CN107209964A - Double-deck personal identification and alignment system - Google Patents

Double-deck personal identification and alignment system Download PDF

Info

Publication number
CN107209964A
CN107209964A CN201580075132.3A CN201580075132A CN107209964A CN 107209964 A CN107209964 A CN 107209964A CN 201580075132 A CN201580075132 A CN 201580075132A CN 107209964 A CN107209964 A CN 107209964A
Authority
CN
China
Prior art keywords
restricted area
people
pcd
enter
person
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201580075132.3A
Other languages
Chinese (zh)
Other versions
CN107209964B (en
Inventor
T·Z·施杜欧维奇
R·L·科普兰
M·F·塞凯拉
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Sensormatic Electronics LLC
Original Assignee
Safe Section's Fire-Fighting And Safe Corp
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Priority claimed from US14/558,796 external-priority patent/US9384607B1/en
Application filed by Safe Section's Fire-Fighting And Safe Corp filed Critical Safe Section's Fire-Fighting And Safe Corp
Publication of CN107209964A publication Critical patent/CN107209964A/en
Application granted granted Critical
Publication of CN107209964B publication Critical patent/CN107209964B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/20Individual registration on entry or exit involving the use of a pass
    • G07C9/29Individual registration on entry or exit involving the use of a pass the pass containing active electronic elements, e.g. smartcards
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/20Individual registration on entry or exit involving the use of a pass
    • G07C9/28Individual registration on entry or exit involving the use of a pass the pass enabling tracking or indicating presence
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/00174Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
    • G07C2009/00579Power supply for the keyless data carrier
    • G07C2009/00603Power supply for the keyless data carrier by power transmission from lock
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C2209/00Indexing scheme relating to groups G07C9/00 - G07C9/38
    • G07C2209/14With a sequence of inputs of different identification information
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C2209/00Indexing scheme relating to groups G07C9/00 - G07C9/38
    • G07C2209/60Indexing scheme relating to groups G07C9/00174 - G07C9/00944
    • G07C2209/63Comprising locating means for detecting the position of the data carrier, i.e. within the vehicle or within a certain distance from the vehicle

Landscapes

  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Lock And Its Accessories (AREA)
  • Mobile Radio Communication Systems (AREA)
  • Time Recorders, Dirve Recorders, Access Control (AREA)

Abstract

System and method for controlling the access to restricted area (" RA ").Methods described includes:Determine whether that someone wants to enter into RA:Check whether this person is authorized to using the first unique identifier associated with the wearable access sensors that it is worn and enter RA;When it is determined that this person is authorized into RA, the portable communication device (" PCD ") of this person is set to send the second unique identifier and available for the positional information for determining positions of the PCD in surrounding environment;Confirm that this person is currently located at RA accessing points using the second unique identifier and positional information;And when it is determined that this person want to enter into RA, this person be authorized to enter RA and this person and be currently located at RA accessing points when, make mechanical actuator actuating enable the individual to enter RA.

