside of the door). The panic bar is typically triggered by a user seeking to exit from an installation. Often the panic bar is connected to an alarm system, such as a security system, so that engaging the panic bar will trigger the fire alarm.
In present systems, the panic bar must be physically wired to the security alarm system. Physically wiring the panic bar to the security alarm system is often undesirable, especially when retro-wiring buildings that have already been built. That is, running connecting wires from a door installation site to a centralized security alarm system in an already built installation requires a great deal of time, effort, and disturbance. For example, holes may need to be punched in walls, door installations may need to be altered, etc.
Such activity is in addition to the expense of the actual linear feet of connecting wire that must be installed. Such wire is typically not inexpensive due to compliance with building codes and reliability issues.
Consequently, a system and method providing for the functionality of a panic bar without the additional expense of wiring is desirable. Additionally, such a system may be especially desirable when retro-wiring an installation in order to avoid costly and time-consuming modifications and installation activity.
A wireless exit kit (“WEXK”) is provided that includes a panic bar, a wireless transceiver, and a door position switch. The WEXK is preferably mounted in a door or other access point and is in wireless communication with a panel interface module (“PIM”). The PIM in turn communicates with and is preferably wired to an access control panel (“ACP”). The panic bar is user-actuatable and, when actuated, causes a request-to-exit signal to be transmitted from the transceiver to the PIM. The request-to-exit signal then travels to the ACP. Additionally, the door position switch generates a door position signal that identifies when the door changes state, for example when the door opens. The door position signal is also transmitted by the wireless transceiver to the PIM and then to the ACP. The ACP detects the door position signal and the request-to-exit signal. If the door position signal indicates a change in the position of the door from closed to open and no request-to-exit signal has been received, then the ACP initiates a security access alarm. Conversely, if a request-to-exit signal has been received by the ACP, then the ACP does not initiate an alarm upon the receipt of the door position signal.
In one form, the invention provides a wireless access system that includes a door, a door position switch, a user-actuable device, and an access control panel. The door position switch is mounted on the door such that the door position switch provides a door position indicator to indicate whether the door is open or closed. The user-actuatable device is mounted near the door. The user actuable device is configured to provide a request-to-exit signal when the user-actuatable device is actuated. The access control panel (“ACP”) can receive the door position indicator and the request-to-exit signal, and generate an alarm signal when the door position indicator indicates the door is open and no request-to-exit signal has been received.
In another form, the invention provides a method for access control. The method includes generating a door position signal at a door. The door position signal provides an indication of when the door is opened. The method also includes providing the ability to generate a request-to-exit signal at said door in response to a user-actuatable device, and initiating an alarm when said door position signal is received at an access control panel and no request-to-exit signal is received at said access control panel.
In yet another form, the invention provides an exit system that includes a door, an access device, a position sensor, and a control device. The door has a door position including a closed position in which the door is substantially closed, and an open position in which the door is substantially opened. The access device is mounted on the door, and configured to engage the door in the closed position, to disengage the door from the closed position, and to wirelessly transmit a disengaged signal after the door is disengaged from the closed position. The position sensor monitors the door position, and wirelessly transmits a second signal after the door is in the open position. The control device is spaced apart from the door, and wirelessly monitors and receives the disengaged and second signals, to determine from the disengaged and second signals if the door is securely disengaged.
In yet another form, the invention provides a method of monitoring an exit door that is movable moveable between a closed position substantially closing the exit door and an open position substantially opening the exit door. The exit door also has an access device mounted thereon. The method includes determining a door position, wirelessly transmitting the door position after the exit door is in the open position, wirelessly transmitting a disengaged signal after the exit door is disengaged from the closed position, and determining from the disengaged and second signals if the door is securely disengaged.
Other aspects of the invention will become apparent by consideration of the detailed description and accompanying drawings.
Before any embodiments of the invention are explained in detail, it is to be understood that the invention is not limited in its application to the details of construction and the arrangement of components set forth in the following description or illustrated in the following drawings. The invention is capable of other embodiments and of being practiced or of being carried out in various ways. Also, it is to be understood that the phraseology and terminology used herein is for the purpose of description and should not be regarded as limiting. The use of “including,” “comprising,” or “having” and variations thereof herein is meant to encompass the items listed thereafter and equivalents thereof as well as additional items. Unless specified or limited otherwise, the terms “mounted,” “connected,” and “coupled” and variations thereof are used broadly and encompass both direct and indirect mountings, connections, supports, and couplings. Further, “connected” and “coupled” are not restricted to physical or mechanical connections or couplings.
