Remote activation system

ABSTRACT

A method for remotely activating an event over a telecommunications network, said method comprising: providing processing means connected to a telecommunications transceiver and having an output for activating an event; and connecting the transceiver to the network, such that it is able to receive a connection request from a user; the processing means and transceiver being configured to: receive a connection request; wait for a predetermined time period; refuse the connection request; and activate the event. 
     Also provided is a device for enabling an event to be remotely activated over a telecommunications network, said device comprising: processing means connected to a telecommunications transceiver and having an output for activating the event; wherein the transceiver is operable to receive a connection request from a user, and wherein the processing means are operable, on receipt of a connection request, to: wait for a predetermined time period; refuse the connection request; and activate the event.

The present invention relates to a system for remotely activating anevent via a telecommunications network, and to other remote control andremote communication methods via networks. It is particularlyapplicable, but by no means limited, to enabling a door, gate or shutterto be opened or closed via a mobile phone network.

BACKGROUND TO THE INVENTION

It is often desirable to be able to cause an event to occur using remotecontrol. By way of example, much of the present disclosure will refer tothe event being the opening or closing of a door, gate or industrialshutter. However, the present disclosure is applicable to many otherremotely-controlled events, and additional examples are provided.

In the case of an industrial shutter, for example at a loading bayentrance of a warehouse, it is often desirable for a user to be able toopen or close the shutter by remote control. For example, the user maybe driving a vehicle and, as he approaches the shutter, he may find thatthe shutter is closed. Operation of the shutter by remote control savesthe user the inconvenience of stopping his vehicle, disembarking fromit, opening the shutter, getting back into the vehicle and then drivingfurther. Thus, the user saves time and, if it is raining, does not getwet. He is also able to remain safely inside his vehicle, which keepshim from potential danger, and means that the vehicle and contents arenot left unattended.

There are two main types of known remote control systems suitable foropening a door, shutter or gate, etc. The first type, which may bereferred to as “local” remote control, operates by sending a wireless(e.g. infra-red or radio frequency) signal from a handheld transmitter(or a transmitter mounted within a vehicle) to a receiver which isconnected to door opening equipment (e.g. a motor). Such “local” systemshave the disadvantage that every user needs a dedicated transmitter, andalso the user needs to be in relatively close proximity to the door tobe opened, in order for the door opening signal to be able to reach thereceiver. Close proximity to the door is also necessary to enable theuser to see whether the door is already open—in which case there wouldbe no need for him to open it. Another disadvantage of “local” remotecontrol systems is that no information can be sent back to the user, asthe receiver-side apparatus does not include a transmitter.

The second type, which may be referred to as “network-based” remotecontrol, uses a telecommunications network to transmit an instructionfrom the user to the door opening equipment, to cause the door to open.A commercially available example of such a system is available fromDPS-Promatic srl, via Edison 21, 47100 Forlì, Italy, and is marketedunder the name “Easygate” (www.dpspro.com/easygate.html). The Easygatesystem enables a user to open a gate using a mobile telephone. With theEasygate system, a GSM (Global System for Mobile Communications)receiver having a SIM (Subscriber Identity Module) is connected tocontrol circuitry and a door opening motor. In use, a user uses a phone(which may be a mobile telephone, although not necessarily so) to dialthe telephone number which corresponds to the SIM number of the system'sGSM receiver. By dialling this number, the user causes a connectionrequest to be sent to the system's GSM receiver. To save the user thecost of a phone call (in many countries), the Easygate system does notanswer this incoming connection request, but instead instantly rejectsthe connection request. The Easygate system determines if the phonenumber of the user's phone is on a list of authorised numbers, and if itis, the system opens the door.

When the user dials the number of the Easygate system, the system doesnot provide the user with any confirmatory feedback via the telephonenetwork, or any information regarding the status of the system. Havingdialled the number, the user does not know whether the gate is beingopened, or whether the gate is, for some reason, already open. TheEasygate system is designed only to be used to open a gate, and not toclose it, since by the system only acting to open the gate the Easygateuser is provided with certainty that, after the Easygate number has beendialled, the gate will either be opened or will already be open.

The absence of any feedback with the Easygate system also means that, inpractice, a user will tend not to use the Easygate system unless he isalready within eyeshot of the gate to be opened, since this enables theuser to see whether the gate is already open, before deciding whether itis necessary to use the Easygate system. Moreover, if he does use thesystem, being within eyeshot of the gate enables him verify that thegate has been successfully opened, and that no obstacle (or even aperson) is in the way.

Accordingly, there is a desire for a network-based remote control systemthat can be used both to open and to close a door or the like, and whichprovides the user with some kind of feedback to confirm the remoteaction the system is performing.

SUMMARY OF THE INVENTION

According to a first aspect of the present invention there is provided adevice for opening or closing a member such as door, a window, ashutter, a curtain, a gate or a barrier said device comprising:

-   -   a telecommunications receiver operable to receive a connection        request from a user, memory means for storing the state an        article was in prior to the receipt of the connection request,        and    -   processing means connected to a telecommunications transceiver        and having an output for activating an opening or closing event;        -   and wherein the processing means are operable, on receipt of            a connection request, to:        -   wait for a predetermined time period which time period is            automatically varied dependant on the state the article was            in prior to the receipt of the connection request;        -   refuse the connection request; and        -   activate the event.    -   whereby a member such as a door, a window, a shutter, a curtain,        a gate or a barrier is openable or closeable remotely by        communication over a telecommunications network and whereby the        open or closed status of the member is fed back to the user via        the telecommunications network by the automatic variation in the        said predetermined time period.

The time period may be measured in seconds or in terms of ring cycles inthe telecommunications system or by some other measure.

As with the Easygate system, the process of sending a connection requestfrom a user may be performed by the user telephoning the present system.Also, as with the Easygate system, the present invention refuses theconnection request, and so the user is not charged (in many countries)for calling the system. However, the system waiting for a predeterminedtime period before refusing the connection request is an important pointof distinction provided by the present invention. Once the system hasreceived the incoming connection request, by waiting before refusing theconnection request, the user will hear ring tones for a time periodcorresponding to the duration of the wait. Highly advantageously, thelength of this time period (i.e. the duration of ring tones heard) canbe used to convey information to the user relating to the action thesystem is to perform, and/or the status of the system.

Thus, by virtue of this wait or delay, the user can be provided withfeedback or other information, but because the incoming connectionrequest is then refused, the user still does not incur a connectioncharge (in many countries). The user must understand in advance thesignificance of the duration of the ring tones, but once this isunderstood the ring tone duration may be used to convey a variety ofpieces of information to the user without him incurring a connectioncharge.

The term “event” as used herein should be interpreted broadly, toencompass both activating and deactivating an article, device or suchlike, and generally performing any kind of remotely controlled action.

Preferably the event is a transition of an article from a first state toa second state or vice versa, and the method further comprises storing,in memory means, the state the article was in prior to the receipt ofthe connection request. This advantageously enables the present systemto be used for two-state or reversible events, such as the opening andclosing of a door.

By arranging for the processing means to set the predetermined timeperiod according to the state the article was in prior to the receipt ofthe connection request, the duration of the wait period, andconsequently the duration of ring tones heard by the user, may be set bythe processing means in order to convey the appropriate feedback orstatus information to the user.

Preferably the said time period is set to a first time period if thearticle was in the first state prior to the receipt of the connectionrequest, or is set to a second time period if the article was in thesecond state prior to the receipt of the connection request. By way ofexample, the first time period may be relatively long, and the secondtime period may be relatively short.

In one embodiment, used for opening or closing a gate, door orindustrial shutter, a long duration of ring tones indicates the door isclosed and will be opened, whereas a short duration of ring tonesindicates the door is open and will be closed.

Preferably, the device detects that the user has terminated theconnection request during the said predetermined time period; and, inresponse, not activating the event. The provision of the wait beforerefusing the connection request, and the status information conveyed tothe user via the duration of the wait, advantageously enable the user toconsider and appreciate the event that the system is about to activate,and enable the user to abort the event by “hanging up” or otherwiseterminating the connection request.

The event may be the opening or closing of an article (e.g. a door,window, shutter, gate or barrier), wherein the first state is thearticle closed, and the second state is the article open.

Alternatively the event may be the switching on or switching off of anarticle (e.g. a light or an electrical device), wherein the first stateis the article switched on, and the second state is the article switchedoff.

The event may alternatively be the summoning of a lift or elevator,which has significant benefits for disabled users who are unable toreach a wall-mounted call button.

The device may be arranged to return status information to a user, thestatus information being selected from a group containing input from asensor for detecting status of the member such as an error or incidentin the vicinity of the member prior to the activation of the event andthe stored the state the article was in prior to the receipt of theconnection request. For example, the device may return information abouthow many times the device had been activated or about an intermediatestate between open and closed, such as a percentage open or closed. Thistype of information may be sent back to the user via an SMS message forexample.

Preferably the telecommunications network comprises a telephone network,and the method further comprises identifying the telephone number fromwhich the connection request originated. It will be appreciated thateither mobile or land-based telephones and telephone networks may beused. Moreover, it will also be appreciated by those skilled in the artthat other types of networks could also be used, such as a datacommunications network (e.g. a local area network, a wide area networkor the internet).

The processing means may compare the said telephone number with a listof authorised telephone numbers, and only activate the event if the saidtelephone number is on the said list. This provides the advantage thatonly authorised phones may be used to activate the event. However, thesystem may be configured such that any phone (regardless of its number)may be used to activate the event, even if the phone withholds itsnumber.