Description

Double-deck personal identification and alignment system
Technical field
Access control system (" ACS ") is related generally to herein.More particularly, present document relates to double-deck (dual level) people Member's identification and alignment system.
Background technology
There are many known ACS in the art.A kind of such ACS includes being installed on restricted area (restricted Areas outlet) and/or multiple access control readers (" ACR ") of porch.For example, ACR can be arranged in by it It can enter near the doorway in limitation room.The badge that personnel are worn is used to be approved to enter limitation room via ACR.In this side Face, badge is included and is disposed thereon or low frequency (" LF ") passive radio frequency identification (" RFID ") communication equipment in it.Typically, LF Passive RFID communication equipment is worked with 125kHz frequency.ACR is that detection range is about 5cm or smaller near-field devices. In whole preset time section, ACS is followed the trail of to fix the number of workers in order to which which entrance entrance restricted area has passed through.But, ACS is not followed the trail of When personnel leave each accessed restricted area within the given period.
Another conventional ACS uses the beacon and Wireless Telecom Equipment (example via bluetooth (Bluetooth) technical communication Such as, mobile phone).Personal identifier is stored on Wireless Telecom Equipment, and when this person is near beacon and beacon communication. In response to receiving personal identifier, ACS will allow this person to enter restricted area.
The content of the invention
This disclosure relates to the system and method for controlling the access to restricted area.Method include by electronic circuit come Determine whether that someone wants to enter into restricted area.In some cases, the wearable access sensing worn from people is pointed out based on (a) Received signal strength indicator device (" RSSI ") measurement data of power present in the signal that device (" WAS ") is received, and/or (b) Point out to be arranged in the rate of change of the rate of change of the charging voltage of the energy storage device used in the energy of electromagnetic field Acquisition Circuit in WAS Data make the determination.After such determine is made, this is checked using first unique identifier associated with WAS Whether people, which is authorized to, enters restricted area.
When it is determined that this person is authorized into restricted area, the portable communication device (" PCD ") of this person is set to send second Unique identifier and available for the positional information for determining positions of the PCD in surrounding environment.In some cases, made by PCD Positional information is obtained with the technology based on RSSI.RSSI technologies include:Detection (survey) is performed in the range of it by PCD The operation of medium access control (" MAC ") address of available network;And collect from associated with the MAC Address of available network The RSSI levels for the signal that equipment is received.The RSSI levels and known location of the equipment associated with the MAC Address of available network It is used to confirm that this person is currently located at the accessing points of restricted area.
Second unique identifier and positional information are used to confirm that this person is currently located at the accessing points of restricted area.It is determined that This person wants to enter into restricted area, this person and is authorized to the accessing points that restricted area is currently located at into restricted area and/or this person When, mechanical actuator activated to enable the individual to enter in restricted area.
In some cases, this method also includes the accessing points certain radius for determining whether PCD is located at apart from restricted area Within.When it is determined that PCD is located within the accessing points certain radius of restricted area, activate mechanical actuator.Additionally Or alternatively, this method be included in make mechanical actuator activate after record indicate this person enter restricted area in the specific time Information.
Brief description of the drawings
Embodiment will be described with reference to the following drawings, wherein, similar reference represents similar in all of the figs , and wherein:
Fig. 1 is exemplary ACS perspective view.
Fig. 2 is the block diagram of Fig. 1 WAS exemplary architecture.
Fig. 3 A-3B (being referred to as " Fig. 3 ") provide the flow chart of the illustrative methods for controlling the access to restricted area.
Fig. 4 A-4B (being referred to as " Fig. 4 ") provide another illustrative methods for controlling the access to restricted area Flow chart.
Fig. 5 is to show to be carried out by energy acquisition equipment when energy acquisition equipment moves closer to the accessing points of restricted area The image of energy acquisition.
Fig. 6 is the schematic diagram of the path of four antenna systems and three definition.
Fig. 7 is the curve map for being showing along the power that the first path is received from four antennas.
Fig. 8 is the curve map for being showing along the power that alternate path is received from four antennas.
Fig. 9 is the curve map for being showing along the power that third path is received from four antennas.
Embodiment
It is readily appreciated that, the component generally described herein with the embodiment illustrated in accompanying drawing can be according to various Difference configures to arrange and design.Thus, as illustrated, the more detailed description to various embodiments is not intended to limit below The scope of the present disclosure, and the simply representative of various embodiments.It is attached although giving the various aspects of embodiment in the accompanying drawings Figure is not necessarily drawn to scale, unless otherwise indicated.
In the case of the spirit or inner characteristic without departing substantially from the present invention, the present invention can come real in other specific forms It is existing.Described embodiment should all be seen merely as illustrative and not restrictive in all respects.Therefore, model of the invention Enclose and indicated by appended claims, rather than indicated by the embodiment.Belong to claim equivalent meaning and scope it Interior all changes should all cover within the scope of it.
This specification is not meant as the institute that can be realized with the present invention to the reference of feature, advantage or similar language in the whole text There are feature and advantage to be embraced within or should be included in any single embodiment of the present invention.On the contrary, referring to feature and advantage Language should be understood to mean that:In conjunction with the embodiments described special characteristic, advantage or characteristic is included in the present invention At least one embodiment in.Thus, this specification discussion in the whole text on feature and advantage and similar language can with but Not necessarily refer to same embodiment.
Moreover, the present invention described feature, advantage and characteristic can be incorporated into any suitable form one or In multiple embodiments.According to description herein, it should be appreciated by those skilled in the art that can be in no specific embodiment Implement the present invention in the case of one or more special characteristics or advantage.In other cases, it can deposit in certain embodiments Supplementary features and advantage in all embodiments that may not come across the present invention.
A kind of reference of this specification in the whole text to " embodiment ", " embodiment " or similar language is it is meant that combine signified Special characteristic, structure or the characteristic for the embodiment description shown are included at least one embodiment of the present invention.Thus, whole In this specification, phrase " in one embodiment ", " in embodiment " and similar language can with but might not be all Refer to same embodiment.
As it is used herein, singulative "a", "an" and "the" includes plural reference, unless the context otherwise It is explicitly indicated.Unless otherwise defined, otherwise implication and the people in the art of all technologies used herein and scientific terminology The implication that member is generally understood is identical.As used herein, term " comprising " means " include, but are not limited to ".
Many and increasing people possesses smart phone and in workplace, school or there is Wi-Fi nets Other environment of network facility carry with smart phone everywhere.Smart phone has what the name with the owner was directly associated Identity, and may be used as reliable proof of identification.Wi-Fi network in building includes many routers.These routers With known address, and its position is spatially distributed to allow whole building thing fully to be covered.
Software application allows smart phone to measure from the strong of the signal of each router reception in the range of smart phone Degree or RSSI.Then, the information can be sent to high in the clouds.Beyond the clouds, RSSI information and router spatial positional information by with Come position of the computational intelligence phone in building.Then, the position of smart phone is by directly network of the report to building. During into building, once software application finds the Wi-Fi of building, it can just be activated.Hereafter, software application is based on pre- Fixed time interval run location updates.When smart phone not movement (for example, based on phone motion sensor output information come It is determined that) when, stop to update, until exercise recovery.
