EP2704106A1 - Command input using multiple data carriers - Google Patents

Command input using multiple data carriers Download PDF

Info

Publication number
EP2704106A1
EP2704106A1 EP12182614.3A EP12182614A EP2704106A1 EP 2704106 A1 EP2704106 A1 EP 2704106A1 EP 12182614 A EP12182614 A EP 12182614A EP 2704106 A1 EP2704106 A1 EP 2704106A1
Authority
EP
European Patent Office
Prior art keywords
data
carrier
reader
computer
control unit
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Withdrawn
Application number
EP12182614.3A
Other languages
German (de)
French (fr)
Inventor
Kilian Schuster
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Inventio AG
Original Assignee
Inventio AG
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Inventio AG filed Critical Inventio AG
Priority to EP12182614.3A priority Critical patent/EP2704106A1/en
Publication of EP2704106A1 publication Critical patent/EP2704106A1/en
Withdrawn legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/20Individual registration on entry or exit involving the use of a pass
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/00174Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
    • G07C9/00182Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated with unidirectional data transmission between data carrier and locks
    • G07C2009/00261Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated with unidirectional data transmission between data carrier and locks the keyless data carrier having more than one function
    • G07C2009/00277Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated with unidirectional data transmission between data carrier and locks the keyless data carrier having more than one function opening of different locks separately
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C2209/00Indexing scheme relating to groups G07C9/00 - G07C9/38
    • G07C2209/14With a sequence of inputs of different identification information
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C2209/00Indexing scheme relating to groups G07C9/00 - G07C9/38
    • G07C2209/60Indexing scheme relating to groups G07C9/00174 - G07C9/00944
    • G07C2209/62Comprising means for indicating the status of the lock
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/00174Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
    • G07C9/00658Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated by passive electrical keys

