Login| Sign Up| Help| Contact|

Patent Searching and Data


Title:
SYSTEMS AND METHODS FOR AUTHORIZING TRANSMISSION OF COMMANDS AND SIGNALS TO AN ACCESS CONTROL DEVICE OR A CONTROL PANEL DEVICE
Document Type and Number:
WIPO Patent Application WO/2020/242965
Kind Code:
A1
Abstract:
Systems and methods are provided that can include a doorbell device receiving a request signal to enter a region associated with the doorbell device from a remote control device and, responsive thereto, accessing a list identifying which of a plurality of authorized users are located within the region, identifying one of the plurality of authorized users associated with the remote control device, determining whether the list indicates that the one of the plurality of authorized users is located within the region, and determining whether to transmit a disarm command signal to a control panel device or an activation signal to an access control device based on whether the list indicates that the one of the plurality of authorized users is located within the region, wherein entries on the list can correspond to historical use of the doorbell device or the control panel device to enter and exit the region.

Inventors:
READ TRAVIS (US)
COVI ANDREW (US)
Application Number:
PCT/US2020/034277
Publication Date:
December 03, 2020
Filing Date:
May 22, 2020
Export Citation:
Click for automatic bibliography generation   Help
Assignee:
ADEMCO INC (US)
International Classes:
G07C9/00
Domestic Patent References:
WO2018213648A12018-11-22
Foreign References:
US20190066415A12019-02-28
JP2011179170A2011-09-15
US20160125676A12016-05-05
US20160210827A12016-07-21
US20170061717A12017-03-02
EP1241633A22002-09-18
US20180139332A12018-05-17
Other References:
See also references of EP 3977420A4
Attorney, Agent or Firm:
HIPKINS, Thomas, R. et al. (US)
Download PDF:
Claims:
What is claimed is:

1. A method comprising:

a doorbell device receiving a request signal to enter a region associated with the doorbell device from a remote control device;

responsive to receiving the request signal, the doorbell device accessing a list identifying which of a plurality of authorized users are located within the region, identifying one of the plurality of authorized users associated with the remote control device, and determining whether the list indicates that the one of the plurality of authorized users is located within the region; and

the doorbell device determining whether to transmit a disarm command signal to a control panel device associated with the region or an activation signal to an access control device controlling access to the region based on whether the list indicates that the one of the plurality of authorized users is located within the region, wherein entries on the list correspond to historical use of the doorbell device or the control panel device by the plurality of authorized users to enter and exit the region.

2. The method of claim 1 further comprising:

when the list indicates that the one of the plurality of authorized users is located within the region, the doorbell device refraining from transmitting the disarm command signal and the activation signal.

3. The method of claim 1 further comprising:

when the list fails to indicate that the one of the plurality of authorized users is located within the region, the doorbell device transmitting the disarm command signal or the activation signal.

4. The method of claim 3 further comprising:

responsive to transmitting the disarm command signal or the activation signal, the doorbell device updating the list to add the one of the plurality of authorized users to the list.

5. The method of claim 4 further comprising:

the doorbell device transmitting an update signal to the control panel device to update the list.

6. The method of claim 4 further comprising:

the doorbell device transmitting an update signal to a cloud server device to update the list.

7. The method of claim 1 further comprising:

the doorbell device communicating with the control panel device to access the list, identify the one of the plurality of authorized users, and determine whether the list indicates that the one of the plurality of authorized users is located within the region.

8. The method of claim 1 further comprising:

the doorbell device receiving access credentials with the request signal; the doorbell device determining whether the access credentials are valid; and

the doorbell device refraining from accessing the list when the access credentials are invalid.

9. The method of claim 2 further comprising:

when the doorbell device refrains from transmitting the disarm command signal and the activation signal, the doorbell device initiating a security action.

10. The method of claim 1 further comprising:

the doorbell device communicating with a cloud server device to access the list, identify the one of the plurality of authorized users, and determine whether the list indicates that the one of the plurality of authorized users is located within the region.