Copeland et al. U.S. Patent application No.14/558,796 (" ' 796 patent application ", this application, which passes through, to be quoted It is incorporated herein) describe the access control system for using body wearable sensors and reader.Reader, which is used, comes from superelevation Frequently received signal strength indicator (" the RSSI ") information of (" UHF ") RFID sensor or with transceiver radio communication and energy The UHF energy acquisition sensors of amount collection electronic equipment.UHF methods allow the relatively long distance of sensor to detect, detecting distance allusion quotation It is apart from 1-2 meters of interrogation antenna type.
Although ' 796 patent applications are the improvement to existing access control, it is still single credential security system System.By the body WAS described in ' 796 patent applications is together with PCD unique identifiers (for example, MAC Address of cell phone) and sets Current location in applying is used together, and double-deck identification and position system can be achieved.It can possess with two independent identifying devices Than any one method all much higher safe coefficients.Can be weighed with adjustment algorithm each signal in itself or signal combination Use.If for example, someone does not enter accessing points with PCD, but just adorning oneself with WAS and entering accessing points, then there is certain journey The safety identification of degree.With both WAS and PCD (for example, smart phone or intelligent watch), then there is dual and much higher peace Whole degree.
This disclosure relates in addition to applying at monitored inlet point except using the technology described in the patent application of ' 796 Also using it is personal company PCD confirm people identity second layer security system and method.In this respect, PCD, PCD are applied And remote data base service (" high in the clouds ") be implanted in each system.Each user of system is required for:PCD applications are installed In on the PCD of his (she);And using individual/company's voucher of his (she), so as to which the PCD of his (she) is registered in system. From that time, PCD apply remained under certain meaning it is passive, i.e., unless received request, otherwise it will not back with high in the clouds Communicate (for example, for purpose of energy-conservation).Alternately, in order to follow the trail of and record, PCD is periodically reported to high in the clouds.
During operation, high in the clouds is after identification/authentication operation based on WAS of ' 796 patent applications or simultaneously to PCD Send on recognizing the request with positional information.In response to the request, PCD obtains the current location for pointing out it in safety zone Information.The positional information can use at least one in following technology to obtain:Based on global positioning system (" GPS ") Technology;Technology based on RSSI;And the technology based on beacon.Technology based on RSSI will be explained in.But, base It is well known in the art, therefore no longer describes herein in the technology of GPS and beacon.Next, PCD by it only One identifier (for example, MAC Address) and positional information are sent to high in the clouds.Beyond the clouds, the information is used to confirm that or verified user Whether it is physically located at given exit/entry (second layer security).
Referring now to Figure 1, there is provided the exemplary ACS 100 for being arranged to control the access to restricted area.Such as Fig. 1 Shown, ACS 100 is generally configured to manage entrance and exit of the people by least one safety zone 118.In this side Face, each safety zone will enter and leave via accessing points (such as doorway 102).Outlet and entrance antenna 106,108 are by cloth Put on the preceding surface and rear surface of the same structure wall at accessing points 102 or on different structural walls.For example, entrance Antenna 108 is arranged on the front side wall surface 130 of the structural wall 132 at neighbouring doorway 102.By contrast, exit antenna 106 On the dorsal part wall surface (not shown in Fig. 1) for the structural wall 134 being arranged at neighbouring doorway 102.Antenna 106,108 also with Reader 104 is coupled in communication.The reader 104 is via network 110 (for example, Intranet and/or internet) and data processing system System (" DPS ") 112 is coupled in communication.
WAS 114 is assigned to each individual for the restricted area for being authorized to commercial entity.WAS 114 includes can be with The wearable communication equipment worn by its allocated people 116 given.As shown in figure 1, WAS 114 includes having internal sensor electricity The wrist strap on road (not shown in Fig. 1).The present invention is not limited to this respect.WAS 114 can include any other type Wearable items, for example, wrist-watch, necklace, cap or the deviation people on the person or on the clothing of people can be worn on Clip article at the position of central shaft.In all cases, WAS 114 is easy to authorized person to enter by safety zone 118 Enter and leave.
The schematic diagram of the exemplary architecture of WAS 114 sensor circuit is provided in Fig. 2.As shown in Fig. 2 sensor is electric Road includes being used for obtaining energy from external source to power to other electronic components 204,206,208,260 inside WAS 114 Energy acquisition circuit 220.From the equipment of the accessing points by being arranged in restricted area be transmitted into surrounding environment in electromagnetic field in receive Collect energy.Energy is stored in energy storage device 222 (for example, capacitor), to treat that electronic component 204,206,208,260 is follow-up Use.
Curve 502 is provided in Figure 5, and it is shown when people is constantly close to the accessing points of restricted area by energy acquisition electricity The collection of energy that road 220 is carried out.Fig. 5 also includes curve 504, and it shows the power supply of the processor to WAS 114.When processor quilt During power supply, WAS 114 starts to collect the data for the energy stores rate for pointing out energy storage device 222.
Referring again to Fig. 2, WAS 114 antenna 202 can include directional aerial, and directional aerial is arranged in WAS 114 point to the direction away from this human body when being worn by.Antenna 202 and junction service (" the SRC ") equipment for realizing SRC technologies 212 couplings.SRC technologies include but is not limited to RFID technique, and RFID technique is used when people and/or object are close to reader 104 It is identified radio frequency electromagnetic field.Therefore, SRC equipment 212 is via responding to the request signal that reader 104 is sent SRC answer signals come promote unique identifier 210 arrive reader 104 transmission.Then, reader 104 and/or DPS 112 make With unique identifier 210 whether restricted area is authorized to come automatic identification close to the people 116 of accessing points 102 and/or this person.
In accessing points 102, reader 104 determines the WAS 114 of transmitting SRC answer signals directionality.Based on to by day The rssi measurement of power present in the SRC answer signals that line 106 or 108 is received from WAS 114 makes the determination.Rssi measurement Point out the signal intensity of SRC answer signals received at antenna 106 or antenna 108, and the signal intensity is given It is in increase or in reduction in period.If the signal intensity of SRC answer signals is increasing within the given period, WAS 114 is considered as to be advanced towards corresponding antenna 106 or 108.If on the contrary, the signal intensity of SRC answer signals exists Reducing in the given period, then WAS 114 is considered as away from corresponding antenna 106 or 108.
But, such determination e insufficient to detect that this person is attempt to restricted area to be entered and still leaves restricted area Domain.Therefore, additional motion sensor 120,122 is additionally used herein.Motion sensor can be arranged at accessing points 102 Place.First motion sensor 122 is arranged on the front side wall surface 130 of the structural wall 132 at neighbouring accessing points 102.Compare Under, the second motion sensor 120 is arranged in the dorsal part wall surface of the structural wall 134 at neighbouring accessing points 102 (in Fig. 1 It is not shown) on.Motion sensor 120,122 is used to determine direction and/or speed/speed of the people 116 near accessing points 102 Rate.Point out that the direct of travel of this person and/or the information of speed/rate are supplied to reader 104 from motion sensor 120,122.
Note, the present invention is not limited to the motion sensor configuration shown in Fig. 1.Additionally or alternatively, it is arranged at PCD Motion sensor on (for example, mobile phone or smart phone) can be used to detect direction and/or the speed of the motion of people.
And then, reader 104 turns the information received from one or more motion sensors 120,122 via network 110 Issue DPS 112.Similarly, reader 104 by indicate WAS 114 directionality (that is, WAS 114 be just towards antenna 106 or 108 advance still just is advancing away from antenna 106 or 108) information transmission to DPS 112.DPS 112 can be with reader 104 In same facility, or it is located remotely from the different facilities for being wherein disposed with the facility of reader 104.Therefore, network 110 Intranet and/or internet can be included.In addition, each outlet of restricted area in each facility of commercial entity and/or Entrance can have access control sensor-based system 104-108,120,122 being arranged in herein, to limit access control sensing The distributed network of device system.
