Systems and methods for authorizing transmission of commands and signals to an access control device or a control panel device

ABSTRACT

Systems and methods are provided that can include a doorbell device receiving a request signal to enter a region associated with the doorbell device from a remote control device and, responsive thereto, accessing a list identifying which of a plurality of authorized users are located within the region, identifying one of the plurality of authorized users associated with the remote control device, determining whether the list indicates that the one of the plurality of authorized users is located within the region, and determining whether to transmit a disarm command signal to a control panel device or an activation signal to an access control device based on whether the list indicates that the one of the plurality of authorized users is located within the region, wherein entries on the list can correspond to historical use of the doorbell device or the control panel device to enter and exit the region.

FIELD

The present invention relates generally to security systems and accesscontrol systems. More particularly, the present invention relates tosystems and methods for authorizing transmission of commands and signalsto an access control device or a control panel device.

BACKGROUND

Known security systems and access control systems can receive commandsand signals from a remote control device. However, such systems do notdetermine a location of an authorized user of the remote control deviceprior to authorizing transmission of the commands or the signals to anaccess control device or a control panel device.

In view of the above, there is a need and an opportunity for improvedsystems and methods.

BRIEF DESCRIPTION OF THE DRAWINGS

FIG. 1 is a block diagram of a system in accordance with disclosedembodiments; and

FIG. 2 is a flow diagram of a method in accordance with disclosedembodiments.

DETAILED DESCRIPTION

While this invention is susceptible of an embodiment in many differentforms, specific embodiments thereof will be described herein in detailwith the understanding that the present disclosure is to be consideredas an exemplification of the principles of the invention. It is notintended to limit the invention to the specific illustrated embodiments.

Embodiments disclosed herein can include systems and methods fortracking historical use of a doorbell device or a control panel deviceto enter or exit a region to determine a location of an authorized userof a remote control device prior to authorizing transmission of commandsor signals to an access control device or the control panel device.Accordingly, such systems and methods can prevent an unauthorized userof the remote control device, such as a thief, from using the remotecontrol device to gain access to the region when the authorized user islocated within the region.

For example, such systems and methods can include the doorbell devicereceiving a request signal to enter the region associated with thedoorbell device from the remote control device. Responsive to receivingthe request signal, the doorbell device can access a list identifyingwhich of a plurality of authorized users are located within the region,identify one of the plurality of authorized users associated the remotecontrol device, and determine whether the list indicates that the one ofthe plurality of authorized users is located within the region. Then,the doorbell device, the control panel device, and/or a cloud serverdevice can determine whether to transmit a disarm command signal to thecontrol panel device or an activation signal to the access controldevice based on whether the list indicates that the one of the pluralityof authorized users is located within the region.

In some embodiments, entries on the list can correspond to thehistorical use of the doorbell device or the control panel device by theplurality of authorized users to enter and exit the region. For example,when the one of the plurality of authorized users uses the doorbelldevice or the control panel device to enter the region, the doorbelldevice, the control panel device, and/or the cloud server device can addthe one of the plurality of authorized users to the list. However, whenthe one of the plurality of authorized users uses the doorbell device orthe control panel device to exit the region, the doorbell device, thecontrol panel device, and/or the cloud server device can remove the oneof the plurality of authorized users from the list. In some embodiments,the doorbell device, the control panel device, and/or the cloud serverdevice can update the list in real time and/or periodically by accessinguser input received by the doorbell device and the control panel device.

In some embodiments, when the list indicates that the one of theplurality of authorized users is located within the region, the doorbelldevice can refrain from transmitting the disarm command signal and theactivation signal. However, in some embodiments, when the list fails toindicate that the one of the plurality of authorized users is locatedwithin the region, the doorbell device can transmit the disarm commandsignal or the activation signal.