As should also be apparent to one of ordinary skill in the art, the systems shown in the figures are models of what actual systems might be like. As noted, many of the modules and logical structures described are capable of being implemented in software executed by a microprocessor or a similar device or of being implemented in hardware using a variety of components including, for example, application specific integrated circuits (“ASICs”). Terms like “controller” may include or refer to both hardware and/or software. Furthermore, throughout the specification capitalized terms are used. Such terms are used to conform to common practices and to help correlate the description with the coding examples and drawings. However, no specific meaning is implied or should be inferred simply due to the use of capitalization. Thus, the claims should not be limited to the specific examples or terminology or to any specific hardware or software implementation or combination of software or hardware.
Once the WEXK 130 receives the access signal from the access point location 103, the WEXK 130 wirelessly broadcasts or transmits the access signal to the PIM 120 over the wireless RF communication link 125. The PIM 120 receives the access signal and relays the access signal to the ACP 110 over the wired communication link 115.
The ACP 110 includes a database of authorized access signals. In the embodiment shown, the database is stored in a memory 140. If the access signal received from the PIM 120 is determined at a controller 144 of the ACP 110 to be a signal corresponding to an authorized user, a confirmation signal is transmitted from the transceiver 148 of the ACP 110 to the PIM 120 and then to the WEXK 130. The WEXK 130 then unlocks to provide access to the door, for example.
In the embodiment shown, the WEXK 130 also includes other components such as a reader module 152 that reads the access card as described. The WEXK 130 also includes a manual override module 156 that can be used to manually override any locking instructions received or stored at the WEXK 130. The WEXK 130 also includes an access device 160 to allow someone to access to the door, for example. A sensor 164 is positioned or mounted near the WEXK 130 such that movement of the door, for example, can be monitored. signals generated by or received at the WEXK 130 are transmitted or received at the transceiver module 168. In this way, the signals can be collected or received at the transceiver module 168, and be transmitted to other nearby receiver module, transceiver module, or interfaces such as the PIM 120.
The door position switch 250, panic bar 240, reader module 210, and trim faceplate 230 are all connected to and in communication with the transceiver module 220, as further described below. In some embodiments, the door position switch 250 is a magnetic sensor that is affixed to the door 204 and operates in conjunction with a ferromagnetic element that is positioned in a door jam 260 so that the magnetic sensor is in close proximity to the ferromagnetic element when the door 204 is closed, or engaged with the door jam 260. Preferably, the door position switch 250 generates a signal when a state of the magnetic sensor changes. For example, the door position switch 250 generates after the door is moved from an open to a closed position. Alternatively, the door position switch 250 may generate a signal indicative of a position of the door. For example, the door position switch 250 only generates a signal when the door is closed, or when the door is opened.
Additionally, in some embodiments, the trim faceplate 230 contains a lock that is controllable using an electronic signal from the transceiver 220. Specifically, the transceiver may preferably activate a motor in the trim faceplate 230 in order to engage the lock.
The operation of the reader module 210, faceplate 230, and transceiver module 220 proceed generally as described in greater detail in the above-identified cases to which the present case claims priority. For example, a user attempting to gain access may present an identifier to the reader module 210. The identifier may be a token such as an optical, magnetic, or proximity card, for example, or may be a biometric such as a fingerprint. The reader module 210 receives the identifier and passes the identifier to the transceiver module 220. The transceiver module 220 then wirelessly transmits data representing the identifier to the PIM 120 (of
The ACP 110 then makes a determination to grant or deny access at the controller 144. The controller 144 (of
In addition to the above operation, the WEXK 200 adds the panic bar 240. The panic bar 240 is similar to commonly used commercially available panic bars. However, the panic bar 240 of the present embodiment is able to send signals to the transceiver module 220. Specifically, the panic bar 240 communicates with the transceiver module 220, preferably via a connecting wire.
The panic bar 240 operates in conjunction with the door position switch 250 to cause an access control alarm to be initiated when unauthorized access is obtained through the door 204. More specifically, when the panic bar 240 is pressed, the panic bar 240 generates a request-to-exit signal (“RTES”), which may also be called a panic bar signal. The request-to-exit signal is received by the transceiver 220 and relayed to the ACP 110 through the PIM 120.
