Access control system having a programmable automatic notification feature

ABSTRACT

An access control system such as a telephone entry system (TES) capable of seamlessly transmitting facsimile log reports to remote locations for storage. Alarms are selected such that upon an occurrence of an alarm, the access control system will send a fax to the selected phone number with information about the alarm situation and, for example, all the transaction information within the memory. Alarm situations can include, for example, a number of transactions, a specific person accessed, or code being used, a specific time of day, a specific time since the last alarm situation, a door staying open, and/or a door being forced open. Log information may be sent to an office located in a building that is remote from the access control system. This information may be sent in a standard format to any location around the world.

RELATED APPLICATIONS

[0001] The present invention is related to U.S. patent application Ser.No. ______ (Attorney Docket No. 71331/5569) entitled “A SWITCH MODEPOWER SUPPLY FOR A TELEPHONE ENTRY SYSTEM OR THE LIKE” to J. Ahlstrom;U.S. patent application Ser. No. ______ (Attorney Docket No. 71336/5569)entitled “ACCESS CONTROL SYSTEM HAVING TENANT CODES THAT MAY BESELECTIVELY DISPLAYED” to J. Ahlstrom et al.; and U.S. patentapplication Ser. No. ______ (Attorney Docket No. 71338/5569) entitled“ACCESS CONTROL SYSTEM IN SEAMLESS COMMUNICATION WITH PERSONNELMANAGEMENT SYSTEMS AND THE LIKE” to W. Dow et al.; all filedconcurrently herewith and assigned to the assignee of the presentinvention.

BACKGROUND OF THE INVENTION

[0002] 1. Field of the Invention

[0003] The present invention is related to access control systems andmore particularly to reporting activity on an access control system.

[0004] 2. Background Description

[0005] Apartment buildings, office buildings, condominium complexes,gated residential communities, industrial parks and other securedlocations often include an entrance access control system. One type ofaccess control system, known as a telephone entry system (TES), providesbuilding security as well as tenant access control to a particularbuilding, apartment complex, etc. The access control system controlsentry at one or more other building entry points, e.g., doors, garagedoors, etc. A typical access control system includes a main control unitlocated at a primary entrance and, depending on the size of thestructure or area being monitored, additional remote units may beprovided to control remotely located doors. The access control systemmay also monitor the connected entry points for unauthorized access. Fora TES type access control system visitors wishing to enter thebuilding/complex contact tenants or other building personnel over theTES, that are capable of admitting the visitor by remotely unlocking theentrance, e.g., from the tenant's apartment.

[0006] The main control unit controls the main building entrance and mayinclude a keypad and auto-dialer and be connected to a public telephoneline. Remote units, typically communicate with the main unit to provideremote access to authorized personnel. The main unit can identifytenants seeking entry by a personal access code, authorize entry,monitor for unauthorized entry at the remote doors, etc. A tenantdirectory may be displayed on the control unit itself or on an adjacentsign. The directory includes tenant codes that are correspondingdirectory code numbers for each person, business or for other entitiesin the building (e.g., corporate departments, business employees, orother building tenants) authorized to unlock the entrances.

[0007] When a visitor enters a tenant code into the keypad, the maincontrol unit automatically dials the corresponding tenant's telephonenumber. Then, the called tenant has an opportunity to establish theidentity of the visitor. The tenant, using the same everyday telephoneupon which the call was received, unlocks the entrance, e.g., bypressing a predetermined number on the telephone keypad.

[0008] Some state of the art access control systems generate alarm callsunder various conditions. If the access control system senses the doorit has control over is forced open, an alarm call may be generated. Ifthe same door is opened by the access control system but fails to closeafter a specified amount of time, an alarm call may be generated.Occasionally, someone may randomly enter codes at the keypad in the hopeof discovering an entry code. To prevent this, a count of the number ofinvalid sequential codes may be maintained. If a maximum false entrycount is met, an alarm call may be generated.

[0009] Normally, an alarm call is made by dialing a telephone numberand, then, periodically beeping until the person answering the callpresses a digit on a dual tone multifrequency (DTMF) telephone. A nextlevel of alarm call may be voice. At this level the system states “ALARMDOOR 1.” Again, the alarm process is terminated in response to pressinga digit from the answering telephone. The next alarm call level is amodem call. At this level the access control system uses the modem tocall another modem and then, transmits a detailed description of thealarm call. The originating modem identifies the originating unitexperiencing the alarm condition.

[0010] Some access control systems may log entries/exits or a number ofother selected events. Typically, a history log, e.g., of the last 2000such events, may be maintained in system memory. Should the need ariseto review authorized and/or unauthorized building entries, such ahistory log may prove to be an invaluable tool, provided the events ofinterest remain in memory. Often, the event log may be too short tocontain enough history to establish a telltale trend, e.g., relating thecomings and goings of a single missing tenant of a 200 tenant complex.

[0011] Periodically saving a printed log for storage may just presentthe complex manager with another apparently unnecessary task.Unnecessary, that is, until that one event occurs where reviewing thelogs is a priority. It may be very tempting, rather than collecting theprintouts and sending them to storage, to just throw printouts into thetrash, thinking no one will ever notice.

[0012] Thus, there is a need for a way to automatically send systemalarm calls and other log information to the proper authorities or otherauthorized personnel for attention, processing and/or storage.

SUMMARY OF THE INVENTION

[0013] It is a purpose of the present invention to facilitate accesscontrol system long term record retention;

[0014] It is another purpose of the invention to automatically provideaccess control system history for storage to selected remote locations.

[0015] The present invention is an access control system such as atelephone entry system (TES) capable of seamlessly transmittingfacsimile log reports to remote locations for storage. Alarms areselected such that upon an occurrence of an alarm, the access controlsystem will send a fax to a selected phone number, sending informationabout the alarm situation and, for example, all the transactioninformation within system memory. Alarm situations may include, forexample, a set number of transactions, a specific person accessed, acode being used, a specific time of day, a specific passage of timesince the last alarm situation, a door staying open, and/or a door beingforced open. Log information may be sent to an office located in abuilding that is remote from the access control system. This informationmay be sent in a standard (fax) format to any location around the world.