In some embodiments, the list and a table or other cross-referencingdevice identifying a respective one of a plurality of remote controldevices associated with each of the plurality of authorized users can bestored on a database device, and in some embodiments, the databasedevice can be a standalone device or can be part of the doorbell device,the control panel device, or the cloud server device. For example, inembodiments in which the database device is part of the control paneldevice, the doorbell device can communicate with the control paneldevice to access the table or other cross-referencing device foridentifying the one of the plurality of authorized users and to accessthe list for determining whether the list indicates that the one of theplurality of authorized users is located within the region. Similarly,in embodiments in which the database device is part of the cloud serverdevice, the doorbell device can communicate with the cloud server deviceto access the table or other cross-referencing device for identifyingthe one of the plurality of authorized users and to access the list fordetermining whether the list indicates that the one of the plurality ofauthorized users is located within the region.

In some embodiments, responsive to transmitting the disarm commandsignal or the activation signal, the doorbell device can update the listto add the one of the plurality of authorized users to the list. Forexample, in embodiments in which the database device is part of thecontrol panel device, the doorbell device can transmit an update signalto the control panel device to update the list. Similarly, inembodiments in which the database device is part of the cloud serverdevice, the doorbell device can transmit the update signal to the cloudserver device to update the list.

In some embodiments, the doorbell device can receive access credentialswith the request signal, and in these embodiments, the doorbell devicecan determine whether the access credentials are valid and refrain fromaccessing the list when the access credentials are invalid.

In some embodiments, when the doorbell device refrains from transmittingthe disarm command signal and the activation signal, the doorbell devicecan initiate a security action. For example, in some embodiments, thesecurity action can include the doorbell device transmitting a warningsignal to a mobile device that is different from the remote controldevice or to the control panel device, either of which, under certainconditions or responsive to user input, can authorize the doorbelldevice to transmit the disarm command signal or the activation signaleven though the list indicates that the one of the plurality ofauthorized users is located within the region. Additionally oralternatively, in some embodiments, the security action can include thedoorbell device transmitting an alarm signal to the control panel deviceor transmitting a locking signal to the remote control device.Additionally or alternatively, in some embodiments, the security actioncan include the doorbell device capturing an image of a person proximateto the doorbell device and transmitting the image to an owner or anoccupant of the region.

In some embodiments, the remote control device can include a mobiledevice, a smart phone, a tablet, a portable programmable device, or alow powered device, such as a wireless dongle, a smart watch, or akeyfob. Furthermore, in some embodiments, the doorbell device caninclude a transceiver device for transmitting signals to and receivingsignals from the remote control device, the control panel device, theaccess control device, and the cloud server device and a programmableprocessor for executing the methods disclosed herein.

In some embodiments, the doorbell device can be positioned proximate tothe region, for example, on an exterior of the region. Furthermore, insome embodiments, the doorbell device can include a camera device formonitoring the exterior of the region and/or receiving information, suchas the request signal, from the remote control device. Additionally oralternatively, in some embodiments, the doorbell device can include auser interface, such as a button, that, when activated, can cause thedoorbell device to notify the owner or the occupant of the region abouta presence of the person proximate to the doorbell device, for example,by emitting a sound or a tone or within the region or by transmitting aninformational signal to a portable device associated with the owner.

FIG. 1 is a block diagram of a system 20 in accordance with disclosedembodiments. As seen in FIG. 1 , the system 20 can include a remotecontrol device 22, a database device 24, a doorbell device 26 associatedwith a region R, an access control device 28 that controls access to theregion R, and a control panel device 30 that monitors the region R. Insome embodiments, the system 20 can also include a cloud server device32 that communicates with the doorbell device 26 and/or the otherdevices of the system 20 via a network N, such as the internet.

As seen in FIG. 1 , the doorbell device 26 can include a transceiverdevice 34 and a programmable processor 36, and in some embodiments, thetransceiver device 34 can include one or more communication modules forcommunicating with the remote control 22, the access control device 28,the control panel device 30, and/or the cloud server device 32 via anyknown wireless or wired communication medium (e.g. Wi-Fi, cellular,Bluetooth, cable, phone line, Ethernet, fiber, etc.). As also seen inFIG. 1 , in some embodiments, the database device 24 can be part of thedoorbell device 26. However, in some embodiments, the database device 24can be a standalone device or can be part of the control panel device 30and/or the cloud server device 32.