11. A doorbell device comprising:

a transceiver device; and

a programmable processor,

wherein the transceiver device receives a request signal to enter a region associated with the doorbell device from a remote control device,

wherein, responsive to receiving the request signal, the programmable processor accesses a list identifying which of a plurality of authorized users are located within the region from a database device, identifies one of the plurality of authorized users associated with the remote control device, and determines whether the list indicates that the one of the plurality of authorized users is located within the region, wherein the programmable processor determines whether to transmit a disarm command signal to a control panel device associated with the region or an activation signal to an access control device controlling access to the region based on whether the list indicates that the one of the plurality of authorized users is located within the region, and

wherein entries on the list correspond to historical use of the doorbell device or the control panel device by the plurality of authorized users to enter and exit the region.

12. The doorbell device of claim 11 wherein, when the list indicates that the one of the plurality of authorized users is located within the region, the transceiver device refrains from transmitting the disarm command signal and the activation signal.

13. The doorbell device of claim 11 wherein, when the list fails to indicate that the one of the plurality of authorized users is located within the region, the transceiver device transmits the disarm command signal or the activation signal.

14. The doorbell device of claim 13 wherein, responsive to the transceiver device transmitting the disarm command signal or the activation signal, the programmable processor updates the list to add the one of the plurality of authorized users to the list.

15. The doorbell device of claim 14 wherein the database device is part of the control panel device, and wherein the transceiver devices transmits an update signal to the control panel device to update the list.

16. The doorbell device of claim 14 wherein the database device is part of a cloud server device, and wherein the transceiver devices transmits an update signal to the cloud server device to update the list.

17. The doorbell device of claim 11 wherein the database device is part of the control panel device, and wherein the transceiver device communicates with the control panel device to access the list, identify the one of the plurality of authorized users, and determine whether the list indicates that the one of the plurality of authorized users is located within the region.

18. The doorbell device of claim 11 wherein the transceiver device receives access credentials with the request signal, and wherein the programmable processor determines whether the access credentials are valid and refrains from accessing the list when the access credentials are invalid.

19. The doorbell device of claim 12 wherein, when the transceiver device refrains from transmitting the disarm command signal or the activation signal, the programmable processor initiates a security action.

20. The doorbell device of claim 11 wherein the database device is part of a cloud server device, and wherein the transceiver device communicates with the cloud server device to access the list, identify the one of the plurality of authorized users, and determine whether the list indicates that the one of the plurality of authorized users is located within the region.

Description:
SYSTEMS AND METHODS FOR AUTHORIZING TRANSMISSION OF COMMANDS AND SIGNALS TO AN ACCESS CONTROL DEVICE OR A CONTROL PANEL

DEVICE

FIELD

[0001] The present invention relates generally to security systems and access control systems. More particularly, the present invention relates to systems and methods for authorizing transmission of commands and signals to an access control device or a control panel device.

BACKGROUND

[0002] Known security systems and access control systems can receive commands and signals from a remote control device. However, such systems do not determine a location of an authorized user of the remote control device prior to authorizing transmission of the commands or the signals to an access control device or a control panel device.

[0003] In view of the above, there is a need and an opportunity for improved systems and methods.

BRIEF DESCRIPTION OF THE DRAWINGS [0004] FIG. 1 is a block diagram of a system in accordance with disclosed embodiments; and

[0005] FIG. 2 is a flow diagram of a method in accordance with disclosed embodiments. DETAILED DESCRIPTION

[0006] While this invention is susceptible of an embodiment in many different forms, specific embodiments thereof will be described herein in detail with the understanding that the present disclosure is to be considered as an exemplification of the principles of the invention. It is not intended to limit the invention to the specific illustrated embodiments.

[0007] Embodiments disclosed herein can include systems and methods for tracking historical use of a doorbell device or a control panel device to enter or exit a region to determine a location of an authorized user of a remote control device prior to authorizing transmission of commands or signals to an access control device or the control panel device. Accordingly, such systems and methods can prevent an

unauthorized user of the remote control device, such as a thief, from using the remote control device to gain access to the region when the authorized user is located within the region.

[0008] For example, such systems and methods can include the doorbell device receiving a request signal to enter the region associated with the doorbell device from the remote control device. Responsive to receiving the request signal, the doorbell device can access a list identifying which of a plurality of authorized users are located within the region, identify one of the plurality of authorized users associated the remote control device, and determine whether the list indicates that the one of the plurality of authorized users is located within the region. Then, the doorbell device, the control panel device, and/or a cloud server device can determine whether to transmit a disarm command signal to the control panel device or an activation signal to the access control device based on whether the list indicates that the one of the plurality of authorized users is located within the region.