Definitions

  • This disclosure relates to inputting commands into electronic and computer-based devices.
  • an access control system may receive a command to open a door.
  • an elevator control system may receive a command to send an elevator car to a particular floor.
  • Such commands can be input using, for example, a button on a panel or another interface.
  • US20110100762A1 describes, among other things, an electronic door trim with command buttons.
  • a command can be input into a system using two or more data carriers such as, for example, two or more cards in combination.
  • the command is determined based on the particular combination of the data carriers. Different commands can be input by changing the combination of the data carriers.
  • Some embodiments of a method comprise: contactlessly detecting a first data carrier using a data-carrier reader; contactlessly detecting a second data carrier using the data-carrier reader; and selecting, using a computer-based system control unit, one of a plurality of possible commands associated with respective data carrier combinations, the selected command being associated with a combination of the detected first and second data carriers.
  • the method can further comprise sending the selected command to an elevator system, an access control system, or a lock.
  • the method can further comprise providing a plurality of data carriers, the plurality of data carriers comprising the first and second data carriers, and selecting the first and second data carriers for inputting the selected command.
  • the data carriers are detected using an anti-collision system.
  • the detecting of the first data carrier and the detecting of the second data carrier is performed simultaneously or approximately simultaneously.
  • Some embodiments of a system comprise a data-carrier reader and a computer-based control unit coupled to the data-carrier reader, the computer-based control unit being programmed to perform a method, the method comprising, contactlessly detecting a first data carrier using the data-carrier reader, contactlessly detecting a second data carrier using the data-carrier reader, and selecting one of a plurality of possible commands associated with respective data carrier combinations, the selected command being associated with a combination of the detected first and second data carriers.
  • the first data carrier can be embedded in a first card and the second data carrier can be embedded in a second card.
  • the first data carrier can comprise a radio-frequency identification tag or an optical code.
  • An elevator control system, a lock, or an access control system can be coupled to the computer-based control unit.
  • At least some embodiments of the disclosed methods can be implemented using a computer or computer-based device that performs one or more method acts, the computer or computer-based device having read instructions for performing the method acts from one or more computer-readable storage media.
  • the computer-readable storage media can comprise, for example, one or more optical disks, volatile memory components (such as DRAM or SRAM) and/or nonvolatile memory components (such as hard drives, Flash RAM or ROM).
  • volatile memory components such as DRAM or SRAM
  • nonvolatile memory components such as hard drives, Flash RAM or ROM.
  • the computer-readable storage media do not cover pure transitory signals. The methods disclosed herein are not performed solely in the human mind.
  • FIG. 1 shows a block diagram of an exemplary embodiment of a system 100.
  • the system 100 comprises a computer-based system control unit 110, which is programmed to perform one or more of the method acts described herein.
  • the system control unit 110 is communicatively coupled to at least one reader 120.
  • the reader 120 is configured to contactlessly read information from one or more data carriers 130, 132.
  • the reader 120 comprises a radio-frequency identification (RFID) reader.
  • RFID radio-frequency identification
  • the reader 120 comprises a near-field communication (NFC) reader or a far-field communication reader.
  • the reader 120 comprises an optical code reader.
  • Each of the data carriers 130, 132 is a physical object that stores machine-readable information.
  • the data carriers 130, 132 comprise respective RFID tags 140, 142.
  • passive tags and/or active tags can be used.
  • the data carriers 130, 132 each comprise an optical code (e.g.: a one-dimensional code, such as a bar code; a two-dimensional code, such as a QR code; or another machine-readable image).
  • the data carriers 130, 132 can have various form factors. For example, the data carriers 130, 132 can be shaped like a credit card, they can be shaped like a key fob, or they can have another shape.
  • the reader 120 reads information from the tags 140, 142.
  • the data carriers 130, 132 are at least partially labeled (e.g., with text, colors, and/or images) to identify the data carriers 130, 132 to the user.
  • the system control unit 110 can also be communicatively coupled to one or more other components.
  • the control unit 110 can be coupled to a database 150, which stores information about, for example, users, user access times, and user access zones.
  • the control unit 110 can also be coupled to an access control system 160 (e.g., a security system) for an area and/or a building.
  • the control unit 110 can also be coupled to an elevator control system 170.
  • the control unit 110 can also be coupled to a lock 180, which controls access to a building, a room, a floor, a storage space, a garage and/or another area.
  • the control unit 110 can also be coupled to a network 190, which allows the control unit 110 to exchange information with one or more other electronic devices.
  • the other electronic devices can be located remotely and/or locally relative to the control unit 110.
  • the system 100 is located within a building. In further embodiments, the system 100 can also be located in and used within areas larger than a building and areas smaller than a building. For example, the system 100 could be used across a relatively large area, such as a campus, city, country or another large area. In such cases, at least some of the components are located remotely from each other. In other cases, the system 100 is used within a floor of a building, within a room of a building, or within two or more neighboring buildings. In some cases, the system 100 is integrated into a door, into a lock housing or into an area near a door.
  • one or more of the components of the system 100 comprise energy-saving features.
  • the components can enter a low-energy or "standby" mode during an actual or expected low-use period. This can reduce energy consumption and, in cases where the components rely at least partially on battery power, extend the life of the battery.
  • the lock 180 for example, can enter a standby mode after a period of disuse and then exit the standby mode in response to movement of a door handle or other component.
  • the tags 140, 142 each comprise RFID tags
  • the tags 140, 142 can each operate on the same frequency or about the same frequency.
  • the tags 140, 142 each operate on different frequencies, and the reader 120 is configured to read tags using multiple radio frequencies.
  • the codes can have the same format, or they can have different formats.
  • FIG. 2 shows an exemplary embodiment of a method 200 for inputting a command.
  • the method 200 can be performed using, for example, an embodiment of the system 100.
  • a user selects a first data carrier. This could be, for example, a first RFID card.
  • a method act 220 the user selects a second data carrier. This could be, for example, a second RFID card.
  • the first and second data carriers are selected according to a particular command that the user wishes to input.
  • the user places both the first and second data carriers in range of a reader coupled to an electronic system, so that the reader can detect information stored on the data carriers.