Preferably the processing means are configured to set said time periodto a first time period if the article was in the first state prior tothe receipt of the connection request, and to set said time period to asecond time period if the article was in the second state prior to thereceipt of the connection request.

Preferably the processing means are further configured to detect thatthe user has terminated the connection request during the saidpredetermined time period; and, in response, are configured not toactivate the event.

Preferably the processing means are configured to receive input from asensor for detecting an error or incident in the vicinity of the articleprior to the activation of the event, the processing means being furtherconfigured not to activate the event in response to such an error orincident.

Preferably the processing means are further configured to set the saidtime period to a third time period if the said sensor detects an erroror incident in the vicinity of the article prior to receiving theconnection request.

The device may be operable to open or close a door, a window, a shutter,a curtain, a gate or a barrier. Alternatively it may be operable toactivate or deactivate a light or another electrical device, or to causea lift to be summoned, etc.

Preferably the processing means are further configured to identify thetelephone number from which a connection request originates.

Preferably the processing means are further configured to compare thesaid telephone number with a list of authorised telephone numbers, andonly to activate the event if the said telephone number is on the saidlist. The device may further comprise user interface means operable tocause the said telephone number to be added to or removed from a list ofauthorised telephone numbers.

The system may be configured to allow certain actions for certain users(i.e. from certain phone numbers) only. For example, phone number 1 maybe allowed to control all doors, phone number 2 may only be allowed toopen the entrance door, phone number 3 may be allowed to operate thesystem weekdays form 7.00 am to 6.30 pm, phone number 4 may be allowedonly to operate the system at weekends, etc. Additionally, differentactions in remote places can be activated at the same time, e.g. aplurality of different doors can be opened with one call only.

Preferably the processing means are configured to receive input from asensor for detecting an error or incident in the vicinity of the articleduring the event; the processing means being further configured to stopthe event, if possible, in response to such an error or incident, and tonotify the user via the network. This advantage arises as a consequenceof the present remote control system having both a receiver and atransmitter at both the user's location and at the remote location. Thisshould be contrasted with local remote control systems, which tend onlyto have only a transmitter with the user and only a receiver at theremote location, and hence would not be able to provide this greaterfunctionality.

Preferably the device further comprises data storage means for storingdetails of the event. The data storage means may also be used to assigncertain tasks to different users (i.e. to different phone numbers).

Another such system could be responsive to incoming text messages/SMSmessages. The use of text messages advantageously enables the remotecontrol functions to be significantly extended, and enables the use ofdifferent inputs and outputs. In use, a Bluetooth® or infra-redconnection could connect the “slave” mobile phone to the device it is tocontrol (e.g. a domestic lighting and heating control unit). A number ofdifferent commands could be included in a single text message. Logicaloperators and/or conditions could also be included. Thus, for example, atext message could be sent from the remote user reading: “Switch onlights in room 1, 3, 6 . . . , switch off lights in room 8, 9 . . . , iftemperature is below 18C turn on heating . . . ”

Different actions could thus be started by a user sending a single textmessage to the “slave” mobile phone. The “slave” mobile phone could thensend different pieces of status information and/or confirmatoryinformation to the user's remote phone, optionally in a single textmessage.

The processing means may be arranged to return status information to theuser if a call is terminated by the user before any of the saidpredetermined time periods have expired. Thus the user may make a callto the device, immediately hang-up and then receive status informatione.g. by text message.

The mobile station may be a conventional mobile phone programmed (e.g.with standard software) to enable one of its standard inputs/outputs orinterfaces to control an external device. Said inputs/outputs may beelectrical inputs/outputs (e.g. ones usually used for a headset) or awireless interface (e.g. Bluetooth® or infra-red).

The invention also provides a mobile station programmed to enable saidinputs/outputs to be used in the remote control of an external device.

Further, the invention provides a program for a mobile station to enablesaid inputs/outputs to be used in the remote control of an externaldevice. The program may further provide one or more dedicated menus(e.g. a “remote control” menu and/or an “alarm” menu) through which theuser may configure the remote control functionality of the mobilestation.

BRIEF DESCRIPTION OF THE DRAWINGS

Embodiments of the invention will now be described, by way of example,and with reference to the drawings in which:

FIG. 1 shows a simplified flow diagram illustrating principal processingsteps (including delaying the refusal of an incoming connection request)performed in a remote control system in accordance with the an aspect ofthe invention;

FIG. 2 illustrates a remote control device in communication with atelecommunications network;

FIG. 3 illustrates an example of internal components of a remote controldevice;

FIG. 4 illustrates a remote control device being used to control theillumination of lights in a shop window;

FIG. 5 illustrates a further example of a remote control device beingused to control the illumination of lights in a shop window, with theuser details being logged on a computer;

FIG. 6 illustrates a remote control device having a mains plug and amains socket for the remote control of an appliance over atelecommunications network;

FIG. 7 illustrates a remote control device being used to enable adisabled person to summon an elevator or lift using a telecommunicationsnetwork;

FIG. 8 illustrates the use of a remote control device to control andrecord personnel movement through a building or industrial site;

FIG. 9 is a procedural flow diagram (to be formed by joining partialflow diagrams 9 a, 9 b, 9 c and 9 d according to the off-page links 9/1,9/2, 9/3, 9/4 and 9/5) illustrating the steps performed by a processorin an example of a remote control device;

FIG. 10 is a procedural flow diagram (to be formed by joining partialflow diagrams 10 a, 10 b and 10 c according to the off-page links 10/1,10/2 and 10/3) illustrating the subroutine “Ring-handling” from FIG. 9;

FIG. 11 is a procedural flow diagram (to be formed by joining partialflow diagrams 11 a and 11 b according to the off-page links 11/1)illustrating the subroutine “Dial-alarm-handling” from FIG. 9;

FIG. 12 is a procedural flow diagram illustrating the subroutine“SMS-alarm-handling” from FIG. 9;

FIG. 13 illustrates the use of a mobile phone to exchange data with aprocessor-controlled device, for example to perform setup oradministrator functions on a remote control unit; and

FIG. 14 illustrates the use of a mobile phone to exchange data with aradio frequency identification (RFID) tag.

DETAILED DESCRIPTION OF PREFERRED EMBODIMENTS

The present embodiments represent the best ways known to the applicantof putting the invention into practice. However they are not the onlyways in which this can be achieved.

Embodiment 1—Remote Control with “Delay” Feature to Provide Feedback orStatus Information to the User

A first embodiment will be described with reference initially to FIGS.1, 2 and 3. This embodiment provides improvements over the Easygateprior art system for the remote opening of a gate.

This embodiment provides a system for the remote activation of an event,such as the opening or closing of a door, gate, window or shutter. Asdistinct from the prior art Easygate system, when this present system isused, the user is provided with immediate feedback to confirm the actionthe system is about to perform, or to advise him as to the status of thesystem.

As shown in FIG. 3, a remote control unit 27 comprises an aerial orantenna 26 connected to a telecommunications transceiver 33. The antenna26 may be inside the casing of the remote control unit 27, or outsideit. In the currently preferred embodiment, the telecommunicationstransceiver 33 is a GSM transceiver and the aerial 26 is a correspondingantenna for receiving and transmitting mobile telephone communicationsvia a telephone network. However, it should be emphasised thatcommunications protocols or communication standards other than GSM mayalternatively be used, and the present disclosure is intended to applyto other existing network types, and those which have yet to be inventedor developed.

In the present embodiment, the telecommunications transceiver 33 isprovided with a SIM card, thereby providing the remote control unit 27with a telephone number which a user may call from a remote phone (whichmay be mobile or land-based).

The telecommunications transceiver 33 is connected to a printed circuitboard 38, on which is connected a processor 36, which may be amicroprocessor or microcontroller, an integrated circuit, or some otherform of processing means. A power supply 37 may also be connected to thecircuit board 38. The power supply is connected to a power input/output35, with which the device 27 may be connected to an electrical mainssupply.

Also on the circuit board 38 are one or more outputs 34, which may berelays, inputs to “local” remote control devices, transistors or someother kind of electronic switches or controllable terminals (which mayprovide a simple on/off functionality, or which may provide a variablevoltage or current). Each output 34 is under the control of theprocessor 36, and is connected to an external device that is to beremotely controlled. Thus, by the processor 36 activating an output 34,an external device such as a drive motor may be turned on or off, andits direction of operation may be reversed, in order to open or close adoor, gate, shutter or the like.

A mobile phone or other mobile station could completely replace antenna26, transceiver 33, processor 36, inputs 39, and optionally part of thepower supply 37 and the output 34. Thus, some of the more expensiveparts of such a system could be replaced by a cheap mobile phone.

The remote control unit 27 would typically be situated near the gate ordoor to be opened, with the output 34 connected to the door openingequipment.

The circuit board 38 may also have one or more inputs 39 for connectionto “local” remote control outputs, or to local switches or sensors—forexample to provide feedback to the remote control unit if the gate isblocked, etc. For example, as shown in FIG. 2, the remote control unit27 may be connected to a key switch 28 (for local user control of thegate) and a light sensor 29, both of which serve as input devices to theremote control unit 27.

In use, the remote control unit 27 is connected to a mains power supply25 and the output 34 is connected to the external device to becontrolled, such as a drive motor 24 for opening or closing anindustrial shutter, for example. Other external devices such as a light23 or an audible sounder may also be connected to the output(s) 34, toalso be remotely operated.

When the remote control unit 27 is turned on, the transceiver 33performs an initialisation routine to establish communication with thetelecommunications network 22. Thus, the transceiver 33 is then able toreceive a connection request from a remote phone (e.g. 21 a) via thenetwork when the user of the remote phone 21 a dials the telephonenumber of the transceiver 33.

