CN107209964A - Double-deck personal identification and alignment system - Google Patents
Double-deck personal identification and alignment system Download PDFInfo
- Publication number
- CN107209964A CN107209964A CN201580075132.3A CN201580075132A CN107209964A CN 107209964 A CN107209964 A CN 107209964A CN 201580075132 A CN201580075132 A CN 201580075132A CN 107209964 A CN107209964 A CN 107209964A
- Authority
- CN
- China
- Prior art keywords
- restricted area
- people
- pcd
- enter
- person
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Classifications
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07C—TIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
- G07C9/00—Individual registration on entry or exit
- G07C9/20—Individual registration on entry or exit involving the use of a pass
- G07C9/29—Individual registration on entry or exit involving the use of a pass the pass containing active electronic elements, e.g. smartcards
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07C—TIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
- G07C9/00—Individual registration on entry or exit
- G07C9/20—Individual registration on entry or exit involving the use of a pass
- G07C9/28—Individual registration on entry or exit involving the use of a pass the pass enabling tracking or indicating presence
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07C—TIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
- G07C9/00—Individual registration on entry or exit
- G07C9/00174—Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
- G07C2009/00579—Power supply for the keyless data carrier
- G07C2009/00603—Power supply for the keyless data carrier by power transmission from lock
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07C—TIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
- G07C2209/00—Indexing scheme relating to groups G07C9/00 - G07C9/38
- G07C2209/14—With a sequence of inputs of different identification information
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07C—TIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
- G07C2209/00—Indexing scheme relating to groups G07C9/00 - G07C9/38
- G07C2209/60—Indexing scheme relating to groups G07C9/00174 - G07C9/00944
- G07C2209/63—Comprising locating means for detecting the position of the data carrier, i.e. within the vehicle or within a certain distance from the vehicle
Landscapes
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Lock And Its Accessories (AREA)
- Mobile Radio Communication Systems (AREA)
- Time Recorders, Dirve Recorders, Access Control (AREA)
Abstract
System and method for controlling the access to restricted area (" RA ").Methods described includes:Determine whether that someone wants to enter into RA:Check whether this person is authorized to using the first unique identifier associated with the wearable access sensors that it is worn and enter RA;When it is determined that this person is authorized into RA, the portable communication device (" PCD ") of this person is set to send the second unique identifier and available for the positional information for determining positions of the PCD in surrounding environment;Confirm that this person is currently located at RA accessing points using the second unique identifier and positional information;And when it is determined that this person want to enter into RA, this person be authorized to enter RA and this person and be currently located at RA accessing points when, make mechanical actuator actuating enable the individual to enter RA.
Description
Technical field
Access control system (" ACS ") is related generally to herein.More particularly, present document relates to double-deck (dual level) people
Member's identification and alignment system.
Background technology
There are many known ACS in the art.A kind of such ACS includes being installed on restricted area (restricted
Areas outlet) and/or multiple access control readers (" ACR ") of porch.For example, ACR can be arranged in by it
It can enter near the doorway in limitation room.The badge that personnel are worn is used to be approved to enter limitation room via ACR.In this side
Face, badge is included and is disposed thereon or low frequency (" LF ") passive radio frequency identification (" RFID ") communication equipment in it.Typically, LF
Passive RFID communication equipment is worked with 125kHz frequency.ACR is that detection range is about 5cm or smaller near-field devices.
In whole preset time section, ACS is followed the trail of to fix the number of workers in order to which which entrance entrance restricted area has passed through.But, ACS is not followed the trail of
When personnel leave each accessed restricted area within the given period.
Another conventional ACS uses the beacon and Wireless Telecom Equipment (example via bluetooth (Bluetooth) technical communication
Such as, mobile phone).Personal identifier is stored on Wireless Telecom Equipment, and when this person is near beacon and beacon communication.
In response to receiving personal identifier, ACS will allow this person to enter restricted area.
The content of the invention
This disclosure relates to the system and method for controlling the access to restricted area.Method include by electronic circuit come
Determine whether that someone wants to enter into restricted area.In some cases, the wearable access sensing worn from people is pointed out based on (a)
Received signal strength indicator device (" RSSI ") measurement data of power present in the signal that device (" WAS ") is received, and/or (b)
Point out to be arranged in the rate of change of the rate of change of the charging voltage of the energy storage device used in the energy of electromagnetic field Acquisition Circuit in WAS
Data make the determination.After such determine is made, this is checked using first unique identifier associated with WAS
Whether people, which is authorized to, enters restricted area.
When it is determined that this person is authorized into restricted area, the portable communication device (" PCD ") of this person is set to send second
Unique identifier and available for the positional information for determining positions of the PCD in surrounding environment.In some cases, made by PCD
Positional information is obtained with the technology based on RSSI.RSSI technologies include:Detection (survey) is performed in the range of it by PCD
The operation of medium access control (" MAC ") address of available network;And collect from associated with the MAC Address of available network
The RSSI levels for the signal that equipment is received.The RSSI levels and known location of the equipment associated with the MAC Address of available network
It is used to confirm that this person is currently located at the accessing points of restricted area.
