METHOD AND APPARATUS FOR SECURE ACCESS TO HOMES , OFFICES , PROFESSIONAL BUILDINGS AND/OR REMOTE MACHINERY AND EQUIPMENT
FIELD OF TFf-E INVENTION The present invention relates to systems and methods for controlling access to premises using cellular telephones.
BACKGROUND OF THE INVENTION
The following U.S. Patents are believed to represent the current state of the art:
U.S. Patents 6,308,062; 5,297,183; 5,325,419; 5,333,178; 5,371,901; 5,551,068; 5,553,312; 5,561,446; 5,649,005; 5,793,762; 5,873,031; 5,878,343.
SUMMARY OF THE INVENTION
The present invention seeks to provide systems and methods to control access into premises by using a cellular telephone.
There is thus provided in accordance with a preferred embodiment of the present invention a cellular telephone operated access control system containing: an automatic gate, a gate operating subsystem operating the automatic gate, a cellular communication subsystem connected with the gate operating subsystem, at least one remotely identifiable remote cellular terminal employing terminal identification information uniquely associated with the remote cellular terminal, and an access- permitting database associated with the gate operating subsystem and containing the at least one remote cellular terminal identification information, wherein the gate operating subsystem being operative to receive the terminal identification information from the remote terminal via the cellular communication subsystem, query the access-permitting database for the terminal identification information and operate the automatic gate based on the result of the query.
There is further provided in accordance with a preferred embodiment of the present invention a cellular telephone operated access control system containing an automatic gate, a gate operating subsystem operating the automatic, gate, a cellular communication subsystem connected with the gate operating subsystem, at least one remotely identifiable remote cellular terminal employing terminal identification
information uniquely associated with the remote cellular terminal, an access-permitting database associated with the gate operating subsystem and containing the at least one remote cellular terminal identification information, the gate operating subsystem being operative to receive the terminal identification information from the remote terminal via the cellular communication subsystem, query the access-permitting database for the terminal identification information and operate the automatic gate based on the result of the query; and a remote administration subsystem operative to manage the access- permitting database.
There is additionally provided in accordance with a preferred embodiment of the present invention a cellular telephone operated access control system containing an automatic gate, a gate operating subsystem operating the automatic gate, a cellular communication subsystem connected with the gate operating subsystem, at least one remotely identifiable remote cellular terminal employing terminal identification information uniquely associated with the remote cellular terminal, an access-permitting database associated with the gate operating subsystem and containing the at least one remote cellular terminal identification information, the gate operating subsystem being operative to receive the terminal identification information from the remote terminal via the cellular communication subsystem, query the access-permitting database for the terminal identification information and operate the automatic gate based on the result of the query, a remote administration subsystem operative to manage the access-permitting database; and an Internet web site enabling access via the Internet to the remote administration subsystem.
There is further provided in accordance with a preferred embodiment of the present invention a cellular telephone operated access control method, which includes employing at least one remotely identifiable remote cellular terminal, dialing a telephone number of a cellular communication subsystem connected with a gate operating subsystem using the remotely identifiable remote cellular terminal, the gate operating subsystem receiving a remote cellular terminal identification information uniquely associated with the remote cellular terminal via the cellular communication subsystem, the gate operating subsystem querying an access-permitting database for the received terminal identification information and the gate operating subsystem operating an automatic gate based on the result of the query.
There is still further provided in accordance with a preferred embodiment of the present invention a cellular telephone operated access control method, which also includes managing the access-permitting database.
There is even further provided in accordance with a preferred embodiment of the present invention a cellular telephone operated access control method, which also includes managing the access-permitting database via the Internet.
Further in accordance with a preferred embodiment of the present invention the cellular communication subsystem is a cellular modem; alternatively the cellular communication subsystem is a cellular telephone.
Still further in accordance with a preferred embodiment of the present invention the remote cellular terminal identification information comprises caller ID. Alternatively and in addition, the remote cellular terminal identification information comprises a password entered via the remote cellular terminal, alternatively the password is entered via the remote cellular telephone, as a further alternative the gate operating subsystem comprises a keypad and the password is entered via the gate operating subsystem keypad.
Further in accordance with a preferred embodiment of the present invention the password is based on the remote cellular terminal identification information.
Still further in accordance with a preferred embodiment of the present invention the access-permitting database comprises a log containing at least one access permission operation.
Even further in accordance with a preferred embodiment of the present invention the access-permitting database is operative to receive at least one database instruction via cellular short message service.
Further in accordance with a preferred embodiment of the present invention the access-permitting database is operative to send at least one database query result via cellular short message service.
Also in accordance with a preferred embodiment of the present invention the at least one database instruction comprises a new remote cellular terminal identification information.
Still further in accordance with a preferred embodiment of the present invention the at least one database instraction comprises deletion of a remote cellular terminal identification information.
Even further in accordance with a preferred embodiment of the present invention the at least one database query result comprises a log comprising at least one access permission operation.
