Sign In to Follow Application
View All Documents & Correspondence

Biometrics Electronics

Abstract: A wireless access control system and method is described which permits wireless communication between a remote access controller and a focal access controller on an "on demand" basis. The remote access controller can determine the state of the locking mechanism without communication to the focal access controller when a valid access request is presented. However, if an invalid access request is presented, a remote wireless communicator will be placed in its transmission mode to request updated user control data from the focal access controller. The remote wireless communicator can also be placed in its transmission mode to request updated user control data from the focal access controller by a communication command input at a remote programming mode device.

Get Free WhatsApp Updates!
Notices, Deadlines & Correspondence

Patent Information

Application #
Filing Date
11 November 2011
Publication Number
26/2013
Publication Type
INA
Invention Field
COMMUNICATION
Status
Email
Parent Application

Applicants

GENOMTECH BIO PVT LTD
205, THE BLOSSOM CHS LTD., ADARSH DUGDHALAYA LANE, MARVE ROAD, MALAD (WEST), MUMBAI-400064.

Inventors

1. MR. JINAV SANDEEP GHATALIA
205, THE BLOSSOM CHS LTD., ADARSH DUGDHALAYA LANE, MARVE ROAD, MALAD (WEST), MUMBAI-400064.

Specification

FORM 2
THE PATENTS ACT, 1970
(39 OF 1970) &
THE PATENTS RULES, 2003 PROVISIONAL/COMPLETE SPECIFICATION
(See section 10 and rule 13)
1. TITLE OF THE INVENTION. : BIOMETRIC ELECTRONICS
2. APPLICANTS
Name Nationality Address
GENOMTECH BIO PVT. LTD. INDIAN COMPANY 205, The Blossom CHS
Ltd.,
Adarsh Dugdhalaya Lane, Marve Road, Malad (West), Mumbai - 400064.
3. PREAMBLE TO THE DESCRIPTION:
COMPLE TE The following specification particularly describes
the invention and the manner in which it has to be performed.
4. DESCRIPTION:(Description shall start from the next page )
5.CLA1MS (not applicable for provisional specification. Claims should start with the preamble "I/We claim" on separate page)
6. DATE AND SIGNATURE (to be given at the end of last page of specification)
7. ABSTRACT OF THE INVENTION:

FIELD OF THE INVENTION
This invention is generally directed to a wireless access control system having a remote access controller which is able to wirelessly communicate with a focal access controller to restrict access to a locking mechanism linked to the remote access controller. More specifically, the wireless access control system of the present invention provides for "on demand1' communication between the remote access controller and the focal access controller in a manner to minimize energy consumption, while, at the same time, providing an efficiently fast status signal (e.g., lock or unlock) at the remote location for the locking mechanism. The wireless transmission of access control data between the remote access controller and the focal access controller can be effectuated by (i) an invalid access request signal at the remote access controller, (ii) a communication command input at a remote programming mode device that is coupled to said remote access controller, (iii) the expiration of a timer coupled to said remote access controller; and (iv) the activation of a transducer that is coupled to the remote access controller by a transducer stimulator located remotely from the transducer. The transducer stimulator may be controlled by the focal access controller, but can also be separately operated.
BACKGROUND OF THE INVENTION
The present invention relates to an access control system. More particularly, the present invention relates to an access control system that typically connects a plurality of remote locking mechanisms to a focal access controller.
The need to control access to secured premises has resulted in a long history of access control devices. Traditionally, simple mechanical locks were incorporated to prevent access to the premises by unauthorized users. However, in such simple mechanical locking environments, mechanical keys needed to be provided to every authorized user. If the lock were changed, new keys needed to be provided to each authorized user, resulting in confusion and undue expense. Such mechanical locks were particularly undesirable in the hotel industry wherein a new user might be authorized each day, but wherein prior authorized users should be denied access.

