ES2385009B1 - PROCESS FOR CONTROL AND RECORDING OF ACCESSES BY BLUETOOTH TECHNOLOGY - Google Patents

PROCESS FOR CONTROL AND RECORDING OF ACCESSES BY BLUETOOTH TECHNOLOGY Download PDF

Info

Publication number
ES2385009B1
ES2385009B1 ES201030681A ES201030681A ES2385009B1 ES 2385009 B1 ES2385009 B1 ES 2385009B1 ES 201030681 A ES201030681 A ES 201030681A ES 201030681 A ES201030681 A ES 201030681A ES 2385009 B1 ES2385009 B1 ES 2385009B1
Authority
ES
Spain
Prior art keywords
bluetooth
recording
access
bluetooth technology
building
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Withdrawn - After Issue
Application number
ES201030681A
Other languages
Spanish (es)
Other versions
ES2385009A1 (en
Inventor
Rogelio TRIVIÑO GONZÁLEZ
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Trivino Gonzalez Rogelio 0011634911 S L N E
Trivino Gonzalez Rogelio 0011634911 Slne
Original Assignee
Trivino Gonzalez Rogelio 0011634911 S L N E
Trivino Gonzalez Rogelio 0011634911 Slne
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Trivino Gonzalez Rogelio 0011634911 S L N E, Trivino Gonzalez Rogelio 0011634911 Slne filed Critical Trivino Gonzalez Rogelio 0011634911 S L N E
Priority to ES201030681A priority Critical patent/ES2385009B1/en
Publication of ES2385009A1 publication Critical patent/ES2385009A1/en
Application granted granted Critical
Publication of ES2385009B1 publication Critical patent/ES2385009B1/en
Withdrawn - After Issue legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/00174Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
    • G07C9/00896Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys specially adapted for particular uses
    • G07C9/00904Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys specially adapted for particular uses for hotels, motels, office buildings or the like
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/20Individual registration on entry or exit involving the use of a pass
    • G07C9/27Individual registration on entry or exit involving the use of a pass with central registration
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/20Individual registration on entry or exit involving the use of a pass
    • G07C9/28Individual registration on entry or exit involving the use of a pass the pass enabling tracking or indicating presence

Landscapes

  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Alarm Systems (AREA)

Abstract

Procedimiento para control y grabación de accesos por tecnología bluetooth.#Se describe un proceso que utiliza ordenadores, software y antenas bluetooth y permite el registro y control de accesos a edificios, detectando tarjetas inteligentes o los móviles de los usuarios, así como la localización y seguimiento de personas dentro de edificios, centros comerciales, fábricas o explotaciones mineras.Procedure for access control and recording by bluetooth technology. # A process is described that uses computers, software and bluetooth antennas and allows the registration and control of access to buildings, detecting smart cards or mobile phones of users, as well as the location and tracking of people inside buildings, shopping centers, factories or mining operations.

Description

TECNOLOGíA BLUETOOTH BLUETOOTH TECHNOLOGY

La presente invención se refiere a un proceso que graba información identificativa de las personas que acceden a un edificio o comercio, complementario a las imágenes que captan las cámaras de vídeo de vigilancia. También se utilizará dicha información para permitir los accesos a edificios y para realizar un seguimiento de las personas dentro de los edificios. The present invention relates to a process that records identifying information of people accessing a building or business, complementary to the images captured by surveillance video cameras. This information will also be used to allow access to buildings and to track people inside the buildings.

ANTECEDENTES DE LA INVENCiÓN BACKGROUND OF THE INVENTION

Las grandes superficies, empresas y los bancos usan sistemas de cámaras de seguridad para grabar a las personas que acceden a sus centros, intentando identificar a personas fichadas en el caso de las grandes superficies o bien grabando sus caras como una prueba a aportar en delitos. Estos sistemas no son exhaustivos y cualquier medida complementaria será bienvenida. Otra necesidad no bien cubierta es el seguimiento más exhaustivo de los horarios y ausencias de los empleados. Con este proceso se puede hacer además localización en tiempo real de individuos en edificios, simplificando y abaratando los sistemas actuales basados en localización GPS. Para ello se usarán componentes informáticos estándar, destacando antenas bluetooth, y APIs (librerías) estándar de programación que usen las funciones de descubrimiento de dispositivos bluetooth cercanos. Large stores, companies and banks use security camera systems to record people who access their centers, trying to identify people signed in the case of large stores or recording their faces as evidence to contribute to crimes. These systems are not exhaustive and any complementary measures will be welcome. Another need that is not well covered is the more exhaustive monitoring of employee schedules and absences. This process also allows real-time location of individuals in buildings, simplifying and lowering current systems based on GPS location. For this, standard computer components will be used, highlighting bluetooth antennas, and standard programming APIs (libraries) that use the discovery functions of nearby bluetooth devices.