In DPS 112, information is used to determine whether people just seeks entry into or leave accessing points 102.If for example, information Indicate that WAS 114 just advances towards entrance antenna 108 and people just moves along direction 124, it is determined that this person is wanted via accessing points 102 enter restricted area.If on the contrary, information indicates that WAS 114 just advances towards antenna 106 and people just moves along direction 126 It is dynamic, it is determined that this person wants to leave restricted area via accessing points 102.If information indicates WAS 114 just away from the row of antenna 108 Enter, it is determined that this person is not intended to enter restricted area.Similarly, if information indicates WAS 114 just away from the row of antenna 106 Enter, it is determined that this person is not intended to leave restricted area.
DPS 112 can also analyze the motor pattern limited by information, to determine that people is intended to enter accessing points 102 still Want to leave accessing points 102.If for example, information indicate this person 116 be along in first time period direction 124,136 or 138 advance towards accessing points 102, and are then visited in the second time period followed by along direction 126,136 or 138 is remote Ask and a little 102 advance, it is determined that this person is not desired to enter restricted area, simply by accessing points.If on the contrary, information indicates this person 116 are just advanced with First Speed in first time period along direction 124,136 or 138 towards accessing points 102, and then at him Slow down when (she) is close to accessing points, it is determined that this person does want to enter restricted area.Similarly, if information indicates this person 116 Just advanced in first time period with First Speed along direction 124,136 or 138 towards accessing points 102 and when reaching accessing points Stop, it is determined that this person does want to enter restricted area.
Once it is determined that this person is not desired to enter or leave restricted area, then DPS 112 is simply by unique identifier, directionality Information, direction of motion information, speed/rate information, and/or the result of information analysis are recorded in data storage and (not shown in Fig. 1 Go out) in, with for later use.Once it is determined that this person does want to enter restricted area, then DPS 112 by unique identifier 210 with The multiple unique identifiers being stored in data storage are compared, and enter restricted area to check whether this person is authorized to.Such as Fruit this person, which is authorized to, enters restricted area, then DPS 112 makes to be sent to this person on identification and the request of positional information and gathered around Some PCD 150.
In response to the request, PCD 150 performs operation to determine its current location in surrounding environment.In some situations Under, the technology based on RSSI is used to determine PCD current location.Technology based on RSSI is wireless including the use of PCD Wi-Fi Electricity detects the MAC Address of all available networks in the range of.It has collected the MAC Address of all available networks and RSSI water After flat, MAC Address and RSSI information relay forwarding are gone back to high in the clouds 154 by PCD 150 via wireless communication link 152.Then, cloud Estimate PCD's 150 based on the MAC Address of each equipment associated with MAC Address, RSSI levels and known location in end 154 Position.Learning algorithm can be used to be associated between two kinds of listed information.
In the case where PCD 150 estimated location is located within the former monitoring door certain radius of distance, high in the clouds 154 will be opened Command auto repeat is transmitted to door to make enabling actuator 128 activated (for example, for unlocking lock).In order to reduce scanning WAS with Door open between delay, PCD 150 constantly detection Wi-Fi network and make detection data when PCD 150 receives request Through being ready to.
High in the clouds 154 and/or DPS 112 go back the result of record information analysis and/or point out that the access rights of restricted area exist The specific time is provided to the information of this person.Once it is determined that this person wants to leave restricted area, then DPS 112 activates enabling Device 128 is activated, and is gone back the result of record information analysis and/or pointed out that this person leaves the letter of restricted area in the specific time Breath.
Data record allow the accessing points that high in the clouds 154 and/or the trackers of DPS 112 enter and leave and the entrance and from The time opened.Due to a variety of causes, the historical information is useful.For example, historical information can be used to determine that employee reaches And/or the time of work is left, thus, it is desirable to the routine that each employee checks in and checked out manually when coming off duty when being on duty manually Staff attendance system is no longer necessary.When possible theft occurs or when equipment is removed from restricted area, history Information can be utilized to the individual that identification enters restricted area.
Note, above-mentioned access control system overcomes some shortcomings of conventional access control system.For example, in the present invention In, authorized individual need not take any manually operated (for example, swiping the card) to enter restricted area.In fact, for certain The demand of a little access control equipments (for example, card reader) has been eliminated, and is thus reduced and is realized this access control system 100 Totle drilling cost.
In other cases, WAS 114 is in the lower work of both energy acquisition pattern and communication pattern.In energy acquisition pattern Under, when WAS 114 is by accessing points, energy acquisition circuit 220 collects energy.Collected energy is stored in energy storage and set In standby 222 (for example, capacitors).Once energy storage device 222 is charged to the operational voltage level of SRC equipment 212, then WAS114 Pattern change into communication pattern from energy acquisition pattern.Hereafter, SRC identifier signals at accessing points 102 via antenna 202 It is sent to reader 104.SRC identifier signals include unique identifier 210.It can also believe from WAS 114 via SRC identifiers It number will indicate that the information 214 of rate of change of the charging voltage of energy storage device 222 (for example, capacitor) is sent to reader 104.Become Rate information 214 indicates WAS 114 directionality.In later time, reader 104 is by unique identifier 210 and/or becomes Rate information 214 sends DPS 112 to.
Note, also (that is, be configured as in the lower work of both energy acquisition pattern and communication pattern together with multi-mode WAS 114 The WAS of work) motion sensor 120,122 is used together.Motion sensor 120,122 is used to determine this person 116 in accessing points Direction and/or speed/rate near 102.By motion sensor 120,122 by point out this person direct of travel and/or speed/ The information of speed is supplied to reader 104.
At DPS 112, determine whether this person is authorized to restricted area and/or base based on unique identifier 210 Determine that this person is just seeking entry into restricted area and still leaving restricted area in rate of change information 214.If this person just attempting into Enter restricted area and be not authorized to access restricted area, then DPS 112 simply records instruction this person in the specific time Information near accessing points.By contrast, if this person is just seeking entry into restricted area and is being authorized to restricted area Domain, then DPS 112 make on recognizing and the request of positional information is sent to the PCD 150 that this person is possessed.
In response to the request, PCD 150 performs operation to determine its current location in surrounding environment.In some situations Under, PCD current location is determined using the technology based on RSSI.Technology based on RSSI is wireless including the use of PCD Wi-Fi Electricity detects the MAC Address of all available networks in the range of.It has collected the MAC Address of all available networks and RSSI water After flat, MAC Address and RSSI information relay forwarding are gone back to high in the clouds 154 by PCD 150 via wireless communication link 152.Then, cloud Estimate PCD's 150 based on the MAC Address of each equipment associated with MAC Address, RSSI levels and known location in end 154 Position.Learning algorithm can be used to be associated between two kinds of listed information.
In the case where PCD 150 estimated location is located within the former monitoring door certain radius of distance, high in the clouds 154 will be opened Command auto repeat is transmitted to door so that enabling actuator 128 is activated (for example, for unlocking lock).In order to reduce scanning WAS with Door open between delay, PCD 150 constantly detection Wi-Fi network and make detection data when PCD 150 receives request Through being ready to.High in the clouds 154 and/or DPS 112, which are also recorded, points out that the access rights of restricted area are provided in the specific time The information of this person.
