Technical Field
[0001] The present invention is mainly related to a method and a device whereby commonly
used radio (cellular) telephones facilitate various substantially physical types of
services, and this is described, purely by way of example, for control of access,
signalling, communication and e.g. entrance door lock opening for an entrance telephone
system. However, also examples of other fields of use will be mentioned.
Background Art
[0002] "Entrance telephones" used today are either arranged with installed fixed communication
circuits ("local telephones") or connected to and switched through a public telephone
network ("door telephones"). They exist basically due to a need for security and privacy
- while still offering a sodal possibility - for inhabitants in areas which require
locked entrances due to various threats and risks in mainly highly populated areas,
but they also involve certain disadvantages.
[0003] Local telephones are costly to install, wire and maintain; door telephones involve
continuos costs for the building when used, and for reasons unknown are the local
telecommunication authorities always attempting to create a number of obstacles for
an economical installation. All of them include the disadvantage caused by externally
available user units which are extremely sensitive for outer influence and vandalism,
and mainly for the same reason, most of these units are of loudspeaking types, "hands
free", and often having a poor sound quality.
[0004] However, today a large part of the population, and rapidly increasing, carry a radio
telephone ("cellular phone"; "mobile (telephone)"), or may at least do so if there
are suffident reasons. These telephones have excellent communication, signalling and
sound properties, but have so far lacked possibility of using these properties as
a possibility to gain access/lock opening from a visitor's point of view.
[0005] WO 93 14571 A1 discloses establishment of a conventional call from a user's cellular
telephone to a clearinghouse. After receipt of an incoming call, the clearinghouse
uses a separate RF communication link from the clearinghouse to the locks controlled
by the clearinghouse.
[0006] WO 94 01963 A1 discloses am access control system that uses transmitters which generate
a dual tone (DTMF) modulated signal. A standard mobile telephone can thus be used
to obtain access to controlled areas. However, the method disdosed in WO 94 01963
A1 is related to MFC-signalling and makes no use of the information obtainable during
a "hand-shaking" procedure between a mobile radio telephone and adjacent conventional
base station.
Disclosure of Invention
[0007] It would be a major advantage to accomplish an entrance system, such as a door opening
system, which is easy to install and maintain, having good sound quality, having a
minimum of external physical user communication parts, which does not involve continuos
fees for inhabitants and property owners for the use of the system etc., but instead
allows a visitor's mobile telephone accomplish this. It is thus an object of the present
invention to disclose a method and a device facilitating a functional system having
simple installation, substantially only requiring connection to an electrical power
source and a controlled device, such as a door lock, but which does not require external
physical user communication means such as a microphone, loudspeaker and push buttons/keyboard,
as well as wired communication circuits or connection to a communication network,
but still offers complete and functional selective control of visitors/entrance telephone
services for intended building. A further object of the present invention is to give
mobile telephones existing "out there" desired possibility for control of visitors/entrance
telephone properties for a building having the aforementioned installation.
[0008] These and other objects, advantages and features of the present invention are for
this special purpose (for intended purpose preferably by specially adapted devices)
partly obtained by use of means known as "scanners", which today may for example include
receiving capability for the entire GSM frequency range. Only the receiving capability
of a scanner is required; since the communication properties of same according to
the present invention are only utilized as a "passive" listener for data, same does
not require analogue sound, nor transmitting possibility.
[0009] Since said scanner mean are only receivers, they do not require any permit or licence
to keep or use, and there are no laws prohibiting preventing the use of same for technical
solutions of the type described herein, nor any user fees, formal acceptances or similar.
With regard to analogue radio telephones, such as NMT, it is only conventional radio
reception, whereas for digital networks, such as GSM, certain signal processing is
required. Without restricting the present invention (NMT and other "analogue" standards
are used less and less, whereas "satellite" (IRIDIUM), "broadband", "dual mode", "multi
mode" and other "digital" standards are increasing), the invention will hereafter
be described with reference to an embodiment for use with digital wireless communication
systems named as "U.S. PCS 1900", "JAPAN PHS", "DCS 1800", "CT-2", "CT-2-CALL", "CT-3"
and "DECT" and/or digital cellular communication systems named "IS-54B (ADC, D-AMPS,
CDMA, IS-136)" in the United States of America, JDC in Japan and the global GSM-networks.
The "scanning" radio receiver part according to the present invention must thus be
in a position to handle the most frequently used mobile telephone systems within the
area of use (and possibly facilitate upgrading to future specifications/protocols,
for example "Bluetooth", "Maya", "Chat", "e-mode", "3G", "SMS", "WAP (/MEXE)", "iDEN",
"IMT-2000", "GMPCS", "GPRS", "UMTS", "FDMA", and "(W) CDMA" with "FH/SS", "DS/SS"
and "CO FDM"), but in order to simplify the non-restricting description, GSM has been
chosen. GSM is a commonly used standard for mobile telephones. In accordance with
a so called "protocol", a format is used denominated MultiCarrier(MC)/Time Division
Multiple Access (TDMA)/Time Division Duplex (TDD) for radio communication between
the units, such as mobile telephones and base stations, which are connected to a public
telephone network. Mobile radio telephone systems are restricted to use certain frequency
ranges for communication, and mobile telephones transmit and receive at separate frequencies
(cellular) or "time frames" (DECT) in order to accomplish speech with "full duplex".
[0010] The method according to the present invention is mainly characterized by the features
stated in the following Claim 1, and related subclaims, whereas the device for utilization
of the method is disclosed in Claim 5 and the subclaims related to this claim.
[0011] Since mobile telephony is radio communication, same can be intercepted by devices
known as scanners, which operate by continuously proceeding search of the radio frequency
spectrum or chosen parts thereof, and which detect and "lock" on active channels,
and submit intercepted sound to a listener. In the case with analogue radio, the communication
is immediately understandable, but with regard to digital communication, such as GSM,
the output would be a meaningless noise, unless they are capable of performing a speech
and signal data decoding operation with use of the same protocol as used for the intercepted
signal. In the case of GSM, such scanners are today commercially available, which
are also capable of detecting the number dialled from the mobile telephone and also
to disclose their individual and unique PIN (a subscriber's personal identification
number - "International Mobile Subscriber Identity" - IMSI)/SIM number, particularly
in the case when the mobile telephone is switched on from an off condition and when
"hand shaking" is performed with the base station located closest to the subscriber
with use of a few basic protocols, when also the protocols to be used for a subsequently
following telephone call are disclosed to an initiated listener. Accordingly, even
though it is technically possible according to the present invention to perform required
scanning/"tapping" of mobile telephones that are "switched on", it is preferred and
described that a visitor should initiate the access control procedure by switching
on a "disconnected" mobile telephone closely adjacent to the entrance to which access
is desired. This results in many advantages.
[0012] Firstly, that the visitor's mobile telephone is located in such a close relationship
to the entrance as a normal entrance request situation requires, before same can be
detected, prevents all other persons switching on their mobile telephones in an adjacent
area from addressing or initiating the system according to the present invention.
The antenna used by the system can thus be well screened, being directional and having
a short reception range.
[0013] Secondly, a "switched off" mobile telephone which is switched on also acts as a starting
or activating unit for the system, apart from the fact that same generously gives
away the protocols facilitating an "entrance call".
[0014] The radio receiving "scanning" unit in the described system will, after being activated,
perform scanning of assigned radio channel (frequency) for communication and perform
synchronisation with transmitted time divided TDMA parcels. It may thus detect, decode
and handle the number that the visitor will dial in order to make a request for access
to the building. This number is typically the telephone number of a tenant living
in the building. A programmable device, a "number discriminator", compares this number
with preprogrammed numbers - normally the telephone numbers of the tenants and/or
other persons authorized to unlock the door - and if these numbers correspond, the
door lock is allowed to receive and be activated by an unlock command. Should the
numbers not correspond, and provided that the dialled number was a telephone number,
same results in a conventional telephone call between the calling party and the called
party, while the described system does not respond to any control commands. On the
other hand, should the numbers correspond, a call can be started between the calling
and called party (provided that a reply is obtained), whereby the calling party may
identify himself and request permission to enter, whereafter the called party has
possibility to allow this by sending adequate control signals back via the established
connection - preferably as a DTMF digit sequence or code sequence - which can be detected
and decoded by the locked, synchronised and listening scanner radio part of the system.,
which "listens in" to the entire communication between the parties concerned (via
the base station) and may thus, preferably during a predetermined time period, detect
DTMF signals and act in response to same, as well as, since it may require that valid
DTMF signals must be in the correct frequency/time slot, secure that only the called
party can transmit DTMF signals influencing the system. (other means of protection
can be to disregard valid DTMF signals at T-frequency, or rather, in GSM and unless
DTMF:s are acoustically being loaded into the visiting mobile's "mic" from a tone
generator, the DTMF instructing signal messages which a mobile telephone transfers
to the base station in order to make same produce DTMF signals to the replying telephone,
this in case of attempts to force the system, strong feedback, echoes or side tone;
or a required certain dB-level to cause acceptance). Since DTMF makes it very simple
to give numerous types of commands, also other functions apart from opening a door
lock can be accomplished, e.g. start of a camera, alarm transmission, switching on
a light source etc. by commands from the called party, and such functions only require
system programming and that required hardware for such functions are made available.