DESCRIPCiÓN DE LA INVENCiÓN DESCRIPTION OF THE INVENTION

Lo que aquí se propone es una solución complementaria para registrar los accesos de personas a comercios y edificios usando la identificación informática del código de red bluetooth asociado a la mayoría de los móviles del mercado. Este código es único para cada móvil, y se comunica a cualquier otro dispositivo bluetooth con el que se conecta. Se colocará un ordenador cerca de cada entrada al edificio, con una antena bluetooth instalada, y con un software en ejecución desarrollado al efecto. Se puede usar un ordenador ya existente, por ejemplo un terminal de caja. El programa en ejecución en cada uno de estos ordenadores, captará cada entrada de una persona en el edificio que lleve con él un móvil con tecnología bluetooth activada. Comunicará cada acceso a otro programa servidor instalado en la central de la empresa. Este llevará un registro de accesos por código bluetooth, identificando por patrones periódicos de entrada a clientes, a transeúntes (hay que tener en cuenta que las antenas bluetooth actuales tienen un alcance de 100 metros, pudiéndose restringir a 10 metros si se estima conveniente), a empleados o a sospechosos por una lista negra residente en el servidor central o bien en la central de alarmas puesta en internet por la empresa proveedora, y conectada con los servidores de cada cliente. Cuando se cometa un delito, se usará la fecha y hora para identificar el código bluetooth del móvil del sospechoso. Este será un móvil nuevo para el sistema, fácilmente separable del de los empleados y los clientes habituales. Con este código, la policía podrá identificar al sospechoso preguntando a los proveedores de telefonía. Además, este código bluetooth del sospechoso se propagará en una lista negra, que hará que salten las alarmas la próxima vez que el sospechoso se acerque a la entrada de otro establecimiento con el sistema conectado. Se fijarán distintos niveles de alarma según el tipo de registro de sospechoso, ejecutando las acciones acordadas para cada tipo de alarma. En el caso de hurto en comercios minoristas, se puede fichar el código del bluetooth del móvil del sujeto asociándolo a fotos y demás datos del mismo, mientras se le retiene a la espera de la policía, y así detectar fácilmente futuras incursiones del suj eto en éste u otro What is proposed here is a complementary solution to register the access of people to shops and buildings using the computer identification of the bluetooth network code associated with most mobile phones in the market. This code is unique to each mobile, and communicates to any other bluetooth device with which it connects. A computer will be placed near each entrance to the building, with a bluetooth antenna installed, and running software developed for this purpose. You can use an existing computer, for example a cash terminal. The program running on each of these computers, will capture each entry of a person in the building that carries with him a mobile with Bluetooth technology activated. It will communicate each access to another server program installed in the company's headquarters. This will keep a record of accesses by bluetooth code, identifying by periodic patterns of entry to customers, passersby (it should be taken into account that the current bluetooth antennas have a range of 100 meters, being able to restrict to 10 meters if deemed convenient), to employees or suspects by a blacklist resident in the central server or in the alarm center put on the internet by the provider company, and connected to the servers of each client. When a crime is committed, the date and time will be used to identify the bluetooth code of the suspect's mobile. This will be a new mobile for the system, easily separable from that of employees and regular customers. With this code, the police will be able to identify the suspect by asking the telephone providers. In addition, this suspect's bluetooth code will be blacklisted, which will cause alarms to be raised the next time the suspect approaches the entrance of another establishment with the system connected. Different alarm levels will be set according to the type of suspect record, executing the agreed actions for each type of alarm. In the case of theft in retail stores, you can sign the bluetooth code of the subject's mobile by associating it with photos and other data of the subject, while being held while waiting for the police, and thus easily detect future incursions of the subject in this one or another

