CA2410016A1 - Access control system having a programmable automatic notification feature - Google Patents

Access control system having a programmable automatic notification feature Download PDF

Info

Publication number
CA2410016A1
CA2410016A1 CA002410016A CA2410016A CA2410016A1 CA 2410016 A1 CA2410016 A1 CA 2410016A1 CA 002410016 A CA002410016 A CA 002410016A CA 2410016 A CA2410016 A CA 2410016A CA 2410016 A1 CA2410016 A1 CA 2410016A1
Authority
CA
Canada
Prior art keywords
access
control unit
main control
remote
access control
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Abandoned
Application number
CA002410016A
Other languages
French (fr)
Inventor
John F. Ahlstrom
Wayne B. Dow
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Chamberlain Group Inc
Original Assignee
Chamberlain Group Inc
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Chamberlain Group Inc filed Critical Chamberlain Group Inc
Publication of CA2410016A1 publication Critical patent/CA2410016A1/en
Abandoned legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M11/00Telephonic communication systems specially adapted for combination with other electrical systems
    • H04M11/02Telephonic communication systems specially adapted for combination with other electrical systems with bell or annunciator systems
    • H04M11/025Door telephones
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M11/00Telephonic communication systems specially adapted for combination with other electrical systems
    • H04M11/04Telephonic communication systems specially adapted for combination with other electrical systems with alarm systems, e.g. fire, police or burglar alarm systems

Abstract

An access control system such as a telephone entry system (TCS) capable of seamlessly transmitting facsimile log reports to remote locations for storage.
Alarms are selected such that upon an occurrence of an alarm, the access control system will send a fax to the selected phone number with information about the alarm situation and, for example, all the transaction information within the memory. Alarm situations can include, for example, a number of transactions, a specific person accessed, or code being used, a specific time of day, a specific time since the last alarm situation, a door staying open, and/or a door being forced open. Log information may be sent to an office located in a building that is remote from the access control system. This information may be sent in a standard format to any location around the world.