[0015] The system according to the present invention thus operates in synergy with the mobile
telephone call, it does not take any part in any telephone communication, to which
it is only acting as a passive listener, and when reacting on stimulus from same,
it does not influence the actual conversation, which is carried out and completed
(logically after intended result) by the parties concerned, and furthermore is the
call without charges for the building - normally is the visitor charged to call fee
unless a 1-800 (free of charge) number is offered, whereby the need for a communication
unit for visitors no longer exists, such as a keyboard, microphone and loudspeaker
- and furthermore will excellent sound quality be achieved, well suited for use in
an area having street sounds. Since conventional telephone numbers are used, no list
of numbers is required, which favours welcome visitors, who normally knows the person
to be visited and the telephone number of same, as well as the need to bring a mobile
telephone. Since the described system has a number discriminator for storage of different
numbers, it can also offer a code lock possibility, as is the case with known entrance
telephone systems. This is advantageous for tenants, service personnel etc., as well
as to give tenants having no telephone a possibility to let in visitors by giving
them a door opening code. The system according to the invention can obviously also
include a keypad, for addressing a code lock, but this would mean additional hardware
and an external user influenced unit which is sensitive for influence/damage. A number
dialled from a mobile telephone must not necessarily be a functioning/existing telephone
number which is transferred to the base station (or in the air). All numbers dialled
are transmitted after a command and "authenticated" (authentication) by the base station,
and by preferably starting with a non-numerical part such as "*" or "#" it will, as
disclosed above, reach and be understood by the described system. Should this number
correspond to a number stored in the number discriminator for a certain code lock
purpose, intended function can be performed, in the same way and with same advantages,
e.g. time zones, as for a code lock having a keypad, even though no keypad exists.
A possible disadvantage would be that both tenants and service personnel must carry
mobile telephones to use this, but this can be motivated by costs and the advantage
of security against damage. Since the base station according to the GSM protocol first
authenticates the "mobile" and thereby makes it possible for same to "send out" a
dialled number, security against copy transmissions from a possible intruder is also
reasonably high. The level of security can be increased further, if the code lock
function first must be initiated by "switch on" of a "mobile" followed by handshaking
between same and the base station, as discussed in otherwise in this description.
Furthermore may "rolling" variable codes, time zones etc. be used to safeguard the
authority. In any case, since no telephone calls take place, due to the fact that
same is interpreted by the base station as "wrong number", the use is free of charge.
Another additional feature of existing entrance systems is often a card reader facilitating
entrance for persons having valid cards, which in conjunction with a code lock result
in different "levels" of security, namely "card only", "code sequence" or "card-plus-code
sequence", apart from the fact that it is smart, fast and practical, particularly
for company staff. A system according to the present invention can obviously also
be equipped with a suitable type of card reader (this may also include a conventional
physical card reader which reads the SIM card of the "visiting mobile", removed from
the telephone and inserted into the reader), but it may also use mobile telephones
for accomplishing a corresponding function, without the need for any external user
unit. When a GSM mobile telephone is switched on, same discloses during the initial
handshaking operation with the base station its unique "PIN-code/SIM-card" number
(amongst other information required to reach correct base station) in a format and
according to a protocol which can be read by the now activated described system. If
such a number is programmed and stored in the number discriminator as a valid "card
code", the mobile telephone acts very much the same as a "proximity card" and the
system as a "proximity card reader" which reads the card without direct physical contact,
and programming can be performed as "card only", or alternatively as "card-plus-code
sequence" with required code sequence being inputted subsequently. The same disadvantages
and advantages exist as for a non-keypad code lock, but routine reading of the unique
PIN/SIM code for a visitor can also result in advantages such as an improved registration
in a transaction memory to relate a certain visitor to misuse, also with regard to
conventional entrance communication or code lock situations, who otherwise are completely
untraceable. One may also, particularly with regard to installations having high security
requirements such as military stores or similar, authorize only a few selected mobile
telephones to initiate communication or code lock opening, and also define what certain
mobile telephones that should be permitted to do, and additionally possibly include
selectively chosen time zones, format changes, variable codes etc., and the initial
authentication by the base station of the mobile/the connection results in a general
guard against misuse. Apart from the PIN/SIM code etc. transferred "automatically"
from the visiting mobile when switched on and conventional dialled number, also other
types of automatically or intentionally transferred signals from the mobile can be
used for the above code lock/card functions.
[0016] Since the described system should include a speech handling unit, mainly in order
to detect and decode DTM F signals sent as speech data, same may theoretically also
accept voice and speech commands for its functions/actions, but DTMF is believed both
simpler and better for the relatively few tasks that an entrance surveillance system
has to perform. Possibly, and in order to improve security and use, may given commands
consist of longer DTMF code sequences, as well as different command codes for different
called inhabitants (based on the different call numbers of same) for same type of
actions, or for actions specific for only certain inhabitants, such as permitting
a lift to reach a certain floor level, but normally is only one or a few DTMF digits
required to achieve required extent of signalling with adequate security, since same
in fact must originate from the called party, and amongst other criteria, preferably
also within a predetermined time frame in a by the base station authenticated call.
[0017] Even though commercially available GSM-scanners can be used for radio frequency scanning
and reception, time adjustment and synchronization, and signal/speech decoding required
for utilization of the present invention, the speech must never leave its digitized
format to be transformed to an analogue signal audible to a listener; each system
function is preferably in digital format. Accordingly, when using such devices a considerable
part of their functions are not utilized, but since they are available and can be
used, same confirms that described functions can be achieved in a number of ways and
by use of standard components.
[0018] Programming the system according to the invention can be carried out in a number
of ways, e.g. in position by means of a serial connection and with a handheld programming
device or a PC (or PC-capable mobile telephone), and programming from a PC at a distant
location via modem is also possible. In position, the system may also receive DTMF
or, if adapted thereto, data via mobile telephone (WAP, SMS etc.) as programming commands,
provided that somebody (authorized, e.g. by PIN/SIM number) is in place and establishes
a mobile telephone call to an authorized programming telephone, in which case the
described system can listen to the communication therebetween and thus receive the
correctly formatted programming instructions/commands. It may also be arranged with
a connection to a public telephone network for distant programming purposes, as well
as, for example, a mobile telephone subscription of cash card type or via Internet,
typically not utilized for speech communication, but possibly used, for example, for
alarm transmission purposes and surveillance/control purposes of functions within
the building.
[0019] Non-existence of external physical user units (apart from the antenna, which can
be arranged hidden) results in a highly secure substantially non-external installation,
protected against external influence and damage, and expensive parts and covers are
not required. Normally, only a few instructions are required (even though same may
be an electronic display or similar, as well as audio/voice synthesized instructions,
which on the other hand increases the costs and the risk for damage, but still remains
as a possibility), and with indication of the area within which the mobile telephone
should be switched on, even though this is not absolutely necessary for an experienced
user, whereby nothing is required that would damage the looks, integrity and security
of a beautifully designed entrance, even though same is equipped with an entrance
surveillance system. Based on input of a correct telephone number and that same is
detected/approved by the number discriminator, same can order connection of a TV camera
operating on a channel in a cable TV system, and also via secondary unit give a general
"alert" to all TV sets in the building, or based on the dialled number only to the
party having said number, in order to disclose that the call resulting in a ring signal
is an entrance telephone call (should the called party have the service "caller ID",
the telephone number/identity of the calling party is also disclosed) and that the
visitor can be seen on TV, prior to responding to the call. A similar function can
also be implemented for code/card addressing.
[0020] Certain mobile telephones use speech scrambling in order to make the calls safer.