With reference to FIG. 1, on receiving an incoming connection request(10), the transceiver 33 does not answer the user's call.Advantageously, this means that the user is not charged for using thisservice. Instead the system waits (12) for a predetermined time period,before refusing (14) the connection request and then activating (16) theevent. (Alternatively the event may be activated and then the connectionrequest refused.) From the user's point of view, on dialling the phonenumber of the transceiver 33, the user hears a predetermined duration ofring tones, and then the call is rejected and the user hears nothing(i.e. no more ring tones) or alternatively a signal or message (orreceives other information) provided by the network provider when a callis rejected.

The step 12 of waiting for a predetermined time period (or alternativelya predetermined number of “RING” messages provided by means ofAT-Commands of a GSM-module) before refusing the connection request isconsidered to be an important distinction over the prior art Easygatesystem. The duration of the “wait” period, i.e. the duration of ringtones the user hears before the system refuses the incoming connectionrequest, can be used to convey important information to the user as towhat state the system is in, and what it is about to do.

The duration of the “wait” period is determined (18) by the processoraccording to the status of the system and/or the action to be performed.For example, the processor may set the “wait” period to be long (e.g. 6seconds, or 6 “RING” messages provided by means of AT-Commands of aGSM-module) if the door is closed and is now about to be opened, orconversely may set the “wait” period to be short (e.g. 2 seconds, or 2“RING” messages) if the door is open and is now about to be closed.Thus, the user hearing a long duration of ring tones is informed thatthe door is closed and is now about to be opened, whereas a shortduration of ring tones (or even no ring tone at all) indicates the dooris open and is now about to be closed. This provides the user withimmediate confirmatory feedback as to the status of the system and theaction to be performed. Through being immediate, this confirmatoryfeedback is highly preferable over other possible ways of sendingfeedback to the user. For example, such a system could send the user atext message, or phone him back to play a pre-recorded audio message.However, such forms of feedback would incur telecommunications chargesand would not be immediate. Indeed, a confirmatory text message couldtake several minutes to be sent, depending on when thetelecommunications company actually sends it, the capability of thenetwork to convey it quickly, etc.

With the present embodiment, the incoming connection request is refusedafter the “wait” period, and this means that the user is provided with aservice (i.e. the opening of the door or gate) and obtains immediateconfirmatory feedback (by way of the duration of the ring tones heardbefore the connection request is refused), without incurring aconnection charge (in the many countries whose telecommunicationsnetworks do not charge for refused calls).

Another advantage of the direct feedback is that the user can be surethat he dialled the right number.

A further advantage provided by the “wait” period, before the incomingconnection request is refused, is that the user is provided with anopportunity to cause the remotely controlled event to be cancelled oraborted. This may be achieved by the user terminating the connectionrequest during the “wait” period, for example by pressing the cancelbutton on a mobile phone, or replacing a conventional land-basedtelephone handset on its transceiver. If the remote control unit detectsthat the incoming connection request has been cancelled before the endof the “wait” period, then the processor will not activate the remotelycontrolled event.

In some cases, on hearing the duration of ring tones which convey acertain system status to the user, the user may realise that theremotely controlled action that he thought he was instructing is notactually the action that is about to be performed, and consequently hemay abort the forthcoming action by terminating the connection requestbefore the end of the “wait” period.

Together with the processor 36, a memory may also be provided to storethe status of the system. If the remote control system is being used tocontrol a multi-state operation (such as the opening or closing of adoor, which can have two states—i.e. either opened or closed), then thememory may also record the last state that the system was in (e.g. thedoor being closed). This information may then be used by the processorto adjust the duration of the “wait” period accordingly, to convey thisstatus information to the user as described above.

A sensor, such as a photocell 29, may be provided in the vicinity of thearticle that is to be remotely controlled, and arranged in order toprovide an error signal to the remote control device 27, for example inthe event of a blockage that would prevent a gate from closing. If,prior to receiving an incoming connection request, the processor 36receives input from a photocell 29 or other sensor representative of anerror or incident in the vicinity of the gate, then the system will notactivate the mechanism for opening or closing the gate. In suchinstances, the processor 36 will set the duration of the “wait” periodto a duration different from those used to indicate that the gate isbeing opened or closed. Thus, when a user phones the system and there isa blockage or some other problem that is preventing the system fromperforming the desired action, he will hear a third duration (or number)of ring tones (e.g. for 12 seconds, or 12 ring tones) to advise him thatthere is a problem.

If, however, the photocell 29 or other sensor is activated during theremotely controlled event, i.e. after the incoming connection requesthas been refused, then the remote control unit will abort the event ifpossible (e.g. by stopping or reversing the gate drive motor) and willnotify the user via the network. This notification could take the formof an automatically generated audible message (i.e. the user iseffectively called back by the system), or may be a text message.Alternatively, the system may call the user's mobile phone number, suchthat the user sees the phone number of the system or a correspondingname (e.g. “PHOTOCELL ALARM”) on the display of his mobile phone. Theuser can then reject this incoming call from the system (so that thisservice is also free from telecommunication charges), and can then callthe system back in order to reset the alarm. This return call from theuser, that will also be rejected by the system, will have the effect ofnot only resetting the alarm, but also closing the door or completingthe aborted action (provided that the problem or blockage has now passedand that the photocell or other sensor is now deactivated). If thephotocell is still active, then the user will be provided with thisinformation by way of the third duration of ring tones described above,prior to the system refusing the connection request of his return call.

The course of events described above in connection with a photocellcould similarly be used in connection with any other sensor. Thus thepresent system can also be used to send any alarm information, forexample from a burglar alarm, etc.

The system may be configured such that, if the photocell alarm is notreset, the system will continue trying to call the user (for exampleevery five minutes). Alternatively it may call one or more other users,a security organisation or the police, according to a pre-programmedsequence or hierarchy of telephone numbers that are to be used in suchan event.

For security purposes, the remote control system may be configured suchthat it only responds to incoming connection requests from certain phonenumbers. The processor 36 may be configured to identify the telephonenumber from which the connection request originated, to compare thistelephone number with a list of authorised telephone numbers, and onlyto activate the remote control event if the said telephone number is onthe said list. A user interface may be provided on or within the controlunit 27, to enable a user to add or remove telephone numbers from thisauthorised list. Alternatively, the system can be configured to respondto a connected computer, or to text messages, to enable authorisednumbers to be added to the list or removed from the list.

In the presently preferred embodiment, a list of authorised numbers canalso be programmed without using a computer or text messages, butinstead by using a single setup button provided in or on the controlunit 27, as follows:

On delivery, the remote control device 27 may be used without anypreconfiguration, and connection requests from any phone will beaccepted. Even phones that do not transmit their number, or somehowsuppress it, can be used to operate the system. In such cases, thesystem still retains a certain degree of security, since the user isrequired to know the phone number of the transceiver 33 in order to beable to use the remote control system.

However, if it is desired that only certain phone numbers should beauthorised to activate the remote control system, then all a user needsto do is to press the setup button as indicated in the followingprogramming steps:

1. Connect the power. The system accepts all phone numbers.

2. Make a call from an “authorised” phone (phone “A”) to the system.Press the set up button. The system will only accept calls from this“authorised” phone A.

3. Make another call from a hitherto unauthorised phone (phone “B”). Thesystem will not respond. However, pressing the setup button will thencause the system to accept calls from both phones A and B. This processmay be continued to add further phone numbers to the list of authorisednumbers.

Storing numbers in this manner has an additional advantage, in that itis not possible to mis-enter a telephone number by human error. If acomputer or text message were used to program a number onto theauthorised list, then it is possible that the programmer may mis-typethe number. However, with the present method as described above, thereis no scope for a wrong number to be entered.

To erase all the stored numbers, the setup button may simply be pressedand held down for a predetermined length of time, e.g. a few seconds.

The system can be factory set with the following safety function. Thefirst telephone number stored (by pressing the setup button) will notonly be designated as being an “authorised” number, but will also bedesignated as being the “priority” number. Thereafter, all alarmmessages and details of any subsequently stored numbers will always besent as text messages to this priority number. Resetting the system byholding down the setup button will delete all the numbers except thispriority number. To reset the number to the factory setting a user wouldneed to enter a code number, or press some other global reset button(which may be concealed in order to prevent accidental use).

When existing local (e.g. infra red or radio frequency) remote controlunits are used, for example to open a gate, one cannot tell which of anumber of identical transmitter was used, because all equivalent localtransmitters send the same information to the transceiver. However, withthe present system a log may be kept of the telephone numbers of thephones used to activate the remote operation, together with details ofthe operation that was performed (e.g. whether a gate was opened orclosed), and also the time and date of the operation may be recorded aswell. Thus, a log of the remotely-controlled events may be produced, forsubsequent analysis by security personnel if necessary.

Further, it is possible to arrange more than one photocell, for exampleone inside a garage and one outside, so that it is also possible torecord in the log whether a vehicle drove into the garage or out of it.This could be useful for applications in restricted areas such asindustrial sites.

With this system it is straightforward to keep a record of how often adoor, gate or shutter is opened or closed, how many times it has beenopened or closed, and how many hours a drive motor has been operated.This information may be stored and read out any time, but using a mobilephone system this information can also be sent automatically (e.g. as atext message) to the company that installed the system, and/or to theowner of the premises.

For example, a text message could be sent to a shutter installationcompany to say: “Customer XYZ in London, address . . . , phone number .. . , has opened/closed his shutter 1000 times and so it is now due fora service.”

This provides an advantage for the owner of the shutter, in that he canbe assured that the shutter will be serviced at appropriate times duringits life.