Description

ACCESS CONTROL S~'STEM HAVING A
PROGRAMMABLE AI.ITOMATIC NOTIFICATION FEATURE
UESCRIPTIO'S
1p BACKGROLWU OF THC: INVENTION
Field of the Illi~eYlllOlt The present invention is related to access control systems and more particularly to reporting activity on an access control system.
Background De.srription 20 Apartment buildings. office buildings, condominium complexes, gated residential communities, industrial parks and other secured locations often include an entrance access control system. Ow type of access control system, known as a telephone enty system (1 L51, provides buildings security as well as tenant access control to a particular building, apartmern complex, etc. The access control system controls entry at one or more other building entry points. e.g., doors, garage doors, etc. :~ typical access control systurn includes a main cuntrol unit located at a primary entrance and, dvpendine on the size of the structure or area heing monitored, additional rcrnote units ntay be provided to control remotely located door.
The access control s~ ~Um may also monitor the connected entry points for unauthorized access. Fur a TI:S type access control system visitors wishing to enter the buildin~~complo~ contact tenants or other building personnel over the TES, that are capable of admiuing the visitor by remotely unlocking the entrance, e.g., front the tenant's apartment.
The main control unit controls the main building entrance and may include a keypad and aut~~-dialer and he connected to a public telephone line. Remote units, typically communicate with the main unit to provide remote access to authorized p~r~Orlrlel. The (11a117 tlntt Cat1 tdelttlly tznants seeking entry by a personal access 1 ~ code, authorize entry, monitor for unauthorized entry at the remote;
doors, etc.
tenant directory may he displayed on the control unit itselfor on an adjacent sigh.
l~he directory includes tenant codes that are corresponding directory code numbers for each person, business or 1(~C OIh eC f',I111t1eS ttl the building (e.g., corporate departntents. husiness rmplow~s, ur other building tenants) authorized to unlock the entrances.
V~rhen a visitor enters a tenant code into the keypad, the main control unit automatically dials the corresponding tenant's telephone number. Then, the called tenant has an opportunity to establish the identity of the visitor. T'he tenant, using 2~ the same everyday telephone upon which the call was received, unlocks the entrance, e.g., by pressing a predetermined number on the telephone keypad.
Some state of the art access control systems generate alarm calls under various conditions. If the access control system senses the door it has control over is forced open, an alarm call may be generated. 1f the same door is opc,ned by the access control system but fails to close afar a specified amount of time, an alarm call may be generated. Occasionally, someone ma} randomly enter codes at the keypad in the hope of discoverin g an entry coda. Tu preven«his, a count of the number of invalid sequential cedes may be maintaimd. If a maximum false entry count is met, an alarm call may be generated.
Normally, an alarm call is made by dialing a telephone number and, then;
periodically beeping until the person answering the call presses a digit on a dual tone multifrequency (UT~~fF) telephone. A next Ic:vcl of alarm call may be voice.
At this level the system stags "r~LAR!~~t DOOR 1 ." :leain, the alarm process is terminated in response to pressing a digit from the answering telephone. The next alarm call level is a modem call. At this level the access control system uses the modem to call another modem and then, transmits a detailed description of the alarm call.
The originating modem identifies the oriLinatine unit etperiencing the alarm condition.
Some access control systems mere lug entries 'ex its or a number of other selected events. Typically, a history log. e.e., of the last 3000 such events, may he maintain ed in svstent memory Should tlm need arise to review authorized and:
or unauthorized building entries, such a histt,ry log may prove to be an invaluable tool, provided the events of interest remain in nrernory Ofien, the event log may be too short to contain enough history to establish a Ulltale trend, e.g., relating the comings and goings of a single missing tenant of a 200 tenant complex.
Periodically saving a printed log for storage may just present the complex manager with another apparently unnecessary task. Unnecessary, that is, until that one event occurs where reviewing the logs is a priority. It may be very tempting.
rather than collectinc the printouts and sending them to storage, to just throw 2~ printouts into the trash. thinking no one will ever notice.
_.> _ Thus. there is a need fur a way to automatically send system alarm calls and other log information to the: proper authorities or other authorized personnel fur attention, processing and%or storage.
S SU~IVIaRI' OF THE tWjE~iTlOh It is a purpose of the present invention to facilitate access control system long term record retention;
It is another purpose of the invention to automatically provide access control system history for stora~z w selected remote locations.
The present invention is an access control system such as a telephone entry system (-fES j capable of seamlessly transmlttlng lacsmole log reports to remote locations for storage. alarms are selected such that upon an occurrence of an alarm, the ac:.ess control system will send a fax to a selected phone number, sanding information about the alarm situation and, for example. all the transaction information w°ithin system memory. _alarm situations may in elude. for exampU, a set number of transactions. a specific person accessed, a code being used, a sptcitic time of day, a specific passage of time since the last alarm situation, a door staying open, and'or a door being forced open. I_og information may be sent to an office located in a building that is remote from the access control system. This information may be sent in a standard (Fax) format to any location around the world.
Advantageously. faxing the alarm information allows using standard communications over potentially long distances.
_:I_ BRIEF DESCRiFTIO\ OF THE DRAWIyGS
The foregoing and other objects, aspects and advantages will be better understood from the fullowiy detailed preferred embodiment description with reference to the dra~.vings, in which:
Figure 1 shrnes an example ofa typical building such as a factory with access controlled by a simple telephone entry systenm (TES) according to the preferred embodiment of the present invention;
Fibure 2 shows an example of a main control unit;
figure > is an eaampl~ of a peripheral control unit;
Figure 4 shows an example of a minimum TLS configuration;
figure ~ is an example of a building with a multiple access point TES;
Figure 6 shows a main control unit upper electronics assembly in an internal Vle\i'.
Fi~,ure 7 is an e~:pandea 4 icw of the detachable handheld keypad;
Figure 8 shows a block diagram of a motherhoard enclosed in the main control electronics assemble;
Figure 9 shows a building with access controlled by a preferred embodiment access control system in communication with a remotely located fax machine;
Figures 10:x-F3 show an example of a word (ALARM) defined for faxing and an expanded view of the letter A:
_5_ Figure 1 1 is a flow chart showing how messages may be faxed.
DFSCRIf'TIOy OF TEiE PRFFE:RRCD Fl~If3UDIVlH:\TS
Turning no~~ to the drawings and. more particularly. Ivigure I shows an example of a typical site, a factory building 90 in this example, with access controlled by a preferred embodiment ulephone entry system (~f~FS? that, in response to a detined alarm condition, may automatically far information related to the alarm condition to the proper authorities fur responding to the alarm condition.
Previously, access control systems did not fax an alarm call or other transaction because of limited system resources. For convenience and brevity a modem call transfers the information using ASCII characters. Fur example ":1L.AR\M' is 4l =IC 41 ~2 ~D in hexadecimal ASCII. where ' A' = Ov-11 = 0100 100() 'L' = Oa-IC = 0100 1100 etc.
1 ~ So, typically an access control system would use the modem to send ~
bytes: -11, ~1(.', -li, ~2, ~4D.
8y contrast, a typical fax page includes 17?8 black or white dots per line (width) and 11.13 lines (length). 'fhe preferred embodiment access control system converts messages from ASCII to dots for faxing. These are messages that would otherwise be sent using a modem, printed ~ ith a printer or displayed on a computer display. l he can voted messages are faxed to proper authorities, e.g., police, fire department, security personnel, building management, as described hereinbelow.
So, returning to 1-~igure 1, the TES is in communication with one or more general purpose computer 9?. A computer terminal 9-1~, such as a personal computer 2~ or the like, and a modem 96 are attached to the general purpose computer 92.
_6_ Product aSSClllt7lf lines 98, shoe n for example only, are located at orte end of tl~~
factory 9U. A parking lm IU(l, e.g., for employee parking, is located at the front o(~
the building 90. The huilding 90 includes a front entrance l0?, a rear entrance I(l-1 and an cmergemy evil I U6 with attached sensors (not slwwn) indicating whether the door at enmrgcncv emt Infi is open or closed. In this example, the t~ont huildine entrance I U_' providCS passage to~f~ront the parking lot IOU and a gate 108 providm auto entry. exit to the parkins~ lot 100. A coda entt~ unit, remote entry keypad ! 1U, is located at rear entram~ 10-1 tar entering access codos The gate 108 inulud~s entry and exit code enty units. external card reader 1 12 for requesting entry and internal card reader 1 1-1 for requesting! exit. A main control unit 116, which may contain tlm fax modem. controla huildin~~ entry directly at each of the front entrance 10?
and rear entrance ! U:J and monitors s~nsurs at the rear emergency exit 106. Further, to allow for the distance of the gate f 08 from the main unit 1 1 t>, a peripheral unit 1 18 controls the gala 108 and cummunicatzs with the main unit 1 16. The peripheral unit 1 IS passes erttn sit re~lu~sts from the yate card readm 1 1?, I 1-I to the main unit I IC~
and. upon receipt of an authorization response to such a request, openslcloses the gate 108.
C:ar~i readers I 1 ~. I 1 ~ may include well known V~;'eigard protocol card readers. E3arrium Ferrite and froaimit~ Readers or C.'IikCard Receivers, for exatnpl~.
20 Access control system and 7 1S are used interchangeably herein. The present invention is described herein with reference to a'fES type of access control system, for example only and not as a limitation. Further, although general purpose computer 9? is shown here a~ being located on site, this is for example only.
It is understood that computer 92 may by located at a remote site (not shown) and in 25 communication with the access control system over public or private telephone lines using a modem or any other appropriate communications media l h~ pret~rred embodintCnt TL:S and the general purpose computer 9~
communicate with each other seamlessly- f:ntries made in the TES are seamlessly transferred to the general purpose computer 92 and updated in corresponding _7_ databases stored therein. Likewise entries made in selected datahascs within the general purpose computer or in other types of selectCd tiles are reflected in the TFS, seamlessly, and without requiring manual int~wention. l hus, fur example, employees may be added ur removed from factory p~nunnel lees stored in thu 5 central purpose computer and. as each is enter;:d cr rmnuved, the corresponding entry code in the; TFS is addW or deleted. fn a more particular example, a lIuman Resources person sluing at a terminal 9-I may d~lme an employee fmm a list of ~n~ployees in the general purpose computer 9~. Upon such deletion, the general purpose computer 9? contacts the 1 (:S using modem r)6, and corresponding 10 employee records stored in the main unit 1 16 are dClmed Furthermore, other types of entries, such as holidays, may be changed in the rllaltl C(llllpllter 9? and those chance; r.: fleeted in the TFS So, fur example, in a first year Indepzndence Day may fall on a Tuesday. ( hat dear thv company mas it~rid~ to also make :vlonday, the third of July, a holiday. r1 f luman Resources person enters 1 ~ the selection of July 3'° and -t"' as holidaw in the personnel system and those holidays are automatically communicated to the main unit 1 16. In the following year, which is a Ivap year, (nd~pendenc~ Day falls on a Thursday . Su, this following year the tifth of July is also selected as a holiday. Thus, the I luman Resources person deletes July 3'° as a holiday in thz personnel system and adds July ~''' as a ?0 holiday. The personnel system causes computer 9? to transmit the deletion of July 3'° and the addition of July ~'" as holidays to the main control unit I
16. In response to each set of holiday dates, the TES restricts access to the main building during holidays to selected management personnel, c.g., to the factory manager and assistant manager. On normal work days. the ThS opens the fron t gate 108 at 8:00 a.m.
and 2~ closes it at 6:30 a.m. f Iowever, during the selCCted holidays, July 3'° and -1'" of the first year and July 4'" and ~'" of the. second, the front gate 108 remains closed with access provided only through thz card reader I I? and exit only through card reader 1 1 a.
_g_ In addition. inlormation may be passed the other way as well from the TF-:S to the main computer 9~. The TES, monitoring rear entrance 106 may receive an indication that the rear door is open, e.g., from the door ajar sensor.
Immediately, the TES faxes that information to the proper auth orities. In addition. the alarm may 3 be relayed to the g~nural purpose computer 92 which displays a message on the computer terminal 9-l to a security guard, alerting the guard that the rear door has been opened. In response to the rear door 106 being opened, the TES may also sound a building alarm and dial an emergency number, to call the fire department for example. Coincidentally, as the TES sounds the alarm and calls the fire departntcnt, the TES may report this inlurmatiun to the general purpose computer 9~ ~4!llCh play display the information to appropriate personnel.
fe:nant or contact codes. such as for contacting departments within a business or tenants in an apartment complex, may be displayed on the main unit 1 lfi.
The code sequence I~ngth for granting access is arbitrary and depends on the 1 ~ contiguration of the particular unit. The preferred eIllbOdtrllellt ~~ES
manages the admission process, recalling and dialing tenant telephone numbers and then, respurdin~; to dt:al tone mu!ti Frequency (DTM1F) signals from their telephones to unlock a door, open a gate or open another connected device.
These directory contact codes prompt the system to call a particular tenant.
Each contact code entered into the main control keypad points to the telephone number of a corresponding tenant. A visitor may enter a tenant contact code into the main unit to call and communicate with an associated tenant. Tenant contact codes can be linked to the tenant's card or entry code, and may be deleted once the tenant leaves th a building, e.g., moves out, thereby removing the tenant's building access 2~ authorization. Thus, each tenant must be associated with at least one individual contact code. All codes are not required to be displayed in the directory display, i.e, some codes may be unlisted.
_9_ this unlisted number feature allows tenants that desire privacy and wish to restrict awareness that they are tenants of the building to prevent their contact code tCOnl being displayed. So, unlisted contact code numbers are not listed in the display director-v and arc not displayable. -thus- only visitors that know an unlisted contact code can enter the coda to cotUact the tenant. Vvithout knowing the unlisted contact code, visitors do not have inl'urmation to contact the tenant. Also, tenants may select a tenant Do-Not-Disturb (DND) feature to block calls to the tenant during selected period.
10 So for example. where the preferred TES controls access to an apartment complex, a visitor arriving at the building or complex, can find a tenant's contact code on the main control unit 1 16 directory, provided the codi; i5 listed.
Then, the visitor may select or enter the tenant's code and the preferred embodiment system will dial an associated tenants tul~pltone number without the visitor knowing the 1 ~ tenant's telephone number. I Ipon answering th a call, the tenant may initiate one of four actions by dialing a number on the telephone. These actions may include activating first relay, for eaampl~. to open a front door or entry gate;
activating a second relay to open another door or enable whatever device is controlled by the second relay, e.g , an elevator; and, continue to talk to the visitor.
In addition, building tenants can access the building using the preferred embodiment '1'I~S, which controls entrances and selectively grants access.
Typically, each tenant has an assigned access code and'or card to access the complex. As the tenant enters a cowesponding access code on a keypad or, cards in using a card reader (connected to one of the main control units 1 16 or peripheral unit I
18). The system checks to determine it the entered access code is valid. If the code is valid and access is not restricted for the particular entrance, the system grants access by unlatching the entrance, e.g.. opening a front gate or garage door.
Access codes arc enabled programmably to allow tenants to enter or exit through one or more gaW(s) or door(s). Cntrances are symbolically linked to the tenant's access code and links may be deleted ~~hen a tenant moves out. Entry cards, like access codes authorize entry. Thus. swiping the card through an entry card reader or touching a smart card to a smart card reader, provides access at an authorized entrance. Autlu~ri~ations for entry cards as well as access codes may be restricted to ceaain entrances and for selecud time periods or generally authorized for all building entrances and at any time. A valid door structure (VDS) grants tenant access to a set number of doors, and may deny access to other doors.
So, for example, a VDS may be crated authori-r_ing tenant access to the front and back door, hut not to a mana~'~r's door or a garage door. A second VDS may be created for the manager to aut(aorize access to all doors.
Also, access restrictions may be placed on codes to reduce the possibility of a card or code being used by more than one person. Period restricted or time zone access may limit the times of day that access is allowed throu;~h a particular entry 1 ~ location, e.g., access ma~, be restricted only to the front entrance of a building during night hour s. An anti-pass hack restriction mas- be one of nvo types, either true or timed anti-pass hack. True anti-pass back requires that each entry be matched b}~ an exit hefure re-entry is allowed. Timed anti-pass back requires that a defined period of time pass before the same card or code may be used again for re-entry by the same ?0 reader er keypad. If the timed anti-pass back feature is set to time out in sixty seconds, for example, the system will not grant access to anyone trying to re-enter using the same code or card at the same reader until, for example, sixty seconds have elapsed from the most recent entry.
Likwvisc, a Strikes-And-Out feature may be included to prohibit unauthorized persons from guessing an entry code. The Strikes-And-Out feature allows a selected number of erroneous code entries before temporarily disabling a coda reader at a particular dour for a specified amount of time. Upon occurrence of a Strikes-.And-Out, an alarm may trigger a fax notification of the occurrence.
An anti-pass back forgiveness feature may be timed, such that after expiration of the 30 forgiveness period, entry using the same code or card may be resumed. So, for example, after midnight entry may be made re-using a blocked code or card to the same buildine.
For convenience. use 1're~mncy limits or period limits may be placed on cards or access codes, to allies- issuance of temporary cards or access codes that are authorized for limited numbers uf' uses or for a limited period of time. Use limited codes or cards grant entry fur set number of uses. Thus, a code or card may be authorized for sixty uses over the course of a month. for example. Once the card use exceeds that sixty-use limit, the code or card is no longer valid and the card may be discarded. Period limits may include date limitation wherein cards or access codes 10 are authorized for entryntil a spo~ifie~l date, i.e., an expiration date.
For example, a tenant may hr scheduled to mow out of the building on December 1" of the current year. The expiration data fur that tenant's card or access code may be set for December 1" and thereafter. access to the building is not authorized for either the card or access code. Fir~t-1. s~ time limited cards or access codes authorize entry fur 1 p a set number of day~-hour~ minutes atier first use. For example, a tenant may have access for an unspecified wcel: which begins to run upon the first entry.
After the first entrap, the tenant can use the card code to enter and exit the building for a week until the period expires and is no longer valid. Start-Noes time limited cards 'codes are similar to First-Use time limited card; 'codes providing authorized access over a 20 period of daysihuurs.'minutes beginning immediately.
Figure 2 shows an example of a main control unit 116 and Figure 3 shows an example of a peripheral unit I I 8. Thz main control unit 116 houses a main system motherboard (not shown) as well as TIS software and building/tenant related data.
A keypad 120 is included on the main unit 116 for numeric code entry, e.g., entering 2~ access codes or tenant phone numbers to contact tenants. A display 122 is provided fur displaying telephone numbers stored in the system, as well as providing interactive information and for viewing any diagnostic information that might be displayed during entry or normal maintenance. Both the main control unit 116 and the peripheral unit 1 18 include keyed access points 124, 126. Unlocking each unit's housing provides access to system circuits contained within the particular unit 1 16, 1 18.
~f-he main unit control I 16 includes four internal relays and preferably is capable of supportin« lour (-I) peripheral units l I S. f=urther, in this embodiment each peripheral unit 1 18 includes lour relays. Thus. besides pedestrian access control. relays can by' employed for generating alarms, bypassing an alarm.
providing elevator acvess control, controlling close circuit television (C'CTV), controlling a gate operator and, for heating and air-conditioning system control. )=ach of the main control unit 116 and peripheral units 118 also include an interface fur an evil request sensor and door position sensor. ~\'hen attached, the exit reduest sensor senses when a request is placed for exit through the door, e.g., a button is pushed to request exit.
.~ dour position sensor senses wi»n a door has been pried open or is otherwise open and'ur remains open. e.~.. for more than a minute after a relay deactivation.
~~lessaees such as greetings, general inlorntation or warnings may be 1~ programmed into the main unit 1 18 for display on the display 1?2. A series of system menus are provided un the display l?? lur manually programming the preterred embodiment TES. These menus are navigable using a menu prompt, scrolling through each menu level to iden!ifj~ and select an active value that corresponds to a desired menu action. The menus may be navigated by pressing number, or characters on the keypad I?0 that prompt a currently displayed option.
Command prompts may be identified as appropriate, such as using a designated character, underscoring, highlighting or placing a cursor below the prompt.
Further, depending on the number of displayable lines on the main control unit display 1?Z, scrolling up and down the menu lines may be required as the number of current menu lines tray exceed the number of lines that may be displayed. Further, the preferred CtnbOdll11i:11L '1 ES may convert messages to a foreign language, e.g., by pressing a main control keypad 1?0 number to select displaying messages in Spanish.
_13_ A manager call button l?8 may he included on the keypad l?0. Pressing the manager call button 128 prompts the system to call a preselected manager's telephone number. hp to (i~ur different mana5er telephone numbers can be accompanied pith a call sch~~~lul~ for each number such that calls are placed tc~
selected onus of the manayt phone nmnbcrs depending on the time of day. for example. A programmable manager's call schedule, sets times when visitors am allowed to contact the manater. Call schedules for up to four managers may be progranuned with each manager having up to four sub-schedules and each sub-schedule having up to four s<«ments. In addition, the managor call button may be 10 selectively disabled to prevent visitors from contacting the manger 1'rom the main unit during any period that it is disabled. So, for example, the manager call button may be disabled beW een midnight and ~:OOAM and the prefen-ed embodiment TFS
would not respond to pressings the Manager call button during those hours.
Figure ~ shows an example of a building 1.>0 with a minimunn ~I E:S
1~ contigurutiun. E3uilding !3U includes a iiont door 13? and a rear door 13-t, across through both of which is controlled directly by a main control unit I 1 f>. 1n this example, a card reader 136 is providmi at the front door 13? for r°c~u~sting a;:eoss and a remote keypad 138 is at the rear entrance 136 for exit. Also, in this example of a simple TE:S, a card reader l-10 is included at the rear entrance I 36.
Remote entry 20 relays 1-I_', 1=1~ are providmi. each controlled by the main control unit 1 16, to remotely open,'lock the respective Croat entrance 13? and rear entrance 13=I.
Additionally, the access control system of this example includes a printer 1=16, a computer terminal 1.I8 and a telephone 1 ~0 connected to the main unit 1 I 6.
The printer 1-16 is included for printing out periodic reports, periodic system dumps 2~ or diagnostics information. The computer terminal 148 may be used with an interface program such as SI'SWin from Sentex Systems for example. to program the control unit l 16 and maintain data in databases. Telephone 150 provides another point of internal access to lh2 SySICtI7 IelephOnlCally' and, correspondingly, to _1.I_ building tenants connected to the system. ,Also, the main control unit 1 16 accesses an external telephone system. e.g. for fax/modem communications functions.
l he Tf:S records all transactions including telephone calls and any other system activity and may send a report in any number of ~avs. For example, the fax 5 modem may be used to fax the report to a remote fax machine, the printer may print the report locally, the display may° display the report or, the modem may send the report to a remote computer terminal. Logged transactions may include any activity such as visitor directory calls, tenant entry references (whether granted or denied), card or coda activity and any other activity that the sysUm manager may select, 10 whether at eh a main control unit or a peripheral contnrl unit. Further, reports may be scheduled for automatic transmission, at a previously selected time to a previously selected destination.
Figure s shows an example of an expanded access control system controlling multiple access points in IW ilding I ~0. In this example, a single main control unit l~ 1 16 connnunicates with nvo peripheral units 1 l8 to control remote entry.
Main unit I 16 control; both peripheral units 1 18 and directly controls access to central doors 1 ~?, 1 s-1. Each peripheral unit I l 8 controls access to a renuUe pair of doors 1 56, 1 ~8 and 160. 16?. Further , each of a remote k~~-pad 1 ~-Il~, 1 ~6k, 1 X81., i 601;, l6?k and a card reader 1 ~~lc, 1 ~6c, 1 ~8c, 160c, 16?c is located at each of the entrances 20 15-4, 1 ~6, 1 ~8, 160 and I6?. In this example, a closed circuit television camera {CCTV)16=1 connected to main unit 1 16 is located at entrance 152, for monitoring activity at that entrance. A button l66 may be located at door 15'' to request exit from the building. A closed circuit TV monitor 168 is located internally to the building for monitoring activity at entry 15~, e.g., by a guard and for granting access 25 to entrance 1 ~?. The guard may authorize entry through telephone 170, through a dedicated input device (e.g., a button), through a computer or through any other appropriate device. Each of remote peripheral units 1 18 and main unit 116 controls a pair of relates labeled A and 13, each of which remotely opens/closes or loekslunlocks a respective one of the doors.