Second unique identifier and positional information are used to confirm that this person is currently located at the accessing points of restricted area.It is determined that
This person wants to enter into restricted area, this person and is authorized to the accessing points that restricted area is currently located at into restricted area and/or this person
When, mechanical actuator activated to enable the individual to enter in restricted area.
In some cases, this method also includes the accessing points certain radius for determining whether PCD is located at apart from restricted area
Within.When it is determined that PCD is located within the accessing points certain radius of restricted area, activate mechanical actuator.Additionally
Or alternatively, this method be included in make mechanical actuator activate after record indicate this person enter restricted area in the specific time
Information.
Brief description of the drawings
Embodiment will be described with reference to the following drawings, wherein, similar reference represents similar in all of the figs
, and wherein:
Fig. 1 is exemplary ACS perspective view.
Fig. 2 is the block diagram of Fig. 1 WAS exemplary architecture.
Fig. 3 A-3B (being referred to as " Fig. 3 ") provide the flow chart of the illustrative methods for controlling the access to restricted area.
Fig. 4 A-4B (being referred to as " Fig. 4 ") provide another illustrative methods for controlling the access to restricted area
Flow chart.
Fig. 5 is to show to be carried out by energy acquisition equipment when energy acquisition equipment moves closer to the accessing points of restricted area
The image of energy acquisition.
Fig. 6 is the schematic diagram of the path of four antenna systems and three definition.
Fig. 7 is the curve map for being showing along the power that the first path is received from four antennas.
Fig. 8 is the curve map for being showing along the power that alternate path is received from four antennas.
Fig. 9 is the curve map for being showing along the power that third path is received from four antennas.
Embodiment
It is readily appreciated that, the component generally described herein with the embodiment illustrated in accompanying drawing can be according to various
Difference configures to arrange and design.Thus, as illustrated, the more detailed description to various embodiments is not intended to limit below
The scope of the present disclosure, and the simply representative of various embodiments.It is attached although giving the various aspects of embodiment in the accompanying drawings
Figure is not necessarily drawn to scale, unless otherwise indicated.
In the case of the spirit or inner characteristic without departing substantially from the present invention, the present invention can come real in other specific forms
It is existing.Described embodiment should all be seen merely as illustrative and not restrictive in all respects.Therefore, model of the invention
Enclose and indicated by appended claims, rather than indicated by the embodiment.Belong to claim equivalent meaning and scope it
Interior all changes should all cover within the scope of it.
This specification is not meant as the institute that can be realized with the present invention to the reference of feature, advantage or similar language in the whole text
There are feature and advantage to be embraced within or should be included in any single embodiment of the present invention.On the contrary, referring to feature and advantage
Language should be understood to mean that:In conjunction with the embodiments described special characteristic, advantage or characteristic is included in the present invention
At least one embodiment in.Thus, this specification discussion in the whole text on feature and advantage and similar language can with but
Not necessarily refer to same embodiment.
Moreover, the present invention described feature, advantage and characteristic can be incorporated into any suitable form one or
In multiple embodiments.According to description herein, it should be appreciated by those skilled in the art that can be in no specific embodiment
Implement the present invention in the case of one or more special characteristics or advantage.In other cases, it can deposit in certain embodiments
Supplementary features and advantage in all embodiments that may not come across the present invention.
A kind of reference of this specification in the whole text to " embodiment ", " embodiment " or similar language is it is meant that combine signified
Special characteristic, structure or the characteristic for the embodiment description shown are included at least one embodiment of the present invention.Thus, whole
In this specification, phrase " in one embodiment ", " in embodiment " and similar language can with but might not be all
Refer to same embodiment.
As it is used herein, singulative "a", "an" and "the" includes plural reference, unless the context otherwise
It is explicitly indicated.Unless otherwise defined, otherwise implication and the people in the art of all technologies used herein and scientific terminology
The implication that member is generally understood is identical.As used herein, term " comprising " means " include, but are not limited to ".
Many and increasing people possesses smart phone and in workplace, school or there is Wi-Fi nets
Other environment of network facility carry with smart phone everywhere.Smart phone has what the name with the owner was directly associated
Identity, and may be used as reliable proof of identification.Wi-Fi network in building includes many routers.These routers
With known address, and its position is spatially distributed to allow whole building thing fully to be covered.
Software application allows smart phone to measure from the strong of the signal of each router reception in the range of smart phone
Degree or RSSI.Then, the information can be sent to high in the clouds.Beyond the clouds, RSSI information and router spatial positional information by with
Come position of the computational intelligence phone in building.Then, the position of smart phone is by directly network of the report to building.
During into building, once software application finds the Wi-Fi of building, it can just be activated.Hereafter, software application is based on pre-
Fixed time interval run location updates.When smart phone not movement (for example, based on phone motion sensor output information come
It is determined that) when, stop to update, until exercise recovery.