[0016] Advantageously, faxing the alarm information allows usingstandard communications over potentially long distances.

BRIEF DESCRIPTION OF THE DRAWINGS

[0017] The foregoing and other objects, aspects and advantages will bebetter understood from the following detailed preferred embodimentdescription with reference to the drawings, in which:

[0018]FIG. 1 shows an example of a typical building such as a factorywith access controlled by a simple telephone entry system (TES)according to the preferred embodiment of the present invention;

[0019]FIG. 2 shows an example of a main control unit;

[0020]FIG. 3 is an example of a peripheral control unit;

[0021]FIG. 4 shows an example of a minimum TES configuration;

[0022]FIG. 5 is an example of a building with a multiple access pointTES;

[0023]FIG. 6 shows a main control unit upper electronics assembly in aninternal view;

[0024]FIG. 7 is an expanded view of the detachable handheld keypad;

[0025]FIG. 8 shows a block diagram of a motherboard enclosed in the maincontrol electronics assembly;

[0026]FIG. 9 shows a building with access controlled by a preferredembodiment access control system in communication with a remotelylocated fax machine;

[0027] FIGS. 10A-B show an example of a word (ALARM) defined for faxingand an expanded view of the letter A;

[0028]FIG. 11 is a flow chart showing how messages may be faxed.

DESCRIPTION OF THE PREFERRED EMBODIMENTS

[0029] Turning now to the drawings and, more particularly, FIG. 1 showsan example of a typical site, a factory building 90 in this example,with access controlled by a preferred embodiment telephone entry system(TES) that, in response to a defined alarm condition, may automaticallyfax information related to the alarm condition to the proper authoritiesfor responding to the alarm condition.

[0030] Previously, access control systems did not fax an alarm call orother transaction because of limited system resources. For convenienceand brevity a modem call transfers the information using ASCIIcharacters. For example “ALARM” is 41 4C 41 52 4D in hexadecimal ASCII,where

[0031] ‘A’=0×41=0100 1000

[0032] ‘L’=0×4C=0100 1100 etc.

[0033] So, typically an access control system would use the modem tosend 5 bytes: 41, 4C, 41, 52, 4D.

[0034] By contrast, a typical fax page includes 1728 black or white dotsper line (width) and 1143 lines (length). The preferred embodimentaccess control system converts messages from ASCII to dots for faxing.These are messages that would otherwise be sent using a modem, printedwith a printer or displayed on a computer display. The convertedmessages are faxed to proper authorities, e.g., police, fire department,security personnel, building management, as described hereinbelow.

[0035] So, returning to FIG. 1, the TES is in communication with one ormore general purpose computer 92. A computer terminal 94, such as apersonal computer or the like, and a modem 96 are attached to thegeneral purpose computer 92. Product assembly lines 98, shown forexample only, are located at one end of the factory 90. A parking lot100, e.g., for employee parking, is located at the front of the building90. The building 90 includes a front entrance 102, a rear entrance 104and an emergency exit 106 with attached sensors (not shown) indicatingwhether the door at emergency exit 106 is open or closed. In thisexample, the front building entrance 102 provides passage to/from theparking lot 100 and a gate 108 provides auto entry/exit to the parkinglot 100. A code entry unit, remote entry keypad 110, is located at rearentrance 104 for entering access codes. The gate 108 includes entry andexit code entry units, external card reader 112 for requesting entry andinternal card reader 114 for requesting exit. A main control unit 116,which may contain the fax modem, controls building entry directly ateach of the front entrance 102 and rear entrance 104 and monitorssensors at the rear emergency exit 106. Further, to allow for thedistance of the gate 108 from the main unit 116, a peripheral unit 118controls the gate 108 and communicates with the main unit 116. Theperipheral unit 118 passes entry/exit requests from the gate cardreaders 112, 114 to the main unit 116 and, upon receipt of anauthorization response to such a request, opens/closes the gate 108.

[0036] Card readers 112, 114 may include well known Weigard protocolcard readers, Barrium Ferrite and Proximity Readers or ClikCardReceivers, for example. Access control system and TES are usedinterchangeably herein. The present invention is described herein withreference to a TES type of access control system, for example only andnot as a limitation. Further, although general purpose computer 92 isshown here as being located on site, this is for example only. It isunderstood that computer 92 may be located at a remote site (not shown)and in communication with the access control system over public orprivate telephone lines using a modem or any other appropriatecommunications media.

[0037] The preferred embodiment TES and the general purpose computer 92communicate with each other seamlessly. Entries made in the TES areseamlessly transferred to the general purpose computer 92 and updated incorresponding databases stored therein. Likewise entries made inselected databases within the general purpose computer or in other typesof selected files are reflected in the TES, seamlessly, and withoutrequiring manual intervention. Thus, for example, employees may be addedor removed from factory personnel logs stored in the general purposecomputer and, as each is entered or removed, the corresponding entrycode in the TES is added or deleted. In a more particular example, aHuman Resources person sitting at a terminal 94 may delete an employeefrom a list of employees in the general purpose computer 92. Upon suchdeletion, the general purpose computer 92 contacts the TES using modem96, and corresponding employee records stored in the main unit 116 aredeleted.

[0038] Furthermore, other types of entries, such as holidays, may bechanged in the main computer 92 and those changes reflected in the TES.So, for example, in a first year Independence Day may fall on a Tuesday.That year the company may decide to also make Monday, the third of July,a holiday. A Human Resources person enters the selection of July 3^(rd)and 4^(th) as holidays in the personnel system and those holidays areautomatically communicated to the main unit 116. In the following year,which is a leap year, Independence Day falls on a Thursday. So, thisfollowing year the fifth of July is also selected as a holiday. Thus,the Human Resources person deletes July 3^(rd) as a holiday in thepersonnel system and adds July 5^(th) as a holiday. The personnel systemcauses computer 92 to transmit the deletion of July 3^(rd) and theaddition of July 5^(th) as holidays to the main control unit 116. Inresponse to each set of holiday dates, the TES restricts access to themain building during holidays to selected management personnel, e.g., tothe factory manager and assistant manager. On normal work days, the TESopens the front gate 108 at 8:00 a.m. and closes it at 6:30 a.m.However, during the selected holidays, July 3^(rd) and 4^(th) of thefirst year and July 4^(th) and 5^(th) of the second, the front gate 108remains closed with access provided only through the card reader 112 andexit only through card reader 114.