f~:aeh of the main control unit 1 16 and any' connected peripheral unit, 1 18 may be cunf gurml liar uw-door control or tvo-door control. For one-door contiguration, the unit ci>ntrulone door for entry or exit and includes three other relays that are available fur other functions such as, shunting or bypassing an alarm.
triggering an alarm or activating a closed circuit 'T~~. For a w~o-door configuration two relays are availahle for shunting or reroutinfi an alarm.
V6'hen a tenant swipes a card or enters a code, the TES response may include ono or more relay actions, e.g., a door will cycle, the CC~I-V will cycle on, etc. A
relay activation structure (R:'~S) controls relay responses to entry cards or codes.
10 Each IZWS defines on a or more relay responses and is associated with an entry card or rode. Relay cununar~ds are provided for programmable individual relay control and select relay r~sponsu to an entry request. A cycle command causes a selected relay to rwpund by upming and then closing after a period of time, e.g., buzzing in som~um ti> a lucked huildin~~. A latch-open cununand energies the relay. for 1 ~ example, to unlock the door and leave the dour unlocked until prompted to re-energize the relay, therehy re-locking the door. A latch release command returns the relay action to a default setting_, z.g., il'thu door is open after rzspun~Iinv~ to a latch open command. issuing the latch release command returns the corresponding n:lay to the vycle siati:. .An initial delault state foxy be sCICCIed such that relay control is set 20 to that default state upon system power up.
The system may monitor door status to determine whether it is held open more than a predefined maximum time and, otherwise, determine whether a controlled door is stack open, i.e.. a building security breach has occurred.
An open door condition may elicit an alarm call wherein using the modem, the system 2~ transmits an alarm message to a designated computer or to a fax machine.
Alternately, the system response to an open door may be to close a relay that turns on an alarm light or that sounds a siren to inform a monitoring station of the perimeter breach.