Even so, all mobile telephones within a given area must use the protocols for handshaking,
dialled telephone number, radio transmission etc.. This communication between the
mobile telephone and the base station remains within given standards. Only the speech
is made subject to speech scrambling and can only be received by another telephone
having the same algorithm for speech scrambling. However, it is not a major problem
to detect and decode DTMF signals from a scrambled data stream. Since the pair of
tones have such a typical configuration and maintain their frequency relationship
also when scrambled, they are easily detectable as DTMF signals and their specific
internal frequency relationship between the two frequencies identifies the digit.
[0021] Ring signals and engaged signals (signals identifying call progress) can also be
detected, since they are sent back to the calling telephone from the side of the called
telephone, and can thus be detected by the described system and be utilized for additional
purposes, for example, as known from existing entrance telephone systems, to start
a time period allowed for DTMF detection only as from detection of reply (end of ring
signals); the time period allowed for calling (between dialled telephone number and
reply) and possibly also to specify separately the time of the call. Many of the above
mentioned possibilities are only stated to indicate functions intended to meet certain
specific situations, demands and/or design alternatives, and in order to give a general
background to the following example of a non-restricting example of an embodiment
according to the method of the present invention, described with reference to the
accompanying drawings.
Brief Description of Drawings
[0022]
- Fig. 1
- shows, schematically and illustratively, a digital data stream including bursts of
transferred data in a digital radio telecommunication system (in this case, for simplification,
DECT);
- Fig. 2
- shows a simplified block diagram disclosing an example of a system according to the
present invention; and
- Fig. 3
- shows a flow diagram, illustrating the function of the system according to Fig. 2.
Detailed Description of the Preferred embodiment
[0023] As previously mentioned, and without intending any undue restriction, the described
embodiment will be related to the GSM standard, which, as already mentioned, is a
MC/TDMA/TDD format for communication between mobile telephones (not shown) and base
stations (not shown). Furthermore, all types of telephones and other "telephone related"
apparatus, e.g. modems, computers etc., that can be reached by a call from a mobile
telephone are also not shown, and same can be connected to a wired telephone network
but also consist of mobile telephones. Earlier (page 2) has the almost Babylonic scenario
with regard to available mobile systems been discussed. GSM has today the largest
number of users, and this fact is the main reason why same has been chosen for the
example of an embodiment. However, also this system is relatively difficult to describe
in brief terms. In order to simplified illustrate some common principles for "digital"
mobile telephones, Fig. 1 discloses DECT. DECT is allocated certain "frequency bands"
for wireless radio communication in which a number of carrier waves are available.
Each carrier wave is divided in time periods having twenty-four "time slots". Two
time slots are utilized to create a duplex channel, which means that twelve speech
channels exist within the range of each carrier wave. Said twenty-four time slots
are transmitted as so called TDMA frames having a frame cycle time TF of 10 ms. A
typical frame structure for a digital TDMA/TDD communication system is shown in Fig.
1. During the first half of the frame, i.e. the first twelve time slots denominated
R1, R2 ... R12, data are received from the base station, whereas during the second
half of the frame, i.e. the second group of twelve time slots denominated T1, T2 ...
T12, the telephone unit is transmitting data to the base station. A radio connection
between a base station and a telephone unit is assigned a time slot in the first half
of the time frame and a time slot having the same number in the second half of the
time frame. Each time slot normally includes synchronizing data, control data and
digitalized speech or user data.
[0024] Signalling data, such as data referring to the calling party, dialled telephone number
and call progress signals can be included in control data as well as speech/user data.
[0025] Digital cellular systems must be even more complicated, but differ from the above
by having individual radio frequencies (carrier waves) for transmission and reception
(according to present and previous GSM).
[0026] Fig. 2 shows a simplified block diagram disclosing the described system 1, including
four essential building blocks, i.e. a central controlling user adapted logical unit
2, a radio unit 3, a time controlling and synchronizing control unit 4 and a speech
treating unit 5.
[0027] The radio unit includes an atmospheric interface by means of an antenna 6, connected
to the radio unit 3 and including a searching "scanning" part and a receiver/demodulator.
Time adaption during reception is controlled by the time controlling unit 4, which,
in the case of TDMA/TDD technology, handles synchronization of frames and time slots
in a known fashion. The time reference is normally gained from a synchronizing signal
received by the antenna 6. Suitable for described embodiment, said antenna is preferably
of receive type only, screened and of directional type, whereby same has a very short,
narrow and defined reception range wherein same well receives radio signals within
the frequency band(s) utilized for mobile telephony within the installed area. During
a first phase, which can be called the "resting phase", said antenna can under ideal
conditions only be activated by signals from the predetermined area (which usually
requires certain calibration in position, e.g. when the system is installed), but
a nearly "ideal" condition is also acceptable due to the following protocol. During
this phase is the antenna connected to a searching ("scanning") device, which constitutes
the first part of the radio unit 3. This searching device searches during the first
phase continuously the frequency bands used for a suddenly occurring relatively strong
radio signal on any of the frequencies. This is a reason why it is preferred that
a visitor should switch on a "disconnected" mobile telephone adjacent to the entrance
in order to initiate the entrance telephone procedure. When a mobile telephone is
"switched on", it is transmitting with substantially full power in order to secure
contact with a possibly distant base station (the output of the telephone may be relatively
low in certain areas), and this signal is often considerably reduced due to instructions
received from the contacted base station during the initial "handshaking" phase, during
which also other parameters for the communication are transferred, followed by a number
of initiating routines, or "protocols", which, due to the general character of the
situation, must be rather general and repeated and thus easy to understand. As previously
mentioned, required decoding of same can be carried out by commercially available
scanners, and certain of these can also decode mobile GSM conversations without having
performed surveillance of the handshaking procedure. In order to accomplish the present
embodiment, such a scanner would be a luxury, since reproduction of speech is not
required, and since most of these scanners are built to cover the entire radio spectrum;
totally unnecessary in the present case. A discrete circuit, LSI circuit or a few
commercially available IC circuits would be more suitable to implement the functions
described herein, surveillance/"scanning" only within required narrow bands, and surveillance
of the handshaking procedure, and gaining only a few desired parameters from same.
Technically can this be accomplished today in a number of ways by a person skilled
in the art and by use of commercially available standard components, and in view of
this fact a more detailed description of a certain embodiment is not believed required
and would only constitute a non-required restriction.
[0028] With reference to "handshaking", same also involves that the mobile telephone gives
away its PIN/SIM number, which, even it is not necessary for utilization of the basic
principle according to the present invention, can be used for many interesting purposes,
as already described earlier. However, since this is an added feature within the scope
of the invention, no technical solution for the gain and use thereof is described,
it is believed sufficient to disclose that this can be carried out technically in
a number of ways, and with use of components adapted for this purpose.
[0029] The only tasks to be performed by a "scanning" device according to the present invention
after having been initiated in previously described fashion are (if previously described
"proximity card" and/or transaction memory possibility are used, to deal with data
including PIN/SIM number or corresponding equivalents and secure that same are transferred
for adequate treatment) to connect another antenna (or part of an antenna) facilitating
reception at a large distance, which results in reception also from the base station
and possibly power reduced mobile telephone signals, and to transfer same to the more
stable parts of the radio unit 3. Mentioned reduction/increase of the receiving range
can also be carried out in other fashions, e.g. by use of a connectable and disconnectable
attenuating unit. The system according to the invention now enters into "active" condition,
and it is transferred back to "resting" condition after having completed intended/instructed
actions, or by disconnection after a predetermined time period. During "active" condition,
no "scanning" is performed, since only one visitor at the time requires to be handled
at an entrance. With regard to buildings having several entrances scanning and associated
procedures can simultaneously be carried out at each not yet engaged entrance, and
such satellite stations are preferably by means of a "multiplexed system" connected
to a central main unit, which may have the entire capacity for handling calls and
the main part of hardware, thereby reducing the costs for the installation.
[0030] The central control unit 2 receives data from the radio unit 3. Signalling and synchronization
information are removed from received data, and resulting speech data are transferred
to the speech treating unit 5, which decodes received data. It should be noted, that
according to described embodiment, unless speech/voice commands are utilized, preferably
only DTMF signals are of interest, which are included in the flow of speech from the
party called by the telephone, and only when a valid and preprogrammed telephone number
has been dialled from the visitor's mobile telephone; and that DTMF signals are fairly
easy to detect and decode from a speech data stream. Accordingly need only received
time slots with "R" speech data (for DECT) or corresponding frequency (in cellular
networks) be transferred to the unit 5, which can be of a fairly simple design, whereas
the unit 2 preferably maintains received "T" speech data and preferably also all control
data for internal treatment, preferably in order to obtain the number dialled by the
visitor's mobile telephone and which is transferred after "handshaking". This number
may thereafter be compared with the numbers stored/programmed in the number discriminator
7 in order to ascertain whether or not corresponding, and should this not be the case,
the system may immediately return to "resting" status. Should comparison establish
that the number corresponds to a programmed "code lock number" (if this function is
utilized), a door lock, for example, may be immediately unlocked followed by return
to "resting". Should comparison establish that the number corresponds to an authorized/programmed
"reply telephone number", the unit 5 can be started pending incoming "R" data and
for detection of in such data included DTMF signals, and provided that such are located
within a predetermined time limit, corresponding to programmed criteria, corresponding
action can be performed. After completion of programmed action, and also at reception
of a non-valid digit/code command and/or expiration of time period for surveillance,
the described system can return to "resting".