  • the phrase "in range of" the reader means that the data carrier is close enough to the reader for the reader to recognize the presence of the data carrier and read information from it.
  • the range can vary according to the embodiment. Possible ranges include, for example, a few millimeters, a few centimeters, less than 1 meter, about 1 meter, 3 meters, 5 meters, 10 meters, or another distance.
  • the user uses the combined data carriers, the user communicates the desired command to the electronic system.
  • FIG. 3 shows an exemplary embodiment of a method 300 for receiving a command.
  • the method 300 can be performed using, for example, an embodiment of the system 100.
  • a system control unit detects a first data carrier using a reader.
  • the system control unit can detect a first RFID card that is within range of the reader.
  • "detecting" a data carrier comprises reading information from the data carrier that allows the data carrier to be differentiated from at least one other data carrier.
  • such differentiating information can comprise, for example, a number, a string, a name, a number sequence and/or another type of information.
  • the system control unit detects a second data carrier using the reader. For example, the system control unit can detect a second RFID card that is within range of the reader.
  • the system control unit determines which command is associated with the combination of the first and second data carriers. For example, if the first and second data carriers are "Card A” and “Card B,” then the associated command is "Command X.” However, if the first and second data carriers are "Card B” and “Card C,” then the associated command is "Command Y.”
  • the commands that can be determined vary according to the particular embodiment. Possible commands include, for example: lock a door; unlock a door; call an elevator to pick up the user; open a door for a visitor; send an elevator to pick up a visitor; and/or other commands.
  • the method acts 310, 320 are performed simultaneously or approximately simultaneously.
  • approximately simultaneously is meant, for example, in rapid succession.
  • the first and second data carriers are detected within 10 milliseconds of each other, within 100 milliseconds of each other, within 0.5 seconds of each other, within 1 second of each other, or within another amount of time.
  • the first and second data carriers are detected approximately simultaneously, it often appears to a human user that they are detected simultaneously.
  • the system control unit sends the determined command to another system component in a method act 340. For example, if the selected command is an elevator command (e.g., "call the elevator"), the system control unit sends the command to the elevator control system. If the selected command is an access control command (e.g., "unlock a door for a visitor"), the system control unit sends the command to the access control system.
  • an elevator command e.g., "call the elevator”
  • the system control unit sends the command to the access control system.
  • an access control command e.g., "unlock a door for a visitor
  • FIG. 4 shows a signal diagram for an exemplary exchange of signals in a system, such as an embodiment of the system 100.
  • a data signal 410 is sent from a first data carrier to a reader and a system control unit coupled to the reader.
  • a data signal 420 is sent from a second data carrier to the reader and the system control unit.
  • the signals 410, 420 are sent simultaneously or approximately simultaneously.
  • the system control unit identifies the first and second data carriers and determines a command associated with them.
  • this command is sent to another system component for execution by the system component.
  • a data signal is sent by a data carrier in response to a signal that is first sent by the reader (sometimes called an "interrogation signal"). This can be the case if, for example, the data carrier is a passive RFID tag. For clarity, such additional signals sent by the reader are not shown in FIG. 4 .
  • FIG. 5 shows a block diagram of an exemplary embodiment of a computer 500 (e.g., part of a lock system, part of a system control unit, part of an elevator control system, part of an access control system, part of a reader, part of a database) that can be used with one or more technologies disclosed herein.
  • the computer 500 comprises one or more processors 510.
  • the processor 510 is coupled to a memory 520, which comprises one or more computer-readable storage media storing software instructions 530. When executed by the processor 510, the software instructions 530 cause the processor 510 to perform one or more method acts disclosed herein. Further embodiments of the computer 500 can comprise one or more additional components.
  • the computer 500 can be connected to one or more other computers or electronic devices through an input/output component (not shown).
  • the computer 500 can connect to other computers or electronic devices through a network 540.
  • the computer 500 works with one or more other computers, which are located locally and/or remotely.
  • One or more of the disclosed methods can thus be performed using a distributed computing system.
  • an identification feature can be used.
  • the lock system can compare data read from the data carrier with a list of data for authorized users to determine if the user associated with the data carrier is authorized to perform a given command.
  • the lock system can first require that a user input authorization information, possibly using an additional data carrier.
  • At least some of the disclosed embodiments can provide additional ways for a user to input a command into an electronic system. Such embodiments can be helpful to, for example, a user who cannot operate buttons or other types of user interfaces, possibly due to a handicap. Physically touching the interface can also be avoided, which can help reduce the spread of dirt or disease.
  • a user lives in a high-rise apartment building.
  • the user's apartment door has an electronic lock, including a system control unit, which is contained in a lock housing.
  • Three commands can be input into the lock: lock/unlock the door; call an elevator car to the floor of the user's apartment; and send an elevator car to the building lobby to pick up a guest and bring the guest to the user's floor.
  • the user knows that a guest has just arrived in the lobby, and the user wishes to send the elevator to pick up the guest.
  • the user selects first and second credit-card-sized RFID cards and holds them within a few centimeters of the lock housing, which contains an RFID reader.
  • the lock Upon detecting the two cards, the lock determines that this combination of cards is associated with the command to send the elevator car to the building lobby to pick up the guest. Accordingly, the system control unit sends this command to an elevator system control in the apartment building. After the elevator brings the guest to the user's floor, the user wishes to unlock the apartment door to let the guest in. To issue this command, the user selects the second RFID card and a third RFID card and holds these cards together near the reader of the electronic lock. The lock detects the two cards and determines that the command associated with this combination is the door-unlock command. Accordingly, the system control unit unlocks the door lock.
  • any of the disclosed embodiments can be adapted to detect combinations of three data carriers, four data carriers, five data carriers, six data carriers, or another number of data carriers.
  • at least some commands can also be input using only one data carrier.
  • Any of the disclosed embodiments that use radio-based detection of the data carriers can be adapted to use one or more anti-collision techniques.
  • method acts are performed in an order other than as disclosed herein.
  • two or more method acts can be combined into one method act, and/or one method act can be divided into two or more method acts.
  • a "user” can be a person, a group of persons, a machine and/or an animal.