V~'hen an alarm is tri~~~~ered (r.g.. because a dour has been forced open), the preferred embodiment TES automatically scads an alarm message over the modem to a designated recipient ~.e., a computer trrminal ur a fas machine. The alarm message typically includes <cr alarm unit ID to idmtif~y the open door so that the message recipient f;tteiw> the alarm origination point. bite alarm call unit ED is programmable in the I EMS as is the number of retry' times fur dialing the number.
Also, alarms may be enabled or disabled, e.g., fur maintenance purposes. In the event of an alarm, the preferred embodiment TES reports the alarm by calling a previously dcaignated location, which may be a fav machine, a terminal connected 1U ttwouyh a modem. an alarm company or to a pager. (f the location does not answer the call or the number is buss, the control unit repeatedly hangs up and redials the same number until the swtem connects or, until the redial retry number is met.
If, alternately, a direct ccmnectiun is provided to a cunthuter, printer or other reporting device, the 1 IS repun; the alarm condition occurrence directly, posting ur printing a l~ message that indicates the uccurrmce, e.g.. un tl~e attached printer.
Figure fi shows upper elzctronics assembly 18U in an internal view of an open main control unit 1 I6. The upper electronics assembly I RCl includes a detachable handheld key-pad I R? and a display 1 R-1 whlCh Ittay' he a liquid crystal diode (LCD) display. A plug~;able tnentu;-y module 186 is shaven inserted at the top of the upper 20 electronics assembly 180. The pluggable memory module 186 is, preferably, flash electronically programmable read only memory (Hash EPROM). Local audio communications may be eflected in an intercom-like i>r speaker phone fashion through the faeeplate of the main control unit 1 16 using a microphone E 88 and speaker 189.
2> T~-o types of data that may be saved or reloaded into the main control unit using the pluggable memory module 186. These Uvu types of data include, unit data and operating data necessary fur normal operation and is inserted during initial installation. Llnit data includes user-generated data for the particular control unit.
Such user-generated data ntay include code entries for tenants. Operating data includes any data required by the main control unit to operate. A backup mi)dulv may be inserted periodically to backup/restore unit or operating data from!to the control unit ni~mi)ry. t il backup module also nom be used for upgrading tllC
cOntC01 LIIlII <ll)~i'<lllilg S~ Slcli).
Figure 7 is an expanded view of the detachable handheld keypad 18'? which is an alphanumeric keypad. The detachable handheld keypad 18? includes a numeric section 190 and an alphahetic section 19?. 'l~he numeric section 190 includes several cursor keys 190c, a backspace key 190b, an escape hey 190e and a clear key l9Ucl.
The cursor keys 190c facilitate navigating between displayed menu entries, e.~., on 10 the display 18~ in Figure ~. The backspace key 1906 functions to eliminate a single previously entered number or character at a time. 7'h a escape key 190e may be used for canceling an erron eously ~nmrcd command key sequence and'or terminating a command. i.e.. ahorting. :~ single stroke of the clear kay l9?cl clzarp displayed entries.
1 ~ The alphabetic section 19? includes several hot keys 19~, typical alphabetic keys and an ;.nt~r key 19; a; well. l h~ hot keys 19-I include a number of shortcut keys for bypassing n)enu navigation and directly selecting and initiating a previously stored procedure 1 fin 1,u) s 19-1 mny includr, lur rvample, an enter phone numbzr key for addin~~ a new phone number to the stored listing; a delete phone number key 20 may be imluded fur removing entries from the list; and, an enter code key and a delete code key may be included for adding/removing codes from the listing.
Card authorization may likewisr he managed with enter card and delete card keys. A
time!date key may be inelud~d for recalling alld updating system time. A
transaction key niay be included for recalling and viewing logged system activity such as for 2~ example, visitor to tenant directory calls, tenant entry (granted or denied) and card or code activity. ~'iiiie each of these corresponding commands may be other~~ise effected through a series of alphanumeric key entries, hot keys 190 provide a much simpler faster shortcut.
-18_ Figure 8 shows a block diagram of the motherboard 200 of the electronics assembly according to the preferred embodiment of the present invention. The motherboard _'UO, essentially. includes w~o subsy~wtns, a control subsystem 202 and a signal processing subsystem ?U-1~. Further. each subsystem ZU2, 204 includes an address bus 20?.~, 20-11 anal a data bus 20?D, ?0-1D.
The control subsystem 202 includes a microcontroller 206. which may be a general purpose microprocessor or. preferably. is a 16-bit, single chip controller such as the X.a-S3 microcontroller from Philips Semiconductors. The control subsystem 202 includes memory, preferably. both dynamic random access memory (DR.WI) 10 208 and Flash EfIZOLI ?10. If necrssars. a memory controller 212 may be included for controlling access to and refreshing the D1~~11 2U8 or, if the microcontroller 206 is capable. the memory control function may be provided directly by the mii:rocontroller 206. When installed in the train control unit 1 16 with the motherboard 2UU, the pluggabie flash memory- module 186 in Figure 7 is also 1~ included in the tremor- in the control ~llbSySlC111 2()2. :~ real time clock (R-f(') and peripheral interface ?1-l also is included in the control subsystem 202.
The microcontroller 2()6 in control subsvsttm 20'_' manages a programable transactiot: auto reporting !unction to autvn~atically send a record of ail transactions that are currently stored in the main control unit memory at the preselected tune to a 20 selected destination, e.g., to a terminal. fax ur a printer. Transactions may include records of system activity such as a directory call, an open door, entry card or code activity, etc. Auto reporting may be triggered by count number, a specified day or time or, a combination of transaction count and daytime. Count only scheduling triggers a report automatically when the count reaches a specified number of 2~ transactions, as selected by the complex manager, for example. When the transaction count reaches that number, the transactions report is transmitted to the destination. If daytime reporting is selected. all !of; transaction are transmitted on a selected day and time. Count and daytime reporting allows transaction report transmission t f the count reaches a selected level prior to the scheduled daytime.