[0039] In addition, information may be passed the other way as well fromthe TES to the main computer 92. The TES, monitoring rear entrance 106may receive an indication that the rear door is open, e.g., from thedoor ajar sensor. Immediately, the TES faxes that information to theproper authorities. In addition, the alarm may be relayed to the generalpurpose computer 92 which displays a message on the computer terminal 94to a security guard, alerting the guard that the rear door has beenopened. In response to the rear door 106 being opened, the TES may alsosound a building alarm and dial an emergency number, to call the firedepartment for example. Coincidentally, as the TES sounds the alarm andcalls the fire department, the TES may report this information to thegeneral purpose computer 92 which may display the information toappropriate personnel.

[0040] Tenant or contact codes, such as for contacting departmentswithin a business or tenants in an apartment complex, may be displayedon the main unit 116. The code sequence length for granting access isarbitrary and depends on the configuration of the particular unit. Thepreferred embodiment TES manages the admission process, recalling anddialing tenant telephone numbers and then, responding to dual tone multifrequency (DTMF) signals from their telephones to unlock a door, open agate or open another connected device.

[0041] These directory contact codes prompt the system to call aparticular tenant. Each contact code entered into the main controlkeypad points to the telephone number of a corresponding tenant. Avisitor may enter a tenant contact code into the main unit to call andcommunicate with an associated tenant. Tenant contact codes can belinked to the tenant's card or entry code, and may be deleted once thetenant leaves the building, e.g., moves out, thereby removing thetenant's building access authorization. Thus, each tenant must beassociated with at least one individual contact code. All codes are notrequired to be displayed in the directory display, i.e, some codes maybe unlisted.

[0042] This unlisted number feature allows tenants that desire privacyand wish to restrict awareness that they are tenants of the building toprevent their contact code from being displayed. So, unlisted contactcode numbers are not listed in the display directory and are notdisplayable. Thus, only visitors that know an unlisted contact code canenter the code to contact the tenant. Without knowing the unlistedcontact code, visitors do not have information to contact the tenant.Also, tenants may select a tenant Do-Not-Disturb (DND) feature to blockcalls to the tenant during selected period.

[0043] So for example, where the preferred TES controls access to anapartment complex, a visitor arriving at the building or complex, canfind a tenant's contact code on the main control unit 116 directory,provided the code is listed. Then, the visitor may select or enter thetenant's code and the preferred embodiment system will dial anassociated tenant's telephone number without the visitor knowing thetenant's telephone number. Upon answering the call, the tenant mayinitiate one of four actions by dialing a number on the telephone. Theseactions may include activating first relay, for example, to open a frontdoor or entry gate; activating a second relay to open another door orenable whatever device is controlled by the second relay, e.g., anelevator; and, continue to talk to the visitor.

[0044] In addition, building tenants can access the building using thepreferred embodiment TES, which controls entrances and selectivelygrants access. Typically, each tenant has an assigned access code and/orcard to access the complex. As the tenant enters a corresponding accesscode on a keypad or, cards in using a card reader (connected to one ofthe main control units 116 or peripheral unit 118). The system checks todetermine if the entered access code is valid. If the code is valid andaccess is not restricted for the particular entrance, the system grantsaccess by unlatching the entrance, e.g., opening a front gate or garagedoor.

[0045] Access codes are enabled programmably to allow tenants to enteror exit through one or more gate(s) or door(s). Entrances aresymbolically linked to the tenant's access code and links may be deletedwhen a tenant moves out. Entry cards, like access codes authorize entry.Thus, swiping the card through an entry card reader or touching a smartcard to a smart card reader, provides access at an authorized entrance.Authorizations for entry cards as well as access codes may be restrictedto certain entrances and for selected time periods or generallyauthorized for all building entrances and at any time. A valid doorstructure (VDS) grants tenant access to a set number of doors, and maydeny access to other doors. So, for example, a VDS may be createdauthorizing tenant access to the front and back door, but not to amanager's door or a garage door. A second VDS may be created for themanager to authorize access to all doors.

[0046] Also, access restrictions may be placed on codes to reduce thepossibility of a card or code being used by more than one person. Periodrestricted or time zone access may limit the times of day that access isallowed through a particular entry location, e.g., access may berestricted only to the front entrance of a building during night hours.An anti-pass back restriction may be one of two types, either true ortimed anti-pass back. True anti-pass back requires that each entry bematched by an exit before re-entry is allowed. Timed anti-pass backrequires that a defined period of time pass before the same card or codemay be used again for re-entry by the same reader or keypad. If thetimed anti-pass back feature is set to time out in sixty seconds, forexample, the system will not grant access to anyone trying to re-enterusing the same code or card at the same reader until, for example, sixtyseconds have elapsed from the most recent entry.

[0047] Likewise, a Strikes-And-Out feature may be included to prohibitunauthorized persons from guessing an entry code. The Strikes-And-Outfeature allows a selected number of erroneous code entries beforetemporarily disabling a code reader at a particular door for a specifiedamount of time. Upon occurrence of a Strikes-And-Out, an alarm maytrigger a fax notification of the occurrence. An anti-pass backforgiveness feature may be timed, such that after expiration of theforgiveness period, entry using the same code or card may be resumed.So, for example, after midnight entry may be made re-using a blockedcode or card to the same building.

[0048] For convenience, use frequency limits or period limits may beplaced on cards or access codes, to allow issuance of temporary cards oraccess codes that are authorized for limited numbers of uses or for alimited period of time. Use limited codes or cards grant entry for setnumber of uses. Thus, a code or card may be authorized for sixty usesover the course of a month, for example. Once the card use exceeds thatsixty-use limit, the code or card is no longer valid and the card may bediscarded. Period limits may include date limitation wherein cards oraccess codes are authorized for entry until a specified date, i.e., anexpiration date. For example, a tenant may be scheduled to move out ofthe building on December 1^(st) of the current year. The expiration datefor that tenant's card or access code may be set for December 1^(st) andthereafter, access to the building is not authorized for either the cardor access code. First-Use time limited cards or access codes authorizeentry for a set number of days/hours/minutes after first use. Forexample, a tenant may have access for an unspecified week which beginsto run upon the first entry. After the first entry, the tenant can usethe card/code to enter and exit the building for a week until the periodexpires and is no longer valid. Start-Now time limited cards/codes aresimilar to First-Use time limited cards/codes providing authorizedaccess over a period of days/hours/minutes beginning immediately.