In this case, reader 104 is only the edge link block for controlling enabling actuator.As a result, to inquiry The demand of reader (for example, RFID reader) is eliminated, and thus reduces the totle drilling cost needed for the system of realization 100.
With reference now to Fig. 3 A-3B, there is provided the flow of the illustrative methods 300 for controlling the access to restricted area Figure.As shown in Figure 3A, method 300 is since step 302, and proceeds step 304, in step 304, by ACS (for example, Fig. 1 ACS 100) reader (for example, Fig. 1 reader 104) send request signal.In response to request signal, by WAS (for example, Fig. 1 WAS 114) sends SRC answer signals, as shown at step 306.SRC answer signals include unique identifier (example Such as, Fig. 2 unique identifier 210).In next step 308, in the antenna coupled with reader (for example, Fig. 1 antenna 106 or 108) place receive SRC answer signals.
At reader, operation is performed to obtain and points out the power present in SRC answer signals within the given period Rssi measurement data, as indicated in step 310.Rssi measurement data are used for determining that the signal of SRC response messages is strong by reader Whether degree is in increase.Note, alternatively, can be determined by DPS (for example, Fig. 1 DPS 112) to perform this.In such case Under, can correspondingly amending method 300.Such change is that those skilled in the art are understood.
If the signal intensity of SRC answer signals is reducing [312:It is no], then step 314 is performed, it is in a step 314, raw The first information just advanced into instruction WAS away from antenna.If on the contrary, the signal intensity of SRC answer signals is in increase [312: It is], then step 316 is performed, in step 316, generation indicates the second information that WAS is just advancing towards antenna.
When completing step 314 or 316, method 300 proceeds step 318.Step 318 wears WAS including detection People (for example, Fig. 1 people 116) motion direction and/or speed/rate.In step 318, one or more motions are passed Sensor (for example, Fig. 1 sensor 120 and/or 122) can be used for the detection.Hereafter, in step 320, it is indicated that detection To the direction of motion of this person and/or the 3rd information of speed/rate be transmitted to reader.Then, the reader will be following Information transmission is to DPS:Unique identifier;Timestamp;The first information;Second information;And/or the 3rd information, such as step 322 institute Show.
At DPS, operation is performed in step 324, and this person is determined using the information received in step 322 previous Whether just attempting to enter or leave restricted area.If for example, the information that is received indicate WAS just towards entrance antenna (for example, Fig. 1 antenna 108) advance and this person's (for example, Fig. 1 direction 124) movement just in the first direction, it is determined that this person wants warp Enter restricted area by accessing points (for example, Fig. 1 accessing points 102).If on the contrary, the information received indicates the positive courts of WAS Exit antenna (for example, Fig. 1 antenna 106) traveling and this person is along with first party in the opposite direction (for example, Fig. 1 Direction 126) it is mobile, it is determined that this person wants to leave restricted area via accessing points.If the information received is indicating WAS just Advanced away from entrance antenna, it is determined that this person is not intended to enter restricted area.Similarly, if the information received is indicated WAS just advances away from exit antenna, it is determined that this person is not intended to leave restricted area.The present invention is not limited to these realities The details of example.In this respect, it will be appreciated that additionally or alternatively, DPS also analyzes the motion mould limited by the information received Formula, to determine whether this person wants to enter into or leave accessing points.
After step 324 is completed, method 300 proceeds Fig. 3 B judgment step 326.If it is determined that this person is not desired to Into or leave restricted area [326:It is no], then step 328 is performed, wherein following information is recorded in data storage:Uniquely Identifier;Timestamp;First or second information;3rd information;And/or indicate the knot of operation performed in step 324 before The 4th information of fruit.Then, step 350 is performed, wherein method 300 terminates or performed other processing.
If it is determined that this person wants to enter into or left restricted area [326 really:It is], then perform optional step 332.When this When people just seeks entry into restricted area, optional step 332 is performed, therefore, optional step 332 is included unique identifier and storage It is compared in multiple unique identifiers in data storage, enters restricted area to check whether this person is authorized to.Work as someone Just trying to exit from restricted area or when authorized person just seeks entry into restricted area, DPS makes on identification and positional information Request be sent to the PCD (for example, Fig. 1 PCD 150) that this person is possessed, as shown in step 334.
In response to the request, in step 336, PCD performs operation and can be used for determining it in surrounding environment to obtain The information of current location.In some cases, PCD current location is determined using the technology based on RSSI.Based on RSSI's Technology detects the MAC Address of all available networks in the range of including the use of PCD Wi-Fi radio.Have collected Have after the MAC Address and RSSI levels of available network, PCD is via wireless communication link (for example, Fig. 1 wireless communication link 152) MAC Address and RSSI information relay forwarding are gone back into high in the clouds (for example, Fig. 1 high in the clouds 154), as shown in step 338.Then, High in the clouds performs operation to estimate PCD position in step 340.Location estimation can be based on associated with MAC Address each MAC Address, RSSI levels and the known location of equipment is determined.Learning algorithm can be used to come two kinds of listed It is associated between information.
In the case where PCD estimated location is located within the certain radius of the former monitoring door of distance, high in the clouds will be opened and be ordered Relay forwarding is to door so that enabling actuator (for example, Fig. 1 actuator 128) activated (for example, for unlocking lock), such as step Shown in rapid 342.When completing step 342, perform step 344-346 to record following information:Unique identifier;Timestamp;The One or second information;3rd information;4th information;And/or indicate that this person enters or left restricted area in the specific time 5th information.The information recorded can alternatively be used to the movement that execution passes through facility on this person in step 348 Historical analysis.Hereafter, step 350 is performed, wherein method 300 terminates or performed other processing.
With reference now to Fig. 4 A-4B, there is provided another illustrative methods 400 for controlling the access to restricted area Flow chart.As shown in Figure 4 A, method 400 is since step 402, and proceeds step 404, wherein WAS (for example, Fig. 1 WAS 114) energy acquisition circuit (for example, Fig. 2 circuit 220) collect energy.Then, collected energy is stored in In WAS energy storage device (for example, Fig. 2 equipment 222).When energy storage device is charged to WAS SRC equipment (for example, Fig. 2 SRC equipment 212) operational voltage level [408:It is] when, step 410 is performed, wherein WAS is from its energy acquisition Mode change Its communication pattern.Under its communication pattern, step 412 is performed.Step 412 includes sending SRC identifier signals by WAS.SRC is marked Know the first information that symbol signal includes unique identifier and/or indicates the rate of change of the charging voltage of energy storage device.Then, in step In rapid 414, SRC identifier signals are received at antenna (for example, Fig. 1 antenna 106 or 108) place coupled with reader.
In next step 416, direction and/or the speed/rate of the motion of WAS people are worn in detection.In step 416 In, one or more motion sensors (for example, Fig. 1 sensor 120 and/or 122) can be used to carry out the detection.This Afterwards, in step 418, it is indicated that the direction of the motion of this person detected and/or the second information of speed/rate are sent to reading Take device.Then, the reader by following information transmission to DPS:Unique identifier;Timestamp;The first information;And/or second letter Breath, as shown at step 420.After step 420 is completed, method 400 proceeds Fig. 4 B step 422.
At DPS, operation is performed in step 422, and this person is determined using the information received in step 420 previous Whether just attempting to enter or leave restricted area.If for example, the information received indicates that WAS just advances towards entrance antenna (for example, Fig. 1 antenna 108) and this person just move along the first direction in (for example, Fig. 1 direction 124), it is determined that this person wants Enter restricted area via accessing points (for example, Fig. 1 accessing points 102).If on the contrary, the information received is indicating WAS just Advanced towards exit antenna (for example, Fig. 1 antenna 106) and this person is along with first party in the opposite direction (for example, figure 1 direction 126) it is mobile, it is determined that and this person wants to leave restricted area via accessing points.If the information received indicates WAS Just advanced away from entrance antenna, it is determined that this person is not intended to enter restricted area.Similarly, if the information received is indicated WAS just advances away from exit antenna, it is determined that this person is not intended to leave restricted area.The present invention is not limited to these examples Details.In this respect, it will be appreciated that additionally or alternatively, DPS also analyzes the motor pattern limited by the information received To determine whether this person wants to enter into or leave accessing points.