[0031] In the case of multi carrier wave/multi time frames, such as GSM, the central control
unit 2 normally also controls the various combinations of carrier wave frequencies
and time frames in a known fashion. In order to minimize the number of required components,
the unit 2 may according to the present invention be configured in such a way that
same helps the "scanner" to lock on assigned carriers/time frames. According to the
described embodiment is the control unit 2 arranged to handle received signal information
for decoding a transmitted dialled number from a mobile telephone at the entrance,
for comparison with programmed/stored numbers, and for possibly taking actions based
on the instructions associated with said number. This is carried out by the schematically
indicated number discriminator denominated 7. It should be noted that the number discriminator
7 can be integrated with the control unit 2, and may substantially comprise of a for
the purpose adapted micro control circuit, which furthermore may be integrated with
the control unit 2 and perform substantially all steps associated with same. It includes
an operative memory, in which all operative programs are stored. Furthermore, same
also includes memory means including data for a number of decoding logarithms, for
example adapted to the type of signalling information that must be decoded for a certain
purpose. These decoding algorithms are fetched and treated together with received
signalling information to reveal instructions for an action. The memory means also
facilitates possibility for adapted and/or personal user programming (which for applications
requiring high security, such as military applications, may include memory components
which can not be reprogrammed by "external persons"), such as programming/storage
of desired actions, choice of decoding algorithms from the users of the system depending
on requirements and circumstances, and/or programming of user specific information,
e.g. telephone numbers, code lock numbers, numbers for "proximity cards"; if and how
this information should co-act; DTMF digits/codes to be used for instructions from
the called telephone; etc., as well as temporary information, e.g. parameters relating
to time periods whereunder certain functions are allowed/not allowed. In order to
allow maximum use of these possibilities, at least one serial port and a real time
clock are advantageously arranged.
[0032] The system 1 may furthermore include a keypad 8 (and/or, for analogue purposes, an
IR receiver, "Bluetooth" receiver or similar), an optional card reader 9 (and/or for
analogue purposes, a "biometrical" reader or similar) and an optional display unit
10. It is connected to a power source 11, and is shown connected to an entrance lock
12 for influence of same. A connection to a block 13 is also shown, which is intended
to illustrate a number of possible added options, e.g. a TV camera, a device for announcing
a visitor via cable network, a light source, transmitting status data, or any other
desired device/procedure.
[0033] According to the present invention, as shown in Fig. 3, block 14, the described embodiment
is normally in "resting" condition, which means that same is continuously "scanning"
for a sudden and sufficiently strong radio signal within utilized frequency bands,
block 15. When this occurs, the "scanning" operation is halted, the range of the receiving
antenna is increased and surveillance is performed with regard to the initiating functions,
the "handshaking" between the mobile telephone and the base station, the PIN/SIM number
is possibly collected (if this should be used), and more specifically, locking is
performed to utilized carrier wave and assigned time frames for interception of initiated
communication, block 16. Block 17 shows a possibly included action, namely a question
whether or not a PIN/SIM number has been detected. If the answer is "yes", same is
transferred to block 18 (to which also inputted information from a possible optional
card reader or similar can be transferred) in order to initiate an associated predetermined
action, which is not described here in detail, but unless it is an action of type
"card only" the flow of operations must now return to the "no" flow from block 17
to block 19, which, during a predetermined time period, questions whether or not any
number has been dialled/transferred from the active mobile telephone. If the reply
is "no", the system returns to block 14. However, should the reply be "yes", same
is transferred to block 20, where the number is decoded and thereafter transferred
to block 21 (to which also a sequencer inputted from a possible optional keypad or
similar can be transferred), which ascertains whether or not the received number corresponds
to a number programmed into the number discriminator as a "code lock number", and
if the reply is "yes" same is transferred to block 22, in which the number is used
to initiate desired predetermined function, which is not described here, but the completion
of which may reset the system 1 and cause a return to block 14, but with regard to
certain applications first influencing block 25. If the reply in block 21 should be
"no", the number is transferred to block 23, which ascertains whether or not the number
is a telephone number programmed into the number discriminator 7 as a number which
at the actual time of day is authorized to control some related functions/actions
in the building. If the reply is "no", the system is reset and returns to block 14.
If the reply is "yes", the flow of operations is moved to block 24, in which the speech
treating unit 5 starts waiting for reception of "R" speech data (i.e. a reply to the
telephone call), and if this should occur, detection and decoding of any possible
DTMF signals in same during a predetermined time period for this purpose. If "no",
the system 1 is reset and returns to block 14, whereas if "yes", decoded digit/digits
are transferred to the number discriminator 7 and the flow of operations moves to
block 25, in which the number discriminator compares received digits/codes with stored/programmed
telephone numbers, commands, time zones etc., in order to establish programmed action
for given command. Should no correspondence be established, i.e. "No", the system
1 is reset and returns to block 14; should on the other hand correspondence be established,
i.e. "Yes", corresponding action is performed; typically a door lock opening operation
(with the unlocking indicated by "buzz", "click" and/or LED), whereafter the system
1 is reset and returns to block 14 (block 26).
[0034] The previous description is only intended to serve as an illustrating description
of an example of an embodiment according to the present invention. The method in which
the described system performs surveillance, detection and identification of activity
and signals from the connection of a mobile telephone normally with a base station,
and carries out actions associated with related received commands, can today be solved
in a number of ways and by use of commercially available components, whereby detailed
described embodiments are not regarded as necessary. Those skilled in the art can
easily on basis of the present description easily make alternative designs, which
incorporate functions corresponding to the described embodiment and without departing
from the basic principles or the scope of the invention. For example, previously described
"scanning function" may be replaced by a device which in a more "stationary" fashion
is arranged to monitor carriers/frequency bands, and furthermore can mobile telephones
already "switched on" be "tapped" with regard to dialled number, and furthermore may
also more distantly located telephones in conjunction with one single type of antenna
system be used in certain cases and/or a starting sequence for the system can be caused
by another means, e.g. a keypad or a pushbutton adjacent to the entrance. Mobile telephones
utilizing other types of systems than GSM can be used, many different decoding algorithms/routines
can be used to meet various needs, and also other command types than DTMF can be used,
e.g. speech, SMS, WAP can also be used, and some functions can, provided that the
operator supplies such services, be handled/implemented by the base station, and may,
for example via "menu choice", be included amongst the services and functions included
in the mobile telephone, if also supported by the manufacturer. Finally, the possibility
(for GSM) of constant surveillance (monitoring) of "BCCH" carrier waves from base
stations in the area should also be mentioned, whereby correct synchronization is
always achieved when a "RACH burst" is detected from an (adjacent) mobile telephone
which is being switched on, whereby detection and decoding of parameters in the "handshake"
and the call thus is made simplified. One may also, perhaps mainly in an attempt to
by-pass the present invention as described and furthermore, not in a particularly
advantageous way and without departing from the inventive thought, completely or partly
avoid surveillance/analysation/discrimination etc. Of "handshaking", PIN/SIM codes,
dialled numbers etc., and instead allow created reply codes carry out corresponding
authentication/discrimination/etc. of primarily the number dialled from the visiting
mobile, and to do this by holding parameters for this purpose, interpretable by the
device according to the invention by the corresponding programming of same, the codes
generated by replying part - man or machine - will probably be rather large, complex
and difficult to handle, but the version is interesting from descriptive point of
view, since same discloses a solution whereby only a commercially available GSM scanner
is required to accomplish the more special functions of the invention. Quite conventionally
can thus all DTM signals in an intercepted GSM call in a known way (for example by
a passband filter) completely analogue be gained from the CODEC of the scanner and
in a conventional way be handled by a "number discriminator"/processor. Should an
intercepted and obtained DTMF sequence correspond to preprogrammed criteria, this
would serve as "evidence" of the authenticity of both the number dialled and the command,
and this could possibly meet required security, at least for more trivial applications.