[0049]FIG. 2 shows an example of a main control unit 116 and FIG. 3shows an example of a peripheral unit 118. The main control unit 116houses a main system motherboard (not shown) as well as TES software andbuilding/tenant related data. A keypad 120 is included on the main unit116 for numeric code entry, e.g., entering access codes or tenant phonenumbers to contact tenants. A display 122 is provided for displayingtelephone numbers stored in the system, as well as providing interactiveinformation and for viewing any diagnostic information that might bedisplayed during entry or normal maintenance. Both the main control unit116 and the peripheral unit 118 include keyed access points 124, 126.Unlocking each unit's housing provides access to system circuitscontained within the particular unit 116, 118.

[0050] The main unit control 116 includes four internal relays andpreferably is capable of supporting four (4) peripheral units 118.Further, in this embodiment each peripheral unit 118 includes fourrelays. Thus, besides pedestrian access control, relays can by employedfor generating alarms, bypassing an alarm, providing elevator accesscontrol, controlling close circuit television (CCTV), controlling a gateoperator and, for heating and air-conditioning system control. Each ofthe main control unit 116 and peripheral units 118 also include aninterface for an exit request sensor and door position sensor. Whenattached, the exit request sensor senses when a request is placed forexit through the door, e.g., a button is pushed to request exit. A doorposition sensor senses when a door has been pried open or is otherwiseopen and/or remains open, e.g., for more than a minute after a relaydeactivation.

[0051] Messages such as greetings, general information or warnings maybe programmed into the main unit 118 for display on the display 122. Aseries of system menus are provided on the display 122 for manuallyprogramming the preferred embodiment TES. These menus are navigableusing a menu prompt, scrolling through each menu level to identify andselect an active value that corresponds to a desired menu action. Themenus may be navigated by pressing numbers or characters on the keypad120 that prompt a currently displayed option. Command prompts may beidentified as appropriate, such as using a designated character,underscoring, highlighting or placing a cursor below the prompt.Further, depending on the number of displayable lines on the maincontrol unit display 122, scrolling up and down the menu lines may berequired as the number of current menu lines may exceed the number oflines that may be displayed. Further, the preferred embodiment TES mayconvert messages to a foreign language, e.g., by pressing a main controlkeypad 120 number to select displaying messages in Spanish.

[0052] A manager call button 128 may be included on the keypad 120.Pressing the manager call button 128 prompts the system to call apreselected manager's telephone number. Up to four different managertelephone numbers can be accompanied with a call schedule for eachnumber such that calls are placed to selected ones of the manager phonenumbers depending on the time of day, for example. A programmablemanager's call schedule, sets times when visitors are allowed to contactthe manager. Call schedules for up to four managers may be programmedwith each manager having up to four sub-schedules and each sub-schedulehaving up to four segments. In addition, the manager call button may beselectively disabled to prevent visitors from contacting the manger fromthe main unit during any period that it is disabled. So, for example,the manager call button may be disabled between midnight and 5:00 AM andthe preferred embodiment TES would not respond to pressing the Managercall button during those hours.

[0053]FIG. 4 shows an example of a building 130 with a minimum TESconfiguration. Building 130 includes a front door 132 and a rear door134, access through both of which is controlled directly by a maincontrol unit 116. In this example, a card reader 136 is provided at thefront door 132 for requesting access and a remote keypad 138 is at therear entrance 136 for exit. Also, in this example of a simple TES, acard reader 140 is included at the rear entrance 136. Remote entryrelays 142, 144 are provided, each controlled by the main control unit116, to remotely open/lock the respective front entrance 132 and rearentrance 134.

[0054] Additionally, the access control system of this example includesa printer 146, a computer terminal 148 and a telephone 150 connected tothe main unit 116. The printer 146 is included for printing out periodicreports, periodic system dumps or diagnostics information. The computerterminal 148 may be used with an interface program such as SPSWin fromSentex Systems for example, to program the control unit 116 and maintaindata in databases. Telephone 150 provides another point of internalaccess to the system telephonically and, correspondingly, to buildingtenants connected to the system. Also, the main control unit 116accesses an external telephone system, e.g. for fax/modem communicationsfunctions.

[0055] The TES records all transactions including telephone calls andany other system activity and may send a report in any number of ways.For example, the fax modem may be used to fax the report to a remote faxmachine, the printer may print the report locally, the display maydisplay the report or, the modem may send the report to a remotecomputer terminal. Logged transactions may include any activity such asvisitor directory calls, tenant entry references (whether granted ordenied), card or code activity and any other activity that the systemmanager may select, whether at the main control unit or a peripheralcontrol unit. Further, reports may be scheduled for automatictransmission, at a previously selected time to a previously selecteddestination.

[0056]FIG. 5 shows an example of an expanded access control systemcontrolling multiple access points in Building 150. In this example, asingle main control unit 116 communicates with two peripheral units 118to control remote entry. Main unit 116 controls both peripheral units118 and directly controls access to central doors 152, 154. Eachperipheral unit 118 controls access to a remote pair of doors 156, 158and 160, 162. Further, each of a remote keypad 154 k, 156 k, 158 k, 160k, 162 k and a card reader 154 c, 156 c, 158 c, 160 c, 162 c is locatedat each of the entrances 154, 156, 158, 160 and 162. In this example, aclosed circuit television camera (CCTV)164 connected to main unit 116 islocated at entrance 152, for monitoring activity at that entrance. Abutton 166 may be located at door 152 to request exit from the building.A closed circuit TV monitor 168 is located internally to the buildingfor monitoring activity at entry 152, e.g., by a guard and for grantingaccess to entrance 152. The guard may authorize entry through telephone170, through a dedicated input device (e.g., a button), through acomputer or through any other appropriate device. Each of remoteperipheral units 118 and main unit 116 controls a pair of relays labeledA and B, each of which remotely opens/closes or locks/unlocks arespective one of the doors.