After step 422 is completed, method 400 proceeds Fig. 4 B judgment step 424.If it is determined that this person is not desired to Into or leave restricted area [424:It is no], then step 426 is performed, wherein following information is recorded in data storage:Uniquely Identifier;Timestamp;The first information;Second information;And/or the 3rd of the result of the operation performed before indicating in step 422 Information.Then, step 444 is performed, wherein method 400 terminates or performed other processing.
If it is determined that this person wants to enter into or left restricted area [424 really:It is], then perform optional step 427.When this When people just seeks entry into restricted area, optional step 427 is performed, therefore, optional step 427 is included unique identifier and storage It is compared in multiple unique identifiers in data storage and enters restricted area to check whether this person is authorized to.When someone just Try to exit from restricted area or when authorized person just seeks entry into restricted area, DPS makes on recognizing and positional information Request is sent to the PCD (for example, Fig. 1 PCD 150) that this person is possessed, as seen in step 428.
In response to the request, in step 430, PCD performs operation and can be used for determining it in surrounding environment to obtain The information of current location.In some cases, PCD current location is determined using the technology based on RSSI.Based on RSSI's Technology detects the MAC Address of all available networks in the range of including the use of PCD Wi-Fi radio.Have collected Have after the MAC Address and RSSI levels of available network, PCD is via wireless communication link (for example, Fig. 1 wireless communication link 152) MAC Address and RSSI information relay forwarding are gone back into high in the clouds (for example, Fig. 1 high in the clouds 154), as shown in step 432.Then, High in the clouds performs operation to estimate PCD position in step 434.Location estimation can be based on associated with MAC Address each MAC Address, RSSI levels and the known location of equipment is determined.Learning algorithm can be used to come two kinds of listed It is associated between information.
In the case where PCD estimated location is located within the former monitoring door certain radius of distance, high in the clouds will be opened in order After being transmitted to door so that enabling actuator (for example, Fig. 1 actuator 128) activated (for example, for unlock lock), such as step Shown in 434.When completing step 434, perform step 436-440 to record following information:Unique identifier;Timestamp;First Information;Second information;3rd information;And/or indicate that this person enters or left the 4th information of restricted area in the specific time. The information recorded can be optionally in step 442, to perform the historical analysis for the movement for passing through facility on this person.This Afterwards, step 444 is performed, wherein method 400 terminates or performed other processing.
In addition, in some cases, when wearer is just standing near the accessing points of restricted area, WAS may be detected not To rate of change.For example it is assumed that someone advances towards accessing points, thus WAS detects the energy collected by its energy acquisition circuit Rate of change.When this person reaches accessing points, his (she) is prevented to discuss by another person.Now, WAS can't detect by it The rate of change for the energy that energy acquisition circuit is collected.In response to such detection, WAS will indicate that energy acquisition circuit collects energy Speed send reader (for example, Fig. 1 reader 104) to currently without the signal of change.And then, reader performs operation To terminate the electromagnetic field emissions of entrance antenna (for example, Fig. 1 antenna 108).Expired in predetermined time period (for example, 2 minutes) When, electromagnetic field is launched again.In this way, this person still can access limit after the discussion with another person is finished Region processed.
The Exemplary mathematical algorithm for being used for estimating positions of the PCD in building is explained in following discussion.Taken place frequently for height Emitter and receiver antenna, famous Friis conveying types given below.This assumes free space environment and is receiving and launching There is no polarization loss between antenna, hold PCD people not from PCD absorption signals yet.
Wherein Pr is received power (PCD), and Pt is transmitter power (Wi-Fi antenna), and Gt is that emitter antenna increases Benefit, Gr is receiver gain, and R is the distance between transmitting and reception antenna (vector), and f is working frequency, and c is light Speed.Both sides, which are taken the logarithm, produces following mathematical expression.
Wherein Pr and Pt unit is that dBm, Gt and Gr unit are dB, and λ unit is rice, and R unit is rice.
Fig. 6 provides the schematic diagram for the symmetric array for showing the individual Wi-Fi transmitting antennas 602,604,606,608 in four (4).Hair Antenna 602-608 is penetrated to be installed on the ceiling of building on (for example, above floor at about 4 meters).It also show PCD (examples Such as, about 1 meter of place above floor) three paths 1,2,3 that move.PCD along symmetrical path 1 and asymmetric path 2, 3 advance.Coordinate origin is shown at the center of antenna.
In figure 6, grid or step size are (1) rice.The step-length of (1) rice is defined as per paths.It is assumed that hair Antenna Pt is penetrated for 28 (28) dBm, transmitter antenna gain (dBi) Gt is five (5) dB, receiver antenna gain G r is minus two (- 2) dB, And frequency f is two points four (2.4) GHz.
Fig. 7 provides the curve map for the simulation result for showing symmetric path 1, and PCD is along aerial system in the plot The center line of system is travelled downwardly.As is expected, one group of very symmetrical curve is intersecting at center, and PCD is sitting at day in this place The centre of linear system system.It is symmetrical to the 602/608 power mirror face received to 604/606 and antenna from antenna.
Fig. 8 provides the curve map for the simulation result for showing symmetric path 2.Path 2 is downward since center line, but It is along the path between antenna 604 and antenna 602 that (cut over) is changed at 8 meters.Path 2 is apart from the ratio of antenna 604 apart from day 602 nearly 2 meters of line.Start off center line towards antenna 604 and antenna 602 close to (but closer to antenna 604 up to 2 meters) in PCD At 8th step-length, signal about high 1dBm after next step-length.So corresponding to the He of antenna 604 along 2 meters of step-lengths of dispersal point The signal intensity of 2.5dBm between 606.
Fig. 9 provides the curve map for the simulation result for showing symmetric path 3.Path 3 is another symmetric path, on the road PCD and centerline parallel are advanced but closer to antenna 604 up to 2 meters, then departed from footpath, towards antenna 606,608 (but more Close to antenna 608 up to 2 meters).
The use of the simple linear interpolation method of the difference of four aerial signals is along primarily examining during known paths estimated location Consider.Estimated position P (x, y) can be represented by following mathematical expression.
P (x, y)=C1 (STx3-STx2)ax+C2(STx4-STx1)ax+C3(STx1-STx2)ay+C4(STx4-STx3)ay
Wherein C1, C2, C3 and C4 are coefficient, STx1To STx4For signal intensity, and axAnd ayIt is x and y unit vector. Above mathematical expression can be represented in linear matrix form, as follows.
Coefficient is determined using one or more paths, and uses simplified C1=C2 and C3=C4, it can be seen that prediction Path P (x, y) can be arrived precisely less than 1 meter.
All devices disclosed herein and prescription, method and algorithm can realize and perform according to the disclosure, Without excessively testing.Although according to preferred embodiment, invention has been described, those skilled in the art should , can be to the order of device, method and method and step in the case where not departing from the design of the present invention, spirit and scope when clear Carry out various changes.More specifically, it should be clear that some components may be added to, be attached to or be alternative in described herein Component, while identical or similar result can be obtained.It is all such clearly similar to be replaced for those skilled in the art Generation and modification are considered to belong to the spirit of the invention limited, within scope and spirit.
Feature disclosed above and function and alternative solution can be incorporated into many other different systems or should In.Those skilled in the art can carry out can not predicting at present or unexpected various substitute, change, change or change Enter, each be also intended to during these substitute, change, change or improved is covered by disclosed embodiment.