Copeland et al. U.S. Patent application No.14/558,796 (" ' 796 patent application ", this application, which passes through, to be quoted
It is incorporated herein) describe the access control system for using body wearable sensors and reader.Reader, which is used, comes from superelevation
Frequently received signal strength indicator (" the RSSI ") information of (" UHF ") RFID sensor or with transceiver radio communication and energy
The UHF energy acquisition sensors of amount collection electronic equipment.UHF methods allow the relatively long distance of sensor to detect, detecting distance allusion quotation
It is apart from 1-2 meters of interrogation antenna type.
Although ' 796 patent applications are the improvement to existing access control, it is still single credential security system
System.By the body WAS described in ' 796 patent applications is together with PCD unique identifiers (for example, MAC Address of cell phone) and sets
Current location in applying is used together, and double-deck identification and position system can be achieved.It can possess with two independent identifying devices
Than any one method all much higher safe coefficients.Can be weighed with adjustment algorithm each signal in itself or signal combination
Use.If for example, someone does not enter accessing points with PCD, but just adorning oneself with WAS and entering accessing points, then there is certain journey
The safety identification of degree.With both WAS and PCD (for example, smart phone or intelligent watch), then there is dual and much higher peace
Whole degree.
This disclosure relates in addition to applying at monitored inlet point except using the technology described in the patent application of ' 796
Also using it is personal company PCD confirm people identity second layer security system and method.In this respect, PCD, PCD are applied
And remote data base service (" high in the clouds ") be implanted in each system.Each user of system is required for:PCD applications are installed
In on the PCD of his (she);And using individual/company's voucher of his (she), so as to which the PCD of his (she) is registered in system.
From that time, PCD apply remained under certain meaning it is passive, i.e., unless received request, otherwise it will not back with high in the clouds
Communicate (for example, for purpose of energy-conservation).Alternately, in order to follow the trail of and record, PCD is periodically reported to high in the clouds.
During operation, high in the clouds is after identification/authentication operation based on WAS of ' 796 patent applications or simultaneously to PCD
Send on recognizing the request with positional information.In response to the request, PCD obtains the current location for pointing out it in safety zone
Information.The positional information can use at least one in following technology to obtain:Based on global positioning system (" GPS ")
Technology;Technology based on RSSI;And the technology based on beacon.Technology based on RSSI will be explained in.But, base
It is well known in the art, therefore no longer describes herein in the technology of GPS and beacon.Next, PCD by it only
One identifier (for example, MAC Address) and positional information are sent to high in the clouds.Beyond the clouds, the information is used to confirm that or verified user
Whether it is physically located at given exit/entry (second layer security).
Referring now to Figure 1, there is provided the exemplary ACS 100 for being arranged to control the access to restricted area.Such as Fig. 1
Shown, ACS 100 is generally configured to manage entrance and exit of the people by least one safety zone 118.In this side
Face, each safety zone will enter and leave via accessing points (such as doorway 102).Outlet and entrance antenna 106,108 are by cloth
Put on the preceding surface and rear surface of the same structure wall at accessing points 102 or on different structural walls.For example, entrance
Antenna 108 is arranged on the front side wall surface 130 of the structural wall 132 at neighbouring doorway 102.By contrast, exit antenna 106
On the dorsal part wall surface (not shown in Fig. 1) for the structural wall 134 being arranged at neighbouring doorway 102.Antenna 106,108 also with
Reader 104 is coupled in communication.The reader 104 is via network 110 (for example, Intranet and/or internet) and data processing system
System (" DPS ") 112 is coupled in communication.
WAS 114 is assigned to each individual for the restricted area for being authorized to commercial entity.WAS 114 includes can be with
The wearable communication equipment worn by its allocated people 116 given.As shown in figure 1, WAS 114 includes having internal sensor electricity
The wrist strap on road (not shown in Fig. 1).The present invention is not limited to this respect.WAS 114 can include any other type
Wearable items, for example, wrist-watch, necklace, cap or the deviation people on the person or on the clothing of people can be worn on
Clip article at the position of central shaft.In all cases, WAS 114 is easy to authorized person to enter by safety zone 118
Enter and leave.
The schematic diagram of the exemplary architecture of WAS 114 sensor circuit is provided in Fig. 2.As shown in Fig. 2 sensor is electric
Road includes being used for obtaining energy from external source to power to other electronic components 204,206,208,260 inside WAS 114
Energy acquisition circuit 220.From the equipment of the accessing points by being arranged in restricted area be transmitted into surrounding environment in electromagnetic field in receive
Collect energy.Energy is stored in energy storage device 222 (for example, capacitor), to treat that electronic component 204,206,208,260 is follow-up
Use.
Curve 502 is provided in Figure 5, and it is shown when people is constantly close to the accessing points of restricted area by energy acquisition electricity
The collection of energy that road 220 is carried out.Fig. 5 also includes curve 504, and it shows the power supply of the processor to WAS 114.When processor quilt
During power supply, WAS 114 starts to collect the data for the energy stores rate for pointing out energy storage device 222.