Abstract

A command can be input into a system (100) using two or more data carriers (130, 132) such as, for example, two or more cards in combination. The command is determined based on the particular combination of the data carriers. Different commands can be input by changing the combination of the data carriers.

Description

  • This disclosure relates to inputting commands into electronic and computer-based devices.
  • Electronic and computer-based systems often receive commands from users. For example, an access control system may receive a command to open a door. As another example, an elevator control system may receive a command to send an elevator car to a particular floor. Such commands can be input using, for example, a button on a panel or another interface.
  • US20110100762A1 describes, among other things, an electronic door trim with command buttons.
  • Further options for the input of commands into systems could be advantageous. This is addressed herein by at least some of the embodiments covered by the claims.
  • A command can be input into a system using two or more data carriers such as, for example, two or more cards in combination. The command is determined based on the particular combination of the data carriers. Different commands can be input by changing the combination of the data carriers.
  • Some embodiments of a method comprise: contactlessly detecting a first data carrier using a data-carrier reader; contactlessly detecting a second data carrier using the data-carrier reader; and selecting, using a computer-based system control unit, one of a plurality of possible commands associated with respective data carrier combinations, the selected command being associated with a combination of the detected first and second data carriers. The method can further comprise sending the selected command to an elevator system, an access control system, or a lock. The method can further comprise providing a plurality of data carriers, the plurality of data carriers comprising the first and second data carriers, and selecting the first and second data carriers for inputting the selected command. In some cases, the data carriers are detected using an anti-collision system. In some cases, the detecting of the first data carrier and the detecting of the second data carrier is performed simultaneously or approximately simultaneously.
  • Some embodiments of a system comprise a data-carrier reader and a computer-based control unit coupled to the data-carrier reader, the computer-based control unit being programmed to perform a method, the method comprising, contactlessly detecting a first data carrier using the data-carrier reader, contactlessly detecting a second data carrier using the data-carrier reader, and selecting one of a plurality of possible commands associated with respective data carrier combinations, the selected command being associated with a combination of the detected first and second data carriers. The first data carrier can be embedded in a first card and the second data carrier can be embedded in a second card. The first data carrier can comprise a radio-frequency identification tag or an optical code. An elevator control system, a lock, or an access control system can be coupled to the computer-based control unit.
  • Further embodiments comprise a computer-based device configured to perform one or more of the disclosed methods.
  • At least some embodiments of the disclosed methods can be implemented using a computer or computer-based device that performs one or more method acts, the computer or computer-based device having read instructions for performing the method acts from one or more computer-readable storage media. The computer-readable storage media can comprise, for example, one or more optical disks, volatile memory components (such as DRAM or SRAM) and/or nonvolatile memory components (such as hard drives, Flash RAM or ROM). The computer-readable storage media do not cover pure transitory signals. The methods disclosed herein are not performed solely in the human mind.
  • The disclosure refers to the following figures, in which:
    • FIG. 1 shows a block diagram of an exemplary embodiment of a system.
    • FIG. 2 shows a block diagram of an exemplary embodiment of a method for inputting a command.
    • FIG. 3 shows a block diagram of an exemplary embodiment of a method for receiving a command.
    • FIG. 4 shows a signal diagram for an exemplary exchange of signals in a system.
    • FIG. 5 shows a block diagram of an exemplary embodiment of a computer.
  • FIG. 1 shows a block diagram of an exemplary embodiment of a system 100. The system 100 comprises a computer-based system control unit 110, which is programmed to perform one or more of the method acts described herein. The system control unit 110 is communicatively coupled to at least one reader 120. The reader 120 is configured to contactlessly read information from one or more data carriers 130, 132. In some embodiments, the reader 120 comprises a radio-frequency identification (RFID) reader. In further embodiments, the reader 120 comprises a near-field communication (NFC) reader or a far-field communication reader. In other embodiments, the reader 120 comprises an optical code reader.
  • Each of the data carriers 130, 132 is a physical object that stores machine-readable information. In at least some embodiments, the data carriers 130, 132 comprise respective RFID tags 140, 142. In various embodiments, passive tags and/or active tags can be used. In further embodiments, the data carriers 130, 132 each comprise an optical code (e.g.: a one-dimensional code, such as a bar code; a two-dimensional code, such as a QR code; or another machine-readable image). The data carriers 130, 132 can have various form factors. For example, the data carriers 130, 132 can be shaped like a credit card, they can be shaped like a key fob, or they can have another shape. The reader 120 reads information from the tags 140, 142. In some embodiments, the data carriers 130, 132 are at least partially labeled (e.g., with text, colors, and/or images) to identify the data carriers 130, 132 to the user.