As noted above. system transactions or records of system activ ity include records of events such as a directory call, an open door, entry card or code activity or anything else identified as system activity for lugging or repurtinc. Reports are transmittc:I, fur example, to a printer, a fax machine or a computer terminal.
Since 5 computer terrninais du not have identical modem transmission capabilities.
the preferred embodiment TES has a progranuuable baud rate, selectable fife a particular computer terminal or printer. Optionally, the preferred embodiment TES may send transaction information in real time. Further, real time transmission may be programmed to begin at some future time and continue until the system receives a 1() tzrmit~ation command to end real time transmission. Also, interactive report transmission may be selected to require a response to a manual prompt at the time of LraliSIlIISSIUtI. ThllS, when the programmed transmission time occurs, the prompt is presented to an operator. e.g., the building manager, vvho may approve or deny transn~i~sic~n.
1 ~ 1_he heart of the signal processint subsystem ?0=4 is a digital signal processor (DSP) ? 16, preferable. ?-1-bit DSP ~6sf)3 ti-om 1~-lotorula Corporation. The digital signal processor ? I C is mnwetcd to memory such as, for example, static IZWI
(SRA'VI) '_' l 8 and Flash LI'ROyI ?20. The digital signal processor ~ 16 interfaces externally to the train control circuit ?0U through a eomtnunications interface 2?2.
20 l~he main control unit communicates with the outside v~~orld through any number of connected optional interface devices that may be connected to the real time clock (RTC) and peripheral interface ? 1 q or to the communications interface 2??. The DSI' data bus 2U4D is selectively connectable to the control data bus and the DSP address bus 20-!A is selzctivelv connectable to the control address bus 2~ ?0?A.
In particular, the RTC and peripheral interface 21=1 communicates with connected remote units, e.g., peripheral unit 118 above. Also, connected inputloutput ( I; O) devices such as a display. e.g., an LCD display I 8-4, an RS~2'_' printer port, an RS'_'3~ serial port, keypads including handheld keypad I8?, and card readers ail communicate with and are controlled by the microcontroller through RTC
and peripheral interface ? 1-t. Furthtr. a rral limo clock in the R~I C and peripheral interface '_' 1-l maintains current date and time information that may be used, for 5 example, in logging or in tinted operation. Programmable 'l line Zones are defined as time periods during which particular access codes and card codes are enabled.
So, if a group of tenants is intended to have access to the complex only during certain hours and!or on certain days of the week, a time zone may be identified for those specific periods and that time zom assigned to that group of tenants. Each time cone 10 may have four different schedules; segments with a maximum of fifteen different time zones. Further, holidays may be identified and included or excluded from particular time zones.
Also, a timed c~~ntrul system may be included for setting relay controls to automatically ohcu'clo;e or enahleldisahlt certain connected functions ur features at 1 ~ preselected periods. ~t~hus. lior example. the system may automatically unlock and open the front gate daily and later re-lock or close the gate, at times that are specilWd within the s~ smm. So, ~ontit~uing this cvampl~, tln front gag may automatically open at 7:OOam and close at 7:UOpm. Further, typical holidays may be identified ~mh that the gate does nut automatically open even if a holiday falls on a weekday.
20 A tree exit may be provided through any monitored door such that opening the door to exit does not cause a door forced opined condition during the exit. A post office and fire department entry future referred to as a postal lock provides access using a dedicated lock and key. The local tire department may have a common key that allows access tluough the postal lock. Access to the complex using either of these is 25 through the access control system and treated as a normal entry.
Communication interface 2'? provides both audio and telephonic communications interface functions. Audio communications may include sound from the main control unit microphone and speaker. Both the microphone and speaker volume may be controlled programmably. Telephonic communications may _~1_ include a modem!fax modem function and providing a telephone handset interface for either or both of touch tone or rotaw dial type telephones.
The modem provides for both incoming as well as outgoing conununications.
The modem may be sCt to answer an incoming call after a selecwd number of rings.
A preselected length ma5~ be set for visitor to tenant calls to prevent unintentionally tying up the line by leaving a call connected indetinitely. blocking other calls to the tenant as well as to the control unit. Dialing may be selected fur either touch tone or a pulse dialing depending upon local telephone company capabilities. If Caller ID is available, incoming telephone numbers may be logged for each call along with any corresponding system 'tenant response or action.
If a voicemail system is attached to the TL:S, v°oicemail rnay be conligured from the main control unit. Also, voicemail may be programmed to intercept calls and to screen visitors fur tenants. To use this voiccmail control future of the prelerred emh(ldllllvllt SySlelll, a visitor places a tenant call and the voice mail system 1 ~ answers the call. Then, the vlsltor earl bypass voicemail and contact the tenant by dialing atl txte11S1011 (a number with up to six digits) on the front panel keypad. If Caller ID is available through the local telephone service, the system may retrieve the caller's nulnhvr far the tenant to return tl~~ call IaUr. A I'B?~
enabie~disable and dial-in feature provides call configuration capability to dial a number for outside 20 access, e.g., 9. A dial-up unit ID feature allows assignment of a 6-digit identification number such that a person dialing into the unit can retrieve the unit ID to determine whether the caller has contacted the correct unit.
The preferred embodiment access control system includes the capability to provide; audible signals, e.g., betps, in response to various inputs. So for e~.ample, 2~ an access granted beep may be provided by the main control unit speaker when granting tenant:'visitor access. Also, talk time beeps on the telephone may indicate when visitor to tenant communication approaches the end of the selected talk period.
These audible alerts may be disabled or enabled as desired.