Referring again to Fig. 2, WAS 114 antenna 202 can include directional aerial, and directional aerial is arranged in WAS
114 point to the direction away from this human body when being worn by.Antenna 202 and junction service (" the SRC ") equipment for realizing SRC technologies
212 couplings.SRC technologies include but is not limited to RFID technique, and RFID technique is used when people and/or object are close to reader 104
It is identified radio frequency electromagnetic field.Therefore, SRC equipment 212 is via responding to the request signal that reader 104 is sent
SRC answer signals come promote unique identifier 210 arrive reader 104 transmission.Then, reader 104 and/or DPS 112 make
With unique identifier 210 whether restricted area is authorized to come automatic identification close to the people 116 of accessing points 102 and/or this person.
In accessing points 102, reader 104 determines the WAS 114 of transmitting SRC answer signals directionality.Based on to by day
The rssi measurement of power present in the SRC answer signals that line 106 or 108 is received from WAS 114 makes the determination.Rssi measurement
Point out the signal intensity of SRC answer signals received at antenna 106 or antenna 108, and the signal intensity is given
It is in increase or in reduction in period.If the signal intensity of SRC answer signals is increasing within the given period,
WAS 114 is considered as to be advanced towards corresponding antenna 106 or 108.If on the contrary, the signal intensity of SRC answer signals exists
Reducing in the given period, then WAS 114 is considered as away from corresponding antenna 106 or 108.
But, such determination e insufficient to detect that this person is attempt to restricted area to be entered and still leaves restricted area
Domain.Therefore, additional motion sensor 120,122 is additionally used herein.Motion sensor can be arranged at accessing points 102
Place.First motion sensor 122 is arranged on the front side wall surface 130 of the structural wall 132 at neighbouring accessing points 102.Compare
Under, the second motion sensor 120 is arranged in the dorsal part wall surface of the structural wall 134 at neighbouring accessing points 102 (in Fig. 1
It is not shown) on.Motion sensor 120,122 is used to determine direction and/or speed/speed of the people 116 near accessing points 102
Rate.Point out that the direct of travel of this person and/or the information of speed/rate are supplied to reader 104 from motion sensor 120,122.
Note, the present invention is not limited to the motion sensor configuration shown in Fig. 1.Additionally or alternatively, it is arranged at PCD
Motion sensor on (for example, mobile phone or smart phone) can be used to detect direction and/or the speed of the motion of people.
And then, reader 104 turns the information received from one or more motion sensors 120,122 via network 110
Issue DPS 112.Similarly, reader 104 by indicate WAS 114 directionality (that is, WAS 114 be just towards antenna 106 or
108 advance still just is advancing away from antenna 106 or 108) information transmission to DPS 112.DPS 112 can be with reader 104
In same facility, or it is located remotely from the different facilities for being wherein disposed with the facility of reader 104.Therefore, network 110
Intranet and/or internet can be included.In addition, each outlet of restricted area in each facility of commercial entity and/or
Entrance can have access control sensor-based system 104-108,120,122 being arranged in herein, to limit access control sensing
The distributed network of device system.
In DPS 112, information is used to determine whether people just seeks entry into or leave accessing points 102.If for example, information
Indicate that WAS 114 just advances towards entrance antenna 108 and people just moves along direction 124, it is determined that this person is wanted via accessing points
102 enter restricted area.If on the contrary, information indicates that WAS 114 just advances towards antenna 106 and people just moves along direction 126
It is dynamic, it is determined that this person wants to leave restricted area via accessing points 102.If information indicates WAS 114 just away from the row of antenna 108
Enter, it is determined that this person is not intended to enter restricted area.Similarly, if information indicates WAS 114 just away from the row of antenna 106
Enter, it is determined that this person is not intended to leave restricted area.
DPS 112 can also analyze the motor pattern limited by information, to determine that people is intended to enter accessing points 102 still
Want to leave accessing points 102.If for example, information indicate this person 116 be along in first time period direction 124,136 or
138 advance towards accessing points 102, and are then visited in the second time period followed by along direction 126,136 or 138 is remote
Ask and a little 102 advance, it is determined that this person is not desired to enter restricted area, simply by accessing points.If on the contrary, information indicates this person
116 are just advanced with First Speed in first time period along direction 124,136 or 138 towards accessing points 102, and then at him
Slow down when (she) is close to accessing points, it is determined that this person does want to enter restricted area.Similarly, if information indicates this person 116
Just advanced in first time period with First Speed along direction 124,136 or 138 towards accessing points 102 and when reaching accessing points
Stop, it is determined that this person does want to enter restricted area.
Once it is determined that this person is not desired to enter or leave restricted area, then DPS 112 is simply by unique identifier, directionality
Information, direction of motion information, speed/rate information, and/or the result of information analysis are recorded in data storage and (not shown in Fig. 1
Go out) in, with for later use.Once it is determined that this person does want to enter restricted area, then DPS 112 by unique identifier 210 with
The multiple unique identifiers being stored in data storage are compared, and enter restricted area to check whether this person is authorized to.Such as
Fruit this person, which is authorized to, enters restricted area, then DPS 112 makes to be sent to this person on identification and the request of positional information and gathered around
Some PCD 150.