The transceiver 220 continuously monitors the door position switch 250. When the door is opened, the door position switch 250 generates a door open signal (“DOS”) which is sent from the transceiver 220 to the ACP 110 through the PIM 120. The transceiver 220 is also continuously monitoring for other signals such as the request-to-exit signal generated by the panic bar 240, or an input to the reader module 210, as described above.
The ACP 110 receives both the request-to-exit signal and the door open signal, and then makes a determination of whether there has been a security breach. That is, if the ACP 110 receives a door open signal from the door position switch 250, but the ACP 110 has not received a request-to-exit signal from the panic bar 240, the ACP 110 generates a security breached signal or an access control alarm. In other words, if the door 204 is opening, but the panic bar 240 has not been depressed, the ACP 110 determines that security has been breached and generates an alarm.
On the other hand, if the ACP 110 has processed an access request through the reader module 210 and has caused the door to be opened, no security alarm is generated. That is, if the ACP 110 has purposely unlocked the door, the ACP 110 does not generate an alarm when the door is opened, even if no request-to-enter signal is received from the panic bar 240.
In some embodiments, when the key override 235 in the trim faceplate 230 is used, the ACP 110 still generates an alarm unless a successful access request has been received by the reader module 210. In other embodiments, the ACP 110 may be configured not to generate an alarm if the key override 235 in the trim faceplate 230 is used. That is, once the transceiver 220 has detected that the key override 235 is used, the alarm remains inactive even though a request-to-exit signal from the panic bar 240 has not been received.
In the embodiment shown, when the IDS is present in the signal as determined at block 460, the ACP 110 determines if the IDS is valid for access at block 464. Once a decision is made, the ACP 110 sends the decision along with its instructions to the PIM 120 at block 468 for subsequent wireless transmission back to the transceiver 220 at block 472. If the decision is to grant access or to unlock the door 204 as determined at block 476, the door 204 is unlocked at block 480. Otherwise, if the decision is to deny access as determined at block 476, the door 204 remains unlocked, and the process 400 repeats.
However, if no identification is present in the signal as determined at block 460, the process 400 continues to monitor if the signal includes a DOS at block 484. If a DOS is present, the process 400 continues to determine if an RTES is present at block 488. In the embodiment shown, if the process 400 determines that an RTES is absent, the process 400 optionally checks to determine if the DOS is sent during valid business hours at block 492. If the DOS is sent during valid business hours, the process 400 repeats. Otherwise, if the DOS is not sent during valid business hours, a security breached signal is generated at the ACP 110 at block 496, the alarm is activated at block 500, and data relating to the breach is recorded at block 504.
If the signal does not include a DOS as determined at block 484, the process 400 determines if a RTES is present such as in an override situation sent from the ACP 110 at block 508. If there is no RTES as determined at block 508, the process 400 repeats. Otherwise, the door 204 is unlocked at block 480 when the signal includes an RTES.
Reciting the operation of the panic bar 240 another way, when the panic bar 240 is engaged, the panic bar 240 mechanically opens the door to provide immediate egress from the installation, for example, in case of an emergency. When the panic bar 240 is depressed, the panic bar 240 also generates an electrical request-to-exit signal that travels from the panic bar 240 to the transceiver 220 using a wired connection.
Ignoring for the moment the operation of the reader module 210 and trim faceplate 230, the transceiver 220 waits to receive signals from the door position switch 250 and the panic bar 240. Any signals received from the door position switch 250 or the panic bar 240 by the transceiver are then wirelessly transmitted to the PIM 120. This signals received by the PIM 120 are then preferably transmitted to the ACP 110 using a wired connection.
If the ACP 110 receives a door open signal from the door position switch 250 and no request-to-exit signal has been received from the panic bar 240, then the ACP 110 initiates an access control alarm. Conversely, if the ACP 110 receives a door open signal from the door position switch 250 and a request-to-exit signal has already been received from the panic bar 240, then the ACP 110 does not initiate an access control alarm.
Once the ACP 110 generates an access control alarm, an indication is preferably displayed of the location of the origin of the panic bar/alarm signal. For example, the ACP 110 may display a schematic map of the installation. The location of the access point at which the present alarm signal originated may then be displayed on the schematic map of the installation.
