BARRIER CONTROL SYSTEM

20190088050 ยท 2019-03-21

Assignee

Inventors

Cpc classification

International classification

Abstract

The device controls the opening and closing of mechatronic access control barriers. It validates entry requests from identity verification mechanisms with a real-time database of authorizations. Controlling users can give, remove, and edit virtual entry keys in real-time. Keys are programmed for one-time use, specific amount of uses, or in a fixed or recurring schedule. Potential guests can request in advance a virtual key of a restricted area from controlling users. The device sends an entry notification to controlling users when their virtual keys are used.

Claims

1. A barrier control system comprising: at least one processor; at least one memory modules; at least one transceiver module; a plurality of ports; wherein at least one port of said plurality of ports is dedicated to interface with an access gate for a restricted area; wherein at least one port of said plurality of ports is dedicated to interface with a digital key input device; wherein said at least one processor is configured to receive a digital key input data, send it to a remote server through said at least one transceiver module, and receive authorization data related to said digital key input data; and wherein said at least one processor is further configured to send a grant or deny access command to said access gate for a restricted area based on said received authorization data.

2. The barrier control system of claim 1, wherein said at least one transceiver module is a Wi-Fi module.

3. The barrier control system of claim 1, wherein said digital key input device is a barcode scanner.

4. The barrier control system of claim 1, wherein said digital key input device is a QR code scanner.

5. The barrier control system of claim 1, wherein said digital key input device is a fingerprint scanner.

6. The barrier control system of claim 1, wherein said digital key input device is a camera.

7. The barrier control system of claim 1, wherein said at least one processor is further configured to identify facial features through image recognition software.

8. The barrier control system of claim 1, wherein said digital key input device is an RFID reader.

9. The barrier control system of claim 1, wherein data related to access granted and denied is stored in a database in said remote server.

10. The barrier control system of claim 1, wherein said at least one memory modules comprises digital key data configuration software.

11. The barrier control system of claim 10, wherein said digital key data configuration software is accessible through a web application.

12. The barrier control system of claim 10, wherein said digital key data configuration software is accessible through a mobile application.

Description

BRIEF DESCRIPTION OF THE DRAWINGS

[0016] Various other objects, features and advantages of the present invention will become fully appreciated as the same becomes better understood when considered in conjunction with the accompanying drawings.

[0017] FIG. 1 is a block diagram of the various elements that interact to achieve the objects of the present invention.

[0018] FIG. 2 is a block diagram of the various components of an exemplary embodiment of the present invention.

[0019] FIG. 3 illustrates further illustrates the various elements that achieve the objects of the present invention in relation to a user being granted access to a restricted area.

DESCRIPTION OF EXAMPLE EMBODIMENTS

[0020] To provide an overall understanding of the invention, certain illustrative embodiments and examples will now be described. However, it will be understood by one of ordinary skill in the art that the same or equivalent functions and sequences may be accomplished by different embodiments that are also intended to be encompassed within the spirit and scope of the disclosure. The compositions, apparatuses, systems and/or methods described herein may be adapted and modified as is appropriate for the application being addressed and that those described herein may be employed in other suitable applications, and that such other additions and modifications will not depart from the scope hereof.

[0021] As used in the specification and claims, the singular forms a, an and the include plural references unless the context clearly dictates otherwise. For example, the term a memory module may include a plurality of memory modules unless the context clearly dictates otherwise. As used in the specification and claims, singular names or types referenced include variations within the family of said name unless the context clearly dictates otherwise. Terms such as attached, affixed, connected, mechanically coupled, interconnected, and similar refer to a relationship wherein structures are secured or attached to one another either directly or indirectly through intervening structures, as well as both movable or rigid attachments or relationships, unless expressly described otherwise. Terms such as electronically coupled are directed to wire and wireless connections between electronic elements such as power supplies, amplifiers, computers and circuits. Moreover, the features and benefits of the disclosure are illustrated by reference to the exemplified embodiments. Accordingly, the invention expressly should not be limited to such exemplary embodiments illustrating some possible non-limiting combination of features that may exist alone or in other combinations of features; the scope of the invention being defined by the claims appended hereto. Certain terminology is used in the following description for convenience only and is not limiting.

[0022] Turning descriptively into the drawings, in which reference characters denote similar elements, the figures illustrate the exemplary embodiment having a processor, a memory, wireless communication transceivers, several ports and software stored in said memory.

[0023] As shown in FIG. 1, and exemplary embodiment of the barrier control system object of the present invention 100 allows controlling users, which are fixed users of a restricted area, to invite other non-fixed users into this restricted area by creating and sending a key 110 unique to this user. A key can be, but is not limited to virtual images like QR codes and Aztec codes 112 which can be presented digitally to a reader 120 from any device 160 with a screen, or algorithms. Controlling users can also enable other types of keys that are fixed to a user to be used as keys for this restricted area with the barrier control system. For example, keys may also be radio wave communication devices 111 such as RFID (Radio Frequency Identification) of NFC (Near-field communication) tags or physical keys 113 that comprise a memory for storing digital information related to a key. A key may also be a digital representation of a user's biometric identification data, such as a fingerprint, facial features, retina, or voice.