[0057] Each of the main control unit 116 and any connected peripheralunits 118 may be configured for one-door control or two-door control.For one-door configuration, the unit controls one door for entry or exitand includes three other relays that are available for other functionssuch as, shunting or bypassing an alarm, triggering an alarm oractivating a closed circuit TV. For a two-door configuration two relaysare available for shunting or rerouting an alarm.

[0058] When a tenant swipes a card or enters a code, the TES responsemay include one or more relay actions, e.g., a door will cycle, the CCTVwill cycle on, etc. A relay activation structure (RAS) controls relayresponses to entry cards or codes. Each RAS defines one or more relayresponses and is associated with an entry card or code. Relay commandsare provided for programmable individual relay control and select relayresponse to an entry request. A cycle command causes a selected relay torespond by opening and then closing after a period of time, e.g.,buzzing in someone to a locked building. A latch-open command energizesthe relay, for example, to unlock the door and leave the door unlockeduntil prompted to re-energize the relay, thereby re-locking the door. Alatch release command returns the relay action to a default setting,e.g., if the door is open after responding to a latch open command,issuing the latch release command returns the corresponding relay to thecycle state. An initial default state may be selected such that relaycontrol is set to that default state upon system power up.

[0059] The system may monitor door status to determine whether it isheld open more than a predefined maximum time and, otherwise, determinewhether a controlled door is stuck open, i.e., a building securitybreach has occurred. An open door condition may elicit an alarm callwherein using the modem, the system transmits an alarm message to adesignated computer or to a fax machine. Alternately, the systemresponse to an open door may be to close a relay that turns on an alarmlight or that sounds a siren to inform a monitoring station of theperimeter breach.

[0060] When an alarm is triggered (e.g., because a door has been forcedopen), the preferred embodiment TES automatically sends an alarm messageover the modem to a designated recipient e.g., a computer terminal or afax machine. The alarm message typically includes an alarm unit ID toidentify the open door so that the message recipient knows the alarmorigination point. The alarm call unit ID is programmable in the TES asis the number of retry times for dialing the number. Also, alarms may beenabled or disabled, e.g., for maintenance purposes. In the event of analarm, the preferred embodiment TES reports the alarm by calling apreviously designated location, which may be a fax machine, a terminalconnected through a modem, an alarm company or to a pager. If thelocation does not answer the call or the number is busy, the controlunit repeatedly hangs up and redials the same number until the systemconnects or, until the redial retry number is met. If, alternately, adirect connection is provided to a computer, printer or other reportingdevice, the TES reports the alarm condition occurrence directly, postingor printing a message that indicates the occurrence, e.g., on theattached printer.

[0061]FIG. 6 shows upper electronics assembly 180 in an internal view ofan open main control unit 116. The upper electronics assembly 180includes a detachable handheld keypad 182 and a display 184 which may bea liquid crystal diode (LCD) display. A pluggable memory module 186 isshown inserted at the top of the upper electronics assembly 180. Thepluggable memory module 186 is, preferably, flash electronicallyprogrammable read only memory (Flash EPROM). Local audio communicationsmay be effected in an intercom-like or speaker phone fashion through thefaceplate of the main control unit 116 using a microphone 188 andspeaker 189.

[0062] Two types of data that may be saved or reloaded into the maincontrol unit using the pluggable memory module 186. These two types ofdata include, unit data and operating data necessary for normaloperation and is inserted during initial installation. Unit dataincludes user-generated data for the particular control unit. Suchuser-generated data may include code entries for tenants. Operating dataincludes any data required by the main control unit to operate. A backupmodule may be inserted periodically to backup/restore unit or operatingdata from/to the control unit memory. The backup module also may be usedfor upgrading the control unit operating system.

[0063]FIG. 7 is an expanded view of the detachable handheld keypad 182which is an alphanumeric keypad. The detachable handheld keypad 182includes a numeric section 190 and an alphabetic section 192. Thenumeric section 190 includes several cursor keys 190 c, a backspace key190 b, an escape key 190 e and a clear key 190 cl. The cursor keys 190 cfacilitate navigating between displayed menu entries, e.g., on thedisplay 184 in FIG. 5. The backspace key 190 b functions to eliminate asingle previously entered number or character at a time. The escape key190 e may be used for canceling an erroneously entered command keysequence and/or terminating a command, i.e., aborting. A single strokeof the clear key 192 cl clears displayed entries.

[0064] The alphabetic section 192 includes several hot keys 194, typicalalphabetic keys and an enter key 196 as well. The hot keys 194 include anumber of shortcut keys for bypassing menu navigation and directlyselecting and initiating a previously stored procedure. Hot keys 194 mayinclude, for example, an enter phone number key for adding a new phonenumber to the stored listing; a delete phone number key may be includedfor removing entries from the list; and, an enter code key and a deletecode key may be included for adding/removing codes from the listing.Card authorization may likewise be managed with enter card and deletecard keys. A time/date key may be included for recalling and updatingsystem time. A transaction key may be included for recalling and viewinglogged system activity such as for example, visitor to tenant directorycalls, tenant entry (granted or denied) and card or code activity. Whileeach of these corresponding commands may be otherwise effected through aseries of alphanumeric key entries, hot keys 190 provide a much simplerfaster shortcut.

[0065]FIG. 8 shows a block diagram of the motherboard 200 of theelectronics assembly according to the preferred embodiment of thepresent invention. The motherboard 200, essentially, includes twosubsystems, a control subsystem 202 and a signal processing subsystem204. Further, each subsystem 202, 204 includes an address bus 202A, 204Aand a data bus 202D, 204D.

[0066] The control subsystem 202 includes a microcontroller 206, whichmay be a general purpose microprocessor or, preferably, is a 16-bit,single chip controller such as the XA-S3 microcontroller from PhilipsSemiconductors. The control subsystem 202 includes memory, preferably,both dynamic random access memory (DRAM) 208 and Flash EPROM 210. Ifnecessary, a memory controller 212 may be included for controllingaccess to and refreshing the DRAM 208 or, if the microcontroller 206 iscapable, the memory control function may be provided directly by themicrocontroller 206. When installed in the main control unit 116 withthe motherboard 200, the pluggable flash memory module 186 in FIG. 7 isalso included in the memory in the control subsystem 202. A real timeclock (RTC) and peripheral interface 214 also is included in the controlsubsystem 202.