This is even more conventional, when the "scanner" of the device according to the
invention receives a call via the still well used NMT 450 or the analogue alternative
of D-AMPS etc. This would require no signal treatment at all. In correspondence with
what has been disclosed above concerning speech scrambling it will be understood,
that signal treatment for only DTMF will be fairly simple, also for GSM. In this connection
can be mentioned the possibility, provided that the device according to the invention
is arranged with a keypad, pushbutton or similar, that the called party during the
conversation informs the entrance, either programming the device or verbally informing
the visitor, which code/action (e.g. buttons to press) required, whereby the visitor
may "key himself in". If this should occur, the operation is temporary and can not
be "publicly known" and thereby misused, and even a simple operation will be safe
enough. Also more complicated methods can be used. For example, should there be an
entrance set having a microphone able to receive verbal or DTMF commands, the visitor
can be requested to press the loudspeaker of the mobile against this microphone, whereafter
the called party sends an opening command (which does not require to be changed),
hopefully unheard by the visitor. For certain applications, particularly single family
houses, a wired circuit from the inhabitant to the entrance set can cause opening
(for example by galvanical closed circuit) during conversation, but the functional
possibilities will be restricted to the influence caused via the wired circuit. These,
and possibly other more or less cunning modifications pertaining to how the called
party shall be able to give functional commands influencing the system after replying
to a mobile call authorized by a listening entrance apparatus give fair security against
damage from visitors, particularly if the above time zone/authorization/transaction
memory criteria with PIN/SIM numbers and called number are included, but are not preferred,
since the simplest, straightest and most versatile use is accomplished according to
the described and preferred embodiment.
[0035] Finally, a further solution resulting in all functions and features of the invention,
but involving only known and conventional components and techniques, and without any
need for scanners, D/A-transformation etc. will now be disclosed. The entrance apparatus
may according to the invention namely be arranged in a conventional way connected
to a fixed or mobile telephone network, Internet or similar. It may thus be called
in a conventional way from the visitor's mobile. Its own number may be secret, only
shown by the entrance, to avoid calls from distant locations, or it may be temporary
and variable and shown on a display by the entrance, readable by a visitor; or it
may only accept calls after depressing a pushbutton by the entrance. The call number
is dialled by the visitor on the mobile, and the caller is thus conventionally connected
to the entrance apparatus and may then communicate therewith, i.e. send and receive
commands. The visitor can now be requested to dial a code number, which can be constantly
shown on a name-number-board at the entrance, or alternatively may the call number
(shown at the entrance) include components for selective calling (only to parties
at present in program/memory). Based on this code/component and remaining design/program
can the entrance apparatus now quite conventionally, for example according to the
"three parties call service", establish a conference call between the visitor, the
party to be called and itself, whereby the first two parties can talk, whereas the
entrance apparatus a silent listener await/monitor for given commands, which can be
given by the called party and reacted to in accordance with the described preferred
example of an embodiment. By means of caller identification (caller ID), it is possible
to a certain extent copy functions based on PIN/SIM numbers, and for safeguarding
that commands are only recognized from the called party can also thus, or by applying
some of the above discussed methods for "in retro OK:ing", be cared for. However,
also this solution is regarded as non-preferred, since same involves permission for
connection and connection charges (subscriber and call charges), but same is mainly
disclosed as an example of a technical solution within the scope of the inventive
thought.
[0036] Use of an adapted GSM scanner has already been discussed. With regard to suitable
types of components, Siemens offers a GSM module, which for the purpose includes unnecessarily
many functions, since same also can handle transmission, microphone, loudspeaker,
CODEC/DA-transformer, SIM card interface etc., which are not used according to the
present invention. Due to similar reasons are also so called GSM chip sets offered
by, amongst others, Philips and Mitel to advanced, even though possible a restricted
number of such circuits can be used cost effectively. Motorola has recently released
a circuit, DSP 56690, which can handle mostly everything and covers all standards,
and other manufacturers are about to release similar type of circuits. With regard
to micro control means has, for example, Dallas DS2250(T)-64 64 Kb RAM for storage
of program and/or data, and the circuit also includes a serial port having full duplex
and a real time clock, which thus is more than sufficient for the described embodiment.
[0037] The present invention can also be used for other purposes than surveillance of a
building, e.g. for car parks, access to computers or machinery, rental cars, dispensers
for purchase or issuance of travel tickets and similar, ATMS, "toll"-roads/bridges,
control points for night watchmen, border surveillance, time/presence charting systems,
"distant control" of garage doors, car locks/alarms, etc. For example, with regard
to the last mentioned application speech communication/telephone call need not be
connected through, since there a replying party often does not exist, and the communication
will thus be one-sided of controlling character, whereby the claimed invention can
be utilized in a simpler and more of the type special purpose, for example may no
speech processing unit 5 be required and/or scanner, and same may apart from radio
communication also in certain cases use infrared (IR) communication and/or "Bluetooth"
(or similar standard) short range radio communication as an alternative, since modern
radio telephones often are arranged to facilitate such communication in the near range
of the mobile telephone. Also with regard to other applications may IR/Bluetooth communication
serve as an alternative, and such communication is therefore included with regard
to described embodiments when the notion radio communication has been used. When using
IR/"Bluetooth" communication, it is also possible, via corresponding transceiver for
the controlled object, to establish a reciprocal "dialogue", whereby the controlled
object also may transfer for example status data to the controlling mobile (which
of course also is possible with regard to previously described mobile-base station-related
"code/card"-communication, but would involve further complications; either some sort
of subscription, or granted permission, in order to radio transmit back in the established
carrier format, via base station or direct, to the mobile "in sync", respectively,
and hence is viewed less preferable, at least for low cost applications), which PIN/SIM
number, inputted code numbers etc. also, for example by a menu choice at the mobile
telephone, can be transferred via the same link and thus be used for authorization
checkup, transaction memory etc. Since "Bluetooth" (in difference to conventional
GSM communication) is fairly easy to intercept and copy transmit, should for many
cases IR be preferred, which (if well designed) is extremely difficult for intruders
to intercept, and thus would be preferred for transfer of confidential information.
[0038] Described example of an embodiment and stated examples of fields of use are thus
in no way intended to serve as a restriction in relation to the inventive thought
and the method and the device as defined in the following claims. Accordingly, also
embodiments are possible in which generated control codes afterwards are used to complete/authorize
and/or verify the authority/relevance of an initially dialled number and/or commands;
control function signalling/effectuation can be accomplished in many different ways
while maintaining authentication/authority for the command; transforming elements,
scanner/radio receiver/DA-converter may also be substituted by a substantially convention
telephone network connection with call possibility; and call numbers inputted to the
mobile telephone can be substituted by (menu chosen) depressed buttons, speech commands,
code input etc.
[0039] Finally, apart from PIN/SIM number, the present invention may also make use of the
unique serial number ("International Mobile Equipment Identity" - IMEI) allocated
to every mobile radio telephone when manufactured, and this number is also made available
during the handshaking process and can thus identify a specific mobile radio telephone.
1. Method to use mobile radio telephones for surveillance and/or control purposes, wherein,
a receiver for reception of signals from mobile radio telephones, in a "resting" and
non-activated condition is arranged to perform a scanning function with regard to
frequencies utilized within the present geographical area for mobile radio telephone
communication; where the receiver is arranged in a first step to be activated by an
incoming signal from a mobile telephone, detected by the scanning function and to
lock onto the frequency of the incoming signal in a second step to analyse the received
signal with regard to the PIN/SIM number or corresponding ID and/or dialled call number
for comparison with preprogrammed corresponding data, and in a successive, "third"
step when correspondence is established, to initiate performance of preprogrammed
procedures and/or influence on predetermined devices, and if correspondence is not
established, to return to the "resting" and non-activated condition pending receipt
of an incoming signal from a mobile telephone.
2. Method according to claim 1, wherein locking to the frequency of an incoming signal
is also maintained on acceptance to perform the third step, and that the receiver
thereafter, as well as at non-acceptance during the second or the third step, returns
to "resting" function with scanning of the frequencies.
3. Method according to claim 1 or 2, wherein the geographical extension of the receiving
area for utilized receiver is maintained restricted during the performance of initial
steps, and that the receiving area thereafter is extended In order to facilitate reception
of the base station with which the mobile radio telephone is communicating.
4. Method according to anyone of claims 1-3. wherein utilized mobile radio telephone
is switched on from non-active operation within the area covered by the receiver,
thereby initiating a handshaking procedure with an adjacent base station, which base
station can be received by the receiver due to an extension of the receiving area.
