ES2385009B1 - PROCESS FOR CONTROL AND RECORDING OF ACCESSES BY BLUETOOTH TECHNOLOGY - Google Patents
PROCESS FOR CONTROL AND RECORDING OF ACCESSES BY BLUETOOTH TECHNOLOGY Download PDFInfo
- Publication number
- ES2385009B1 ES2385009B1 ES201030681A ES201030681A ES2385009B1 ES 2385009 B1 ES2385009 B1 ES 2385009B1 ES 201030681 A ES201030681 A ES 201030681A ES 201030681 A ES201030681 A ES 201030681A ES 2385009 B1 ES2385009 B1 ES 2385009B1
- Authority
- ES
- Spain
- Prior art keywords
- bluetooth
- recording
- access
- bluetooth technology
- building
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Withdrawn - After Issue
Links
Classifications
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07C—TIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
- G07C9/00—Individual registration on entry or exit
- G07C9/00174—Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
- G07C9/00896—Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys specially adapted for particular uses
- G07C9/00904—Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys specially adapted for particular uses for hotels, motels, office buildings or the like
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07C—TIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
- G07C9/00—Individual registration on entry or exit
- G07C9/20—Individual registration on entry or exit involving the use of a pass
- G07C9/27—Individual registration on entry or exit involving the use of a pass with central registration
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07C—TIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
- G07C9/00—Individual registration on entry or exit
- G07C9/20—Individual registration on entry or exit involving the use of a pass
- G07C9/28—Individual registration on entry or exit involving the use of a pass the pass enabling tracking or indicating presence
Landscapes
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Alarm Systems (AREA)
Abstract
Procedimiento para control y grabación de accesos por tecnología bluetooth.#Se describe un proceso que utiliza ordenadores, software y antenas bluetooth y permite el registro y control de accesos a edificios, detectando tarjetas inteligentes o los móviles de los usuarios, así como la localización y seguimiento de personas dentro de edificios, centros comerciales, fábricas o explotaciones mineras.Procedure for access control and recording by bluetooth technology. # A process is described that uses computers, software and bluetooth antennas and allows the registration and control of access to buildings, detecting smart cards or mobile phones of users, as well as the location and tracking of people inside buildings, shopping centers, factories or mining operations.
Description
La presente invención se refiere a un proceso que graba información identificativa de las personas que acceden a un edificio o comercio, complementario a las imágenes que captan las cámaras de vídeo de vigilancia. También se utilizará dicha información para permitir los accesos a edificios y para realizar un seguimiento de las personas dentro de los edificios. The present invention relates to a process that records identifying information of people accessing a building or business, complementary to the images captured by surveillance video cameras. This information will also be used to allow access to buildings and to track people inside the buildings.
Las grandes superficies, empresas y los bancos usan sistemas de cámaras de seguridad para grabar a las personas que acceden a sus centros, intentando identificar a personas fichadas en el caso de las grandes superficies o bien grabando sus caras como una prueba a aportar en delitos. Estos sistemas no son exhaustivos y cualquier medida complementaria será bienvenida. Otra necesidad no bien cubierta es el seguimiento más exhaustivo de los horarios y ausencias de los empleados. Con este proceso se puede hacer además localización en tiempo real de individuos en edificios, simplificando y abaratando los sistemas actuales basados en localización GPS. Para ello se usarán componentes informáticos estándar, destacando antenas bluetooth, y APIs (librerías) estándar de programación que usen las funciones de descubrimiento de dispositivos bluetooth cercanos. Large stores, companies and banks use security camera systems to record people who access their centers, trying to identify people signed in the case of large stores or recording their faces as evidence to contribute to crimes. These systems are not exhaustive and any complementary measures will be welcome. Another need that is not well covered is the more exhaustive monitoring of employee schedules and absences. This process also allows real-time location of individuals in buildings, simplifying and lowering current systems based on GPS location. For this, standard computer components will be used, highlighting bluetooth antennas, and standard programming APIs (libraries) that use the discovery functions of nearby bluetooth devices.