Procedural Flow Diagrams to Illustrate an Example System According toEmbodiment 1

The procedural flow diagrams shown in FIGS. 9, 10, 11 and 12 illustratethe processing and communication steps performed by an example of anetwork-based remote control system—here being used to remotely controla gate.

Main Program (FIGS. 9 a-d)

The flow diagram in FIG. 9 begins with the power being turned on and thehardware initialised (FIG. 9 a). The system then checks whether theprogram key is being pressed on the user interface. If it is pressed, ared LED is illuminated and the system executes a subroutine “Setup viaPC”, which enables the details of authorised users to be supplied from aPC, together with other setup parameters.

If the program key is not being pressed, the red LED is illuminated andthe GSM modem is initialised on the network, sending a message AT+CLIP=1(CLIP: Calling Line Identification Presentation, i.e. the calling numberwill be given in addition to the “RING” message). The red LED is thenturned off. Once an OK signal is received, the modem-ready LED is turnedon.

The door status is now set to “off” and the next accepted incoming callwill open the door. The system waits at this stage (see FIG. 9 c,connected to FIG. 9 a via link 9/1) for an incoming call, or any otherinput signal. If the system is called, the GSM-module will send a “RING”message and the phone number to the controller. By this the controllerknows that the system has been called and turns on the red LED. Thenumber of received “RING” messages is counted by a ring counter which isincremented after every received “RING” message until the set maximumcount is detected by subroutine “Ring-handling”. If the ring counter isnot zero, this indicates that the system is actually receiving a call.If no further “RING” message is received after a predefined time thesystem assumes that the caller hung up, the counter is reset to zero andthe red LED is turned off.

The counting of the “RING” messages received is a key element of thesystem, in order to provide the delay before the incoming call isrejected. The interpretation of the received “RING” messages is done insubroutine “Ring-handling”.

To make sure that the GSM-transceiver remains connected to the network,the controller will constantly send command “AT” to the GSM-module andcheck if the module sends back an “OK” message. If no “OK” is receivedthe system turns off the green LED to indicate the lost connection andwaits until an “OK” is received again.

With reference to FIG. 9 d, in addition to the GSM-transceiver thesystem may contain a local remote control receiver. The program waitsfor code-words received by this receiver. If a code-word is received theinterpretation will be done in subroutine “remote-control-handling”.

If the “program-key” button is pressed the following program steps dealwith adding received phone numbers or code-words to the list ofauthorised users in the non-volatile memory. This is done by simplypressing the “program-key” button for a short period of time. Pressingthis button for more than 4 seconds will erase all stored phone numbers.

If the button is not pressed the program (via link 9/3) checks if anyalarm input was triggered and jumps to the subroutines dealing withthese alarms and/or continues waiting on incoming calls (via link 9/5).

Subroutine “Ring-Handling” (FIGS. 10 a-c)

After having received the first “RING” message from the GSM-module (FIG.9 c), the program jumps to subroutine “Ring-handling” (FIG. 10 a) andchecks if a message containing “CLIP” has been received. The “CLIP”message will be followed by the calling number in most cases but as thesystem might be operated by phones suppressing their number (CLIR:Calling Line Identification Restriction) this is of no importance atthis stage. If no “CLIP” is detected, the program will set an error flagand exit the subroutine.

The program continues by reading the incoming phone number and thenchecks if the ring counter is set to 1. If not it will check (FIG. 10 b,via link 10/2) if the maximum number of “RING” messages has been reachedand, if the maximum number has been reached, will exit the subroutine.

After detecting that the ring counter is set to 1 the program checks ifthe system is set (e.g. by subroutine “Setup via PC” (FIG. 9 a)) toaccept authorised users only (i.e. only phones which give their numberand for which their number is authorised). If only authorised users areallowed, there must be at least one number stored in the non-volatilememory of the system or on the SIM-card. The program searches for thenumber calling and will hang up (by sending command “ATH” to theGSM-module) if the number is not “on the list” (i.e. stored in memory)and will exit the subroutine.

If the number is on the list the program checks if an input signaltriggered the “dial-alarm” beforehand—causing the system to call a phonenumber—and setting the dial-alarm status flag. If this flag is not set,the program will continue checking the SMS alarm status flag, which willhave been set if a text message had been sent by the system. If thisflag is not set to “LOCKED”, the program will check if the maximumnumber of “RING” messages has been received—exiting the subroutine inthis case and continuing with the program sequence if not (see FIG. 10 cvia link 10/3). If any of these two flags is set to “LOCKED”, theprogram compares the calling number with the number the dial-alarm orSMS-alarm was sent to. If the numbers are the same the alarm statusflags will be unlocked (reset).

If the maximum number of “RING” messages has not been reached, theprogram flow continues and checks the actual status of the system to beoperated, i.e. checks if the gate is closed or open (see FIG. 10 c vialink 10/3). A closed gate will be opened, a opened gate will be closed.Thus, the “feedback information” for the next incoming call is set up bysetting the number of “RING” messages the program will wait next timebefore the appropriate action is executed (i.e. before the gate isopened or closed). After this the ring counter is reset, the connectionrequest is rejected by sending hang-up command “ATH” to the GSM-module,and the program exits the subroutine.

Subroutine “Dial-Alarm Handling” (FIGS. 11 a-b)

If the program is triggered by a “dial-alarm” input signal thissubroutine will be executed. The first check is done to make sure thatthe dial-alarm flag is not set (LOCKED), otherwise the program willinstantly exit the subroutine.

If a dial-alarm has to be executed, the program will seek the phonenumber with the highest priority stored. (Note that adding a prioritynumber to a phone number may be done by subroutine “Setup via PC” (FIG.9 a) or e.g. by automatically assigning the highest priority to thenumber stored first, etc.). After this number is found, it will bedialled by sending the appropriate AT-command and the phone number tothe GSM-module. The program then waits for a feedback from the networkprovider to see if the connection had been successfully established. Ifso, the program will lock the dial-alarm (FIG. 11 b, via link 11/1),wait a few seconds and hang up. Before exiting the subroutine, theprogram will reset the “DialAlarm Pending” flag.

If the connection request was not successful (FIG. 11 a), the“DialAlarmPending” flag will be set and the whole process previouslydescribed will be executed with the phone number having the next highestpriority. If all priority phone numbers have been called without asuccessful connection the program will return. Because theDialAlarmPending flag is still active the program will wait (the nexttime it enters this subroutine) for a set dial-retry time and will startthe whole process again and again until a successful connection can beestablished.

Subroutine “SMS-Alarm Handling” (FIG. 12)

This subroutine handles the sending of four different text messages(SMS1-4) (stored in the system e.g. by subroutine “Setup via PC”) to aphone number also stored in the system.

If the program is triggered by a “SMS-alarm” input signal (input0-3)this subroutine will be executed. The program checks if there is anumber stored to which the SMS can be sent, otherwise the program willinstantly exit the subroutine.

If such a number is found, the program will check which of the four SMSinputs was triggered and will send SMS1 if input0 was activated, SMS2 ifinput 1 was activated, etc..

Whenever a SMS is sent, the “SMS_input” flag will be set to “locked”,preventing the system to be retriggered by the same input signal again.The unlocking of this flag is done by subroutine “Ring-handling”.

After having reset the flag, the user will get no more text messages ifthe input signals are no longer active. In case of the inputs stillbeing active, the text messages will be sent again.

Embodiment 2—Remote Control of the Illumination of a Display

The embodiment described above for the remote control of an event may beused to control the illumination of a display. In this embodiment, itshould be emphasised that it is not necessary for the remote controlunit to provide a delay before rejecting an incoming connection request.

This embodiment was initially conceived to enable a passer-by to cause ashop window display to be illuminated at night, on demand. This providesthe benefit that the shop does not need to illuminate the window displaycontinuously throughout the night, when there are no people nearby tosee the display. Instead, using this embodiment, a passer-by can causethe shop window light to be illuminated as and when required. Thisenables the shop to leave the lights turned off, or at a low level, forthe rest of the night, thereby saving electricity costs and benefitingthe environment.

This embodiment has more applications than simply illuminating a shopwindow, and is also envisaged to be of use in museums and art galleriesin which delicate exhibits are only illuminated as required, in order toavoid exposure to light over a prolonged period of time. This embodimentmay also be used to illuminate public landmarks or historical sites, asand when required.

FIG. 4 illustrates an example of this system used for illuminating ashop window at night. The remote control unit 46, having an antenna 45and an internal transceiver and processor (as with the unit shown inFIG. 3), is first installed in or near the shop. The control unit 46 isconnected by wires 47 or a wireless link to the lights 43 in the shopwindow 44. The control unit 46 is turned on and is connected to atelecommunications network 42 to enable the control unit 46 to receivean incoming connection request from a phone (e.g. 41 a or 41 b)belonging to a passer-by.

The telephone number to be dialled, in order to cause the lights in theshop window to be illuminated, may be displayed outside the shop window,or conveyed to the public through advertising or by some other means.Thus, a person passing the shop window 44 at night, who wishes to viewthe window display, may dial the advertised phone number, which has theeffect of sending a connection request from his mobile phone 41 a viathe network 42 to the remote control unit 46. Upon receiving thisconnection request, the control unit 46 will then reject the incomingconnection request and will cause the shop window lights 43 to beilluminated. The remote control unit 46 may then turn the lights 43 offafter a predetermined time period, for example after ten minutes, tosave electricity until another passer-by wishes to illuminate the windowdisplay.

Instead of refusing the incoming connection request, the remote controlunit 46 may answer the connection request, for example by playing aprerecorded acknowledgement or advertising message to the mobile phoneuser.