5. Device for performing the method to use mobile radio telephones for surveillance and/or
control purposes according to any one of claims 1-4, comprising a receiving radio
unit (3) with associated receiving antenna (6), having a searching scanner for reception
of the frequencies used within related geographical area for mobile radio telephone
communication, a central control unit (2) whereto a received signal from a mobile
radio telephone detected by the scanner, is transferred and a time related synchronizing
unit (4) for surveillance and decoding of completed hand shaking procedure between
the mobile radio telephone and an associated base station and thereby reported PIN/SIM
number and/or from the mobile radio telephone transferred called number, whereby conformity
with corresponding stored information is arranged to initiate a predetermined process
or action, and otherwise result in return to "resting" and listening condition pending
a new inputted signal.
6. Device according to claim 5, wherein the receiving radio unit (3) is arranged having
a restricted geographical reception area, said area being extended when an incoming
signal has been determined as a call to a preprogrammed subscriber, and that the radio
unit (3) thereafter during a predetermined time period listens to the communication
channel of the called subscriber via a speech treatment unit (5) for preprogrammed
commands in the form of DTMF signals, the receipt of such an approved command resulting
in performance of an associated predetermined procedure/action, and otherwise return
to the "resting" and listening condition pending a new inputted signal.
7. Device according to any one of claims 5 and 6, wherein the central control unit (2)
also is connected to be influenced by a user operated physical input means, such as
for example a keypad (8), a card reader (9) or similar, and that commands via such
a means (8; 9) are arranged to individually, or in combination/interchange with information
obtained from a mobile radio telephone, result in initiation for performance of predetermined
procedure and/or action.
8. Device according to any one of claims 5 - 7, wherein the receiving radio unit (3),
when an approved call to a subscriber has been confirmed, is arranged to change to
listening of the speech data stream of the called subscriber, and thereby only receive
and accept possible commands existing in the speech data stream of the called subscriber,
introduced as DTMF sequences, speech commands or similar.
9. Device according to any one of claims 5 - 8, wherein a number sequence dialled from
a mobile radio telephone commencing with a non-numerical part, such as, for example,
"*" or "#", is received and interpreted as a direct command, which, when corresponding
to a preprogrammed command, results in initiation and performance of predetermined
process/action, for example, a code lock command for opening an entrance door lock.
10. Device according to any one of claims 5-9, wherein the geographical receiving range
of the receiving radio unit (3) in "resting" condition is so restricted, that same
substantially only will react on signals resulting from a mobile radio telephone which
is switched on from disconnected condition within the receiving range, i.e. when the
mobile radio telephone with substantially full output power attempts to establish
contact with an adjacent base station in order to perform a handshaking process.
11. Device for performing the method to use mobile radio telephones for surveillance and/or
control purposes according to claim 1, the receiver for reception of signals from
mobile radio telephones comprising a receiving unit for infrared signalling for reception
of infrared signals from a mobile radio telephone equipped with an interface for infrared
communication, wherein said receiving unit is arranged to transfer a received infrared
signal from a mobile radio telephone to a central control unit for surveillance and
decoding of received infrared signals from the mobile radio telephone, said received
signals including reported PIN/SIM number or corresponding information and/orfrom
the mobile radio telephone transferred called number sequence, whereby conformity
with corresponding stored information is arranged to initiate a predetermined process
or action, and otherwise result in return to "resting" and listening condition pending
a new infrared signal being received by the receiving unit.
12. Device for performing the method to use mobile radio telephones for surveillance and/or
control purposes according to claim 1, the receiver for reception of signals from
mobile radio telephones comprising a receiving unit for short range wireless communication
for reception of radio signals from a mobile radio telephone equipped with an interface
for such communication, wherein said receiving unit is arranged to transfer received
signals from a mobile radio telephone to a central control unit for surveillance and
decoding of received signals utilizing the short range communication system from the
mobile radio telephone, said received signals including reported PIN/SIM number and/or
from the mobile radio telephone transferred called number sequence, whereby conformity
with corresponding stored information is arranged to initiate a predetermined process
or action, and otherwise result in return to "resting" and listening condition pending
a new radio signal received by the receiving unit.
13. Device according to claim 5, wherein a call number inputted by the visitor on the
mobile is arranged to result in a conventional connection to an entrance apparatus
for communication therewith, i.e, for sending and receiving commands, and that the
entrance apparatus, based on received commands, is arranged to establish a connection,
e.g. by means of a "three parties call service" established conference call between
the visitor, the party to be called and itself, whereby the first two parties can
talk, whereas the entrance apparatus as a silent listener await/monitor for given
commands, which can be given by the called party and reacted to in accordance with
the preprogrammed actions.
14. Device according to claim 5, wherein commands received by the central control unit
(2) from the called party in retrospect verify/discriminate the validity of established
communication.
1. Verfahren zum Verwenden von Mobilfunktelefonen zu Überwachungs- und/oder Steuerzwecken,
wobei ein Empfänger zum Empfang von Signalen von Mobilfunktelefonen in einem "ruhenden"
und nicht aktivierten Zustand angeordnet ist, um eine Abtastfunktion bezüglich Frequenzen
durchzuführen, die in dem vorliegenden geographischen Bereich für eine Mobilfunktelefonkommunikation
verwendet werden; wobei der Empfänger angeordnet ist, um in einem ersten Schritt durch
ein eingehendes Signal von einem Mobiltelefon, das durch die Abtastfunktion erfasst
wird, aktiviert zu werden und mit der Frequenz des eingehenden Signals zu verriegeln,
in einem zweiten Schritt das empfangene Signal bezüglich der PIN/SIM-Nummer oder der
entsprechenden ID und/oder der gewählten Rufnummer zum Vergleich mit vorprogrammierten
entsprechenden Daten zu analysieren und in einem folgenden, "dritten" Schritt, wenn
eine Entsprechung festgestellt wird, die Durchführung von vorprogrammierten Prozeduren
und/oder einen Einfluss auf vorbestimmte Vorrichtungen einzuleiten, und, falls keine
Entsprechung festgestellt wird, bis zum Empfang eines eingehenden Signals von einem
Mobiltelefon zu dem "ruhenden" und nicht aktivierten Zustand zurückzukehren.
2. Verfahren gemäß Anspruch 1, bei dem eine Verriegelung mit der Frequenz eines eingehenden
Signals auch bei einer Akzeptanz, den dritten Schritt durchzuführen, aufrechterhalten
wird, und dass der Empfänger danach sowie bei Nichtakzeptanz während des zweiten oder
des dritten Schritts zu der "ruhenden" Funktion mit einem Abtasten der Frequenzen
zurückkehrt.
3. Verfahren gemäß Anspruch 1 oder 2, bei dem die geographische Ausdehnung des Empfangsbereichs
für den verwendeten Empfänger während der Durchführung von Anfangsschritten begrenzt
gehalten wird, und dass der Empfangsbereich danach erweitert wird, um einen Empfang
der Basisstation, mit der das Mobilfunktelefon kommuniziert, zu ermöglichen.
4. Verfahren gemäß einem der Ansprüche 1 bis 3, bei dem das verwendete Mobilfunktelefon
in dem Bereich, der durch den Empfänger abgedeckt wird, von einem nicht aktiven Betrieb
angeschaltet wird, wodurch eine Handshaking-Prozedur mit einer benachbarten Basisstation
eingeleitet wird, wobei diese Basisstation durch den Empfänger aufgrund einer Erweiterung
des Empfangsbereichs empfangen werden kann.
5. Vorrichtung zum Durchführen des Verfahrens zum Verwenden von Mobilfunktelefonen zu
Oberwachungs- und/oder Steuerzwecken gemäß einem der Ansprüche 1 bis 4, die eine Empfangsfunkeinheit
(3) mit einer zugeordneten Empfangsantenne (6), die eine Suchabtastvorrichtung zum
Empfang der Frequenzen aufweist, die in einem damit in Beziehung stehenden geographischen
Bereich zur Mobilfunktelefonkommunikation verwendet werden, eine zentrale Steuereinheit
(2), zu der ein empfangenes Signal von einem Mobilfunktelefon, das durch die Abtastvorrichtung
erfasst wird, übertragen wird, und eine zeitbezogene Synchronisiereinheit (4) aufweist
zur Überwachung und zum Decodieren einer abgeschlossenen Handshaking-Prozedur zwischen
dem Mobilfunktelefon und einer zugeordneten Basisstation und dadurch einer berichteten PIN/SIM-Nummer und/oder einer von dem Mobilfunktelefon übertragenen
angerufenen Nummer, wobei es angeordnet ist, dass eine Übereinstimmung mit entsprechenden
gespeicherten Informationen einen vorbestimmten Prozess oder eine Aktion einleitet
und andernfalls bis zu einem neuen eingegebenen Signal zu einer Rückkehr zu einem
"ruhenden" und horchenden Zustand führt.