With the advent of less expensive microelectronics, electronic access controllers were developed that could grant access to an authorized user based on the presentation of a information such as a card key. While the issuance of different card keys was less expensive than the manufacturing of metal keys, such early access control systems still required security professionals to physically adjust authorized codes at each door in a system. In larger installations, this step was both expensive and time-consuming.
In the next development of the access control industry, all locking mechanisms in a system were wired to a focal access controller so that the security professional could reprogram each locking mechanism from a focal location (e.g., a command and control station). However, wired units tended to be expensive and complex to install in view of the necessity to physically connect each locking mechanism to a remote device by hard wire.
A wireless access control system may provide several advantages over a traditional, wire-based access control system. In a traditional, wired access control system, each access point, such as a door, for example, is equipped with a locking module to secure the access point. Each locking module is in turn directly wired to a remote access control module. The access control module is typically a database that compares a signal received from the locking module to a stored signal in the database in order to determine an access decision for that locking module. Once the access decision has been determined by the access control module, the decision is relayed to the locking module through the wired connection.
The use of wired connections between the access control module and the locking module necessitates a large investment of time and expense in purchasing and installing the wires. For example, for larger installations, literally miles of wires must be purchased and installed. An access control system that minimizes the time and expense of the installation would be highly desirable.

Additionally, wire-based systems are prone to reliability and security failures. For example, a wire may short out or be cut and the locking module connected to the access control module by the wire may no longer be under the control of the access control module. If a wire connection is cut or goes, the only alternative is to repair the faulty location (which may not be feasible) or run new wire all the way from the access control module to the locking module, thus incurring additional time and expense. Conversely, an access control system that provides several available communication channels between the locking module and the access control module so that if one communication channel is not usable, communication may proceed on one of the other communication channels, would also be highly desirable, especially if such an access control system did not add additional costs to install the additional communication channels.
The problems occurring with the IR sensors is that is only works as told "in the line of sight" otherwise it fails to transmit data which usually uses the "S" and "L" bands for transmission of data.
Also there is another problem in using IR for telecommunications purpose that is it sends the data in form of the packets and it can only send one packet at a time and the receiver decodes one packet at time which is why it becomes time consuming operation to use IR rays for telecommunications.
The other disadvantage of IR is the noise created by the indoor environments that is sunlight, incandescent lighting and fluorescent lighting which causes disturbances and there is chance of interference. In the case of public address system has the major flaw that the waves are dispersed into the surrounding cause loss of data in between. Due to which the transmission remains incomplete over long ranges. Due to this reason the time increases and the consumption increases multiple times. Now the problems that are faced in wireless communications by using WIFI, BLUETOOTH and ZIGBEE can be satisfactorily overcome by using Micro waves which have all the qualities. The problem with WIFI is that it can traverse its data up to kilometers but the problem is that it has very high power consumption whereas in Microwaves can send data across thousands of kilometers without getting attenuated and with very low consumption.

The next major problem is with BLUETOOTH the is that BLUETOOTH can transmit data by consuming low power due to which the range of data transmission is only limited to meters whereas MICROWAVES fulfill all the gaps left by BLUETOOTH.
The data speed of ZIGBEE is very low though it can transmit data at low power and has got very huge range in kilometers but the time lag between the data transmission cause to much of trouble whereas as MICROWAVE does all the same functions that is transmitting data at very high speeds that is lOOmbps per second with very high range that is in kilometers with consumption of power staying to the minimal.
The shortcomings of previous wireless access control systems are evident. In the for instance, battery drain is substantial since each door access grant or deny signal requires communication between the remote location and the focal access controller. If a new employee is retained and is provided a cardkey at 9:30 AM by security personnel, and then, attempts to use that card key to enter a certain restricted area, access will be denied at that remote location if the system is programmed only to provide updated user control data at midnight of each day. The employee will either need to go back to security personnel or wait until the following day to gain authorized access.
Briefly stated, and in accordance with the preferred embodiments of the present invention, a wireless access control system and method is described which permits wireless communication between a remote access controller and a focal access controller on a demand basis. The access control system of the present invention comprises a locking mechanism having a first state and a second state; a control circuit coupled to the locking mechanism for switching the locking mechanism from the first state to the second state; an access request receiving device for receiving a individual's information and converting the individual's information into a access request signal. A remote access controller coupled to the access request receiving device and adapted to send a status signal to the control circuit. A remote storage device coupled to the remote access controller for maintaining access request data, which will be compared to the access request signal to determine whether the access control signal reflects a valid access request. A remote programming