centro comercial. Si además de en los accesos se instalan nodos dentro del comercio, se puede hacer un seguimiento sobre mapa del sospechoso desde la cabina de seguridad, con un programa creado al efecto. Además, con el registro de transeúntes que pasan por delante del establecimiento, la policía tiene una herramienta más aparte de la grabación de las cámaras de seguridad, para la investigación de delitos. Por otro lado, la central puede tener informes periódicos de los horarios de entrada y salida de sus empleados, integrando este sistema con los accesos del personal a la red corporativa. Por ejemplo, se puede registrar y reportar al responsable de seguridad un acceso inhabitual de un empleado en fin de semana. Como sistema complementario se propone la instalación del sistema en ordenadores cercanos a la entrada de cada departamento, así como a la entrada de las zonas comunes. Así se podrá hacer un seguimiento de la situación de los empleados dentro del edificio en tiempo real (los actuales sistemas de posicionamiento en edificios usan la tecnología GPS, con 10 que requieren que los empleados tengan móviles más avanzados y un software instalado en ellos, cosa que con este método no es necesario). También se podrán sacar estadísticas sobre el tiempo que cada empleado pasa en el edificio, desgranando el tiempo empleado en comida, en reuniones, etc. Además, captando el código bluetooth de las visitas en recepción, se le puede habilitar el paso a las puertas y tornos que vaya a necesitar simplemente con su código bluetooth, sin necesidad de tarjetas ni llaves. Cuando el ordenador cercano a una puerta de un departamento capte la señal bluetooth, la mandará a la central y esta abrirá la puerta si el usuario tiene privilegios suficientes. Hay que hacer constar la importancia del secreto de este método, o de otro modo los empleados y delincuentes empezarán a desconectar el bluetooth de sus móviles para no ser controlados por este sistema. Mall. If, in addition to the accesses, nodes are installed within the store, a map of the suspect can be monitored from the security booth, with a program created for this purpose. In addition, with the registration of passers-by that pass in front of the establishment, the police have a tool other than the recording of security cameras, for the investigation of crimes. On the other hand, the plant can have periodic reports of the schedules of entry and exit of its employees, integrating this system with the access of the personnel to the corporate network. For example, unusual access of an employee on the weekend can be registered and reported to the security officer. As a complementary system, it is proposed to install the system on computers near the entrance of each department, as well as the entrance to the common areas. This will allow you to track the situation of employees within the building in real time (current building positioning systems use GPS technology, with 10 requiring employees to have more advanced mobiles and software installed in them, which which with this method is not necessary). Statistics can also be obtained on the time each employee spends in the building, shelving the time spent on food, meetings, etc. In addition, by capturing the bluetooth code of the visits at reception, you can enable the passage to the doors and lathes that you will simply need with your bluetooth code, without the need for cards or keys. When the computer near a door of an apartment picks up the bluetooth signal, it will send it to the central office and it will open the door if the user has sufficient privileges. It is necessary to state the importance of the secret of this method, or else employees and criminals will begin to disconnect the bluetooth from their mobiles so as not to be controlled by this system.

Claims (3)

REIVINDICACIONES l. Procedimiento para control y grabación de accesos por tecnología bluetooth, caracterizado por a) la captación de los códigos únicos bluetooth de los móviles y/o tarjetas con chip bluetooth desarrolladas al efecto de las personas cercanas a los l. Procedure for access control and recording by bluetooth technology, characterized by a) the acquisition of the unique bluetooth codes of mobile phones and / or cards with bluetooth chip developed for the purpose of people close to 5 puntos de acceso, utilizando antenas bluetooth instaladas en ordenadores del edificio, a los que se les habrá instalado un software de captación desarrollado al efecto; b) envío y grabación de dichos códigos en el software servidor y base de datos desarrollado al efecto e instalado en un servidor central; 5 access points, using bluetooth antennas installed in building computers, which will have installed a collection software developed for this purpose; b) sending and recording of said codes in the server and database software developed for this purpose and installed in a central server; 2. Procedimiento para control y grabación de accesos por tecnología bluetooth, según la 2. Procedure for access control and recording by bluetooth technology, according to the 10 reivindicación 1, caracterizado por c) el software de servidor caracterizado en 1.b no solo lleva el registro de accesos, sino que compara con los privilegios dados de alta en el mismo para los usuarios y controla fisicamente las cerraduras electrónicas del edificio y carretes de acceso. 10 claim 1, characterized by c) the server software characterized in 1.b not only keeps the access log, but compares with the privileges discharged therein for the users and physically controls the electronic locks of the building and reels of access. 3. Procedimiento para control y grabación de accesos por tecnología bluetooth, según la 3. Procedure for access control and recording by bluetooth technology, according to the 15 reivindicación 1, caracterizado por c) el software de servidor caracterizado en 1.b se complementa con mapas del edificio o instalación, que muestre donde están las personas en ese momento, según su último punto de control registrado, para localización, o bien que muestre rutas realizadas por los clientes, mapas de calor de puntos en los que se han parado las visitas, tiempos medios de visita, etc. Claim 1, characterized by c) the server software characterized in 1.b is complemented with maps of the building or installation, showing where the people are at that time, according to their last registered control point, for location, or that show routes made by customers, heat maps of points where visits have stopped, average visit times, etc.
ES201030681A 2010-06-04 2010-06-04 PROCESS FOR CONTROL AND RECORDING OF ACCESSES BY BLUETOOTH TECHNOLOGY Withdrawn - After Issue ES2385009B1 (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
ES201030681A ES2385009B1 (en) 2010-06-04 2010-06-04 PROCESS FOR CONTROL AND RECORDING OF ACCESSES BY BLUETOOTH TECHNOLOGY