[0067] The microcontroller 206 in control subsystem 202 manages aprogramable transaction auto reporting function to automatically send arecord of all transactions that are currently stored in the main controlunit memory at the preselected time to a selected destination, e.g., toa terminal, fax or a printer. Transactions may include records of systemactivity such as a directory call, an open door, entry card or codeactivity, etc. Auto reporting may be triggered by count number, aspecified day or time or, a combination of transaction count andday/time. Count only scheduling triggers a report automatically when thecount reaches a specified number of transactions, as selected by thecomplex manager, for example. When the transaction count reaches thatnumber, the transactions report is transmitted to the destination. Ifday/time reporting is selected, all log transaction are transmitted on aselected day and time. Count and day/time reporting allows transactionreport transmission if the count reaches a selected level prior to thescheduled day/time.

[0068] As noted above, system transactions or records of system activityinclude records of events such as a directory call, an open door, entrycard or code activity or anything else identified as system activity forlogging or reporting. Reports are transmitted, for example, to aprinter, a fax machine or a computer terminal. Since computer terminalsdo not have identical modem transmission capabilities, the preferredembodiment TES has a programmable baud rate, selectable for a particularcomputer terminal or printer. Optionally, the preferred embodiment TESmay send transaction information in real time. Further, real timetransmission may be programmed to begin at some future time and continueuntil the system receives a termination command to end real timetransmission. Also, interactive report transmission may be selected torequire a response to a manual prompt at the time of transmission. Thus,when the programmed transmission time occurs, the prompt is presented toan operator, e.g., the building manager, who may approve or denytransmission.

[0069] The heart of the signal processing subsystem 204 is a digitalsignal processor (DSP) 216, preferably, 24-bit DSP 56303 from MotorolaCorporation. The digital signal processor 216 is connected to memorysuch as, for example, static RAM (SRAM) 218 and Flash EPROM 220. Thedigital signal processor 216 interfaces externally to the main controlcircuit 200 through a communications interface 222.

[0070] The main control unit communicates with the outside world throughany number of connected optional interface devices that may be connectedto the real time clock (RTC) and peripheral interface 214 or to thecommunications interface 222. The DSP data bus 204D is selectivelyconnectable to the control data bus 202D and the DSP address bus 204A isselectively connectable to the control address bus 202A.

[0071] In particular, the RTC and peripheral interface 214 communicateswith connected remote units, e.g., peripheral unit 118 above. Also,connected input/output (I/O) devices such as a display, e.g., an LCDdisplay 184, an RS422 printer port, an RS232 serial port, keypadsincluding handheld keypad 182, and card readers all communicate with andare controlled by the microcontroller through RTC and peripheralinterface 214. Further, a real time clock in the RTC and peripheralinterface 214 maintains current date and time information that may beused, for example, in logging or in timed operation. Programmable TimeZones are defined as time periods during which particular access codesand card codes are enabled. So, if a group of tenants is intended tohave access to the complex only during certain hours and/or on certaindays of the week, a time zone may be identified for those specificperiods and that time zone assigned to that group of tenants. Each timezone may have four different schedules/segments with a maximum offifteen different time zones. Further, holidays may be identified andincluded or excluded from particular time zones.

[0072] Also, a timed control system may be included for setting relaycontrols to automatically open/close or enable/disable certain connectedfunctions or features at preselected periods. Thus, for example, thesystem may automatically unlock and open the front gate daily and laterre-lock or close the gate, at times that are specified within thesystem. So, continuing this example, the front gate may automaticallyopen at 7:00 am and close at 7:00 pm. Further, typical holidays may beidentified such that the gate does not automatically open even if aholiday falls on a weekday. A free exit may be provided through anymonitored door such that opening the door to exit does not cause a doorforced opened condition during the exit. A post office and firedepartment entry feature referred to as a postal lock provides accessusing a dedicated lock and key. The local fire department may have acommon key that allows access through the postal lock. Access to thecomplex using either of these is through the access control system andtreated as a normal entry.

[0073] Communication interface 222 provides both audio and telephoniccommunications interface functions. Audio communications may includesound from the main control unit microphone and speaker. Both themicrophone and speaker volume may be controlled programmably. Telephoniccommunications may include a modem/fax modem function and providing atelephone handset interface for either or both of touch tone or rotarydial type telephones.

[0074] The modem provides for both incoming as well as outgoingcommunications. The modem may be set to answer an incoming call after aselected number of rings. A preselected length may be set for visitor totenant calls to prevent unintentionally tying up the line by leaving acall connected indefinitely, blocking other calls to the tenant as wellas to the control unit. Dialing may be selected for either touch tone ora pulse dialing depending upon local telephone company capabilities. IfCaller ID is available, incoming telephone numbers may be logged foreach call along with any corresponding system/tenant response or action.

[0075] If a voicemail system is attached to the TES, voicemail may beconfigured from the main control unit. Also, voicemail may be programmedto intercept calls and to screen visitors for tenants. To use thisvoicemail control feature of the preferred embodiment system, a visitorplaces a tenant call and the voice mail system answers the call. Then,the visitor can bypass voicemail and contact the tenant by dialing anextension (a number with up to six digits) on the front panel keypad. IfCaller ID is available through the local telephone service, the systemmay retrieve the caller's number for the tenant to return the calllater. A PBX enable/disable and dial-in feature provides callconfiguration capability to dial a number for outside access, e.g., 9. Adial-up unit ID feature allows assignment of a 6-digit identificationnumber such that a person dialing into the unit can retrieve the unit IDto determine whether the caller has contacted the correct unit.

[0076] The preferred embodiment access control system includes thecapability to provide audible signals, e.g., beeps, in response tovarious inputs. So for example, an access granted beep may be providedby the main control unit speaker when granting tenant/visitor access.Also, talk time beeps on the telephone may indicate when visitor totenant communication approaches the end of the selected talk period.These audible alerts may be disabled or enabled as desired.