Claims (20)

1. a kind of method for being used to control the access to restricted area, including:
Determine whether that someone wants to enter into the restricted area by electronic circuit;
First unique identifier associated using the wearable access sensors WAS with being worn by the people checks the people Whether it is authorized to and enters the restricted area;
When it is determined that the people is authorized into the restricted area, the portable communication device PCD of the people is set to send second Unique identifier and available for the positional information for determining positions of the PCD in surrounding environment;
Confirm that the people is currently located at the accessing points of the restricted area using second unique identifier and positional information; And
When it is determined that the people wants to enter into the restricted area, the people, which is authorized to, enters the restricted area, and the people When being currently located at the accessing points of the restricted area, mechanical actuator is set to activate so that the people enters the limitation In region.
2. according to the method described in claim 1, wherein being connect based on the wearable access sensors WAS for pointing out to wear from the people The received signal strength indicator device rssi measurement data of power present in the signal of receipts determine whether the people wants to enter into The restricted area.
3. according to the method described in claim 1, wherein electric in the energy of electromagnetic field collection being arranged in the WAS based on pointing out The rate of change data of the rate of change of the charging voltage of the energy storage device used in road determine that it is described whether the people wants to enter into Restricted area.
4. according to the method described in claim 1, wherein using the skill based on received signal strength indicator device RSSI by the PCD Art obtains the positional information.
5. method according to claim 4, wherein the technology based on RSSI includes:
Perform operation to detect the medium access control MAC Address of the available network in the range of it by the PCD;And
Collect the RSSI levels of the signal received from the equipment associated with the MAC Address of the available network.
6. method according to claim 5, wherein RSSI levels and related to the MAC Address of the available network The known location of the equipment of connection is used to confirm that whether the people is currently located at the accessing points of the restricted area.
7. according to the method described in claim 1, in addition to determine whether the PCD is located at apart from described in the restricted area Within accessing points certain radius.
8. method according to claim 7, wherein when it is determined that the PCD is located at the access apart from the restricted area When within point certain radius, activate the mechanical actuator.
The people is indicated 9. according to the method described in claim 1, being additionally included in and the mechanical actuator is recorded after activating Enter the information of the restricted area in the specific time.
10. according to the method described in claim 1, in addition to by the WAS energy acquisition circuit from by be arranged in one or Energy is collected in the electromagnetic field of the access control equipment transmitting of the accessing points of multiple restricted areas.
11. a kind of system, including:
The wearable access sensors WAS worn by people;
The portable communication device PCD that the people possesses;
At least one electronic circuit communicated with least one in the WAS and the PCD, wherein the electronic circuit by with It is set to
Determine whether the people wants to enter into the restricted area,
First unique identifier associated using the WAS with being worn by the people check the people whether be authorized into Enter the restricted area;
When it is determined that the people is authorized into the restricted area, the PCD is set to send the second unique identifier and available In it is determined that the positional information of positions of the PCD in surrounding environment;
Confirm that the people is currently located at the accessing points of the restricted area using second unique identifier and positional information; And
Mechanical actuator, when it is determined that the people wants to enter into the restricted area, the people, which is authorized to, enters the restricted area, And when the people is currently located at the accessing points of the restricted area, the mechanical actuator is activated so that people's energy Enough enter the restricted area.
12. system according to claim 11, wherein whether wanting to enter into the determination of the restricted area on the people It is the reception signal based on power present in the signal for pointing out to receive from the wearable access sensors WAS worn by the people Volume indicator rssi measurement data are made.
13. system according to claim 11, wherein whether wanting to enter into the determination of the restricted area on the people It is the change of the charging voltage based on the energy storage device for pointing out to use in the energy of electromagnetic field Acquisition Circuit being arranged in the WAS What the rate of change data of rate were made.
14. system according to claim 11, wherein the positional information is strong using reception signal is based on by the PCD Spend indicator RSSI technology acquisition.
15. system according to claim 14, wherein the technology based on RSSI includes:
Perform operation to detect the medium access control MAC Address of the available network in the range of it by the PCD;And
Collect the RSSI levels of the signal received from the equipment associated with the MAC Address of the available network.
16. system according to claim 15, wherein the RSSI levels and the MAC Address phase with the available network The known location of the equipment of association is used to confirm that the people is currently located at the accessing points of the restricted area.
17. system according to claim 11, wherein the electronic circuit is additionally configured to determine that the PCD is located at distance Within the accessing points certain radius of the restricted area.
18. system according to claim 17, wherein when it is determined that the PCD is located at the visit apart from the restricted area When asking within a certain radius, the mechanical actuator is caught actuating.
19. system according to claim 11, wherein the electronic circuit is additionally configured in the mechanical actuator quilt So that record indicates that the people enters the information of the restricted area in the specific time after actuating.
20. system according to claim 11, wherein the WAS is included from by being arranged in one or more restricted areas The energy acquisition circuit of energy is collected in the electromagnetic field of the access control equipment transmitting of accessing points.
CN201580075132.3A 2014-12-02 2015-12-02 Double-layer personnel identification and positioning system Active CN107209964B (en)