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
ES201030681A ES2385009B1 (en) 2010-06-04 2010-06-04 PROCESS FOR CONTROL AND RECORDING OF ACCESSES BY BLUETOOTH TECHNOLOGY

Publications (2)

Publication Number Publication Date
ES2385009A1 ES2385009A1 (en) 2012-07-17
ES2385009B1 true ES2385009B1 (en) 2013-05-20

Family

ID=46383945

Family Applications (1)

Application Number Title Priority Date Filing Date
ES201030681A Withdrawn - After Issue ES2385009B1 (en) 2010-06-04 2010-06-04 PROCESS FOR CONTROL AND RECORDING OF ACCESSES BY BLUETOOTH TECHNOLOGY

Country Status (1)

Country Link
ES (1) ES2385009B1 (en)

Families Citing this family (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104992484B (en) * 2015-06-11 2018-12-25 苏州爱开客信息技术有限公司 Vehicles while passing system based on bluetooth recognition
CN104899950B (en) * 2015-06-11 2018-08-07 苏州爱开客信息技术有限公司 Vehicle mandate based on bluetooth recognition passes in and out method
CN104992485B (en) * 2015-06-11 2018-10-02 苏州爱开客信息技术有限公司 Banister based on Internet of Things controls open method

Family Cites Families (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP1400930A1 (en) * 2002-09-23 2004-03-24 Scheidt & Bachmann Gmbh Method and device for exchanging information
KR100794887B1 (en) * 2003-06-17 2008-01-14 유나이티드 시큐리티 애플리케이션즈 아이디, 인코포레이티드 Electronic security system for monitoring and recording activity and data relating to institutions and clients thereof
NL2000841C2 (en) * 2007-09-03 2009-03-04 Gaming Support B V System for displaying and keeping track of the number of people present in a building, such as a casino.

Also Published As

Publication number Publication date
ES2385009A1 (en) 2012-07-17

Similar Documents

Publication Publication Date Title
US10223888B2 (en) Personnel authentication and tracking system
JP5794599B1 (en) Digital fine security system, method and program
US11096022B2 (en) Tailgating detection
JP5780570B1 (en) Digital loss / accident defense system, method and program
US20110261202A1 (en) Method and System for an Integrated Safe City Environment including E-City Support
US20150339871A1 (en) Entity management and recognition system and method
EP2779130B1 (en) GPS directed intrusion system with real-time data acquisition
US20060181402A1 (en) Security system access control and method
CN108604402B (en) Identification system
JP5900941B1 (en) Digital future now security system, method and program
JP2006202062A (en) Facility monitoring system
JP3199599U (en) Electronic tag security device
JP2004021310A (en) Security management system
ES2385009B1 (en) PROCESS FOR CONTROL AND RECORDING OF ACCESSES BY BLUETOOTH TECHNOLOGY
JP6829508B2 (en) Application program and behavior management device
US20130258110A1 (en) System and Method for Providing Security on Demand
JP3690361B2 (en) Outsider monitoring system
US20150154722A1 (en) Crime Deterrence Using Smartphone Signatures
JP2011012420A (en) Building monitoring system and program
US20200184047A1 (en) Authenticate a first and second user
Yan et al. Detection of suspicious patterns in secure physical environments
Dobre Internet of Things: Challenges and Opportunities for Private Security Perspective
Rajkumar et al. Visitor Monitoring System Using Raspberry PI and PI Camera
Geldenhuys Estate security & technology
Slotnick Integrated Physical Security Systems

Legal Events

Date Code Title Description
FG2A Definitive protection

Ref document number: 2385009

Country of ref document: ES

Kind code of ref document: B1

Effective date: 20130520

FA2A Application withdrawn

Effective date: 20131022