  • The system control unit 110 can also be communicatively coupled to one or more other components. The control unit 110 can be coupled to a database 150, which stores information about, for example, users, user access times, and user access zones. The control unit 110 can also be coupled to an access control system 160 (e.g., a security system) for an area and/or a building. The control unit 110 can also be coupled to an elevator control system 170. The control unit 110 can also be coupled to a lock 180, which controls access to a building, a room, a floor, a storage space, a garage and/or another area. The control unit 110 can also be coupled to a network 190, which allows the control unit 110 to exchange information with one or more other electronic devices. The other electronic devices can be located remotely and/or locally relative to the control unit 110.
  • In various embodiments, the system 100 is located within a building. In further embodiments, the system 100 can also be located in and used within areas larger than a building and areas smaller than a building. For example, the system 100 could be used across a relatively large area, such as a campus, city, country or another large area. In such cases, at least some of the components are located remotely from each other. In other cases, the system 100 is used within a floor of a building, within a room of a building, or within two or more neighboring buildings. In some cases, the system 100 is integrated into a door, into a lock housing or into an area near a door.
  • In various embodiments, one or more of the components of the system 100 comprise energy-saving features. For example, the components can enter a low-energy or "standby" mode during an actual or expected low-use period. This can reduce energy consumption and, in cases where the components rely at least partially on battery power, extend the life of the battery. In some cases, the lock 180, for example, can enter a standby mode after a period of disuse and then exit the standby mode in response to movement of a door handle or other component.
  • In some embodiments where the tags 140, 142 each comprise RFID tags, the tags 140, 142 can each operate on the same frequency or about the same frequency. In further embodiments, the tags 140, 142 each operate on different frequencies, and the reader 120 is configured to read tags using multiple radio frequencies.
  • In some embodiments where the tags 140, 142 comprise optical codes, the codes can have the same format, or they can have different formats.
  • FIG. 2 shows an exemplary embodiment of a method 200 for inputting a command. The method 200 can be performed using, for example, an embodiment of the system 100. In a method act 210, a user selects a first data carrier. This could be, for example, a first RFID card. In a method act 220, the user selects a second data carrier. This could be, for example, a second RFID card. The first and second data carriers are selected according to a particular command that the user wishes to input. In a method act 230, the user places both the first and second data carriers in range of a reader coupled to an electronic system, so that the reader can detect information stored on the data carriers. The phrase "in range of" the reader means that the data carrier is close enough to the reader for the reader to recognize the presence of the data carrier and read information from it. The range can vary according to the embodiment. Possible ranges include, for example, a few millimeters, a few centimeters, less than 1 meter, about 1 meter, 3 meters, 5 meters, 10 meters, or another distance. Using the combined data carriers, the user communicates the desired command to the electronic system.
  • FIG. 3 shows an exemplary embodiment of a method 300 for receiving a command. The method 300 can be performed using, for example, an embodiment of the system 100. In a method act 310, a system control unit detects a first data carrier using a reader. For example, the system control unit can detect a first RFID card that is within range of the reader. Generally, "detecting" a data carrier comprises reading information from the data carrier that allows the data carrier to be differentiated from at least one other data carrier. In various embodiments, such differentiating information can comprise, for example, a number, a string, a name, a number sequence and/or another type of information.
  • In a method act 320, the system control unit detects a second data carrier using the reader. For example, the system control unit can detect a second RFID card that is within range of the reader. In a method act 330, the system control unit determines which command is associated with the combination of the first and second data carriers. For example, if the first and second data carriers are "Card A" and "Card B," then the associated command is "Command X." However, if the first and second data carriers are "Card B" and "Card C," then the associated command is "Command Y."
  • The commands that can be determined vary according to the particular embodiment. Possible commands include, for example: lock a door; unlock a door; call an elevator to pick up the user; open a door for a visitor; send an elevator to pick up a visitor; and/or other commands.
  • In at least some embodiments, the method acts 310, 320 are performed simultaneously or approximately simultaneously. By "approximately simultaneously" is meant, for example, in rapid succession. In such cases, the first and second data carriers are detected within 10 milliseconds of each other, within 100 milliseconds of each other, within 0.5 seconds of each other, within 1 second of each other, or within another amount of time. When the first and second data carriers are detected approximately simultaneously, it often appears to a human user that they are detected simultaneously.
  • In some embodiments, the system control unit sends the determined command to another system component in a method act 340. For example, if the selected command is an elevator command (e.g., "call the elevator"), the system control unit sends the command to the elevator control system. If the selected command is an access control command (e.g., "unlock a door for a visitor"), the system control unit sends the command to the access control system.