In response to the request, PCD 150 performs operation to determine its current location in surrounding environment.In some situations
Under, the technology based on RSSI is used to determine PCD current location.Technology based on RSSI is wireless including the use of PCD Wi-Fi
Electricity detects the MAC Address of all available networks in the range of.It has collected the MAC Address of all available networks and RSSI water
After flat, MAC Address and RSSI information relay forwarding are gone back to high in the clouds 154 by PCD 150 via wireless communication link 152.Then, cloud
Estimate PCD's 150 based on the MAC Address of each equipment associated with MAC Address, RSSI levels and known location in end 154
Position.Learning algorithm can be used to be associated between two kinds of listed information.
In the case where PCD 150 estimated location is located within the former monitoring door certain radius of distance, high in the clouds 154 will be opened
Command auto repeat is transmitted to door to make enabling actuator 128 activated (for example, for unlocking lock).In order to reduce scanning WAS with
Door open between delay, PCD 150 constantly detection Wi-Fi network and make detection data when PCD 150 receives request
Through being ready to.
High in the clouds 154 and/or DPS 112 go back the result of record information analysis and/or point out that the access rights of restricted area exist
The specific time is provided to the information of this person.Once it is determined that this person wants to leave restricted area, then DPS 112 activates enabling
Device 128 is activated, and is gone back the result of record information analysis and/or pointed out that this person leaves the letter of restricted area in the specific time
Breath.
Data record allow the accessing points that high in the clouds 154 and/or the trackers of DPS 112 enter and leave and the entrance and from
The time opened.Due to a variety of causes, the historical information is useful.For example, historical information can be used to determine that employee reaches
And/or the time of work is left, thus, it is desirable to the routine that each employee checks in and checked out manually when coming off duty when being on duty manually
Staff attendance system is no longer necessary.When possible theft occurs or when equipment is removed from restricted area, history
Information can be utilized to the individual that identification enters restricted area.
Note, above-mentioned access control system overcomes some shortcomings of conventional access control system.For example, in the present invention
In, authorized individual need not take any manually operated (for example, swiping the card) to enter restricted area.In fact, for certain
The demand of a little access control equipments (for example, card reader) has been eliminated, and is thus reduced and is realized this access control system 100
Totle drilling cost.
In other cases, WAS 114 is in the lower work of both energy acquisition pattern and communication pattern.In energy acquisition pattern
Under, when WAS 114 is by accessing points, energy acquisition circuit 220 collects energy.Collected energy is stored in energy storage and set
In standby 222 (for example, capacitors).Once energy storage device 222 is charged to the operational voltage level of SRC equipment 212, then WAS114
Pattern change into communication pattern from energy acquisition pattern.Hereafter, SRC identifier signals at accessing points 102 via antenna 202
It is sent to reader 104.SRC identifier signals include unique identifier 210.It can also believe from WAS 114 via SRC identifiers
It number will indicate that the information 214 of rate of change of the charging voltage of energy storage device 222 (for example, capacitor) is sent to reader 104.Become
Rate information 214 indicates WAS 114 directionality.In later time, reader 104 is by unique identifier 210 and/or becomes
Rate information 214 sends DPS 112 to.
Note, also (that is, be configured as in the lower work of both energy acquisition pattern and communication pattern together with multi-mode WAS 114
The WAS of work) motion sensor 120,122 is used together.Motion sensor 120,122 is used to determine this person 116 in accessing points
Direction and/or speed/rate near 102.By motion sensor 120,122 by point out this person direct of travel and/or speed/
The information of speed is supplied to reader 104.
At DPS 112, determine whether this person is authorized to restricted area and/or base based on unique identifier 210
Determine that this person is just seeking entry into restricted area and still leaving restricted area in rate of change information 214.If this person just attempting into
Enter restricted area and be not authorized to access restricted area, then DPS 112 simply records instruction this person in the specific time
Information near accessing points.By contrast, if this person is just seeking entry into restricted area and is being authorized to restricted area
Domain, then DPS 112 make on recognizing and the request of positional information is sent to the PCD 150 that this person is possessed.
In response to the request, PCD 150 performs operation to determine its current location in surrounding environment.In some situations
Under, PCD current location is determined using the technology based on RSSI.Technology based on RSSI is wireless including the use of PCD Wi-Fi
Electricity detects the MAC Address of all available networks in the range of.It has collected the MAC Address of all available networks and RSSI water
After flat, MAC Address and RSSI information relay forwarding are gone back to high in the clouds 154 by PCD 150 via wireless communication link 152.Then, cloud
Estimate PCD's 150 based on the MAC Address of each equipment associated with MAC Address, RSSI levels and known location in end 154
Position.Learning algorithm can be used to be associated between two kinds of listed information.
In the case where PCD 150 estimated location is located within the former monitoring door certain radius of distance, high in the clouds 154 will be opened
Command auto repeat is transmitted to door so that enabling actuator 128 is activated (for example, for unlocking lock).In order to reduce scanning WAS with
Door open between delay, PCD 150 constantly detection Wi-Fi network and make detection data when PCD 150 receives request
Through being ready to.High in the clouds 154 and/or DPS 112, which are also recorded, points out that the access rights of restricted area are provided in the specific time
The information of this person.