[0009] In some embodiments, entries on the list can correspond to the historical use of the doorbell device or the control panel device by the plurality of authorized users to enter and exit the region. For example, when the one of the plurality of authorized users uses the doorbell device or the control panel device to enter the region, the doorbell device, the control panel device, and/or the cloud server device can add the one of the plurality of authorized users to the list. However, when the one of the plurality of authorized users uses the doorbell device or the control panel device to exit the region, the doorbell device, the control panel device, and/or the cloud server device can remove the one of the plurality of authorized users from the list. In some embodiments, the doorbell device, the control panel device, and/or the cloud server device can update the list in real time and/or periodically by accessing user input received by the doorbell device and the control panel device.

[0010] In some embodiments, when the list indicates that the one of the plurality of authorized users is located within the region, the doorbell device can refrain from transmitting the disarm command signal and the activation signal. However, in some embodiments, when the list fails to indicate that the one of the plurality of authorized users is located within the region, the doorbell device can transmit the disarm command signal or the activation signal.

[0011] In some embodiments, the list and a table or other cross-referencing device identifying a respective one of a plurality of remote control devices associated with each of the plurality of authorized users can be stored on a database device, and in some embodiments, the database device can be a standalone device or can be part of the doorbell device, the control panel device, or the cloud server device. For example, in embodiments in which the database device is part of the control panel device, the doorbell device can communicate with the control panel device to access the table or other cross-referencing device for identifying the one of the plurality of authorized users and to access the list for determining whether the list indicates that the one of the plurality of authorized users is located within the region. Similarly, in embodiments in which the database device is part of the cloud server device, the doorbell device can communicate with the cloud server device to access the table or other cross-referencing device for identifying the one of the plurality of authorized users and to access the list for determining whether the list indicates that the one of the plurality of authorized users is located within the region.

[0012] In some embodiments, responsive to transmitting the disarm command signal or the activation signal, the doorbell device can update the list to add the one of the plurality of authorized users to the list. For example, in embodiments in which the database device is part of the control panel device, the doorbell device can transmit an update signal to the control panel device to update the list. Similarly, in embodiments in which the database device is part of the cloud server device, the doorbell device can transmit the update signal to the cloud server device to update the list.

[0013] In some embodiments, the doorbell device can receive access credentials with the request signal, and in these embodiments, the doorbell device can determine whether the access credentials are valid and refrain from accessing the list when the access credentials are invalid. [0014] In some embodiments, when the doorbell device refrains from transmitting the disarm command signal and the activation signal, the doorbell device can initiate a security action. For example, in some embodiments, the security action can include the doorbell device transmitting a warning signal to a mobile device that is different from the remote control device or to the control panel device, either of which, under certain conditions or responsive to user input, can authorize the doorbell device to transmit the disarm command signal or the activation signal even though the list indicates that the one of the plurality of authorized users is located within the region. Additionally or alternatively, in some embodiments, the security action can include the doorbell device transmitting an alarm signal to the control panel device or transmitting a locking signal to the remote control device. Additionally or alternatively, in some embodiments, the security action can include the doorbell device capturing an image of a person proximate to the doorbell device and transmitting the image to an owner or an occupant of the region.

[0015] In some embodiments, the remote control device can include a mobile device, a smart phone, a tablet, a portable programmable device, or a low powered device, such as a wireless dongle, a smart watch, or a keyfob. Furthermore, in some embodiments, the doorbell device can include a transceiver device for transmitting signals to and receiving signals from the remote control device, the control panel device, the access control device, and the cloud server device and a programmable processor for executing the methods disclosed herein.

[0016] In some embodiments, the doorbell device can be positioned proximate to the region, for example, on an exterior of the region. Furthermore, in some embodiments, the doorbell device can include a camera device for monitoring the exterior of the region and/or receiving information, such as the request signal, from the remote control device. Additionally or alternatively, in some embodiments, the doorbell device can include a user interface, such as a button, that, when activated, can cause the doorbell device to notify the owner or the occupant of the region about a presence of the person proximate to the doorbell device, for example, by emitting a sound or a tone or within the region or by transmitting an informational signal to a portable device associated with the owner.