To provide an incentive for passers-by to call the remote control numberand thereby cause the shop window display to be illuminated, thetelephone number from which a connection request originated may bestored in the system or, for example, on a computer 48 as shown in FIG.5, and the shop or system operator may enter the user's telephone numberinto a lottery or draw. This gives passers-by who illuminate the shopwindow an opportunity to win a prize. The system can be programmed tofully automate such a lottery or draw and to automatically inform thewinner by giving direct feedback using the above-described “delay”feature (i.e. refusing the incoming connection request from the user'sphone after a predetermined time, as described earlier), or by sending atext message (or a pre-recorded audio message) to the known phone numberof the winner. Other ways in which passers-by could be rewarded will beknown to those skilled in the art of advertising and rewards schemes.For example, if the user has a rewards account with the shop inquestion, then rewards points could be added to that account inrecognition of the user having illuminated the shop window. The time anddate when the user caused the shop window lights to be illuminated canalso be logged on the computer 48, together with the number of times agiven user called, for subsequent market research analysis.

A lottery or draw could also be performed without being associated withthe turning on of lights. A lottery phone number could be published.People ringing this number could then be entered in a draw, or a prizeawarded to every nth person to call (e.g. every 1000th person). Usingthe above-described “delay” feature (i.e. refusing the incomingconnection request from the user's phone after a predetermined time), itwould be possible to inform the user that they are a winner immediatelywhen they call.

Embodiment 3Remote Control Module for Appliances

This embodiment provides a simple way for a user to control theswitching on or switching off, by network-based remote control, of anyappliance that can be plugged into a mains electricity socket.

The presently preferred outward form of this embodiment is broadlysimilar to existing timer modules that can be used to control theswitching on or switching off of a domestic appliance, such as atelevision or light, for example when the user is away on holiday. Asshown in FIG. 6, a remote control module 50 according to this embodimenthas a unitary housing 56, on one side of which is a mains plug 55, andon the other side of which is a mains socket 61.

In use, the mains plug 55 is plugged into a mains socket (e.g. in theuser's home), and then the mains plug of an appliance (e.g. a coffeemaker) is then plugged into the socket 61.

When plugged into a mains socket, the mains plug 55 provides electricityfor the remote control electronics as well as the connected appliance.

It will be appreciated that the appliance's own on/off switch needs tobe left in the “on” position all the while the appliance is plugged intothe remote control module 50, in order for the module 50 to be able toswitch the appliance on or off as instructed by the user by remotecontrol.

Inside the housing 56 is a telecommunications antenna 58 connected to aremote control unit 57, which may be substantially the same as thatshown in FIG. 3, as previously described. When connected to theelectrical mains, the remote control unit 57 is able to receive aconnection request from a remote telephone (e.g. 51 a or 51 b) via atelecommunications network 52 and the antenna 58.

To remotely turn on the electrical appliance, the user dials the phonenumber of the remote control unit 57. On receipt of the incomingconnection request from the user's phone, the control unit 57 causes aswitch or relay to be closed, thereby connecting the mains electricitysupply to the appliance via the plug 55 and socket 61, and causing theconnected appliance to be turned on. In the preferred embodiment theincoming connection request refused, so that the user does not incur aconnection charge.

A similar procedure may be used to turn an appliance off, the incomingconnection request being used to cause the switch or relay to be opened,thereby disconnecting the mains electricity supply from the appliance.

The remote control unit 57 may incorporate a memory to store the statusof the switch or relay, so that, on receipt of an incoming connectionrequest, the processing means within the control unit can determinewhether the switch is to be opened or closed, i.e. whether the device isto be turned off or on. Optionally, the control unit 57 may beconfigured to wait for a predetermined time period before refusing theconnection request. As with the previous embodiments, this time periodmay be set by the processing means in order to provide statusinformation to the user, such status information being conveyed to theuser by way of the duration of ring tones heard by the user before theconnection request is refused. Alternatively the system may call theuser back, or send him a text message, in order to convey the relevantinformation.

The remote control module 50 may be provided with a master on/off switch60, e.g. in series with the plug 55 and socket 61, to turn the controlmodule on or off.

The remote control unit 57 shown in FIG. 6 is also provided with a localreceiver 59, operable to receive remote control signals from a localtransmitter 53 (which may be, for example, infra-red or radiofrequency). Thus, the remote control unit 57 serves as a multiplereceiver unit, responsive to both network-based remote controlinstructions and to local remote control signals 54 from a localtransmitter 53.

A multiple receiver unit, responsive to both local and network-basedremote control instructions, may also be incorporated in the otherembodiments described herein.

The multiple receiver unit 57 may be configured to be responsive to anyone of a number of different local control signal patterns.Conventionally, with prior art local remote control systems, thereceiver unit needs to be configured (e.g. by adjusting DIP switches inthe receiver and/or transmitter) such that the receiver knows whichsignal pattern it is to respond to. However, with the presentembodiment, the user may press a setup button on or within the housing56, to inform the processor (or other programmable device) that a newlocal signal pattern is about to be taught to the device. Then, bysending a specimen signal from the local transmitter 53 to the device50, the signal pattern may be programmed into the device 50 such that itwill respond to that signal pattern in the future. This may also be doneby sending the signal first and then pressing the program button, or byautomatically programming every transmitter which sends a signal for acertain length of time or in a specified sequence.

Embodiment 4—Remote Control Lift Summoning, for Example for DisabledPeople

The embodiment that will now be described provides a way in which aperson may summon a lift or elevator, if the conventional “call” buttonon the wall outside the lift is out of the person's reach. Thisembodiment is particularly suitable (but by no means limited) for use bydisabled or handicapped people.

In this embodiment, a remote control unit 73 is installed in a buildinghaving a lift 78. The control unit 73 is connected by a wired orwireless connection 79 to the lift control electronics 70 and theassociated drive motor. Typically, the remote control unit 73 may beconnected in parallel with the conventional call buttons. The remotecontrol unit 73 has a power supply 74 and a master on/off switch 77.

Internally, the control unit 73 includes a telecommunications antenna76, a remote control receiver and transmitter unit 75, and a processorand other components as previously described with reference to FIG. 3.In use, the control unit 73 is connected to a power supply and thetransceiver 75 is connected to a telecommunications network 72 to enableit to receive an incoming connection request from a phone (e.g. 71 a or71 b).

On each floor of the building, alongside the conventional lift callbuttons, a telephone number is displayed for use by disabled people tosummon the lift to that floor. A different phone number is displayed oneach floor, specific to that floor. Alternatively, perhaps to preventmisuse, the telephone numbers may be conveyed to disabled users by someother means, for example by providing the users with an informationleaflet when they enter the building.

A separate remote control transceiver 75, having a single floor-specifictelephone number, may be provided for each floor, with each transceiverbeing connected to the lift control circuitry. Alternatively, a singletransceiver 75 may be configured to respond to a plurality of dialledphone numbers corresponding to the different floors.

In use, a disabled person on a particular floor, who wishes to summonthe lift 78, dials the phone number corresponding to that floor, whichhas the effect of sending a connection request from the user's mobilephone 71 a via the network 72 to the remote control transceiver 75. Inthe preferred embodiment the incoming connection request is refused, sothat the user does not incur a connection charge. Depending on the phonenumber dialled, the control unit 73 then controls the lift circuitry,sending the lift to the floor corresponding to the number dialled by theuser.

Optionally, the control unit 73 may be configured to wait for apredetermined time period before refusing the connection request orcalling the user back. This time period may be set by the unit'sprocessing means in order to provide confirmation to the user that thelift has been summoned, or to convey other status information, asdescribed previously.

With such a system installed, it is also possible (at next to no extracost) to connect the alarm button in the lift, via connection 79, to thetransceiver and transmitter unit 75, and to transmit and reset the alarmwith the procedure previously described in connection with the photocellsensor alarm. Unit 75 may be extended to include an audio system, inwhich case it would be possible to talk to people in the lift in case ofan alarm. The alarm information sent from the lift can also include thephone number of the user who called the lift with his mobile phone, sothat this person could be called back on his phone, too.

A similar system may be used to provide remote control operation ofdoors, doorbells or lights—again which may be of benefit to disabledusers.

Embodiment 5—Recording and/or Restricting Personnel Movement

This embodiment provides a means for the movement of personnel orvehicles to be restricted, and/or to be recorded as they pass throughdoors, gates or other barriers. It is envisaged that this embodimentwill be of particular use in large industrial sites, particularly thosein which security is of high importance, or in large buildings such ashotels.

By way of example, FIG. 8 shows part of an industrial site having avehicle access barrier 90 and a security door 91. Both the door 91 andthe barrier 90 have electric motors or electronic locks, which areconnected to a central access control unit 83, either using wiredconnections 89, or by wireless links 92 to a wireless transceiver 88.

The control unit 83 has a power supply 84 and includes atelecommunications antenna 86, a remote control transceiver unit 85, anda processor and other components as previously described with referenceto FIG. 3. In use, the control unit 83 is turned on and the transceiver85 is initialised on a telecommunications network 82 to enable it toreceive an incoming connection request from a phone (e.g. a mobile phone81 a or 81 b).

Around the site, alongside doors or barriers, telephone numbers may bedisplayed for use by authorised personnel, in order to unlock thecorresponding door or to raise the corresponding barrier. A differentphone number may be displayed alongside each door or barrier, specificto that location. Alternatively, the telephone numbers may be conveyedprivately to authorised users.