FIG. 2 is a flow diagram of a method 100 in accordance with disclosedembodiments. As seen in FIG. 2 , the method 100 can include theprogrammable processor 36 determining whether the transceiver device 34has received a request signal to enter the region R, as in 102. If not,then the method 100 can include the programmable processor 36 continuingto determine whether the transceiver device 34 has received the requestsignal, as in 102. However, when the transceiver device 34 receives therequest signal from the remote control device 22, the method 100 caninclude the programmable processor 36 accessing a table or othercross-referencing device in the database device 24 to identify one of aplurality of authorized users associated with the remote control device22 and accessing a list of the plurality of authorized users in thedatabase device 24 to determine whether the list indicates that the oneof the plurality of authorized users is located within the region, as in104. In this regard, it is to be understood that the list can identifyeach of the plurality of authorized users located within the region.

As seen in FIG. 2 , after accessing the table or other cross-referencingdevice in the database device 24 to identify the one of the plurality ofauthorized users and accessing the list in the database device 24 todetermine whether list indicates that the one of the plurality ofauthorized users is located within the region, the method 100 caninclude the programmable processor 36 determining whether to transmit adisarm command signal to the control panel device 30 or an activationsignal to the access control device 28 based on whether the listindicates that the one of the plurality of authorized users is locatedwithin the region, as in 106. When the list indicates that the one ofthe plurality of authorized users is located within the region, themethod 100 can include the transceiver device 34 refraining fromtransmitting the disarm command signal and the activation signal and theprogrammable processor 36 taking no action, as in 108, or initiating asecurity action. However, when the list fails to indicate that the oneof the plurality of users is located within the region, the method 100can include the transceiver device 34 transmitting the disarm commandsignal or the activation signal, as in 110. In some embodiments, themethod 100 can include the programmable processor 36 determining whetherthe list indicates that the one of the plurality of authorized users islocated within the region and whether to transmit the disarm commandsignal or the activation signal in a single processing step.

In some embodiments, the method 100 can include the transceiver device34 transmitting the disarm command signal directly to the control paneldevice 30 or transmitting the activation signal directly to the accesscontrol device 28. However, in some embodiments, the method 100 caninclude the transceiver device 34 transmitting the activation signal tothe access control device 28 via an intermediary device, such as thecontrol panel device 30 or the cloud server device 32, or transmittingthe disarm command signal to the control panel device 30 via anintermediary device, such as the cloud server device 32.

Although a few embodiments have been described in detail above, othermodifications are possible. For example, the logic flows described abovedo not require the particular order described or sequential order toachieve desirable results. Other steps may be provided, steps may beeliminated from the described flows, and other components may be addedto or removed from the described systems. Other embodiments may bewithin the scope of the invention.

From the foregoing, it will be observed that numerous variations andmodifications may be effected without departing from the spirit andscope of the invention. It is to be understood that no limitation withrespect to the specific system or method described herein is intended orshould be inferred. It is, of course, intended to cover all suchmodifications as fall within the spirit and scope of the invention.