[0024] Keys are presented to a reader 120 by the visitor, temporary user or controlling user. The reader may be any kind of input device that can recognize and interpret the key data, such as a QR code scanner, a camera, a fingerprint scanner, etc. These input devices are recognized by the barrier control system through a series of interface ports. The reader sends the received input in digital format to the barrier control system 130 which evaluates keys, receives updates of keys and accesses the database 180 from the server 170 through the network 150 to retrieve information about said key, such as user privileges, location information, and other information. The barrier control system then reports interactions to the server 170 and manipulates barriers 140 via the barrier control mechanisms and/or barrier lock mechanisms. Controlling users specify the period of time for which a key they emitted is valid, the date or dates it can be used, the amount of time and receive a notification every time a key emitted by them is used. A front-end for the barrier control system accessible through a web application or a mobile application allows controlling users to request, emit, monitor, edit or cancel keys for the barrier control system.

[0025] FIG. 2 illustrates the components of an exemplary embodiment 130 of the present invention. This exemplary embodiment comprises one or more processors 210 that manage all the operations of the device, such as obtaining key data from sensors, transferring said data to a database via transceivers 260, and executing the software 250 stored in the memory 240 to change the configuration of the device. The exemplary embodiment further comprises several types of ports to attach devices so key data can be retrieved and existing barrier systems can be connected. Said ports may be UART, USB, or other. Sensor ports 230 allow the present invention to interact with input devices such as barcode scanners, fingerprint scanners, retina scanners, RFID readers, microphones, or any other kind of device that can be used to input data into the system. Said data is then recognized by the processor and compared with a database of emitted keys to grant or deny access based on what the information for that specific key is in the database. Another exemplary embodiment comprises a camera built-into the device for identification and monitoring of users that are being granted or denied access. Access gate ports 220 enable the system to be installed on existing barrier systems.

[0026] FIG. 3 shows a user 510 that has been given a key 110 by a controlling user interacting with a key reader 120. When showing the key 110 to the reader 120, the digital data from the key will be processed by the barrier control system object of the present invention 130. If the barrier control system determines that the key is valid and the conditions for granting access are met, the barrier 140 will be removed and the user 510 will have access to the restricted area 520. Data from the interaction will be stored in a database so an auditable history of granted access is maintained, for example, visitor 510 entered are 520 using key 110 on Friday, Mar. 8, 2018, at 3:00 pm.

[0027] Preferably, the device can be managed remotely from any device with internet browsing capabilities, so no physical access to the system is required to configure it. Preferably, the barrier control system can interact with any barrier, such as but not limited, to magnetic locks, gate barriers and electronic locks. Barrier control mechanisms or existing barrier control systems can also be interacted with. The barrier control system can also interact with any reader, including but not limited to, cameras, radio wave communication devices and biometric scanners. It is preferred that any interaction initiating in the identity verification mechanisms at the barrier location or, in the web application or mobile device application, are recorded and automatically updated in the databases through the servers as well as any of the devices owned by the users involved in this interaction. This interaction information allows for accurate auditing of access history for highly restricted areas. Preferably, phone numbers can be used to identify users for database purposes. Preferably, the key emission process can be initiated by a request from the visitor or by the user granting an authorization. It is preferred that administrators can authorize people as controlling users of a specific area, monitor the barriers and the user activity of the restricted area, suspend or grant privileges and keys of controlling users, visitors and temporary users. The preferred operation of the device includes closing control loop sensors such as but not limited to proximity, hall-effect, optical, and inductive sensors.

[0028] The invention is not limited to the precise configuration described above. While the invention has been described as having a preferred design, it is understood that many changes, modifications, variations and other uses and applications of the subject invention will, however, become apparent to those skilled in the art without materially departing from the novel teachings and advantages of this invention after considering this specification together with the accompanying drawings. Accordingly, all such changes, modifications, variations and other uses and applications which do not depart from the spirit and scope of the invention are deemed to be covered by this invention as defined in the following claims and their legal equivalents. In the claims, means-plus-function clauses, if any, are intended to cover the structures described herein as performing the recited function and not only structural equivalents but also equivalent structures.

[0029] All of the patents, patent applications, and publications recited herein, and in the Declaration attached hereto, if any, are hereby incorporated by reference as if set forth in their entirety herein. All, or substantially all, the components disclosed in such patents may be used in the embodiments of the present invention, as well as equivalents thereof. The details in the patents, patent applications, and publications incorporated by reference herein may be considered to be incorporable at applicant's option, into the claims during prosecution as further limitations in the claims to patentable distinguish any amended claims from any applied prior art.