[0077] In addition, the access control system according to the preferredembodiment of the present invention may facilitate information exchangesand other communications between itself and other systems such as ageneral purpose computer running a personnel or bookkeeping system. Suchseamless communication is described in detail in “Access Control SystemsIn Seamless Communication With Personnel Management Systems and TheLike” to Dow et al. U.S. patent application Ser. No. ______ (AttorneyDocket No. 71338/5569), assigned to the assignee of the presentinvention and filed coincident herewith.

[0078]FIG. 9 shows a building 230 with access controlled by a preferredembodiment access control system in communication with a remotelylocated fax machine 232. Access to front entrance 234 is controlled by amain control unit 236 mounted adjacent to entrance 234. Access to garageentrance 238 is through card entry reader 240. Thus, the access controlsystem and, especially main control unit 236, may be programmed asdescribed hereinabove such that after 250 accesses to garage entrance238 have occurred, for example, the log is faxed to remote fax machine232. Upon receipt of the fax at fax machine 232, the fax may be reviewedand, if anything of note is included in the fax, that may be forwardedto proper authorities. Otherwise, the fax may be stored or archived forlater disposal or possible subsequent use.

[0079]FIG. 10A shows an example of a word (ALARM) 240 defined for faxingand letters 242, 244, 246 and 248 included in the word 240. FIG. 10B isan expanded view of the letter A 242 in FIG. 10A. In this example, eachletter is an array of black or white dots. Selection of an 8 by 8 arrayfor each character is for example only and not intended as a limitation.Significantly improved character readability may be achieved using 9×16character arrays with a corresponding increase in transmission rate ortime. As noted above, each fax page contains 1143 scan lines and eachline contains 1728 dots. Letters are faxed by alternating between whiteand black dots.

[0080] For this 8 by 8 character example, each character is representedby a corresponding ASCII code. As can be seen from FIGS. 10A-B, eachcharacter may be described as an eight byte bit map with a white dot orpixel represented by a zero (“0”) and a black dot or pixel representedby a one (“1”). So, the A in FIG. 10B can be represented by thefollowing binary sequence with the corresponding hexadecimal inparenthesis.

[0081] 0000 0000 (0x00)

[0082] 0001 1000 (0x18)

[0083] 0010 0100 (0x24)

[0084] 0010 0100 (0x24)

[0085] 0011 1100 (0x3C)

[0086] 0010 0100 (0x24)

[0087] 0010 0100 (0x24)

[0088] 0000 0000 (0x00)

[0089] This can be stored in a character memory as:

[0090] Byte Character_A [8 bytes]=0x00, 0x18, 0x24, 0x3C, 0x24, 0x24,0x00.

[0091] Each of these bytes represents a scan line through the characteras may be accessed using a scan line variable. Thus, textual lines maybe converted to scan lines using, for example, 5 variables as in Table 1below. TABLE 1 Variable Defines Scan_line the current scan line.Character_Index which character within the test string is activeCharacter_Pixel which pixel within the current character is active.White_Pixel whether this is a white or black pixel set. Pixel_Countnumber of pixels to transmit.

[0092]FIG. 11 shows a flow chart 250 showing how lines may be preparedfor faxing messages as described for ALARM in FIGS. 10A-B. First, instep 252 the character labels are initialized, to point to the firstpixel of the first character of the first scan line on the first page.Also, the pixel count is set to zero and, since typically, the top lineof each ASCII character is blank, the first pixel is a white pixel.Next, in step 252 the current line in the current character is checkedfor a dot color change location, i.e., from white to black. For thefirst line there will be no dot color change in step 254. After thefirst line is transmitted and the subsequent line is encountered, dotcolor changes occur when white dots change to black and vice versa aseach dot or pixel is transmitted for a character. In step 256, all dotsof current color up to the identified dot change location aretransmitted. In step 258, after having transmitted all dots of the samecolor, a check is made to determine whether the last transmitted dot isat the end of a character and, if not, continuing to step 260, the dotchange location is made to the current dot location. In step 262 dotcolor is switched. Then, returning to step 254 a check is made todetermine the next dot color change location. Again, in step 256 alldots (to the dot change location) of the same color are sent. In step258 the last sent dot location is checked to determine if it is the endof the character. If it is determined that the last transmitted dot isat the end of a current character, then in step 264, the current dotlocation is checked to determine if it is at the end of a line. If not,then in step 266 the next character is selected and, returning to step260, the first dot for the next character in that line is selected.Otherwise, if in step 264 the end of the line is encountered, then instep 268, a check is made to determine if the end page has beenencountered. If the end of page is not encountered, then, in step 270the next line is selected and returning to step 266, the first characterof that next line is selected. In step 268 if the end of the currentpage is been encountered, then in step 272, a check is made to determinewhether the end of message has also been encountered. If not, then instep 274, the variables are reinitialized for the next page and,returning to step 270, the beginning of the first line is selected andin 266 the first character is selected. Otherwise, transmission ends in276.

[0093] Advantageously, the above described access control system faxalarm information using standard (fax) communications over, potentially,long distances. System resources are not consumed in preparing the datafor faxing. Faxes are treated much like a print or modem basedcommunication. Log entries, alarm information or other data areformatted for faxing on the fly and transmitted as formatted.

[0094] Having thus described preferred embodiments of the presentinvention, various modifications and changes will occur to a personskilled in the art without departing from the spirit and scope of theinvention. It is intended that all such variations and modificationsfall within the scope of the appended claims. Examples and drawings are,accordingly, to be regarded as illustrative rather than restrictive.