In addition. the access control system according to the preferred embodiment of the present invention may facilitate information exchanges and other communications bem~~u itself and other systems such as a general purpose computer runnine a personnel or hi,okkeeping system. Such seamless contntunication is described in detail in "Access l ontrol Systems In Seamless Communication V'ith Personnel Management Systems and The Like" to Dow et al.
U.S. Patent Application'~o. _..._~._.---~._ (Attorney Docket No. 71338.'~~69), assigned to the assignee of the present invention and filed coincident herev<~ith.
Figure 9 shows a building 230 with access controlled by a preferred i0 embodiment access control wst~m in conununication with a remotely located fax machine 232. Access to luont entrance 234 is controlled by a main control unit mounted adjacent to entrance 234. Access to garage entrance 238 is through card entry reader 240. Thus, the amess control system and, especially main control unit 236. may be pro~ramnt~ci as d~;crihed hereinabove such that after ?~0 accesses to I ~ garage entrance 238 have occurred, for example, the log is faxed to remote titx machine 232. Upon receipt of the fax at fax machine 232; the fax may be reviewed and. if anythin~~ of note is inrlu~l~d in the fax, that may be fonvarde~l to proper authorities. <)therwise. the fax may be stored or archived fur later disposal or possible snb~e,~ticnt use.
Figure 10A show's an example of a word (ALARA-1) 2-l0 defined for laving and letters 2-1?, 2=4-1, 2-16 and ?-18 included in the word 240. h'igure lOB
is an expanded view of the letter A 2-l2 in Figure 10A. In this example, each letter is an array of black or white dots. Selection of an 8 by 8 array for each character is for 2~ example only and not intended as a limitation. Significantly improved character readability may be achieved using 9x 16 character arrays with a corresponding increase in transmission rate or time. AS noted above, each fax page contains scan lines and each line contains 1728 dots. Letters are faxed by alternating between w bite and black dots.

For this 8 by 8 character example, each character is represented by a corresponding ASCII codz. As can be seen from Figures l0A-B, each character may he described as an eight byte hit map with a whirr dot or pixel represented by a zero ("0") and a black dot or pixel represented by a one ("1 ")- So, the .A in Figure 10!3 can be represented by the following binary sequence with the corresponding hexadecimal in parenthesis.
0000 0000(0x00) 0001 1000 (0 x18) (0a'_'-1) 0010 O l00 (0x'_-1 ~

OOl 1 1100 (Ox3C) (OaZ-1) 0010 01 U0 (Ox~-t) 0000 0000 (0x00) 1 ~ This can be stored in a character n temory as:
Byte Clvaracter_A [8 bytes = OxUO. Ox 1$, Ox'?-1, Ox3C. Ox?=l, Oa2.l, 0:00.
f:ach of these bytes represents a scan line through the character as may be accessed using a scan line aari;tblc. ~l lms, textual lines may he converted to scan lines using, tin- example, ~ aariables as in Tahle I below.
Table 1 Variahle Defines Scan line the current scan line.

Character Index which character within the test string is active Character Pixel which pixel within the current character is active.

2~ White Pixel whether this is a white or black pixel set.

Pixel Count numher of pixels to transmit.

Figure 1 1 shows a llow chart ?~0 shoming how lines may be prepared for faxing messages as described for ALARM in Fi6ures I OA-B. first, in step 2~?
the character labels are initialized, to point to the lirst pixel of the first character of the _?~-first scan line on the first page. Also, the pixel count is set to zero and, since typically, the top line of each .ASCII character is blank, the first pixel is a white pixel. Nexl, in step ?~? the current line in the current character is checked for a dot color change location, i.e., from white to black. for the lirst line there will bi: no dot color chau~;e in step ?~-1. .~tivr t:~~ first line t; transmitted and the subsequent line is encountered, dot color changes occur when white dots change to black and vice versa as each dot or pixel is transmitted for a chara,aer. in step 2~6, all dots of current color up to the identified dot change location are transmitted. In step 2~8, after having transmitted all dots of the same color, a check is made to determine 10 whether the last transmitted dot is at the end of a character and, if not, continuing to step 360, the dot change location is trade to the current dot location. In step ?62 dot color is switched. Then, rmurning to step ?~-4 a check is made to determine the next dot color change location. : gain, in stop 2 i6 all dots ( to the dot change location) of the same color are sent. In step ?~8 the last sent dot location is checked to determine 1 ~ if it is the end of the character. If it is determined that the last transmitted dot is at the end of a current character, then in step 26-1, tlte: i:urr~nt dot location is checked to determine if it is at the end of a line. If not, then in step X66 the next character is selected and, returning to step X60, the first dot far the new character in that line is selected. Otherwise. if in step ?6-~ the end of the line is encountered, then in step 20 255, a check is made to d~tcrn~iue if the end pa~~e hay been eni;ountered.
If the end of page is not encountered. then, in step ?70 the next line is selected and returning to step 266, the first character of that next line is selected. In step ?68 if the end of the current page is been encountered, then in step 27'', a check is trade to determine whether the end of message has also been encountered. !f not, then in step 274, the 2s variables are reinitialized fur the nL~a page and. returning to step 270, the beginning of the first line is selected and in 266 the first character is selected.
Otherwise, transmission ends in 276.
Advantageously, the above described access control system fax alarm information using standard (fax) communications over, potentially, long distances.
30 System resources are not consumed in preparing the data for faxing. taxes are treated nllICl1 like a print or modem based communication. Log entries, alarm information or other data are formatted fur taain« on the fly and transmitted as formatted.
I laving thus described prelerrcd embodiments of the present invention.
various modifications and changes will oerur to a person skilled in the art without departing front the spirit and wope of the invention. 1t is intended that all such variations and modifications fall within the scope of the appended claims.
Examples and drawings are. accordingly, to be regarded as illustrative rather than restrictive.
-? 6-