In this case, reader 104 is only the edge link block for controlling enabling actuator.As a result, to inquiry
The demand of reader (for example, RFID reader) is eliminated, and thus reduces the totle drilling cost needed for the system of realization 100.
With reference now to Fig. 3 A-3B, there is provided the flow of the illustrative methods 300 for controlling the access to restricted area
Figure.As shown in Figure 3A, method 300 is since step 302, and proceeds step 304, in step 304, by ACS (for example,
Fig. 1 ACS 100) reader (for example, Fig. 1 reader 104) send request signal.In response to request signal, by WAS
(for example, Fig. 1 WAS 114) sends SRC answer signals, as shown at step 306.SRC answer signals include unique identifier (example
Such as, Fig. 2 unique identifier 210).In next step 308, in the antenna coupled with reader (for example, Fig. 1 antenna
106 or 108) place receive SRC answer signals.
At reader, operation is performed to obtain and points out the power present in SRC answer signals within the given period
Rssi measurement data, as indicated in step 310.Rssi measurement data are used for determining that the signal of SRC response messages is strong by reader
Whether degree is in increase.Note, alternatively, can be determined by DPS (for example, Fig. 1 DPS 112) to perform this.In such case
Under, can correspondingly amending method 300.Such change is that those skilled in the art are understood.
If the signal intensity of SRC answer signals is reducing [312:It is no], then step 314 is performed, it is in a step 314, raw
The first information just advanced into instruction WAS away from antenna.If on the contrary, the signal intensity of SRC answer signals is in increase [312:
It is], then step 316 is performed, in step 316, generation indicates the second information that WAS is just advancing towards antenna.
When completing step 314 or 316, method 300 proceeds step 318.Step 318 wears WAS including detection
People (for example, Fig. 1 people 116) motion direction and/or speed/rate.In step 318, one or more motions are passed
Sensor (for example, Fig. 1 sensor 120 and/or 122) can be used for the detection.Hereafter, in step 320, it is indicated that detection
To the direction of motion of this person and/or the 3rd information of speed/rate be transmitted to reader.Then, the reader will be following
Information transmission is to DPS:Unique identifier;Timestamp;The first information;Second information;And/or the 3rd information, such as step 322 institute
Show.
At DPS, operation is performed in step 324, and this person is determined using the information received in step 322 previous
Whether just attempting to enter or leave restricted area.If for example, the information that is received indicate WAS just towards entrance antenna (for example,
Fig. 1 antenna 108) advance and this person's (for example, Fig. 1 direction 124) movement just in the first direction, it is determined that this person wants warp
Enter restricted area by accessing points (for example, Fig. 1 accessing points 102).If on the contrary, the information received indicates the positive courts of WAS
Exit antenna (for example, Fig. 1 antenna 106) traveling and this person is along with first party in the opposite direction (for example, Fig. 1
Direction 126) it is mobile, it is determined that this person wants to leave restricted area via accessing points.If the information received is indicating WAS just
Advanced away from entrance antenna, it is determined that this person is not intended to enter restricted area.Similarly, if the information received is indicated
WAS just advances away from exit antenna, it is determined that this person is not intended to leave restricted area.The present invention is not limited to these realities
The details of example.In this respect, it will be appreciated that additionally or alternatively, DPS also analyzes the motion mould limited by the information received
Formula, to determine whether this person wants to enter into or leave accessing points.
After step 324 is completed, method 300 proceeds Fig. 3 B judgment step 326.If it is determined that this person is not desired to
Into or leave restricted area [326:It is no], then step 328 is performed, wherein following information is recorded in data storage:Uniquely
Identifier;Timestamp;First or second information;3rd information;And/or indicate the knot of operation performed in step 324 before
The 4th information of fruit.Then, step 350 is performed, wherein method 300 terminates or performed other processing.
If it is determined that this person wants to enter into or left restricted area [326 really:It is], then perform optional step 332.When this
When people just seeks entry into restricted area, optional step 332 is performed, therefore, optional step 332 is included unique identifier and storage
It is compared in multiple unique identifiers in data storage, enters restricted area to check whether this person is authorized to.Work as someone
Just trying to exit from restricted area or when authorized person just seeks entry into restricted area, DPS makes on identification and positional information
Request be sent to the PCD (for example, Fig. 1 PCD 150) that this person is possessed, as shown in step 334.
In response to the request, in step 336, PCD performs operation and can be used for determining it in surrounding environment to obtain
The information of current location.In some cases, PCD current location is determined using the technology based on RSSI.Based on RSSI's
Technology detects the MAC Address of all available networks in the range of including the use of PCD Wi-Fi radio.Have collected
Have after the MAC Address and RSSI levels of available network, PCD is via wireless communication link (for example, Fig. 1 wireless communication link
152) MAC Address and RSSI information relay forwarding are gone back into high in the clouds (for example, Fig. 1 high in the clouds 154), as shown in step 338.Then,
High in the clouds performs operation to estimate PCD position in step 340.Location estimation can be based on associated with MAC Address each
MAC Address, RSSI levels and the known location of equipment is determined.Learning algorithm can be used to come two kinds of listed
It is associated between information.