Alternatively, when the ACP 110 receives the alarm signal, the ACP 110 may initiate an audible alarm indicating a breach of security, or the ACP 110 may generate an inaudible alarm, such as are typically used for alerting law enforcement.
Additionally, the ACP 110 preferably records data with regard to the alarm such as the location of the alarm and the time of the alarm. Additionally, the length of time that the door remained open during the alarm may also be determined by the ACP 110 and recorded. That is, the ACP 110 may record the length of time between receipt of the door open signal and receipt of the “door closed” signal.
Alternatively, the ACP 110 may be configured to differentiate its response based on a variable such as the time of day, for example. For example, it may be desirable to leave the door unlocked and accessible from both sides during business hours, but then not permit access from the outside after business hours. Consequently, the ACP 110 may be configured not to initiate an alarm signal during business hours if a door open signal is received from the door position switch 250 and no request-to-exit signal has been received from the panic bar 240 (and no other signal, such as from the key override 235 or reader module 210 has been received). Conversely, after business hours, the ACP 110 may generate an alarm if a door open signal is received from the door position switch and no request-to-exit signal has been received from the panic bar 240 (and no other signal, such as from the key override 235 or reader module 210 has been received).
Additionally, the WEXK 130 needs not be implemented in a network solely comprising a plurality of WEXK's. For example, other types of access systems, as described in the patent applications incorporated by reference above, may also be included in an access control network including WEXK's.
Also, although a panic bar is illustrated in the embodiment of
In an alternate embodiment, the transceiver 220 may be equipped to make a determination of whether a request-to-exit signal has been received in conjunction with a door open signal. For example, the transceiver 220 may have a default mode of operation for use in case wireless communication with the PIM 120 is blocked. In the default mode, the transceiver 220 may sense whether the door 204 has been opened without a request-to-exit signal and, if so, to generate a local alarm in communication with the transceiver 220. If communication with the PIM 120 is reestablished, the transceiver 220 will communicate the alarm condition to the PIM 120 to be relayed to the ACP 110.
While particular elements, embodiments and applications of the present invention have been shown and described, it is understood that the invention is not limited thereto since modifications may be made by those skilled in the art, particularly in light of the foregoing teaching. It is therefore contemplated by the appended claims to cover such modifications and incorporate those features which come within the spirit and scope of the invention.
Various features and advantages of the invention are set forth in the following claims.
This application is a continuation in part of application Ser. No. 11/039,010, entitled “Wireless Access Control System With Energy-Saving Piezo-Electric Locking” filed on Jan. 20, 2005, which claims priority to application Ser. No. 10/261,933, entitled “RF Channel Linking Method and System” filed on Sep. 30, 2002; application Ser. No. 10/262,207, entitled “Energy Saving Motor-Driven Locking Subsystem” filed on Sep. 30, 2002; application Ser. No. 10/262,509 entitled “Cardholder Interface for an Access Control System” filed on Sep. 30, 2002; application Ser. No. 10/262,196, entitled “System Management Interface for Radio Frequency Access Control” filed on Sep. 30, 2002; application Ser. No. 10/262,194 entitled “Power Management for Locking System” filed on Sep. 30, 2002; application Ser. No. 10/262,507, entitled “General Access Control Features for a RF Access Control System” filed on Sep. 30, 2002; application Ser. No. 10/262,077, entitled “RF Wireless Access Control for Locking System” filed on Sep. 30, 2002; application Ser. No. 10/262,508, entitled “Maintenance/Trouble Signals for a RF Wireless Locking System” filed on Sep. 30, 2002; application Ser. No. 10/262,249, entitled “RF Dynamic Channel Switching Method” filed on Sep. 30, 2002; and U.S. Provisional Patent Application No. 60/537,922, entitled “Wireless Access Control System With Energy-Saving Piezo-Electric Locking” filed on Jan. 20, 2004. This application also claims the benefit of U.S. Provisional Application Ser. No. 60/613,050 filed on Sep. 25, 2004, the entire content of which is incorporated by reference herein.
Number | Date | Country | |
---|---|---|---|
60537922 | Jan 2004 | US | |
60613050 | Sep 2004 | US |
Number | Date | Country | |
---|---|---|---|
Parent | 11039010 | Jan 2005 | US |
Child | 11234007 | Sep 2005 | US |