In use, a person who wishes to pass through a door 91 or barrier 90dials the phone number corresponding to that location, which has theeffect of sending a connection request from the user's mobile phone 81 avia the network 82 to the remote control transceiver 85. The transceiver85 is configured to respond to a plurality of dialled phone numbers,each corresponding to a different door, gate or barrier around the site.

In the preferred embodiment the incoming connection request is refused,so that the user does not incur a connection charge.

For security purposes, the control unit 83 may be configured such thatit only responds to incoming connection requests from certain authorisedphone numbers. Different users' phone numbers may be authorised foropening different specific doors, gates or barriers. The processorwithin the control unit is configured to identify the telephone numberfrom which the incoming connection request originated and to verifywhether this telephone number is on a list of authorised telephonenumbers for the specific door, gate or barrier that is desired to beopened.

Provided the telephone from which the connection request originated isauthorised for opening that specific door, gate or barrier, the controlunit 83 causes that door, gate or barrier to be opened or unlocked asappropriate, e.g. by sending a control signal from the transceiver 88 tothe door 91. Thus, a mobile phone or the like may be used in place of asecurity access card to enable an authorised user to enter a restrictedlocation. Authorisation to temporary personnel, such as contractors, orguests in a hotel, may be granted on a temporary basis.

Optionally, the control unit 83 may be configured to wait for apredetermined time period before refusing the incoming connectionrequest. This time period may be set by the unit's processing means, inorder to provide confirmation to the user that the door, gate or barrierwill been opened as desired, or to convey other status information, asdescribed previously.

Another option is to set the system to send information to predeterminedpeople (i.e. to their respective phone numbers) if certain areas areaccessed or if certain people (i.e. their respective phone numbers) tryto access certain areas.

On opening the door, gate or barrier, the control unit 83 stores thetelephone number from which the connection request originated, togetherwith the time and date of the connection request. This enables acomprehensive record of personnel movement through that door, gate orbarrier, and indeed throughout the entire site, to be produced. Asecurity officer can also determine who has entered a certain area, andwhether this person is an employee who knows the area, or is someonesuch as an external contractor who needs to be informed about escaperoutes in case of an accident in the area.

As well as in industrial complexes and other secure sites, it isenvisaged that this embodiment will be of particular use in hotels. Withthis embodiment, hotel guests need not be given a room key when theycheck in. Instead, the control unit 83 can be connected to the hotelcomputer and configured so that individual guest room doors can beopened by the mobile phones of the corresponding guests. A guest'smobile phone number may be authorised for remote control opening of themain entrance, car-park and appropriate room(s) etc. when he checks in,and his number can automatically be deleted when the guest checks out.The guest could give his number by simply making a call to a given phonenumber of the remote control system. This call may be free of charge.This provides the additional advantage that the system always gets theright phone number and that people in the hotel know the mobile phonenumbers of all guests (which may be useful in case of emergency, or forthe hotel's promotional or marketing purposes, etc.).

Embodiment 6—Conveying Information Over a Telecommunications Network

Another embodiment provides a method and corresponding device forconveying information over a telecommunications network. Processingmeans are connected to a telecommunications transceiver; and thetransceiver is connected to the network. On receipt of a connectionrequest from a user; the processing means and transceiver wait for atime period representative of the information to be conveyed; and thenrefuse the connection request.

This has a variety of possible applications, and enables information tobe conveyed to the user by virtue of the duration of the “wait” periodor the number of ring tones heard by the user before the system refusesthe incoming connection request. The “information” may be, for example,confirmation that a remote event has taken place, the status of a remotedevice or machine, or even a piece of general information such as aweather forecast (e.g. a short ring for fine weather, or a long ring ifrain is expected), or a sports result (e.g. a short ring if team “A”won, or a long ring if team “B” won). Since the system refuses theincoming connection request, the user is not charged (in many countries)for calling the system.

In a further embodiment, processing means are connected to atelecommunications transceiver, and the transceiver is connected to thenetwork. In use, the processing means and transceiver are configured tosend a connection request to the user (e.g. in response to some otheraction or event), wait for a time period representative of theinformation to be conveyed, and abort the connection request.

This advantageously enables information to be conveyed to the user byvirtue of the duration of the “wait” period or the number of ring tonesheard by the user before the system aborts its outgoing connectionrequest. Since the system aborts the outgoing connection request, inmany countries this service may be provided without a telecommunicationscharge.

The processing means may be configured to send the connection request tothe user in response to the occurrence of a remote event or a change instatus of a remote device.

Alternatively, the processing means may be configured to send theconnection request to the user following the receipt of a connectionrequest or a telecommunications message from the user. The user couldcall the telephone number of the system and then hang up, or his callmay be automatically rejected by the system, thereby avoiding aconnection charge. The system would then effectively call the user back(by sending the outgoing connection request) and the user's phone wouldring for a certain duration or number of rings before the system abortsthe connection request (i.e. effectively “hangs up”). Through theduration or number of rings generated by the user's phone, theinformation is thereby conveyed to the user without incurring aconnection charge

Embodiment 7—Programmed Mobile Station

Instead of using a dedicated remote control transceiver to enable adevice to be remotely controlled via a telecommunications network or tosend information via the network, a mobile phone (or a personal digitalassistant or some other kind of mobile station) can be used for thispurpose. An output from the mobile phone may be connected to an externaldevice which it is desired to control remotely, with the external deviceand the phone arranged such that the external device is responsive tothe signal through the mobile phone's output. For example, the outputfrom the phone may be connected in parallel with the control switch of adoor control unit. The phone is programmed to control the signal throughthe outputs or from the inputs in response to an incoming connectionrequest, thereby to control the external devices and/or sendinformation. The I/O (input/output) may be wired (e.g. one which isusually used for a headset) or may be a wireless I/O interface (e.g.Bluetooth® or infra-red).

In use, on receipt of a connection request from a user dialling thenumber of the “slave” mobile phone (e.g. the phone within the house thatis connected to the door opening control unit) the “slave” mobile phonewill cause the door to be opened, or some other remotely-controlledaction to be performed. Alternatively, or in addition, if an inputsignal is detected by that mobile phone (e.g. from an alarm sensor),then associated information (e.g. alarm information) may be sent to theuser.

The software in such a “slave” mobile phone (or other mobile station)may be programmed to provide dedicated “remote control” and/or “alarm”menus, through which the user may configure the “slave” functionality ofthe phone. Through these dedicated menus the user may specify how the“slave” phone is to control an external device to which it is connected,the form of the signals to be sent between the “slave” phone and theexternal device, and how the “slave” phone is to handle any alarmsignals it receives.

Another such system may be responsive to incoming text messages/SMSmessages. The use of text messages advantageously enables the remotecontrol functions to be significantly extended, and enables the use ofdifferent inputs and outputs. In use, a Bluetooth® or infra-redconnection could connect the “slave” mobile phone to the device it is tocontrol (e.g. a domestic lighting and heating control unit). A number ofdifferent commands could be included in a single text message. Logicaloperators and/or conditions could also be included. Thus, for example, atext message could be sent from the remote user reading: “Switch onlights in room 1, 3, 6 . . . , switch off lights in room 8, 9 . . . , iftemperature is below 18C turn on heating . . . ”

Different actions could thus be started by a user sending a single textmessage to the “slave” mobile phone. The “slave” mobile phone could thensend different pieces of status information and/or confirmatoryinformation to the user's remote phone, which may be done in a singletext message.

With reference to FIG. 3, such a “slave” mobile phone could completelyreplace antenna 26, transceiver 33, processor 36, inputs 39, and partlythe power supply 37 and the output 34. Thus, some of the more expensiveparts of such a system could be replaced by a cheap mobile phone. Thesoftware (optionally with the above-described “delay” feature in whichthe incoming connection request from the remote phone is refused after apredetermined time) stored in the processor unit 36 would be stored inthe mobile phone and could easily be configured using a dedicated“remote control” menu and the mobile phone's user interfaces (e.g.keypad, display).

By using wireless I/O-interfaces of such a mobile phone, all deviceswith compatible interfaces could be remote controlled (worldwide). Ifmobile phone companies and manufacturers of electronic devices agree ona remote control standard, any mobile phone could be used to remotecontrol almost any electronic system. All one would have to do is toturn on the mobile phone, configure the remote control menu and put themobile phone within the range covered by the wireless interfaces. Withreference to the example described in connection with FIG. 6, the usermay switch on a coffee machine (with a wireless interface) in hiskitchen whilst he is driving home from work, by using the mobile phonein his car to dial the number of a “slave” mobile phone in his home thatis in wireless communication with the coffee machine. Depending on thesettings in the remote control menu of the mobile phone in the home, thecoffee machine could be switched off by a subsequent connection request,and/or automatically after a set time.

Mobile phones with the described features could easily be used as alarmsystems. All that has to be done is to supply an input-signal of anysensor (wired of wireless) to the phone and configure a dedicated“remote control” menu or “alarm” menu. Existing alarm systems can easilybe extended by such a mobile phone to send an alarm information (call ortext message) to any phone.

The incoming connection request is preferably refused, so that the userdoes not incur a connection charge. Outgoing information can be sent ascalls (the user need not incur a connection charge) or as text messages.

For this purpose, the mobile phone may be an outdated model that theowner no longer uses on a day-to-day basis (but which nevertheless hasthe described features), and so this provides a good way in which oldmobile phones may be re-used, thereby saving costs and benefiting theenvironment.

A mobile phone (or other mobile station) may be programmed onmanufacture, or reprogrammed (e.g. via a SIM upgrade or a SIM update) toenable it to be used as a remote control I/O-system. The softwareprogram (and respective menu, etc.) for the remote control applicationof a mobile phone may be supplied via a telecommunications network, oron an appropriate data carrier (e.g. a SIM card or smart card).