mode device coupled to the remote access controller. A remote wireless communicator electrically coupled to the remote access controller and adapted to both transmit and receive access control data, wherein the remote wireless communicator in a standby mode during which no access control data can be received or transmitted, a wake-up listening mode during which access control data can be received, and a transmission mode during which access control data can be transmitted. A transducer coupled to the remote access controller; a timer set to a preset value and coupled to the remote access controller; a focal access controller located remotely from the remote access controller .A focal wireless communicator coupled to the focal access controller and adapted to both transmit to, and receive from, the remote wireless communicator access control data; and a transducer stimulator, located remotely from the transducer, and for activating the transducer. The remote access controller described above can determine the state of the locking mechanism without communication to the focal access controller when a valid access request is presented. However, if an invalid access request is requested, the remote wireless communicator will be placed in its transmission mode to request updated user control data from the focal access controller. The remote wireless communicator can also be placed in its transmission mode to request updated user control data from the focal access controller by a communication command input at the remote programming mode device. Moreover, the remote wireless communicator can be placed in its wake-up listening mode be either activation of the transducer by the transducer stimulator or expiration of the attached timer. It will be easier to deduce as the description proceeds that various combinations of the above mentioned components can be utilized. Moreover, while the description and the drawings will focus on the use of the remote access controller in the context of a door lock, similar access control systems can be incorporated in controlling the ignition of vehicles, controlling the operation of power tools, controlling access to telecommunication equipment, and controlling access to computer networks.

CLAIMS:-
1. An access control system consisting: a locking mechanism having an initial position and a next position; a control circuit linked to said locking mechanism for changing said locking mechanism from said initial position to next position; an access request receiving device for receiving a individual's information and altering said information into an access request signal; a remote access controller electrically linked to said access request receiving device and altered to send a signal to said control circuit; a remote storage device linked to said remote access controller for maintaining access control data which will be anaJyzed to said access request signal to determine whether the access request signal testify a valid access request; a remote wireless communicator electrically linked to said remote access controller and is able to both transmit and receive access control data, from the said remote wireless communicator having a dormant mode during which no access control data can be received or transmitted, a acquiring mode during which access control data can be received, and a transmission mode during which access control data can be transmitted; a timer set to a predetermined value and linked to said remote access controller; a focal access controller located remotely from said remote access controller; a focal wireless communicator electrically coupled to said focal access controller and able to transmit access control data, and receive access control data from said remote wireless communicator; and wherein said remote access controller can

determine the state of said locking mechanism without communication to said focal access controller when a authentic access request is presented, wherein said remote wireless communicator is placed in its transmission mode by an invalid access request signal, and further wherein said remote wireless communicator is placed in acquiring mode by the expiration of said timer.
2. The access control system of claim 1 wherein said individual's information is in the form of a user keypad.
3. The access control system of claim 1 wherein said individual's information is in the form of a biometric reader.
4. The access control system of claim 1 wherein said individual's information is in the form of a card key.
5. The access control system of claim 1 wherein said individual's information is in the form of a RFID tag reader.
6. The access control system of claim 1 wherein said individual's information is in the form of a DNA profiling sequence from a computer.
7. The access control system of claim 1 wherein said locking mechanism is a door lock.
8. The access control system of claim 1 wherein said locking mechanism controls ignition of a vehicle.
9. The access control system of claim 1 wherein said locking mechanism controls operation of a power tool.

10. The access control system of claim 1 wherein said locking mechanism controls access to telecommunication equipment.
11. The access control system of claim 1 said locking mechanism controls access to a computer network.

12. An access control system comprising: a locking mechanism having an initial state and a next state; a control circuit linked to said locking mechanism for changing said locking mechanism from said initial state to said next state; an access request acquiring device for receiving a individual's information and converting said information into an access request signal; a remote access controller electrically coupled to said access request acquiring device and able to send a signal to said focal circuit; a remote storage device coupled to said remote access controller for maintaining access request data which will be analyzed to said access request signal to determine whether said access control signal testify a valid access request; a remote wireless communicator electrically linked to said remote access controller and able to both transmit and receive access control data, said remote wireless communicator having a dormant mode during which no access control data can be received or transmitted, a acquiring mode during which access control data can be received, and a transmission mode during which access control data can be transmitted; a transducer linked to said remote access controller; a focal access controller located remotely from said remote access controller; a focal wireless communicator electrically linked to said focal access controller and able to both transmit to, and receive from, said remote wireless communicator access control data; a transducer stimulator, located remotely from said transducer, for triggering said transducer; and wherein said remote access controller can determine the position of said locking mechanism without communication to said focal access controller when a valid access request is presented, wherein said remote wireless communicator is placed in its transmission mode by an invalid access request signal, and further wherein said remote wireless communicator is placed in its acquiring mode by activation of said transducer by said transducer stimulator. 13. The access control system of claim 1 wherein the access control data transferred between said remote wireless communicator and said focal wireless communicator is already encrypted prior to transmission.