In the case where PCD estimated location is located within the certain radius of the former monitoring door of distance, high in the clouds will be opened and be ordered
Relay forwarding is to door so that enabling actuator (for example, Fig. 1 actuator 128) activated (for example, for unlocking lock), such as step
Shown in rapid 342.When completing step 342, perform step 344-346 to record following information:Unique identifier;Timestamp;The
One or second information;3rd information;4th information;And/or indicate that this person enters or left restricted area in the specific time
5th information.The information recorded can alternatively be used to the movement that execution passes through facility on this person in step 348
Historical analysis.Hereafter, step 350 is performed, wherein method 300 terminates or performed other processing.
With reference now to Fig. 4 A-4B, there is provided another illustrative methods 400 for controlling the access to restricted area
Flow chart.As shown in Figure 4 A, method 400 is since step 402, and proceeds step 404, wherein WAS (for example, Fig. 1
WAS 114) energy acquisition circuit (for example, Fig. 2 circuit 220) collect energy.Then, collected energy is stored in
In WAS energy storage device (for example, Fig. 2 equipment 222).When energy storage device is charged to WAS SRC equipment (for example, Fig. 2
SRC equipment 212) operational voltage level [408:It is] when, step 410 is performed, wherein WAS is from its energy acquisition Mode change
Its communication pattern.Under its communication pattern, step 412 is performed.Step 412 includes sending SRC identifier signals by WAS.SRC is marked
Know the first information that symbol signal includes unique identifier and/or indicates the rate of change of the charging voltage of energy storage device.Then, in step
In rapid 414, SRC identifier signals are received at antenna (for example, Fig. 1 antenna 106 or 108) place coupled with reader.
In next step 416, direction and/or the speed/rate of the motion of WAS people are worn in detection.In step 416
In, one or more motion sensors (for example, Fig. 1 sensor 120 and/or 122) can be used to carry out the detection.This
Afterwards, in step 418, it is indicated that the direction of the motion of this person detected and/or the second information of speed/rate are sent to reading
Take device.Then, the reader by following information transmission to DPS:Unique identifier;Timestamp;The first information;And/or second letter
Breath, as shown at step 420.After step 420 is completed, method 400 proceeds Fig. 4 B step 422.
At DPS, operation is performed in step 422, and this person is determined using the information received in step 420 previous
Whether just attempting to enter or leave restricted area.If for example, the information received indicates that WAS just advances towards entrance antenna
(for example, Fig. 1 antenna 108) and this person just move along the first direction in (for example, Fig. 1 direction 124), it is determined that this person wants
Enter restricted area via accessing points (for example, Fig. 1 accessing points 102).If on the contrary, the information received is indicating WAS just
Advanced towards exit antenna (for example, Fig. 1 antenna 106) and this person is along with first party in the opposite direction (for example, figure
1 direction 126) it is mobile, it is determined that and this person wants to leave restricted area via accessing points.If the information received indicates WAS
Just advanced away from entrance antenna, it is determined that this person is not intended to enter restricted area.Similarly, if the information received is indicated
WAS just advances away from exit antenna, it is determined that this person is not intended to leave restricted area.The present invention is not limited to these examples
Details.In this respect, it will be appreciated that additionally or alternatively, DPS also analyzes the motor pattern limited by the information received
To determine whether this person wants to enter into or leave accessing points.
After step 422 is completed, method 400 proceeds Fig. 4 B judgment step 424.If it is determined that this person is not desired to
Into or leave restricted area [424:It is no], then step 426 is performed, wherein following information is recorded in data storage:Uniquely
Identifier;Timestamp;The first information;Second information;And/or the 3rd of the result of the operation performed before indicating in step 422
Information.Then, step 444 is performed, wherein method 400 terminates or performed other processing.
If it is determined that this person wants to enter into or left restricted area [424 really:It is], then perform optional step 427.When this
When people just seeks entry into restricted area, optional step 427 is performed, therefore, optional step 427 is included unique identifier and storage
It is compared in multiple unique identifiers in data storage and enters restricted area to check whether this person is authorized to.When someone just
Try to exit from restricted area or when authorized person just seeks entry into restricted area, DPS makes on recognizing and positional information
Request is sent to the PCD (for example, Fig. 1 PCD 150) that this person is possessed, as seen in step 428.
In response to the request, in step 430, PCD performs operation and can be used for determining it in surrounding environment to obtain
The information of current location.In some cases, PCD current location is determined using the technology based on RSSI.Based on RSSI's
Technology detects the MAC Address of all available networks in the range of including the use of PCD Wi-Fi radio.Have collected
Have after the MAC Address and RSSI levels of available network, PCD is via wireless communication link (for example, Fig. 1 wireless communication link
152) MAC Address and RSSI information relay forwarding are gone back into high in the clouds (for example, Fig. 1 high in the clouds 154), as shown in step 432.Then,
High in the clouds performs operation to estimate PCD position in step 434.Location estimation can be based on associated with MAC Address each
MAC Address, RSSI levels and the known location of equipment is determined.Learning algorithm can be used to come two kinds of listed
It is associated between information.