  • FIG. 4 shows a signal diagram for an exemplary exchange of signals in a system, such as an embodiment of the system 100. A data signal 410 is sent from a first data carrier to a reader and a system control unit coupled to the reader. A data signal 420 is sent from a second data carrier to the reader and the system control unit. The signals 410, 420 are sent simultaneously or approximately simultaneously. Based on the received signals, the system control unit identifies the first and second data carriers and determines a command associated with them. In a command signal 430, this command is sent to another system component for execution by the system component.
  • In various embodiments, a data signal is sent by a data carrier in response to a signal that is first sent by the reader (sometimes called an "interrogation signal"). This can be the case if, for example, the data carrier is a passive RFID tag. For clarity, such additional signals sent by the reader are not shown in FIG. 4.
  • FIG. 5 shows a block diagram of an exemplary embodiment of a computer 500 (e.g., part of a lock system, part of a system control unit, part of an elevator control system, part of an access control system, part of a reader, part of a database) that can be used with one or more technologies disclosed herein. The computer 500 comprises one or more processors 510. The processor 510 is coupled to a memory 520, which comprises one or more computer-readable storage media storing software instructions 530. When executed by the processor 510, the software instructions 530 cause the processor 510 to perform one or more method acts disclosed herein. Further embodiments of the computer 500 can comprise one or more additional components. The computer 500 can be connected to one or more other computers or electronic devices through an input/output component (not shown). In at least some embodiments, the computer 500 can connect to other computers or electronic devices through a network 540. In particular embodiments, the computer 500 works with one or more other computers, which are located locally and/or remotely. One or more of the disclosed methods can thus be performed using a distributed computing system.
  • In any of the disclosed embodiments, an identification feature can be used. For example, the lock system can compare data read from the data carrier with a list of data for authorized users to determine if the user associated with the data carrier is authorized to perform a given command. Alternatively, the lock system can first require that a user input authorization information, possibly using an additional data carrier.
  • At least some of the disclosed embodiments can provide additional ways for a user to input a command into an electronic system. Such embodiments can be helpful to, for example, a user who cannot operate buttons or other types of user interfaces, possibly due to a handicap. Physically touching the interface can also be avoided, which can help reduce the spread of dirt or disease.
  • In one non-limiting example, a user lives in a high-rise apartment building. The user's apartment door has an electronic lock, including a system control unit, which is contained in a lock housing. Three commands can be input into the lock: lock/unlock the door; call an elevator car to the floor of the user's apartment; and send an elevator car to the building lobby to pick up a guest and bring the guest to the user's floor. The user knows that a guest has just arrived in the lobby, and the user wishes to send the elevator to pick up the guest. The user selects first and second credit-card-sized RFID cards and holds them within a few centimeters of the lock housing, which contains an RFID reader. Upon detecting the two cards, the lock determines that this combination of cards is associated with the command to send the elevator car to the building lobby to pick up the guest. Accordingly, the system control unit sends this command to an elevator system control in the apartment building. After the elevator brings the guest to the user's floor, the user wishes to unlock the apartment door to let the guest in. To issue this command, the user selects the second RFID card and a third RFID card and holds these cards together near the reader of the electronic lock. The lock detects the two cards and determines that the command associated with this combination is the door-unlock command. Accordingly, the system control unit unlocks the door lock.
  • Although at least some of the disclosed embodiments are described as detecting combinations of two data carriers, any of the disclosed embodiments can be adapted to detect combinations of three data carriers, four data carriers, five data carriers, six data carriers, or another number of data carriers. In some embodiments, at least some commands can also be input using only one data carrier.
  • Any of the disclosed embodiments that use radio-based detection of the data carriers can be adapted to use one or more anti-collision techniques.
  • Although some embodiments of the various methods disclosed herein are described as comprising a certain number of method acts, further embodiments of a given method can comprise more or fewer method acts than are explicitly disclosed herein. In additional embodiments, method acts are performed in an order other than as disclosed herein. In some cases, two or more method acts can be combined into one method act, and/or one method act can be divided into two or more method acts.
  • As used herein, a "user" can be a person, a group of persons, a machine and/or an animal.
  • Having illustrated and described the principles of the disclosed technologies, it will be apparent to those skilled in the art that the disclosed embodiments can be modified in arrangement and detail without departing from such principles. In view of the many possible embodiments to which the principles of the disclosed technologies can be applied, it should be recognized that the illustrated embodiments are only examples of the technologies and should not be taken as limiting the scope of the invention. Rather, the scope of the invention is defined by the following claims and their equivalents. I therefore claim as my invention all that comes within the scope of these claims.