Lo que aquí se propone es una solución complementaria para registrar los accesos de personas a comercios y edificios usando la identificación informática del código de red bluetooth asociado a la mayoría de los móviles del mercado. Este código es único para cada móvil, y se comunica a cualquier otro dispositivo bluetooth con el que se conecta. Se colocará un ordenador cerca de cada entrada al edificio, con una antena bluetooth instalada, y con un software en ejecución desarrollado al efecto. Se puede usar un ordenador ya existente, por ejemplo un terminal de caja. El programa en ejecución en cada uno de estos ordenadores, captará cada entrada de una persona en el edificio que lleve con él un móvil con tecnología bluetooth activada. Comunicará cada acceso a otro programa servidor instalado en la central de la empresa. Este llevará un registro de accesos por código bluetooth, identificando por patrones periódicos de entrada a clientes, a transeúntes (hay que tener en cuenta que las antenas bluetooth actuales tienen un alcance de 100 metros, pudiéndose restringir a 10 metros si se estima conveniente), a empleados o a sospechosos por una lista negra residente en el servidor central o bien en la central de alarmas puesta en internet por la empresa proveedora, y conectada con los servidores de cada cliente. Cuando se cometa un delito, se usará la fecha y hora para identificar el código bluetooth del móvil del sospechoso. Este será un móvil nuevo para el sistema, fácilmente separable del de los empleados y los clientes habituales. Con este código, la policía podrá identificar al sospechoso preguntando a los proveedores de telefonía. Además, este código bluetooth del sospechoso se propagará en una lista negra, que hará que salten las alarmas la próxima vez que el sospechoso se acerque a la entrada de otro establecimiento con el sistema conectado. Se fijarán distintos niveles de alarma según el tipo de registro de sospechoso, ejecutando las acciones acordadas para cada tipo de alarma. En el caso de hurto en comercios minoristas, se puede fichar el código del bluetooth del móvil del sujeto asociándolo a fotos y demás datos del mismo, mientras se le retiene a la espera de la policía, y así detectar fácilmente futuras incursiones del suj eto en éste u otro What is proposed here is a complementary solution to register the access of people to shops and buildings using the computer identification of the bluetooth network code associated with most mobile phones in the market. This code is unique to each mobile, and communicates to any other bluetooth device with which it connects. A computer will be placed near each entrance to the building, with a bluetooth antenna installed, and running software developed for this purpose. You can use an existing computer, for example a cash terminal. The program running on each of these computers, will capture each entry of a person in the building that carries with him a mobile with Bluetooth technology activated. It will communicate each access to another server program installed in the company's headquarters. This will keep a record of accesses by bluetooth code, identifying by periodic patterns of entry to customers, passersby (it should be taken into account that the current bluetooth antennas have a range of 100 meters, being able to restrict to 10 meters if deemed convenient), to employees or suspects by a blacklist resident in the central server or in the alarm center put on the internet by the provider company, and connected to the servers of each client. When a crime is committed, the date and time will be used to identify the bluetooth code of the suspect's mobile. This will be a new mobile for the system, easily separable from that of employees and regular customers. With this code, the police will be able to identify the suspect by asking the telephone providers. In addition, this suspect's bluetooth code will be blacklisted, which will cause alarms to be raised the next time the suspect approaches the entrance of another establishment with the system connected. Different alarm levels will be set according to the type of suspect record, executing the agreed actions for each type of alarm. In the case of theft in retail stores, you can sign the bluetooth code of the subject's mobile by associating it with photos and other data of the subject, while being held while waiting for the police, and thus easily detect future incursions of the subject in this one or another
centro comercial. Si además de en los accesos se instalan nodos dentro del comercio, se puede hacer un seguimiento sobre mapa del sospechoso desde la cabina de seguridad, con un programa creado al efecto. Además, con el registro de transeúntes que pasan por delante del establecimiento, la policía tiene una herramienta más aparte de la grabación de las cámaras de seguridad, para la investigación de delitos. Por otro lado, la central puede tener informes periódicos de los horarios de entrada y salida de sus empleados, integrando este sistema con los accesos del personal a la red corporativa. Por ejemplo, se puede registrar y reportar al responsable de seguridad un acceso inhabitual de un empleado en fin de semana. Como sistema complementario se propone la instalación del sistema en ordenadores cercanos a la entrada de cada departamento, así como a la entrada de las zonas comunes. Así se podrá hacer un seguimiento de la situación de los empleados dentro del edificio en tiempo real (los actuales sistemas de posicionamiento en edificios usan la tecnología GPS, con 10 que requieren que los empleados tengan móviles más avanzados y un software instalado en ellos, cosa que con este método no es necesario). También se podrán sacar estadísticas sobre el tiempo que cada empleado pasa en el edificio, desgranando el tiempo empleado en comida, en reuniones, etc. Además, captando el código bluetooth de las visitas en recepción, se le puede habilitar el paso a las puertas y tornos que vaya a necesitar simplemente con su código bluetooth, sin necesidad de tarjetas ni llaves. Cuando el ordenador cercano a una puerta de un departamento capte la señal bluetooth, la mandará a la central y esta abrirá la puerta si el usuario tiene privilegios suficientes. Hay que hacer constar la importancia del secreto de este método, o de otro modo los empleados y delincuentes empezarán a desconectar el bluetooth de sus móviles para no ser controlados por este sistema. Mall. If, in addition to the accesses, nodes are installed within the store, a map of the suspect can be monitored from the security booth, with a program created for this purpose. In addition, with the registration of passers-by that pass in front of the establishment, the police have a tool other than the recording of security cameras, for the investigation of crimes. On the other hand, the plant can have periodic reports of the schedules of entry and exit of its employees, integrating this system with the access of the personnel to the corporate network. For example, unusual access of an employee on the weekend can be registered and reported to the security officer. As a complementary system, it is proposed to install the system on computers near the entrance of each department, as well as the entrance to the common areas. This will allow you to track the situation of employees within the building in real time (current building positioning systems use GPS technology, with 10 requiring employees to have more advanced mobiles and software installed in them, which which with this method is not necessary). Statistics can also be obtained on the time each employee spends in the building, shelving the time spent on food, meetings, etc. In addition, by capturing the bluetooth code of the visits at reception, you can enable the passage to the doors and lathes that you will simply need with your bluetooth code, without the need for cards or keys. When the computer near a door of an apartment picks up the bluetooth signal, it will send it to the central office and it will open the door if the user has sufficient privileges. It is necessary to state the importance of the secret of this method, or else employees and criminals will begin to disconnect the bluetooth from their mobiles so as not to be controlled by this system.