Embodiment 8—Mobile Station with Remote Control Menu

A mobile phone (or other mobile station) may be provided with adedicated remote control button or menu option which is configured todial a telephone number for causing a remote device to be remotelycontrolled, in a manner as previously described herein. Such a button ormenu option enables the user to easily perform the corresponding remotecontrol operation, such as the remote opening of a door, gate, shutteror barrier.

Alternatively, or in addition, a mobile phone (or other mobile station)may be provided with one or more dedicated directories of telephonenumbers which are each for causing a corresponding device to be remotelycontrolled. Such directories provide organised lists of the variousremote control operations available to the user, and facilitate theiruse.

A mobile phone (or other mobile station) may be programmed onmanufacture with such a menu option or directory structure, or may bereprogrammed (e.g. via a SIM upgrade or SIM update) to provide thisfunctionality. The reprogramming may be performed via atelecommunications network, or via an appropriate data carrier (e.g. aSIM card or smart card).

Mobile phones with the described features could easily be used as alarmsystems. All that has to be done is to supply an input-signal of anysensor (wired of wireless) to the phone's inputs (wired or wireless).Existing alarm systems can easily be extended by such a mobile phone tosend an alarm information (call or text message) to any phone.

All of the above-mentioned functionality, and all the functionsdescribed with the other embodiments described herein, may be integratedinto the standard software, hardware or firmware of a mobile phone.

Indeed, features of any of the embodiments and aspects of the inventiondescribed herein may be combined in other configurations andcombinations, as will be appreciated by those skilled in the art.

Embodiment 9—Use of a Mobile Station (Especially a Mobile Phone) as aUniversal Handheld (Human) Device Interface

Microcontrollers are used in a growing number of devices because theyare smart, small and low priced. However, a major problem with manymicrocontroller based systems is the human-device-interface (HDI) orcontrol panel, i.e. the interface which enables information to beexchanged with the user. Such an interface is often the most expensivepart of a system and needs a lot of space (e.g. for a display andkeyboard). Mainly because of lack of space and costs, many devices donot have an HDI at all. Other systems can only be set up using buttonsand light emitting diodes. To set up such a system can be complicated,and in many cases can only be done by consulting a user manual. Toovercome these problems many devices have an interface to connect thedevice to a personal computer (PC) system or similar system, in order toperform setup or administrator functions.

Many of the remote control systems previously described herein may beconnected in such a manner to a PC system, in order to be configured byan administrator or security officer, for example to specify thetelephone numbers of authorised users from which incoming connectionrequests will be acted upon, or to configure the remote control actionsto be performed. However, in some cases it may be impractical orprohibitively expensive to provide a PC or a dedicated keypad anddisplay for such purposes. This may particularly be the case when theremote control system is supplied for domestic use.

Other electrical appliances, devices and systems conventionally use anattached computer (or, at least, a visual display screen and a userinput device such as a keyboard or trackball or mouse) to enable a userto perform setup functions or other tasks, or to provide input in a moregeneral sense. However, in many situations this may not be feasible. Forexample, a small museum having limited funds may not be able to affordto provide interactive display screens alongside exhibits. A town orcity council may be unwilling to install interactive terminals (e.g. toprovide information for tourists about local landmarks) in publicplaces, if there is a high risk of vandalism in that area.

To address these issues, this embodiment provides additionalcommunications software in a mobile phone (or a PDA or other mobilestation) to enable it to communicate, via a built-in local datacommunications interface, with another software-controlled device (suchas a remote control unit as described above, for example, or aninformation server) having a compatible data communications interface.By connecting a mobile phone containing this terminal software toanother system or device, by means of a standard interface, the user mayuse the keyboard and display of the mobile phone to comfortably exchangeinformation with the other system or device. In this manner, a mobilephone can easily be used as a handheld terminal or a handheldprogrammer, with little or no extra costs.

Thus, such a mobile phone may be used to supply user input to the otherelectrical appliance, device or system, or to download new software fromthe mobile phone into such systems. It may be used, for example, forperforming setup or administrator functions on a remote control unit asdescribed in the embodiments above, or for obtaining information on amuseum exhibit or public landmark. It should be stressed that many otherapplications are also possible, as will be readily apparent to thoseskilled in the art.

Modern mobile phones include one or more of a variety of different localdata communications interfaces, such as Bluetooth® , infra-red or RS232.These interfaces are typically used to connect the mobile phone to PCsystems to exchange information or to download new software from the PCto the phone. However, with the present embodiment, a mobile phoneprovided with the additional communications software can use one or moreof these local data communications interface(s) (in particular thewireless ones) to communicate not only with PC systems but with anysoftware-controlled device having a compatible interface. Using thepresent embodiment, such a software-controlled device would no longerneed its own control panel or HDI. By using a mobile phone provided withthe communications software, and by providing the software-controlleddevice with a compatible local data communications interface, the devicecould still be comfortably set up and controlled, with the usersupplying input using the mobile phone's keypad and viewing the mobilephone's display.

In many such cases it will be cost effective to replace the controlpanel or HDI of existing devices by a suitable local data communicationsinterface, to enable users to interface with the device using a mobilephone.

The present disclosure is intended to apply to any existing datacommunications interface which may be provided on a mobile phone, aswell as to future data communications interfaces which have yet to beinvented or developed.

The additional communications software provided in the mobile phone maybe standard terminal software, or software using any other existing orfuture protocol.

A mobile phone having the additional communications software may be usedto provide an alternative/replacement user interface for many electricaldevices or systems. Such a mobile phone can provide a processor, memory(integrated or chip cards), a display, a keyboard, an interface and apower supply (battery).

With the present embodiment these parts of a mobile phone may all beused free of charge. The user need not provide a dedicated PC forperforming administrator functions etc., and need not carry any extraequipment (such as a laptop PC) with him for such purposes. Instead, amobile phone having an appropriate data communications interface and theadditional communications software will provide the requiredfunctionality, to enable the user to interact with the electrical deviceor system in question. This may all be accomplished at no or next to noextra cost.

Integrated terminal software would change any mobile phone into auniversal information system that could transfer information to and fromthe user. This system could also give the phone number or the IMEInumber (the “International Mobile Equipment Identity” number—at present,every phone worldwide has a unique IMEI number that can not be changed)as an identification code over a standard data communications interface.Using this IMEI number, or any similar identity number that may bedevised in the future, or by the use of passwords, the system may beconfigured such that only authorised persons can use certain services.

Any system containing software to communicate with standard terminals(e.g. RS232-terminals) could be connected (wirelessly or by wire) tosuch a mobile phone, without any hardware or software changes beingnecessary in the system to be connected to the mobile phone. Thesoftware in the phone could either automatically detect the hostcomputer or could be manually set to the right terminal emulation type.

Using this technique, in museums, information about exhibits etc. couldbe given to visitors in different languages. The visitor would require amobile phone having an appropriate data communications interface (e.g.Bluetooth® ) and the new communications software. The museum wouldprovide a server having a compatible data communications interface. Thevisitor may then use his mobile phone to communicate with the server viathe Bluetooth® interface, by virtue of the communications softwareinstalled on the phone. This technique would also enable visitors togive feedback to the museum staff—for example to provide an opinion asto how interesting they consider a particular exhibit to be.

Using this technique, doors could be opened by a user typing a codenumber on the mobile phone keypad. The code number is transmitted viathe phone's data communications interface (e.g. Bluetooth® ) to a serverhaving a compatible interface. The server then checks the code numberthat has been entered and opens the door if the code number is correct.For an additional level of security, the IMEI, the phone number or anyunique identity code of the user's phone could also be transmitted tothe server, which would check the number against a list of authorisednumbers and only cause the door to be opened if both the code number iscorrect and the phone number is authorised.

Also using this technique, lights in shop windows could be turned on bythe user sending a command via the phone's data communications interface(e.g. Bluetooth® ) to a compatible lighting control system within theshop. Depending on the circumstances, this technique may be easier toimplement and use than the one described in Embodiment 2 above, becausethe user would not need to know and dial any phone number, and theresponse would be immediate. Detailed information (e.g. text and photos)about the products displayed in the window could be sent back to theuser. By providing a short-range data communications transceiver in eachwindow of a large shop having many windows, and identifying whichreceiver receives the user's command, the shop can determine the user'sposition in front of the store and can customise the data sent back tothe user accordingly.

One of the advantages of such an information system is that many peoplein a limited area can be reached. The connection between a user's mobilephone and a server could be automatically established, in the same wayas a computer can automatically identify a mobile phone having aninfra-red interface as soon as the phone is within reach of thecomputer's local transmitter.

The range that is covered by standard short distance transmitters caneasily be expanded by using multiple transmitters or by usingamplifiers.

A mobile phone in accordance with this embodiment may have a dedicated“local comms” or “terminal” menu programmed into the phone's software orfirmware, from which the phone's local data communications or terminalfunctions may be accessed.

As an example of the use of such a phone, in an airport building a usercould set the phone to the “terminal” menu, upon which the phone wouldperform a setup or handshaking routine to establish a local datacommunications connection between the mobile phone and the airport'sinformation server. The user could then, for example, enter the word“PARIS” into the mobile phone, upon which he would then receiveinformation from the airport's information server about flights to orfrom Paris. This information could be automatically tailored accordingto the user's actual location in the airport. For example, if the useris in the Departures section of the airport (i.e. the user's phoneinterfaces with a transceiver in that specific location) then theinformation could be tailored to relate to departures for Paris.Conversely, if the user is in the Arrivals area, then the informationcould provide details of planes arriving from Paris.