Claims (23)

1. An access control system automatically sending system information to a remote maintenance location, said access control system comprising:

a main control unit telephonically in communication with entities within a building. said main control unit and being mountable at an entrance to said building;

a fax modem controlled by said main control unit;
at least one code entry unit receiving access codes, each said code entry unit providing received said access codes to said main control unit: and at least one controlled door, access through each said controlled door being provided by said main control unit in response to a correct access code entered at one said code entry unit, said main control unit logging system activity;

whereby said main control unit selectively faxes system log reports over said fax modem to a remotely located fax machine.
2. An access control system automatically sending system information to a remote maintenance location as in claim 1, wherein one of said at least one code entry units is a keypad located un said main control unit.
3. An access control system automatically sending system information to a remote maintenance location as in claim 2 wherein said at least one controlled door is two or more controlled doors, said main control unit controlling and logging access through said controlled doors at entrances to said building, at least one of said entrances including a remote said code entry unit.
4. An access control system automatically sending system information to a remote maintenance location as in claim 3 wherein said remote code entry unit is a keypad, said main entry unit logging keypad entries.
5. An access control system automatically sending system information to a remote maintenance location as in claim 3 wherein said remote code entry unit is a card reader, said main control unit logging card reader entries.
6. An access control unit automatically sending system information to a remote maintenance location as in claim 3 further comprising a peripheral control unit in communication with said main control unit, said peripheral control unit controlling at least one remotely controlled door at an entrance remotely located from said main control unit, said main control unit logging peripheral control unit activity.
7. An access control unit automatically sending system information to a remote maintenance location as in claim 6 further comprising a remote said code entry unit at said remotely controlled door, said remote code entry unit communicating with said main control unit through said peripheral unit.
8. an access control system automatically sending system information to a remote maintenance location as in claim 7 wherein said remote code entry unit is located external to said building. entry requests being placed by entering an access code at said remote code entry unit.
9. An access control unit automatically sending system information to a remote maintenance location as in claim 8 wherein said remote code entry unit is a card reader.
10. An access control system automatically sending system information to a remote maintenance location as in claim 8 wherein said remote code entry unit is a keypad.
11. An access control unit automatically sending system information to a remote maintenance location as in claim 8 further comprising a second remote coda entry unit located internal to said building, access code entries to said second remote code entry unit requesting exit from said building, said main control unit authenticating access codes, said peripheral unit opening said remote controlled door responsive to authenticated access codes being entered in either said remote code entry unit, each entry and exit at said remote controlled door being logged.
12. An access control system automatically sending system information to a remote maintenance location as in claim 2 further comprising a monitor connected to said main control unit, said main control unit displaying system information on said monitor.
13. An access control unit automatically sending system information to a remote maintenance location as in claim 2 further comprising a closed circuit TV
camera.
said closed circuit TV camera being remotely controlled by said access control system, each activation of said closed circuit TV being logged.
14. An access control system automatically sending system information to a remote maintenance location as in claim 2 wherein said main control further comprise, a displays said display selectively displaying a menu of available options, selection of selected ones of said options being logged.
15. An access control system automatically sending system information to a remote maintenance location as in claim 14, the main control unit further comprising:

a microphone receiving a voice communications from persons requesting building access; and a speaker providing audio responses to said persons requesting building access.
16. An access control system automatically sending system information to a remote maintenance location as in claim 14, the main control unit further comprising:

a memory module;

an electronics assembly adapted to receive said memory module, said memory module being pluggable into said electronics assembly said display being attached to said electronics assembly; and an alphanumeric keypad, said access control system being programmed directly from said alphanumeric keypad, access control codes being programmed into said main control unit using said alphanumeric keypad, program entries being selectively communicated, seamlessly, to said general purpose computer.
17. An access control system automatically sending system information to a remote maintenance location as in claim 16 wherein said electronics assembly unit comprises:

a control subsystem controlling connected peripheral units and controlled doors, receiving and authenticating access codes and monitoring unauthorized accesses and logging said system activity; and a communication subsystem passing voice communications telephonically between said entities within said building and individuals seeking building access, said communication subsystem including said fax modem and sending and receiving faxes by said fax modem.
18. An access control system automatically sending system information to a remote maintenance location as in claim 17 wherein said control subsystem comprises:

a microcontroller controlling building access, communicating access authorization changes to the general purpose computer and changing access code data in response to communications from said general purpose computer;

memory storing current access codes, system related program code, data and system logs;

a handheld interface and real time clock communicating with said general purpose computer; and said memory module, program initialization data and operating codes contained in said memory module.
19. An access control system automatically sending system information to a remote maintenance location as in claim 18 wherein said memory includes Flash EPROM and dynamic random access memory.
20. An access control system automatically sending system information to a remote maintenance location as claim 17 wherein said communication subsystem comprises:
a digital signal processor, said digital signal processor being programmable as a fax modem, said fax modem comprising said digital signal processor;
memory storing code for said digital signal processor; and a communications interface providing a voice interface with said microphone and audio interface with said speaker at said main control unit and providing a telephonic interface to a connected telephone system responsive to said digital signal processor.
21. An access control system automatically sending system information to a remote maintenance location as in claim 20 wherein a selected condition in said control subsystem causes said communication subsystem to fax a report to a remote location.
22. An access control system automatically sending system information to a remote maintenance location, said access control system comprising:
a main control unit telephonically in communication with entities within a building, said main control unit being mountable at an entrance to said building;
a fax modem controlled by said main control unit;
at least one code entry unit receiving access codes, each said code entry unit providing received said access codes to said main control unit;

at least one building function being provided by said main control unit in response to a correct access code entered at one said code entry unit, said main control unit logging system activity into a lug report; and said main control unit comprises apparatus for selectively faxing log reports over said fax modem to a remotely located fax machine.
23. An access control system automatically sending system information regarding a building to a remote maintenance location, said access control system comprising:
a main control unit telephonically in communication with entities within a building, said main control unit being mountable at an entrance to said building:
a fax modem controlled by said main control unit;
apparatus for collecting status information retarding the building connected to said main control unit for logging system activity into a status log report; and whereby said main control unit selectively faxes status log reports over said fax modem to a remotely located fax machine.
CA002410016A 2001-10-29 2002-10-24 Access control system having a programmable automatic notification feature Abandoned CA2410016A1 (en)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
US09/984,342 US6748061B2 (en) 2001-10-29 2001-10-29 Access control system having a programmable automatic notification feature
US09/984,342 2001-10-29

Publications (1)

Publication Number Publication Date
CA2410016A1 true CA2410016A1 (en) 2003-04-29

Family

ID=25530469

Family Applications (1)

Application Number Title Priority Date Filing Date
CA002410016A Abandoned CA2410016A1 (en) 2001-10-29 2002-10-24 Access control system having a programmable automatic notification feature

Country Status (7)

Country Link
US (1) US6748061B2 (en)
CA (1) CA2410016A1 (en)
DE (1) DE10250137A1 (en)
FR (1) FR2831750B3 (en)
GB (1) GB2381926A (en)
MX (1) MXPA02010666A (en)
NZ (1) NZ522259A (en)