6. Vorrichtung gemäß Anspruch 5, bei der die Empfangsfunkeinheit (3) angeordnet ist,
um einen begrenzten geographischen Empfangsbereich aufzuweisen, wobei der Bereich
erweitert wird, wenn ein eingehendes Signal als ein Anruf bei einem vorprogrammierten
Teilnehmer bestimmt worden ist, und dass die Funkeinheit (3) danach während einer
vorbestimmten Zeitperiode den Kommunikationskanal des angerufenen Teilnehmers über
eine Sprachbehandlungseinheit (5) auf vorprogrammierte Befehle in der Form von DTMF-Signalen
abhört, wobei der Empfang eines derartigen zugelassenen Befehls zu einer Durchführung
einer zugeordneten vorbestimmten Prozedur/Aktion führt und andernfalls bis zu einem
neuen eingegebenen Signal zu einer Rückkehr zu dem "ruhenden" und horchenden Zustand.
7. Vorrichtung gemäß einem der Ansprüche 5 und 6, bei der die zentrale Steuereinheit
(2) auch verbunden ist, um durch eine benutzerbetriebene physische Eingabeeinrichtung,
wie z. B. ein Tastenfeld (8), einen Kartenleser (9) oder dergleichen, beeinflusst
zu werden, und dass Befehle über eine derartige Einrichtung (8; 9) angeordnet sind,
um einzeln oder in Kombination/Austausch mit Informationen, die von einem Mobilfunktelefon
erhalten werden, zu einer Einleitung zur Durchführung einer vorbestimmten Prozedur
und/oder Aktion zu führen.
8. Vorrichtung gemäß einem der Ansprüche 5 bis 7, bei der die Empfangsfunkeinheit (3),
wenn ein zugelassener Anruf bei einem Teilnehmer bestätigt worden ist, angeordnet
ist, um zu einem Abhören des Sprachdatenstroms des angerufenen Teilnehmers zu wechseln
und dadurch nur mögliche Befehle zu empfangen und zu akzeptieren, die in dem Sprachdatenstrom
des angerufenen Teilnehmers existieren, die als DTMF-Sequenzen, Sprachbefehle oder
dergleichen eingebracht sind.
9. Vorrichtung gemäß einem der Ansprüche 5 bis 8, bei der eine Zahlensequenz, die von
einem Mobilfunktelefon gewählt wird, die mit einem nichtnumerischen Teil, wie z. B.
"*" oder "#" beginnt, empfangen und als ein direkter Befehl interpretiert wird, was,
wenn derselbe einem vorprogrammierten Befehl entspricht, zu einer Einleitung und Durchführung
eines vorbestimmten Prozesses/einer Aktion führt, z. B. ein Codeverriegelungsbefehl
zum Öffnen einer Eingangstürverriegelung.
10. Vorrichtung gemäß einem der Ansprüche 5 bis 9, bei der der geographische Empfangsbereich
der Empfangsfunkeinheit (3) in einem "ruhenden" Zustand so begrenzt ist, dass dieselbe
im Wesentlichen nur auf Signale reagiert, die sich von einem Mobilfunktelefon ergeben,
das in dem Empfangsbereich von einem getrennten Zustand angeschaltet wird, d. h. wenn
das Mobilfunktelefon mit im Wesentlichen voller Ausgabeleistung versucht, einen Kontakt
mit einer benachbarten Basisstation herzustellen, um einen Handshaking-Prozess durchzuführen.
11. Vorrichtung zum Durchführen des Verfahrens zum Verwenden von Mobilfunktelefonen zu
Überwachungs- und/oder Steuerzwecken gemäß Anspruch 1, wobei der Empfänger zum Empfang
von Signalen von Mobilfunktelefonen eine Empfangseinheit für eine Infrarotsignalisierung
zum Empfang von Infrarotsignalen von einem Mobilfunktelefon aufweist, das mit einer
Schnittstelle zur Infrarotkommunikation ausgestattet ist, wobei die Empfangseinheit
angeordnet ist, um ein empfangenes Infrarotsignal von einem Mobilfunktelefon an eine
zentrale Steuereinheit zur Überwachung und zum Decodieren von empfangenen Infrarotsignalen
von dem Mobilfunktelefon zu übertragen, wobei die empfangenen Signale eine berichtete
PIN/SIM-Nummer oder entsprechende Informationen und/oder eine von dem Mobilfunktelefon
übertragene angerufene Zahlensequenz umfassen, wobei es angeordnet ist, dass eine
Übereinstimmung mit entsprechenden gespeicherten Informationen einen vorbestimmten
Prozess oder eine Aktion einleitet und andernfalls bis zu einem neuen Infrarotsignal,
das durch die Empfangseinheit empfangen wird, zu einer Rückkehr zu einem "ruhenden"
und horchenden Zustand führt.
12. Vorrichtung zum Durchführen des Verfahrens zum Verwenden von Mobilfunktelefonen zu
Überwachungs- und/oder Steuerzwecken gemäß Anspruch 1, wobei der Empfänger zum Empfang
von Signalen von Mobilfunktelefonen eine Empfangseinheit für eine drahtlose Nahbereichkommunikation
zum Empfang von Funksignalen von einem Mobilfunktelefon aufweist, das mit einer Schnittstelle
für eine derartige Kommunikation ausgerüstet ist, wobei die Empfangseinheit angeordnet
ist, um empfangene Signale von einem Mobilfunktelefon an eine zentrale Steuereinheit
zur Überwachung und zum Decodieren von empfangenen Signalen, die das Nahbereichkommunikationssystem
verwenden, von dem Mobilfunktelefon zu übertragen, wobei die empfangenen Signale eine
berichtete PIN/SIM-Nummer und/oder eine von dem Mobilfunktelefon übertragene angerufene
Zahlensequenz umfassen, wobei es angeordnet ist, dass eine Übereinstimmung mit entsprechenden
gespeicherten Informationen einen vorbestimmten Prozess oder eine Aktion einleitet
und andernfalls bis zu einem neuen Funksignal, das durch die Empfangseinheit empfangen
wird, zu einer Rückkehr zu einem "ruhenden" und horchenden Zustand führt.
13. Vorrichtung gemäß Anspruch 5, bei der eine Rufnummer, die durch den Besucher an dem
Mobiltelefon eingegeben wird, angeordnet ist, um zu einer herkömmlichen Verbindung
mit einer Eingangsvorrichtung zur Kommunikation damit zu führen, d. h. zum Senden
und Empfangen von Befehlen, und dass die Eingangsvorrichtung basierend auf empfangenen
Befehlen angeordnet ist, um eine Verbindung herzustellen, z. B. mittels einer Konferenzrufverbindung,
die durch einen "Dreiteilnehmerrufdienst" eingerichtet wird, zwischen dem Besucher,
dem anzurufenden Teilnehmer und sich selbst, wobei die ersten beiden Teilnehmer sprechen
können, während die Eingangsvorrichtung als ein schweigender Zuhörer auf gegebene
Befehle wartet/dieselben überwacht, die durch den angerufenen Teilnehmer gegeben werden
können und auf die gemäß den vorprogrammierten Aktionen reagiert werden kann.
14. Vorrichtung gemäß Anspruch 5, bei der Befehle, die durch die zentrale Steuereinheit
(2) von dem angerufenen Teilnehmer empfangen werden, rückblickend die Gültigkeit einer
hergestellten Kommunikation verifizieren/unterscheiden.
1. Procédé d'utilisation de radiotéléphones mobiles à des fins de surveillance et/ou
de contrôle, dans lequel un récepteur destiné à la réception de signaux provenant
de radiotéléphones mobiles, dans un état "de veille" et non activé, est agencé afin
d'effectuer une fonction de balayage par rapport aux fréquences utilisées dans la
zone géographique actuelle en vue d'une communication de radiotéléphone mobile ; dans
lequel le récepteur est agencé, lors d'une première étape, afin d'être activé par
un signal entrant provenant d'un téléphone mobile détecté par la fonction de balayage
et afin de se bloquer, lors d'une seconde étape, de façon à analyser le signal reçu
en termes de numéro PIN/SIM ou d'ID correspondant et/ou de numéro d'appel composé
en vue d'une comparaison avec des données correspondantes préprogrammées et, lors
d'une "troisième" étape successive, lorsqu'une correspondance a été établie, afin
de déclencher la réalisation de procédures préprogrammées et/ou d'influencer des dispositifs
prédéterminés, et, si aucune correspondance n'est établie, afin de revenir à l'état
"de veille" et non activé, de façon à attendre la réception d'un signal entrant provenant
d'un téléphone mobile.