14. The access control system of claim 13 wherein said transducer and transducer stimulator utilize microwave transmissions.
15. The programming is done in such a way that the data which comes from the focal access controller is feed to the transmitter wherein it takes all the data at once does the encryption work although it is encrypted from the focal access controller and then transmits to the receiver where the it decodes the data packet and then gives to signal to give authorization to an identified individual.
16. During power failure the Circuit is designed to withstand these types of shocks by incorporating high voltage batteries through which the power can be generated and the access control system would remain active even during power failures.
17. In olden access systems the identification of these remote access controls would have to be done through RFID which used to consume lot of time so here we have designed it in such a manner that different frequencies will be set for different remote access focal controller.

Introduction:-
There are two different modules in the system block diagram mentioned above
1) The Focal Access Control System which is connected to the computer. The computer works as an integral part of the system, as it serves as the database for comparing the biometrics an individual of the object in question.
2) The Remote Access Control System which executes the task given to it by the Focal Access Control System. The whole system is controlled by the means of Wireless Transmission and Reception.
The different blocks:-
The Focal Access Control System Block consists of the following devices for its operation.
Access Device: This device is used for gaining access to the specified area. It can be a Palm Vein Scanner, Finger print Scanner, Iris Scanner & Face Recognition Camera.
Focal Access Controller: This block acquires its data from the access device, dumps it in a storage device while enrolling. In the case when it has to give access control, the same action takes place but instead of storing, it will compare with the data already present in the storage device for that particular object and generate the required output.
Storage Device: Used for the storing the information generated from the access device, later on used by the Focal Access Controller.
Focal Wireless Transmitter: The information generated by the Focal Access Controller is sent wirelessly by this device. The receiver present in the Remote Access Control System captures the information, and further action takes place.
The Remote Access Control System requires the following blocks for its operation.

Wireless Receiver: The command generated from the Focal Access Control System is accepted and further processed by this block.
Access Controller & Control Circuit: The data from the Wireless Receiver is fed to the Access Controller, which then decodes the information and sends the required command to the Control Circuit.
Locking Mechanism: The signal generated by the Control Circuit defines the action of the Locking Mechanism. The Locking Mechanisms used are Electronically Controlled Locks and Electromagnetically Controller Locks.

Documents

Application Documents

# Name Date
1 3201-MUM-2011-ABSTRACT.pdf 2018-08-10
1 3201-MUM-2011-FORM 5.pdf 2018-08-10
2 3201-MUM-2011-CLAIMS.pdf 2018-08-10
2 3201-MUM-2011-FORM 3.pdf 2018-08-10
3 3201-MUM-2011-CORRESPONDENCE.pdf 2018-08-10
3 3201-MUM-2011-FORM 2.pdf 2018-08-10
4 3201-MUM-2011-DESCRIPTION(COMPLETE).pdf 2018-08-10
4 3201-MUM-2011-FORM 2(TITLE PAGE).pdf 2018-08-10
5 3201-MUM-2011-FORM 1.pdf 2018-08-10
6 3201-MUM-2011-DESCRIPTION(COMPLETE).pdf 2018-08-10
6 3201-MUM-2011-FORM 2(TITLE PAGE).pdf 2018-08-10
7 3201-MUM-2011-CORRESPONDENCE.pdf 2018-08-10
7 3201-MUM-2011-FORM 2.pdf 2018-08-10
8 3201-MUM-2011-CLAIMS.pdf 2018-08-10
8 3201-MUM-2011-FORM 3.pdf 2018-08-10
9 3201-MUM-2011-ABSTRACT.pdf 2018-08-10
9 3201-MUM-2011-FORM 5.pdf 2018-08-10