[0017] FIG. 1 is a block diagram of a system 20 in accordance with disclosed embodiments. As seen in FIG. 1 , the system 20 can include a remote control device 22, a database device 24, a doorbell device 26 associated with a region R, an access control device 28 that controls access to the region R, and a control panel device 30 that monitors the region R. In some embodiments, the system 20 can also include a cloud server device 32 that communicates with the doorbell device 26 and/or the other devices of the system 20 via a network N, such as the internet.

[0018] As seen in FIG. 1 , the doorbell device 26 can include a transceiver device 34 and a programmable processor 36, and in some embodiments, the transceiver device 34 can include one or more communication modules for communicating with the remote control 22, the access control device 28, the control panel device 30, and/or the cloud server device 32 via any known wireless or wired communication medium (e.g. Wi-Fi, cellular, Bluetooth, cable, phone line, Ethernet, fiber, etc.). As also seen in FIG. 1 , in some embodiments, the database device 24 can be part of the doorbell device 26. However, in some embodiments, the database device 24 can be a standalone device or can be part of the control panel device 30 and/or the cloud server device 32.

[0019] FIG. 2 is a flow diagram of a method 100 in accordance with disclosed embodiments. As seen in FIG. 2, the method 100 can include the programmable processor 36 determining whether the transceiver device 34 has received a request signal to enter the region R, as in 102. If not, then the method 100 can include the programmable processor 36 continuing to determine whether the transceiver device 34 has received the request signal, as in 102. However, when the transceiver device 34 receives the request signal from the remote control device 22, the method 100 can include the programmable processor 36 accessing a table or other cross-referencing device in the database device 24 to identify one of a plurality of authorized users associated with the remote control device 22 and accessing a list of the plurality of authorized users in the database device 24 to determine whether the list indicates that the one of the plurality of authorized users is located within the region, as in 104. In this regard, it is to be understood that the list can identify each of the plurality of authorized users located within the region.

[0020] As seen in FIG. 2, after accessing the table or other cross-referencing device in the database device 24 to identify the one of the plurality of authorized users and accessing the list in the database device 24 to determine whether list indicates that the one of the plurality of authorized users is located within the region, the method 100 can include the programmable processor 36 determining whether to transmit a disarm command signal to the control panel device 30 or an activation signal to the access control device 28 based on whether the list indicates that the one of the plurality of authorized users is located within the region, as in 106. When the list indicates that the one of the plurality of authorized users is located within the region, the method 100 can include the transceiver device 34 refraining from transmitting the disarm command signal and the activation signal and the programmable processor 36 taking no action, as in 108, or initiating a security action. However, when the list fails to indicate that the one of the plurality of users is located within the region, the method 100 can include the transceiver device 34 transmitting the disarm command signal or the activation signal, as in 110. In some embodiments, the method 100 can include the programmable processor 36 determining whether the list indicates that the one of the plurality of authorized users is located within the region and whether to transmit the disarm command signal or the activation signal in a single processing step.

[0021] In some embodiments, the method 100 can include the transceiver device 34 transmitting the disarm command signal directly to the control panel device 30 or transmitting the activation signal directly to the access control device 28. However, in some embodiments, the method 100 can include the transceiver device 34 transmitting the activation signal to the access control device 28 via an intermediary device, such as the control panel device 30 or the cloud server device 32, or transmitting the disarm command signal to the control panel device 30 via an intermediary device, such as the cloud server device 32.

[0022] Although a few embodiments have been described in detail above, other modifications are possible. For example, the logic flows described above do not require the particular order described or sequential order to achieve desirable results. Other steps may be provided, steps may be eliminated from the described flows, and other components may be added to or removed from the described systems. Other embodiments may be within the scope of the invention.

[0023] From the foregoing, it will be observed that numerous variations and modifications may be effected without departing from the spirit and scope of the invention. It is to be understood that no limitation with respect to the specific system or method described herein is intended or should be inferred. It is, of course, intended to cover all such modifications as fall within the spirit and scope of the invention.