BRIEF DESCRIPTION OF THE DRAWINGS
The present invention will be understood and appreciated more fully from the following detailed description, taken in conjunction with the drawings in which:
Figs. 1A, IB and 1C are simplified illustrations of three preferred embodiments of the present invention;
Fig. 2 is a simplified block diagram of a preferred embodiment of the automatic gate of Fig. 1;
Fig. 3 A is a simplified illustration of a preferred embodiment of an access- permitting database;
Fig. 3B is a simplified illustration of a preferred embodiment of an log file of the operations of the automatic gate;
Figs. 4 A and 4B taken together are a simplified flow-chart of the process of operating an automatic gate using a cellular telephone;
Fig. 5 is a simplified block diagram of a preferred embodiment of the present invention comprising a central access-permitting database;
Fig. 6 is a simplified block diagram of another preferred embodiment of the present invention comprising a central access-permitting database; and
Fig. 7 is a simplified block diagram of a central administration server being accessed via the Internet.
DETAILED DESCRIPTION OF PREFERRED EMBODIMENTS
Reference is now made to Fig. 1A, which is a simplified illustration of a preferred embodiment of the present invention. As seen in Fig. 1 A, an automatic gate 10 is operated by a user 12 using a cellular telephone 14. The user 12, using the telephone 14, dials a telephone number that is associated with the gate 10. The dialing command is transmitted by the telephone 14 to a base station 16 of a cellular telephone service (not shown) as indicated by an arrow 18. The cellular telephone service transmits a ringing signal to the automatic gate 10 as indicated by an arrow 20. The ringing signal is accompanied by a caller number identification, also known as caller identification, CLI, automatic number identification and ANI. The gate 10 then determines, as described hereinbelow in the description of Figs. 4A and 4B, based on the caller identification, whether to permit access.
Reference is now made to Fig. IB, which is a simplified illustration of another preferred embodiment of the present invention where the cellular telephone service 22 of Fig. 1A communicates, respectively, with the cellular telephone 14 and with the automatic gate 10 via different base stations 24 and 26. The gate 10 then determines, as described hereinbelow in the description of Figs. 4A and 4B, based on the caller identification, whether to permit access.
Reference is now made to Fig. 1C, which is a simplified illustration of yet another preferred embodiment of the present invention where the automatic gate 10 is connected to a telephone service 28 that is different from the cellular telephone service 22 serving the cellular telephone 14. The telephone service 28 can be a cellular telephone service or a wireline telephone service, as seen in Fig. lC. The gate 10 then determines, as described hereinbelow in the description of Figs. 4A and 4B, based on the caller identification, whether to permit access.
It is appreciated that the automatic gate 10 can be any type of gate or door or barrier or any other physical access device.
Reference is now made to Fig. 2, which is a simplified block diagram of a preferred embodiment of the automatic gate of Fig. 1. As seen in Fig. 2, the automatic gate 10 preferably comprises a motor 30, a motor driver 32, a processor 34, a memory 36 and a line interface 38. The motor 30 is typically an electric motor, which is operative to open and to close the gate 10. The motor driver 32 typically controls the
electric current that operates the motor 30. The processor 34 controls the line interface 38 and the motor driver 32. The line interface 38 typically comprises a cellular modem. Alternatively the line interface comprises a cellular telephone. As a further alternative, if the automatic gate is connected to the wireline telephone service 28 of Fig. 1C, the line interface 38 is a wireline line interface, preferably a telephone line modem or a regular telephone line interface with a caller ID decoder. The memory 36, typically a non-volatile memory, preferably a flash memory, contains an access-permitting database. The automatic gate is typically provided with an electric power supply (not shown). The gate 10 then determines, based on the caller identification, whether to permit access as described hereinbelow in the description of Figs. 4A and 4B.
Reference is now made to Fig. 3 A, which is a simplified illustration of a preferred embodiment of an access-permitting database 40. As seen in Fig. 3 A the access-permitting database 40 typically comprises a list of caller identification numbers 42. Optionally the access-permitting database also comprises a password 44 for each of the caller identification numbers.
Reference is now made to Fig. 3B, which is a simplified illustration of a preferred embodiment of a log file 46 of the operations of the automatic gate 10 (Fig. 2). As seen in Fig. 3B, the log file 46 typically comprises a list of access permission records 47, each typically comprising a caller identification number 42, a time stamp 48, and an access status indicator 49. A time stamp 48 typically comprises a full date and time at which access to the automatic gate 10 was requested. An access status indicator 49 typically records the acceptance or rejection of access requests.
Reference is now made to Figs. 4A and 4B, which, taken together, are a flow chart of the process of operating an automatic gate. As seen in Fig. 4 A, the process begins at block 50, when the user 12 (Fig. 1A), employing his cellular phone 14 (Fig. 1A), dials the telephone number of the automatic gate 10 (Fig. 2). At block 52, the telephone service sends a ringing signal to the automatic gate 10 (Fig. 2), accompanied by the Caller ID number of the calling cellular telephone 14 (Fig. 1A). At block 54, the line interface 38 (Fig. 2) receives the ringing signal and decodes the Caller ID. The processor 34 (Fig. 2) receives the Caller ID from the line interface 38 (Fig. 2). At block 56 the processor 34 (Fig. 2) searches the access-permitting database 40 (Fig. 3A) for a matching Caller ID 42 (Fig. 3 A). If a matching Caller ID 42 (Fig. 3 A) is not found in
block 58, in block 60 an access permission record 47 (Fig. 3B) with access status 49 (Fig 3B) of rejected is entered into the log file 46 (Fig 4B) and the process ends.