Claims (15)

  1. An access control method, comprising:
    contactlessly detecting a first data carrier (130) using a data-carrier reader (120);
    contactlessly detecting a second data carrier (132) using the data-carrier reader (120); and
    selecting, using a computer-based system control unit (110), one of a plurality of possible commands associated with respective data carrier combinations, the selected command being associated with a combination of the detected first and second data carriers (130, 132).
  2. The method of claim 1, further comprising sending the selected command to an elevator control system (170), to an access control system (160), or to a lock (180).
  3. The method of any preceding claim, further comprising providing a plurality of data carriers, the plurality of data carriers comprising the first and second data carriers (130, 132).
  4. The method of any preceding claim, further comprising selecting the first and second data carriers (130, 132) for inputting the selected command.
  5. The method of any preceding claim, the first and second data carriers (130, 132) being detected using an anti-collision technique.
  6. The method of any preceding claim, the detecting of the first data carrier (130) and the detecting of the second data carrier (132) being performed simultaneously or approximately simultaneously.
  7. The method of any of claims 1-5, the detecting of the first data carrier (130) and the detecting of the second data carrier (132) appearing to be performed simultaneously.
  8. A system (100), comprising:
    a data-carrier reader (120); and
    a computer-based control unit (110) coupled to the data-carrier reader (120), the computer-based control unit (110) being programmed to perform an access control method, the method comprising,
    contactlessly detecting a first data carrier (130) using the data-carrier reader (120),
    contactlessly detecting a second data carrier (132) using the data-carrier reader (120), and
    selecting one of a plurality of possible commands associated with respective data carrier combinations, the selected command being associated with a combination of the detected first and second data carriers (130, 132).
  9. The system of claim 8, the first data carrier (130) being embedded in a first card and the second data carrier (132) being embedded in a second card.
  10. The system of claim 8 or 9, the first data carrier comprising a radio-frequency identification tag (140).
  11. The system of claim 8 or 9, the first data carrier comprising an optical code (140).
  12. The system of any of claims 8-11, further comprising an elevator control system (170) coupled to the computer-based control unit (110), a lock (180) coupled to the computer-based control unit (110), and/or an access control system (160) coupled to the computer-based control unit (110).
  13. The system of any of claims 8-12, the data-carrier reader (120) having a range of approximately 1 meter or less than 1 meter.
  14. The system of any of claims 8-13, further comprising a plurality of data-carrier cards, the plurality of data-carrier cards comprising the first and second data carriers (130, 132).
  15. One or more computer-readable storage media (520) having encoded thereon instructions that, when executed by a processor (510), cause the processor (510) to perform an access control method, the method comprising:
    contactlessly detecting a first data carrier (130) using a data-carrier reader (120);
    contactlessly detecting a second data carrier (132) using the data-carrier reader (120); and
    selecting one of a plurality of possible commands associated with respective data carrier combinations, the selected command being associated with a combination of the detected first and second data carriers (130, 132).
EP12182614.3A 2012-08-31 2012-08-31 Command input using multiple data carriers Withdrawn EP2704106A1 (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
EP12182614.3A EP2704106A1 (en) 2012-08-31 2012-08-31 Command input using multiple data carriers

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
EP12182614.3A EP2704106A1 (en) 2012-08-31 2012-08-31 Command input using multiple data carriers

Publications (1)

Publication Number Publication Date
EP2704106A1 true EP2704106A1 (en) 2014-03-05

Family

ID=46851330

Family Applications (1)

Application Number Title Priority Date Filing Date
EP12182614.3A Withdrawn EP2704106A1 (en) 2012-08-31 2012-08-31 Command input using multiple data carriers

Country Status (1)

Country Link
EP (1) EP2704106A1 (en)