2. Procédé selon la revendication 1, dans lequel le blocage sur la fréquence d'un signal
entrant est également maintenu lors de l'acceptation de la réalisation de la troisième
étape, et dans lequel le récepteur, par la suite, mais également en cas de non acceptation
pendant la seconde ou la troisième étape, revient à la fonction de "veille" avec le
balayage des fréquences.
3. Procédé selon la revendication 1 ou 2, dans lequel l'extension géographique de la
zone de réception pour le récepteur utilisé est maintenue restreinte pendant la réalisation
des étapes initiales, et dans lequel la zone de réception, par la suite, est étendue
afin de faciliter la réception de la station de base avec laquelle le radiotéléphone
mobile communique.
4. Procédé selon l'une quelconque des revendications 1 à 3, dans lequel le radiotéléphone
mobile utilisé est commuté à partir d'un état inactif dans la zone couverte par le
récepteur, déclenchant ainsi une procédure d'authentification avec une station de
base adjacente, ladite station de base pouvant être reçue par le récepteur en raison
d'une extension de la zone de réception.
5. Dispositif de réalisation du procédé d'utilisation de radiotéléphones mobiles à des
fins de surveillance et/ou de contrôle selon l'une quelconque des revendications 1
à 4, comprenant une unité radio de réception (3) munie d'une antenne de réception
associée (6), possédant un scanner de recherche destiné à la réception des fréquences
utilisées dans la zone géographique en question pour une communication de radiotéléphone
mobile, une unité centrale de contrôle (2) vers laquelle un signal reçu de la part
d'un radiotéléphone mobile détecté par le scanner est transféré, et une unité de synchronisation
temporelle (4) destinée à la surveillance et au décodage d'une procédure d'authentification
complète entre le radiotéléphone mobile et une station de base associée et, ainsi,
d'un numéro PIN/SIM reporté et/ou d'un numéro d'appel transféré par le radiotéléphone
mobile, moyennant quoi la conformité avec des informations stockées correspondantes
est agencée afin de déclencher un processus ou une action prédéterminé(e), ou d'entraîner
un retour à l'état de "veille" et d'écoute, afin d'attendre un nouveau signal transmis.
6. Dispositif selon la revendication 5, dans lequel l'unité radio de réception (3) est
agencée comme ayant une zone de réception géographique restreinte, ladite zone étant
étendue lorsqu'un signal entrant a été déterminé comme un appel vers un abonné préprogrammé,
et dans lequel l'unité radio (3), par la suite, pendant une période de temps prédéterminée,
écoute le canal de communication de l'abonné appelé via une unité de traitement de
parole (5) en vue de commandes préprogrammées sous la forme de signaux DTMF, la réception
de cette commande approuvée entraînant la réalisation d'une procédure/d'une action
prédéterminée associée, ou un retour à l'état de "veille" et d'écoute, afin d'attendre
un nouveau signal transmis.
7. Dispositif selon l'une quelconque des revendications 5 et 6, dans lequel l'unité centrale
de contrôle (2) est également reliée afin d'être influencée par un moyen de saisie
physique actionné par un utilisateur, tel que par exemple un pavé numérique (8), un
lecteur de cartes (9) ou similaires, et dans lequel ces commandes, via ce moyen (8
; 9), sont agencées afin de provoquer, individuellement ou en combinaison/en échange
avec des informations obtenues de la part d'un radiotéléphone mobile, le déclenchement
de la réalisation d'une procédure et/ou d'une action prédéterminée.
8. Dispositif selon l'une quelconque des revendications 5 à 7, dans lequel l'unité radio
de réception (3), lorsqu'un appel approuvé vers un abonné a été confirmé, est agencée
afin d'écouter le flux de données de parole de l'abonné appelé, et, ainsi, afin de
recevoir et d'accepter uniquement des commandes possibles existant dans le flux de
données de parole de l'abonné appelé, introduites sous forme de séquences DFMT, de
commandes de parole ou similaires.
9. Dispositif selon l'une quelconque des revendications 5 à 8, dans lequel une séquence
de chiffres composée par un radiotéléphone mobile et commençant par une partie non
numérique, comme par exemple "*" ou "#", est reçue et interprétée comme une commande
directe qui, lorsqu'elle correspond à une commande préprogrammée, entraîne le déclenchement
et la réalisation d'un processus/d'une action prédéterminée(e), comme par exemple
une commande de blocage de code destinée à ouvrir une porte d'entrée.
10. Dispositif selon l'une quelconque des revendications 5 à 9, dans lequel l'étendue
de réception géographique de l'unité radio de réception (3) à l'état de "veille" est
tellement restreinte que celle-ci ne réagit sensiblement qu'aux signaux provenant
d'un radiotéléphone mobile qui est commuté à partir d'un état déconnecté dans la zone
de réception, c'est-à-dire lorsque le radiotéléphone mobile ayant une puissance de
sortie sensiblement complète tente d'établir un contact avec une station de base adjacente
afin d'effectuer un processus d'authentification.
11. Dispositif de réalisation du procédé d'utilisation de radiotéléphones mobiles à des
fins de surveillance et/ou de contrôle selon la revendication 1, le récepteur destiné
à la réception de signaux provenant de radiotéléphones mobiles comprenant une unité
de réception destinée à signaler par infrarouges la réception de signaux infrarouges
de la part d'un radiotéléphone mobile équipé d'une interface de communication infrarouge,
dans lequel ladite unité de réception est agencée afin de transférer un signal infrarouge
reçu entre un radiotéléphone mobile et une unité centrale de contrôle à des fins de
surveillance et de décodage des signaux infrarouges reçus de la part du radiotéléphone
mobile, lesdits signaux reçus comprenant un numéro PIN/SIM reporté ou des informations
correspondantes et/ou une séquence de numéro appelé transférée par le radiotéléphone
mobile, moyennant quoi la conformité avec des informations correspondantes stockées
est agencée afin de déclencher un processus ou une action prédéterminé(e), ou d'entraîner
un retour à un état de "veille" ou d'écoute, afin d'attendre un nouveau signal infrarouge
reçu par l'unité de réception.
12. Dispositif de réalisation du procédé d'utilisation de radiotéléphones mobiles à des
fins de surveillance et/ou de contrôle selon la revendication 1, le récepteur destiné
à la réception de signaux provenant de radiotéléphones mobiles comprenant une unité
de réception destinée à une communication sans fil de courte distance en vue de la
réception de signaux radio de la part d'un radiotéléphone mobile équipé d'une interface
permettant cette communication, dans lequel ladite unité de réception est agencée
afin de transférer les signaux reçus de la part d'un radiotéléphone mobile vers une
unité centrale de contrôle à des fins de surveillance et de décodage des signaux reçus
en utilisant le système de communication de courte distance du radiotéléphone mobile,
lesdits signaux reçus comprenant un numéro PIN/SIM reporté et/ou une séquence de numéro
appelé transférée par le radiotéléphone mobile, moyennant quoi la conformité à des
informations correspondantes stockées est agencée afin de déclencher un processus
ou une action prédéterminée(e), ou d'entraîner le retour à un état de "veille" et
d'écoute, afin d'attendre un nouveau signal radio reçu par l'unité de réception.
13. Dispositif selon la revendication 5, dans lequel un numéro d'appel transmis par le
visiteur sur le mobile est agencé afin d'entraîner une connexion conventionnelle avec
un appareil d'entrée en vue d'une communication avec celui-ci, c'est-à-dire afin d'envoyer
et de recevoir des commandes, et dans lequel l'appareil d'entrée, sur la base des
commandes reçues, est agencé afin d'établir une connexion, comme par exemple à l'aide
d'un appel de conférence établi par un "service d'appel à trois parties" entre le
visiteur, la partie à appeler et lui-même, moyennant quoi les deux premières parties
peuvent parler, tandis que l'appareil d'entrée, en tant "qu'auditeur" silencieux,
attend/surveille des commandes données, qui peuvent être fournies par la partie appelée
et auxquelles il est possible de réagir selon les actions préprogrammées.
14. Dispositif selon la revendication 5, dans lequel les commandes reçues par l'unité
centrale de contrôle (2) de la part de la partie appelée vérifient/distinguent en
retour la validité de la communication établie.