Applications Claiming Priority (7)

Application Number Priority Date Filing Date Title
US201462086241P 2014-12-02 2014-12-02
US62/086,241 2014-12-02
US14/558,796 2014-12-03
US14/558,796 US9384607B1 (en) 2014-12-03 2014-12-03 Access control system
US201562205953P 2015-08-17 2015-08-17
US62/205,953 2015-08-17
PCT/US2015/063542 WO2016090053A1 (en) 2014-12-02 2015-12-02 Dual level human identification and location system

Publications (2)

Publication Number Publication Date
CN107209964A true CN107209964A (en) 2017-09-26
CN107209964B CN107209964B (en) 2021-05-11

Family

ID=55066770

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201580075132.3A Active CN107209964B (en) 2014-12-02 2015-12-02 Double-layer personnel identification and positioning system

Country Status (6)

Country Link
EP (1) EP3227870A1 (en)
KR (1) KR102517260B1 (en)
CN (1) CN107209964B (en)
AU (1) AU2015358535B2 (en)
CA (1) CA2972429C (en)
WO (1) WO2016090053A1 (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107845172A (en) * 2017-11-14 2018-03-27 南京物联传感技术有限公司 A kind of smart lock security system and method for work with autonomous classification ability
CN111316335A (en) * 2017-10-11 2020-06-19 米尔鲍尔有限两合公司 System for monitoring a person

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
KR102169842B1 (en) * 2019-11-27 2020-10-27 영남대학교 산학협력단 Method for measuring indoor position, apparatus and system for executing the method

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1682005A (en) * 2002-07-13 2005-10-12 罗格·烘伯 Autorisations, regulation, characterisation, localisation, locking and theft security system (here also referred to as lock-loop DSS)
US20080143478A1 (en) * 2006-12-19 2008-06-19 Denso Corporation Mobile unit and electronic key system using the same
EP2068535A1 (en) * 2006-09-28 2009-06-10 Panasonic Corporation Portable telephone and access control method
CN101499183A (en) * 2008-02-03 2009-08-05 张明哲 Control system, apparatus and method
CN102542644A (en) * 2010-12-17 2012-07-04 株式会社东海理化电机制作所 Electronic key system and electronic key
US20140049361A1 (en) * 2012-08-16 2014-02-20 Schlage Lock Company Llc Wireless reader system

Family Cites Families (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7284125B2 (en) * 2000-03-23 2007-10-16 Tietech Co. Ltd. Method and apparatus for personal identification
JP2002149600A (en) * 2000-11-08 2002-05-24 Sony Corp Information processor, processing method, recording medium and service providing system
WO2006090476A1 (en) * 2005-02-25 2006-08-31 Super Wave Co., Ltd. Wireless authentication method and wireless authentication system
CA2647194C (en) * 2006-03-20 2016-08-16 Gerald R. Black Mobile communication device
US20130278382A1 (en) * 2007-07-27 2013-10-24 Lucomm Technologies, Inc. Systems and methods for object localization and path identification based on rfid sensing
US9311586B2 (en) * 2011-03-22 2016-04-12 Jamie Robinette Apparatus and method for locating, tracking, controlling and recognizing tagged objects using active RFID technology
US20140085050A1 (en) * 2012-09-25 2014-03-27 Aliphcom Validation of biometric identification used to authenticate identity of a user of wearable sensors
JP6107267B2 (en) * 2013-03-18 2017-04-05 株式会社日本自動車部品総合研究所 Vehicle system, in-vehicle device, and portable device

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1682005A (en) * 2002-07-13 2005-10-12 罗格·烘伯 Autorisations, regulation, characterisation, localisation, locking and theft security system (here also referred to as lock-loop DSS)
EP2068535A1 (en) * 2006-09-28 2009-06-10 Panasonic Corporation Portable telephone and access control method
US20080143478A1 (en) * 2006-12-19 2008-06-19 Denso Corporation Mobile unit and electronic key system using the same
CN101499183A (en) * 2008-02-03 2009-08-05 张明哲 Control system, apparatus and method
CN102542644A (en) * 2010-12-17 2012-07-04 株式会社东海理化电机制作所 Electronic key system and electronic key
US20140049361A1 (en) * 2012-08-16 2014-02-20 Schlage Lock Company Llc Wireless reader system

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111316335A (en) * 2017-10-11 2020-06-19 米尔鲍尔有限两合公司 System for monitoring a person
CN107845172A (en) * 2017-11-14 2018-03-27 南京物联传感技术有限公司 A kind of smart lock security system and method for work with autonomous classification ability

Also Published As

Publication number Publication date
KR20170102254A (en) 2017-09-08
AU2015358535B2 (en) 2020-06-18
CA2972429C (en) 2023-03-28
CN107209964B (en) 2021-05-11
KR102517260B1 (en) 2023-03-31
CA2972429A1 (en) 2016-06-09
WO2016090053A1 (en) 2016-06-09
EP3227870A1 (en) 2017-10-11
AU2015358535A1 (en) 2017-07-13

Similar Documents

Publication Publication Date Title
US9384608B2 (en) Dual level human identification and location system
US20220335759A1 (en) Method and system for managing door access using beacon signal
EP3147686B1 (en) Systems and methods for object localization and path identification based on rfid sensing
EP2888725B1 (en) A monitoring system
US10192373B1 (en) Tag identification systems and methods
US9384607B1 (en) Access control system
US11531082B2 (en) Device location network
CN109983511A (en) Lock is controlled based on the position of activation signal and portable key device
WO2018170493A1 (en) Precise positioning system and method of using the same
CN101027700A (en) Method and apparatus for detection and tracking of objects within a defined area
CN103491627B (en) A kind of closely real-time accurate positioning method of integrated many algorithms
Komai et al. Elderly person monitoring in day care center using Bluetooth Low Energy
CN110022530B (en) Wireless positioning method and system for underground space
US20180174433A1 (en) Method and apparatus for creating security and control system tracking immunity
CN107209964A (en) Double-deck personal identification and alignment system
DE102010043394A1 (en) Mobile device and infrastructure system
WO2019209670A1 (en) System and method for seamless access & intent identification using mobile phones
EP3784986B1 (en) Systems and methods for trajectory prediction to enable seamless access using mobile devices
US20210152980A1 (en) Destination identification for frictionless building interaction
KR101959849B1 (en) Smart phones access control and smart phones access information management and reporting system using Social Network Service
US20210314728A1 (en) Methods for learning deployment environment specific features for seamless access
CA3100660A1 (en) Method for commissioning system for door identification using location fingerprinting
CN108917771A (en) A kind of indoor navigation system for fire-fighting first aid
Li et al. An effective tracking system based on Wi-Fi trajectory matching
US11470445B2 (en) Methods for access latency reduction through phone pre-connection based on user location

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
REG Reference to a national code

Ref country code: HK

Ref legal event code: DE

Ref document number: 1242033

Country of ref document: HK

TA01 Transfer of patent application right
TA01 Transfer of patent application right

Effective date of registration: 20210407

Address after: Florida, USA

Applicant after: SENSORMATIC ELECTRONICS, LLC

Address before: Switzerland Rhine falls Neuhausen

Applicant before: Tyco Fire and Safety Co.,Ltd.

GR01 Patent grant
GR01 Patent grant