What is claimed is:
 1. An access control system automatically sendingsystem information to a remote maintenance location, said access controlsystem comprising: a main control unit telephonically in communicationwith entities within a building, said main control unit and beingmountable at an entrance to said building; a fax modem controlled bysaid main control unit; at least one code entry unit receiving accesscodes, each said code entry unit providing received said access codes tosaid main control unit; and at least one controlled door, access througheach said controlled door being provided by said main control unit inresponse to a correct access code entered at one said code entry unit,said main control unit logging system activity; whereby said maincontrol unit selectively faxes system log reports over said fax modem toa remotely located fax machine.
 2. An access control systemautomatically sending system information to a remote maintenancelocation as in claim 1, wherein one of said at least one code entryunits is a keypad located on said main control unit.
 3. An accesscontrol system automatically sending system information to a remotemaintenance location as in claim 2 wherein said at least one controlleddoor is two or more controlled doors, said main control unit controllingand logging access through said controlled doors at entrances to saidbuilding, at least one of said entrances including a remote said codeentry unit.
 4. An access control system automatically sending systeminformation to a remote maintenance location as in claim 3 wherein saidremote code entry unit is a keypad, said main entry unit logging keypadentries.
 5. An access control system automatically sending systeminformation to a remote maintenance location as in claim 3 wherein saidremote code entry unit is a card reader, said main control unit loggingcard reader entries.
 6. An access control unit automatically sendingsystem information to a remote maintenance location as in claim 3further comprising a peripheral control unit in communication with saidmain control unit, said peripheral control unit controlling at least oneremotely controlled door at an entrance remotely located from said maincontrol unit, said main control unit logging peripheral control unitactivity.
 7. An access control unit automatically sending systeminformation to a remote maintenance location as in claim 6 furthercomprising a remote said code entry unit at said remotely controlleddoor, said remote code entry unit communicating with said main controlunit through said peripheral unit.
 8. An access control systemautomatically sending system information to a remote maintenancelocation as in claim 7 wherein said remote code entry unit is locatedexternal to said building, entry requests being placed by entering anaccess code at said remote code entry unit.
 9. An access control unitautomatically sending system information to a remote maintenancelocation as in claim 8 wherein said remote code entry unit is a cardreader.
 10. An access control system automatically sending systeminformation to a remote maintenance location as in claim 8 wherein saidremote code entry unit is a keypad.
 11. An access control unitautomatically sending system information to a remote maintenancelocation as in claim 8 further comprising a second remote code entryunit located internal to said building, access code entries to saidsecond remote code entry unit requesting exit from said building, saidmain control unit authenticating access codes, said peripheral unitopening said remote controlled door responsive to authenticated accesscodes being entered in either said remote code entry unit, each entryand exit at said remote controlled door being logged.
 12. An accesscontrol system automatically sending system information to a remotemaintenance location as in claim 2 further comprising a monitorconnected to said main control unit, said main control unit displayingsystem information on said monitor.
 13. An access control unitautomatically sending system information to a remote maintenancelocation as in claim 2 further comprising a closed circuit TV camera,said closed circuit TV camera being remotely controlled by said accesscontrol system, each activation of said closed circuit TV being logged.14. An access control system automatically sending system information toa remote maintenance location as in claim 2 wherein said main controlfurther comprises a display, said display selectively displaying a menuof available options, selection of selected ones of said options beinglogged.
 15. An access control system automatically sending systeminformation to a remote maintenance location as in claim 14, the maincontrol unit further comprising: a microphone receiving a voicecommunications from persons requesting building access; and a speakerproviding audio responses to said persons requesting building access.16. An access control system automatically sending system information toa remote maintenance location as in claim 14, the main control unitfurther comprising: a memory module; an electronics assembly adapted toreceive said memory module, said memory module being pluggable into saidelectronics assembly, said display being attached to said electronicsassembly; and an alphanumeric keypad, said access control system beingprogrammed directly from said alphanumeric keypad, access control codesbeing programmed into said main control unit using said alphanumerickeypad, program entries being selectively communicated, seamlessly, tosaid general purpose computer.
 17. An access control systemautomatically sending system information to a remote maintenancelocation as in claim 16 wherein said electronics assembly unitcomprises: a control subsystem controlling connected peripheral unitsand controlled doors, receiving and authenticating access codes andmonitoring unauthorized accesses and logging said system activity; and acommunication subsystem passing voice communications telephonicallybetween said entities within said building and individuals seekingbuilding access, said communication subsystem including said fax modemand sending and receiving faxes by said fax modem.
 18. An access controlsystem automatically sending system information to a remote maintenancelocation as in claim 17 wherein said control subsystem comprises: amicrocontroller controlling building access, communicating accessauthorization changes to the general purpose computer and changingaccess code data in response to communications from said general purposecomputer; memory storing current access codes, system related programcode, data and system logs; a handheld interface and real time clockcommunicating with said general purpose computer; and said memorymodule, program initialization data and operating codes contained insaid memory module.
 19. An access control system automatically sendingsystem information to a remote maintenance location as in claim 18wherein said memory includes Flash EPROM and dynamic random accessmemory.
 20. An access control system automatically sending systeminformation to a remote maintenance location as in claim 17 wherein saidcommunication subsystem comprises: a digital signal processor, saiddigital signal processor being programmable as a fax modem, said faxmodem comprising said digital signal processor; memory storing code forsaid digital signal processor; and a communications interface providinga voice interface with said microphone and audio interface with saidspeaker at said main control unit and providing a telephonic interfaceto a connected telephone system responsive to said digital signalprocessor.
 21. An access control system automatically sending systeminformation to a remote maintenance location as in claim 20 wherein aselected condition in said control subsystem causes said communicationsubsystem to fax a report to a remote location.
 22. An access controlsystem automatically sending system information to a remote maintenancelocation, said access control system comprising: a main control unittelephonically in communication with entities within a building, saidmain control unit being mountable at an entrance to said building; a faxmodem controlled by said main control unit; at least one code entry unitreceiving access codes, each said code entry unit providing receivedsaid access codes to said main control unit; at least one buildingfunction being provided by said main control unit in response to acorrect access code entered at one said code entry unit, said maincontrol unit logging system activity into a log report; and said maincontrol unit comprises apparatus for selectively faxing log reports oversaid fax modem to a remotely located fax machine.
 23. An access controlsystem automatically sending system information regarding a building toa remote maintenance location, said access control system comprising: amain control unit telephonically in communication with entities within abuilding, said main control unit being mountable at an entrance to saidbuilding; a fax modem controlled by said main control unit; apparatusfor collecting status information regarding the building connected tosaid main control unit for logging system activity into a status logreport; and whereby said main control unit selectively faxes status logreports over said fax modem to a remotely located fax machine.