What is claimed is:
 1. A method comprising: a camera device receiving arequest signal to enter a region associated with the camera device froma remote control device, the camera device positioned to monitor anexterior of the region having an access control device that controlsaccess to the region; responsive to receiving the request signal, thecamera device accessing a list identifying which of a plurality ofauthorized users are located within the region, identifying one of theplurality of authorized users associated with the remote control device,and determining whether the list indicates that the one of the pluralityof authorized users is located within the region; and the camera devicedetermining whether to transmit a disarm command signal to a controlpanel device associated with the region or an activation signal to theaccess control device controlling access to the region based on whetherthe list indicates that the one of the plurality of authorized users islocated within the region, wherein entries on the list correspond tohistorical use of the camera device or the control panel device by theplurality of authorized users to enter and exit the region.
 2. Themethod of claim 1 further comprising: when the list indicates that theone of the plurality of authorized users is located within the region,the camera device refraining from transmitting the disarm command signaland the activation signal.
 3. The method of claim 1 further comprising:when the list fails to indicate that the one of the plurality ofauthorized users is located within the region, the camera devicetransmitting the disarm command signal or the activation signal.
 4. Themethod of claim 3 further comprising: responsive to transmitting thedisarm command signal or the activation signal, the camera deviceupdating the list to add the one of the plurality of authorized users tothe list.
 5. The method of claim 4 further comprising: the camera devicetransmitting an update signal to the control panel device to update thelist.
 6. The method of claim 4 further comprising: the camera devicetransmitting an update signal to a cloud server device to update thelist.
 7. The method of claim 1 further comprising: the camera devicecommunicating with the control panel device to access the list, identifythe one of the plurality of authorized users, and determine whether thelist indicates that the one of the plurality of authorized users islocated within the region.
 8. The method of claim 1 further comprising:the camera device receiving access credentials with the request signal;the camera device determining whether the access credentials are valid;and the camera device refraining from accessing the list when the accesscredentials are invalid.
 9. The method of claim 2 further comprising:when the camera device refrains from transmitting the disarm commandsignal and the activation signal, the camera device initiating asecurity action.
 10. The method of claim 1 further comprising: thecamera device communicating with a cloud server device to access thelist, identify the one of the plurality of authorized users, anddetermine whether the list indicates that the one of the plurality ofauthorized users is located within the region.
 11. A camera devicecomprising: a transceiver device; and a programmable processor, whereinthe transceiver device receives a request signal to enter a regionassociated with the camera device from a remote control device, thecamera device positioned to monitor an exterior of the region having anaccess control device that controls access to the region wherein,responsive to receiving the request signal, the programmable processoraccesses a list identifying which of a plurality of authorized users arelocated within the region from a database device, identifies one of theplurality of authorized users associated with the remote control device,and determines whether the list indicates that the one of the pluralityof authorized users is located within the region, wherein theprogrammable processor determines whether to transmit a disarm commandsignal to a control panel device associated with the region or anactivation signal to the access control device controlling access to theregion based on whether the list indicates that the one of the pluralityof authorized users is located within the region, and wherein entries onthe list correspond to historical use of the camera device or thecontrol panel device by the plurality of authorized users to enter andexit the region.
 12. The camera device of claim 11 wherein, when thelist indicates that the one of the plurality of authorized users islocated within the region, the transceiver device refrains fromtransmitting the disarm command signal and the activation signal. 13.The camera device of claim 11 wherein, when the list fails to indicatethat the one of the plurality of authorized users is located within theregion, the transceiver device transmits the disarm command signal orthe activation signal.
 14. The camera device of claim 13 wherein,responsive to the transceiver device transmitting the disarm commandsignal or the activation signal, the programmable processor updates thelist to add the one of the plurality of authorized users to the list.15. The camera device of claim 14 wherein the database device is part ofthe control panel device, and wherein the transceiver devices transmitsan update signal to the control panel device to update the list.
 16. Thecamera device of claim 14 wherein the database device is part of a cloudserver device, and wherein the transceiver devices transmits an updatesignal to the cloud server device to update the list.
 17. The cameradevice of claim 11 wherein the database device is part of the controlpanel device, and wherein the transceiver device communicates with thecontrol panel device to access the list, identify the one of theplurality of authorized users, and determine whether the list indicatesthat the one of the plurality of authorized users is located within theregion.
 18. The camera device of claim 11 wherein the transceiver devicereceives access credentials with the request signal, and wherein theprogrammable processor determines whether the access credentials arevalid and refrains from accessing the list when the access credentialsare invalid.
 19. The camera device of claim 12 wherein, when thetransceiver device refrains from transmitting the disarm command signalor the activation signal, the programmable processor initiates asecurity action.
 20. The camera device of claim 11 wherein the databasedevice is part of a cloud server device, and wherein the transceiverdevice communicates with the cloud server device to access the list,identify the one of the plurality of authorized users, and determinewhether the list indicates that the one of the plurality of authorizedusers is located within the region.