As further example, such a mobile phone could be used to interface withthe engine management system or onboard computer of a car. If the carbreaks down, then the user could use his phone to read out the errormemory of the car and send this information to a garage, or to performother diagnostic checks and send a corresponding report to a garage.

FIG. 13 shows an example of a mobile phone 190 provided with terminalcommunications software, being used to configure a remote control unit192 of the type described in Embodiment 1 above. The mobile phone 190may communicate with the control unit 192 using a cable connection 194,a wireless link 196 (e.g. radio frequency or Bluetooth® ), or via aninfra-red link 198. For the purposes of illustration this figure showsall three of these communications links (194, 196, 198) being usedsimultaneously, although in practice they would generally only be usedseparately.

With this new communications software, the mobile phone 190 may be usedto perform inter alia the following administrator or setup functions onthe remote control unit 192:

-   -   store authorised phone numbers    -   delete authorised phone numbers    -   set priorities    -   set the number of ring signals or time delay used to provide        feedback information to the user    -   set the times when the system can be used    -   read a log of when the system was used    -   locally operate the system using a built in local transceiver,        e.g. Bluetooth® , instead of using a local remote control        transmitter    -   download new control software from the mobile phone into the        system and many other functions that would otherwise only be        accessible using a PC system.

With the new software, the user simply selects the “terminal” menu onthe phone and connects the phone to the host system. After sending acharacter form the phone to the host system, the host will respond bysending a start text to the phone and the connection will beestablished. The host will then be able to communicate with the user. Inmost cases, the user will not require a user manual in order to be ableto change the settings of the host system, because all the informationhe needs can be given by the host system.

After the setup operation is finished, the phone can be disconnectedfrom the host system and set back to the standard telephone menu, foruse like any other mobile phone.

Further Advantages of Using Mobile Phones for Terminal Purposes

-   -   By using a mobile phone and a wireless link, no display or        keyboard can be destroyed by vandalism or damaged by        environmental effects (e.g. rain, corrosion, etc.)    -   The user is familiar with the menu-driven handling and the        keyboard of his phone—in contrast to operating other systems.    -   Almost everyone nowadays carries a mobile phone . . . but not a        PC.    -   in connection with systems such as the one described in        Embodiment 1 above, a mobile phone can be used to locally        operate as well as to setup the system.    -   Mobile phone companies will be able to sell more phones if they        contain the additional communication features and software.    -   They could also use their developed products without the “phone        part” as multifunctional handheld terminals.    -   For use as a local terminal or an HDI or control panel, a mobile        phone does not need a SIM card (or contract), or any of the        other components generally provided in mobile phones for network        telecommunications purposes, such as a GSM-modem, an antenna, an        HF-amplifier etc. Thus, an old phone that is no longer required        for network telecommunications could still be used as a handheld        terminal, provided it has a suitable local data communications        interface.

Embodiment 10—Use of a Mobile Phone as an RFID Terminal

RFID, short for radio frequency identification, is a technology similarin theory to bar code identification. With RFID, electromagnetic orelectrostatic coupling in the RF portion of the electromagnetic spectrumis used to transmit signals. An RFID system consists of an antenna and atransceiver, which read the radio frequency and transfer the informationto a processing device, and a transponder, or tag, which is anintegrated circuit containing the RF circuitry and information to betransmitted.

RFID systems can be used just about anywhere, from clothing tags to pettags to food—anywhere that a unique identification system is needed. Thetag can carry information as simple as a pet owner's name and address,or the cleaning instruction on a sweater, to as complex as instructionson how to assemble a car. Some auto manufacturers use RFID systems tomove cars through an assembly line. At each successive stage ofproduction, the RFID tag tells the computers what the next step ofautomated assembly is.

One of the key differences between RFID and bar code technology is thatRFID eliminates the need for line-of-sight reading that bar codingdepends on. Also, RFID scanning can be done at greater distances thanbar code scanning. In the case of supermarket shopping, an RFID tagattached to each item of shopping would enable an entire trolley ofproducts to be scanned at once at the checkout.

At present there are active and passive tags available. Passive tags getthe energy they need from the transmitter of the reader, whereas activetags have their own power supply (i.e. a battery).

RFID tags are expected to play an important part in our future life. Asthese tags contain information, there is a growing need for systems thatcan read this information. Handheld RFID systems are already on themarket, but they are expensive and no one would wish to carry such adevice with him all the time.

Adding RFID functionality to a mobile phone is the ideal solution tothis problem.

The principal components of a device for reading and/or writing ontoRFID devices are: a processor, memory, a display, a keyboard and a powersupply. Every standard mobile phone already contains these components.All that needs to be added is an RFID interface and the software tocontrol it.

FIG. 14 shows an example of a mobile phone 200 provided with an RFIDinterface 202. This phone could, for example, be used to readRFID-format price tags in a supermarket.

In use, the RFID interface 202 of the mobile phone 200 can be used tosend or receive wireless RFID signals 204 to or from an RFID tag 206attached to a package 208.

In use, the mobile phone 200 would first be set to an “RFID” menu, andthe user would then follow instructions on the mobile phone's display.For example, the user could press a key, which would cause a signal tobe sent to the RFID tag 206. RFID response information, received fromthe tag 206, would then be displayed on the mobile phone 200.

With this system, in a supermarket the staff would no longer need toattach any price labels to the goods themselves or display priceinformation on the shelves. Instead, the supermarket management wouldonly need to provide price information on their computer system, whichin turn would cause the correct price information to be displayed on acustomer's mobile phone via the RFID tag system. The supermarket and thecustomers can be sure that the pricing is current, and there will be nodanger of a member of staff inadvertently displaying an incorrect pricelabel on a shelf. Moreover, the supermarket can instantly update productprices (potentially across an entire chain of stores at once) byentering the new prices on a single computer. This will save time andmoney, since personnel will not need to update the price labels on theproducts themselves or on the supermarket shelves.

When a mobile phone is used to obtain pricing information from an RFIDtag, relevant information about the product, or information about anyapplicable special offer, may also be provided to the user via themobile phone. This information may be provided free of charge by meansof the build in interfaces, rather than over the mobile phone network.

A mobile phone may be provided with an RFID interface and software, andalso a local data communications interface and terminal software (asdescribed in Embodiment 9 above), to enable the mobile phone to readRFID data from an RFID tag and then interrogate a local informationserver for the corresponding data (e.g. the product price or productinformation).

If a customer of a supermarket does not own an RFID-compatible mobilephone, then the supermarket could lend one (or any other type of RFIDreader) to the customer for use within the store. If a mobile phone isto be lent to a customer for such a purpose, then it could be configuredsuch that it can only be used for determining product prices, therebyproviding the customer with no motivation to steal the phone from thestore. Alternatively the RFID-compatible mobile phone could be attachedto a shopping trolley, or even integrated with the trolley (e.g. in thetrolley handle), to further deter theft.

At a checkout in a supermarket, a customer could simply hold his mobilephone near his trolley and thereby obtain a price for all the goods inthe trolley. Moreover, if the mobile phone is provided with a facilityto handle financial transactions, then he could use the mobile phone topay for the goods in the trolley.

Standard interfaces of a mobile phone could be used to download andstore RFID information in the phone, or to transfer RFID informationfrom the phone to other systems. Thus product and price informationcould be stored in the phone, and information could be sent worldwide.It would also be possible to acquire RFID product information from asupermarket by mobile phone and to download and store this informationin the phone.

1-106. (canceled)
 107. A device for activating an event such asswitching a device on or off, or opening or closing a member such asdoor, a window, a shutter, a curtain, a gate or a barrier said devicecomprising: a telecommunications receiver operable to receive aconnection request from a user, memory means for storing the state anarticle was in prior to the receipt of the connection request, andprocessing means connected to a telecommunications transceiver andhaving an output for activating an opening or closing event; and whereinthe processing means are operable, on receipt of a connection request,to: wait for a predetermined time period which time period isautomatically varied dependant on the state the article was in prior tothe receipt of the connection request; refuse the connection request;and activate the event. whereby a member such as a door, a window, ashutter, a curtain, a gate or a barrier is openable or closeableremotely by communication over a telecommunications network and wherebythe open or closed status of the member is fed back to the user via thetelecommunications network by the automatic variation in the saidpredetermined time period.
 108. A device as claimed in claim 107,wherein the processing means are further configured to detect that theuser has terminated the connection request during the said predeterminedtime period; and, in response, are configured not to activate the event.109. A device as claimed in claim 107 or claim 108, wherein theprocessing means are configured to set said time period to a first timeperiod if the article was in the first state prior to the receipt of theconnection request, and to set said time period to a second time perioddifferent from the first time period, if the article was in the secondstate prior to the receipt of the connection request.
 110. A device asclaimed in claim 107, wherein the processing means are configured toreceive input from a sensor for detecting status of the member such asan error or incident in the vicinity of the member prior to theactivation of the event, the processing means being further configurednot to activate the opening or closing event in response to such anerror or incident and to set the said time period to a third timeperiod, different from the first and second time periods thereby toprovide user feedback of the error or incident.
 111. A device as claimedin claim 107 arranged to send the user a text message, or phone him backto play a pre-recorded audio message to provide status information aboutthe member.
 112. A device as claimed in claim 107 wherein the processingmeans are arranged to return status information to the user if a call isterminated by the user before any of the said predetermined time periodshave expired.
 113. A device as claimed in any claim 107 arranged toreturn status information to a user the status information beingselected from a group containing input from a sensor for detectingstatus of the member such as an error or incident in the vicinity of themember prior to the activation of the event and the stored the state thearticle was in prior to the receipt of the connection request.