If a matching Caller ID 42 (Fig. 3 A) is found in block 58, the process continues on Fig 4B In block 62, the access-permitting database 40 (Fig. 3 A) is queried to ascertain whether a password 44 (Fig 3 A) is required If a password 44 (Fig 3 A) is not required, then in block 64 an access permission record 47 (Fig 3B) with access status 49 (Fig. 3B) of accepted is entered into the log file 46 (Fig 3B) The gate 10 (Fig. 2) is then operated in block 66 and the process ends
If a password 44 (Fig 3 A) is required, in block 68 the call is answered and a password is requested from the user 12 (Fig. 1A), typically verbally. In block 70, the user entered password is checked against the password 44 (Fig 3A) in the access- permitting database 40 (Fig. 3 A). If the user entered password does match the password 44 (Fig. 3A) in the access-permitting database 40 (Fig. 3A), then in block 64 an access permission record 47 (Fig 3B) with access status 49 (Fig. 3B) of accepted is entered into the log file 46 (Fig. 3B). The gate 10 (Fig. 2) is then operated in block 66 and the process ends
If the user entered password does not match the password 44 (Fig. 3 A) in the access- permitting database 40 (Fig 3A) in block 70, in block 72 an access permission record 47 (Fig 3B) with access status 49 (Fig. 3B) of rejected is entered into the log file 46 (Fig 4B) and the process ends
It is appreciated that if a password 44 (Fig. 3 A) is not required then the call from the cellular telephone 14 (Fig. 1A) to the automatic gate 10 (Fig. 2) is not answered and there is, preferably, no charge for this call.
Reference is now made to Fig. 5, which is a simplified block diagram of a preferred embodiment of the present invention comprising a central access-permitting database As seen in Fig. 5, an access-permitting database 78, similar in structure and function to the access permitting database 40 (Fig 3 A), is hosted in a central server 80, which serves one or a multiplicity of automatic gates, instead of in each individual automatic gate The user 12 (Fig 1A) dials the number of the central server 80 and the call follows the arrows designated by reference numerals 82 and 84 to a line interface 86 connected to the central server 80 The line interface 86 receives and decodes the caller ID and transfers it to the central server 80 The central server 80, executing the
process shown and described with reference to Figs. 4 A and 4B hereinabove, determines to which automatic gate access has been requested, and if access permission is granted, dials the number of that automatic gate to operate it. The call follows the arrows designated by reference numerals 88 and 90 and is received by the automatic gate 10. The automatic gate 10, executing the process shown and described with reference to Figs. 4A and 4B hereinabove, verifies that the call is originated by the central server and operates the gate. It is appreciated that in this case the access- permitting database 40 (Fig. 3 A) in the automatic gate 10 contains only the caller ID of the central server. It is also appreciated that, if a password is not required, there is, preferably, no charge for these procedures as well. It is appreciated that a backup central server 92 can be provided for improved availability. It is also appreciated that a reporting system 94 can be connected to the central server 80 to produce various reports. It is further appreciated that the central server 80 can be interfaced to other systems 96, for example to provide remote administration, for example by connecting the central server 80 to the Internet to enable modifications of the access-permitting database 78 via the Internet 98. Alternatively, the central server 80 can be connected to a cellular short message service (SMS) to receive modification instructions for the access-permitting database using SMS messages.
Reference is now made to Fig. 6, which is a simplified block diagram of another preferred embodiment of the present invention comprising a central access- permitting database. As seen in Fig. 6 the central server is connected to the telephone network using wireline data communication facility 100 rather than cellular facility.
Reference is now made to Fig. 7, which is a simplified block diagram of a central administration server being accessed via the Internet. It is appreciated that the access-permitting database 40 (Fig. 3 A) can reside in the memory 36 of each gate and can be updated, using SMS messages, from any cellular telephone capable of sending SMS messages, or from the central server 80, wherein the central server is updated via the Internet.
It is appreciated that each automatic gate 10 can send access log records to the central server via SMS messages, either for each gate operation or in batch mode. Batch mode reporting can be initiated by each automatic gate 10 or on by polling by the central server 80.
As seen in Fig. 7 the cellular terminal 14, the automatic gate 10 and the central server 80 may be connected to different networks.
It is appreciated that the present invention is not limited to operating an automatic gate as described in detail hereinabove but can also be used for operating any other suitable automatic gate, for example, parking gates, parking lot access devices, home access devices, or for turning on and off remote machinery as well as operating other electronic devices.
It will be appreciated by persons skilled in the art that the present invention is not limited by what has been particularly shown and described herein above. Rather the scope of the present invention includes both combinations and subcombinations of the various features described hereinabove as well as variations and modifications which would occur to persons skilled in the art upon reading the specifications and which are not in the prior art.