Claims (3)
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
ES201030681A ES2385009B1 (en) | 2010-06-04 | 2010-06-04 | PROCESS FOR CONTROL AND RECORDING OF ACCESSES BY BLUETOOTH TECHNOLOGY |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
ES201030681A ES2385009B1 (en) | 2010-06-04 | 2010-06-04 | PROCESS FOR CONTROL AND RECORDING OF ACCESSES BY BLUETOOTH TECHNOLOGY |
Publications (2)
Publication Number | Publication Date |
---|---|
ES2385009A1 ES2385009A1 (en) | 2012-07-17 |
ES2385009B1 true ES2385009B1 (en) | 2013-05-20 |
Family
ID=46383945
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
ES201030681A Withdrawn - After Issue ES2385009B1 (en) | 2010-06-04 | 2010-06-04 | PROCESS FOR CONTROL AND RECORDING OF ACCESSES BY BLUETOOTH TECHNOLOGY |
Country Status (1)
Country | Link |
---|---|
ES (1) | ES2385009B1 (en) |
Families Citing this family (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN104992484B (en) * | 2015-06-11 | 2018-12-25 | 苏州爱开客信息技术有限公司 | Vehicles while passing system based on bluetooth recognition |
CN104899950B (en) * | 2015-06-11 | 2018-08-07 | 苏州爱开客信息技术有限公司 | Vehicle mandate based on bluetooth recognition passes in and out method |
CN104992485B (en) * | 2015-06-11 | 2018-10-02 | 苏州爱开客信息技术有限公司 | Banister based on Internet of Things controls open method |
Family Cites Families (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
EP1400930A1 (en) * | 2002-09-23 | 2004-03-24 | Scheidt & Bachmann Gmbh | Method and device for exchanging information |
KR100794887B1 (en) * | 2003-06-17 | 2008-01-14 | 유나이티드 시큐리티 애플리케이션즈 아이디, 인코포레이티드 | Electronic security system for monitoring and recording activity and data relating to institutions and clients thereof |
NL2000841C2 (en) * | 2007-09-03 | 2009-03-04 | Gaming Support B V | System for displaying and keeping track of the number of people present in a building, such as a casino. |
-
2010
- 2010-06-04 ES ES201030681A patent/ES2385009B1/en not_active Withdrawn - After Issue
Also Published As
Publication number | Publication date |
---|---|
ES2385009A1 (en) | 2012-07-17 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US10223888B2 (en) | Personnel authentication and tracking system | |
JP5794599B1 (en) | Digital fine security system, method and program | |
US11096022B2 (en) | Tailgating detection | |
JP5780570B1 (en) | Digital loss / accident defense system, method and program | |
US20110261202A1 (en) | Method and System for an Integrated Safe City Environment including E-City Support | |
US20150339871A1 (en) | Entity management and recognition system and method | |
EP2779130B1 (en) | GPS directed intrusion system with real-time data acquisition | |
US20060181402A1 (en) | Security system access control and method | |
CN108604402B (en) | Identification system | |
JP5900941B1 (en) | Digital future now security system, method and program | |
JP2006202062A (en) | Facility monitoring system | |
JP3199599U (en) | Electronic tag security device | |
JP2004021310A (en) | Security management system | |
ES2385009B1 (en) | PROCESS FOR CONTROL AND RECORDING OF ACCESSES BY BLUETOOTH TECHNOLOGY | |
JP6829508B2 (en) | Application program and behavior management device | |
US20130258110A1 (en) | System and Method for Providing Security on Demand | |
JP3690361B2 (en) | Outsider monitoring system | |
US20150154722A1 (en) | Crime Deterrence Using Smartphone Signatures | |
JP2011012420A (en) | Building monitoring system and program | |
US20200184047A1 (en) | Authenticate a first and second user | |
Yan et al. | Detection of suspicious patterns in secure physical environments | |
Dobre | Internet of Things: Challenges and Opportunities for Private Security Perspective | |
Rajkumar et al. | Visitor Monitoring System Using Raspberry PI and PI Camera | |
Geldenhuys | Estate security & technology | |
Slotnick | Integrated Physical Security Systems |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
FG2A | Definitive protection |
Ref document number: 2385009 Country of ref document: ES Kind code of ref document: B1 Effective date: 20130520 |
|
FA2A | Application withdrawn |
Effective date: 20131022 |