Families Citing this family (31)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
ES2245192B1 (en) * 2003-08-08 2007-02-16 Raul Gonzalez Martinez AUTOMATIC PORTER INSTALLATION WITH BIDIRECTIONAL ACCESS TO TELEPHONE LINE.
US7158373B2 (en) * 2004-03-08 2007-01-02 Originatic Llc Electronic device having a keyboard rotatable about an axis
US20050197847A1 (en) * 2004-03-08 2005-09-08 Smith Renato L. Facility management computer system operable for receiving data over a network generated by users and sensors
US8646107B1 (en) * 2004-06-25 2014-02-04 Altera Corporation Implementing usage limited systems
CN102831676B (en) * 2004-11-02 2015-07-08 大日本印刷株式会社 Management system
US7791452B2 (en) * 2005-03-23 2010-09-07 Alarm Lock Systems, Inc. Wireless access control and event controller system
US7697674B2 (en) * 2005-10-20 2010-04-13 The Chamberlain Group, Inc. Gate intercom with a wireless telephony interface
KR100643564B1 (en) * 2006-06-28 2006-11-10 이미현 Parking card leading apparatus with urgent alarm function
US8675838B2 (en) * 2006-10-02 2014-03-18 The Chamberlain Group, Inc. Intercom unit for providing a status alert for a movable barrier
US8269602B2 (en) * 2007-08-22 2012-09-18 Utc Fire & Security Americas Corporation, Inc. Security access control system and method for making same
US9288444B2 (en) * 2008-12-30 2016-03-15 Bce Inc. System and method for video signal delivery
DE102009010491A1 (en) * 2009-02-25 2010-09-23 Rittal Gmbh & Co. Kg Access control means
JP2011034415A (en) * 2009-08-03 2011-02-17 Masahide Tanaka Monitoring apparatus
US9246952B2 (en) 2010-06-30 2016-01-26 International Business Machines Corporation Controlling telephone call processing using global signaling codes
US8537990B2 (en) * 2010-11-19 2013-09-17 Frederic Rudman Communications device and method and method of use
US9122254B2 (en) 2012-11-08 2015-09-01 The Chamberlain Group, Inc. Barrier operator feature enhancement
US9563991B2 (en) * 2013-03-05 2017-02-07 Apple Inc. Dynamically authorizing access to restricted areas
WO2015099990A1 (en) * 2013-12-24 2015-07-02 Hoeffner Daren Method and system of controlling access to access points
EP3009991B1 (en) * 2014-09-26 2020-04-01 Assa Abloy AB Anti-passback algorithm for an access control system
DE102014116183A1 (en) * 2014-11-06 2016-05-12 Bundesdruckerei Gmbh Method for providing an access code on a portable device and portable device
AU2015357162A1 (en) * 2014-12-02 2017-06-29 Inventio Ag Access control system with feedback to portable electronic device
JP6401069B2 (en) * 2015-01-30 2018-10-03 アイホン株式会社 Intercom system for housing complex
US9654632B2 (en) * 2015-02-09 2017-05-16 Conduent Business Services, Llc Apparatus and method for generating a graphical representation to motivate employees in a call center
US9978265B2 (en) 2016-04-11 2018-05-22 Tti (Macao Commercial Offshore) Limited Modular garage door opener
USD792858S1 (en) * 2016-04-15 2017-07-25 Elika Access Systems, LLC. Access device housing
USD801287S1 (en) * 2016-04-15 2017-10-31 Elika Access Systems, Llc Access device housing
USD792357S1 (en) * 2016-04-15 2017-07-18 Elika Access Systems, LLC. Access system keypad housing
US10187527B2 (en) * 2016-11-23 2019-01-22 LaTricia Winston Resident information box
US20180232973A1 (en) * 2017-02-10 2018-08-16 Barry Chun Ket Chai Security management system and method thereof
US10823879B2 (en) 2018-07-27 2020-11-03 The Chamberlain Group, Inc. Obstacle detection systems and methods
USD990435S1 (en) * 2020-08-02 2023-06-27 Hung Nguyen Barrier gate opener keypad

Family Cites Families (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6072402A (en) * 1992-01-09 2000-06-06 Slc Technologies, Inc. Secure entry system with radio communications
US5061916A (en) 1990-05-29 1991-10-29 Barber-Colman Company Event driven remote graphical reporting of building automation system parameters
US5225997A (en) 1990-06-05 1993-07-06 Sygnus Controls Inc. Automatic monitoring and remote reporting device
ATE155912T1 (en) * 1992-01-09 1997-08-15 Supra Prod Inc SECURE ACCESS SYSTEM WITH RADIO CONNECTION
US5612994A (en) * 1995-02-22 1997-03-18 Chen; Jhy-Ping Interphone system
US6041106A (en) 1996-07-29 2000-03-21 Elite Entry Phone Corp. Access control apparatus for use with buildings, gated properties and the like
GB2321358A (en) 1997-01-20 1998-07-22 O E M Project Management Ltd Video security system coupled to a fax modem
US6137868A (en) * 1997-07-09 2000-10-24 Leach; Mark A. Outage notification device
NL1014735C2 (en) 2000-03-23 2001-09-25 Lbl Trading Cv Alarm method and device.
GB2368955A (en) 2000-07-12 2002-05-15 Network Systems Group Ltd Intercom and supervisory system recording image of caller

Also Published As

Publication number Publication date
GB0225146D0 (en) 2002-12-11
US20030081746A1 (en) 2003-05-01
MXPA02010666A (en) 2004-05-17
FR2831750A1 (en) 2003-05-02
US6748061B2 (en) 2004-06-08
GB2381926A (en) 2003-05-14
NZ522259A (en) 2004-04-30
DE10250137A1 (en) 2003-06-26
FR2831750B3 (en) 2004-01-09

Similar Documents

Publication Publication Date Title
CA2410016A1 (en) Access control system having a programmable automatic notification feature
US6728351B2 (en) Access control system having tenant codes that may be selectively displayed
US7460859B2 (en) System and method for obtaining a status of an authorization device over a network for administration of theatrical performances
DE60128473T2 (en) INTEGRATED SAFETY AND COMMUNICATION SYSTEM WITH SAFE COMMUNICATION CONNECTION
US7529350B2 (en) System and method for obtaining equipment status data over a network
US20030132830A1 (en) Access control system in seamless communication with personnel management systems and the like
WO2002005220A1 (en) Integrated telephone/proximity access control system
US6606260B2 (en) Switch mode power supply for a telephone entry system or the like
EP2592830A1 (en) Video door entry system
US8464359B2 (en) System and method for obtaining a status of an authorization device over a network
CN111445611A (en) Face recognition access control system
EP1587293B1 (en) Wireless door telephone
CN101630421A (en) Remote visual door control system
CN108876999A (en) Access control system based on recognition of face
US7734018B2 (en) System and method for establishing a call between a calling party and a called party over a wired network
CN208255978U (en) Access control system based on recognition of face
US4872194A (en) Method for transmission of alarm signals utilizing an entrance telephone system
KR100332286B1 (en) System and method for controlling gate of apartment complex
Lau et al. A microprocessor-based gate security system
CN109377597A (en) A kind of offline urgent cryptographic system of Yunmen taboo
CN102123329A (en) District visible intercom system for managing entrance door
US7499527B2 (en) System and method for determining the status of a telephone in a packet switched network
KR100685813B1 (en) Apparatus for controlling door using server pc and camera and interphone and method thereof
EP0182780B1 (en) Entrance telephone installation and method, for transmission of alarm signals
CN1130834A (en) Exchanger management system for guesthouse and its control

Legal Events

Date Code Title Description
EEER Examination request
FZDE Discontinued