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2017136111A1 (en) * 2016-02-04 2017-08-10 Carrier Corporation Dual card programming for access control system
CN111710063A (en) * 2020-05-14 2020-09-25 特斯联科技集团有限公司 Intelligent entrance guard for office building
EP3448791B1 (en) 2016-04-29 2021-06-09 Kone Corporation Elevator entry control system and method
EP4036042A1 (en) * 2021-01-28 2022-08-03 Otis Elevator Company Tag detection in elevator systems

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US4979594A (en) * 1988-05-11 1990-12-25 Inventio Ag Method and equipment for the secure and convenient input of control commands, in particular in lift installations
WO1998052136A1 (en) * 1997-05-12 1998-11-19 American Card Technology, Inc. Dual smart card access control electronic data storage and retrieval system and methods
US20040263316A1 (en) * 2003-06-24 2004-12-30 Case, Llc Reprogrammable vehicle access control system
WO2006017881A2 (en) * 2004-08-18 2006-02-23 Inlink Technologies Pty. Ltd. Radio frequency identification with biometric device control
US20110100762A1 (en) 2008-04-28 2011-05-05 Inventio Ag Method of using an elevator system, elevator system for such a method and method of retrofitting such an elevator system and electronic door trim

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US4979594A (en) * 1988-05-11 1990-12-25 Inventio Ag Method and equipment for the secure and convenient input of control commands, in particular in lift installations
WO1998052136A1 (en) * 1997-05-12 1998-11-19 American Card Technology, Inc. Dual smart card access control electronic data storage and retrieval system and methods
US20040263316A1 (en) * 2003-06-24 2004-12-30 Case, Llc Reprogrammable vehicle access control system
WO2006017881A2 (en) * 2004-08-18 2006-02-23 Inlink Technologies Pty. Ltd. Radio frequency identification with biometric device control
US20110100762A1 (en) 2008-04-28 2011-05-05 Inventio Ag Method of using an elevator system, elevator system for such a method and method of retrofitting such an elevator system and electronic door trim

Cited By (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2017136111A1 (en) * 2016-02-04 2017-08-10 Carrier Corporation Dual card programming for access control system
US10706649B2 (en) 2016-02-04 2020-07-07 Carrier Corporation Dual card programming for access control system
EP3448791B1 (en) 2016-04-29 2021-06-09 Kone Corporation Elevator entry control system and method
US11697572B2 (en) 2016-04-29 2023-07-11 Kone Corporation Remote call and mobile access extension for controlling an elevator or a door key
CN111710063A (en) * 2020-05-14 2020-09-25 特斯联科技集团有限公司 Intelligent entrance guard for office building
EP4036042A1 (en) * 2021-01-28 2022-08-03 Otis Elevator Company Tag detection in elevator systems

Similar Documents

Publication Publication Date Title
ES2808449T3 (en) Access control systems and method using a smartphone
AU2014230867B2 (en) Access control for areas with multiple doors
KR100917718B1 (en) System and Method for managing coming and going with smart tag
CA2881335C (en) Inputting lock commands
CN104918872A (en) Inputting lock commands using gestures
JP6107293B2 (en) Elevator call registration system
EP2704106A1 (en) Command input using multiple data carriers
WO2016067105A2 (en) Smart parking barrier
CN108763993A (en) The noninductive control methods of RFID based on range sensor, apparatus and system
JP4810811B2 (en) Entrance / exit management system
CA2894221C (en) Command input based on data-carrier orientation
KR20070005277A (en) Elevator controller using rfid tag
KR102217522B1 (en) entrance control mat system providing method
GB2515629A (en) Authentication registration and cancellation device
JP6505064B2 (en) Elevator control system and program
JPH09270011A (en) Intruder detector in facility such as condominium
KR20050113552A (en) The elevator automatic floor selecting method which uses the rfid
Alphonse et al. Facilitating Fingerprint-Based Door Automation System Using RFID and Bluetooth
JP2006228175A (en) Facility access automatic management system using non-contact ic card
KR20110114945A (en) System for monitoring whether object enter or go out of place and operating method thereof

Legal Events

Date Code Title Description
AK Designated contracting states

Kind code of ref document: A1

Designated state(s): AL AT BE BG CH CY CZ DE DK EE ES FI FR GB GR HR HU IE IS IT LI LT LU LV MC MK MT NL NO PL PT RO RS SE SI SK SM TR

AX Request for extension of the european patent

Extension state: BA ME

PUAI Public reference made under article 153(3) epc to a published international application that has entered the european phase

Free format text: ORIGINAL CODE: 0009012

STAA Information on the status of an ep patent application or granted ep patent

Free format text: STATUS: THE APPLICATION HAS BEEN WITHDRAWN

18W Application withdrawn

Effective date: 20140527