In the case where PCD estimated location is located within the former monitoring door certain radius of distance, high in the clouds will be opened in order
After being transmitted to door so that enabling actuator (for example, Fig. 1 actuator 128) activated (for example, for unlock lock), such as step
Shown in 434.When completing step 434, perform step 436-440 to record following information:Unique identifier;Timestamp;First
Information;Second information;3rd information;And/or indicate that this person enters or left the 4th information of restricted area in the specific time.
The information recorded can be optionally in step 442, to perform the historical analysis for the movement for passing through facility on this person.This
Afterwards, step 444 is performed, wherein method 400 terminates or performed other processing.
In addition, in some cases, when wearer is just standing near the accessing points of restricted area, WAS may be detected not
To rate of change.For example it is assumed that someone advances towards accessing points, thus WAS detects the energy collected by its energy acquisition circuit
Rate of change.When this person reaches accessing points, his (she) is prevented to discuss by another person.Now, WAS can't detect by it
The rate of change for the energy that energy acquisition circuit is collected.In response to such detection, WAS will indicate that energy acquisition circuit collects energy
Speed send reader (for example, Fig. 1 reader 104) to currently without the signal of change.And then, reader performs operation
To terminate the electromagnetic field emissions of entrance antenna (for example, Fig. 1 antenna 108).Expired in predetermined time period (for example, 2 minutes)
When, electromagnetic field is launched again.In this way, this person still can access limit after the discussion with another person is finished
Region processed.
The Exemplary mathematical algorithm for being used for estimating positions of the PCD in building is explained in following discussion.Taken place frequently for height
Emitter and receiver antenna, famous Friis conveying types given below.This assumes free space environment and is receiving and launching
There is no polarization loss between antenna, hold PCD people not from PCD absorption signals yet.
Wherein Pr is received power (PCD), and Pt is transmitter power (Wi-Fi antenna), and Gt is that emitter antenna increases
Benefit, Gr is receiver gain, and R is the distance between transmitting and reception antenna (vector), and f is working frequency, and c is light
Speed.Both sides, which are taken the logarithm, produces following mathematical expression.
Wherein Pr and Pt unit is that dBm, Gt and Gr unit are dB, and λ unit is rice, and R unit is rice.
Fig. 6 provides the schematic diagram for the symmetric array for showing the individual Wi-Fi transmitting antennas 602,604,606,608 in four (4).Hair
Antenna 602-608 is penetrated to be installed on the ceiling of building on (for example, above floor at about 4 meters).It also show PCD (examples
Such as, about 1 meter of place above floor) three paths 1,2,3 that move.PCD along symmetrical path 1 and asymmetric path 2,
3 advance.Coordinate origin is shown at the center of antenna.
In figure 6, grid or step size are (1) rice.The step-length of (1) rice is defined as per paths.It is assumed that hair
Antenna Pt is penetrated for 28 (28) dBm, transmitter antenna gain (dBi) Gt is five (5) dB, receiver antenna gain G r is minus two (- 2) dB,
And frequency f is two points four (2.4) GHz.
Fig. 7 provides the curve map for the simulation result for showing symmetric path 1, and PCD is along aerial system in the plot
The center line of system is travelled downwardly.As is expected, one group of very symmetrical curve is intersecting at center, and PCD is sitting at day in this place
The centre of linear system system.It is symmetrical to the 602/608 power mirror face received to 604/606 and antenna from antenna.
Fig. 8 provides the curve map for the simulation result for showing symmetric path 2.Path 2 is downward since center line, but
It is along the path between antenna 604 and antenna 602 that (cut over) is changed at 8 meters.Path 2 is apart from the ratio of antenna 604 apart from day
602 nearly 2 meters of line.Start off center line towards antenna 604 and antenna 602 close to (but closer to antenna 604 up to 2 meters) in PCD
At 8th step-length, signal about high 1dBm after next step-length.So corresponding to the He of antenna 604 along 2 meters of step-lengths of dispersal point
The signal intensity of 2.5dBm between 606.
Fig. 9 provides the curve map for the simulation result for showing symmetric path 3.Path 3 is another symmetric path, on the road
PCD and centerline parallel are advanced but closer to antenna 604 up to 2 meters, then departed from footpath, towards antenna 606,608 (but more
Close to antenna 608 up to 2 meters).
The use of the simple linear interpolation method of the difference of four aerial signals is along primarily examining during known paths estimated location
Consider.Estimated position P (x, y) can be represented by following mathematical expression.
P (x, y)=C1 (STx3-STx2)ax+C2(STx4-STx1)ax+C3(STx1-STx2)ay+C4(STx4-STx3)ay
Wherein C1, C2, C3 and C4 are coefficient, STx1To STx4For signal intensity, and axAnd ayIt is x and y unit vector.
Above mathematical expression can be represented in linear matrix form, as follows.
Coefficient is determined using one or more paths, and uses simplified C1=C2 and C3=C4, it can be seen that prediction
Path P (x, y) can be arrived precisely less than 1 meter.
All devices disclosed herein and prescription, method and algorithm can realize and perform according to the disclosure,
Without excessively testing.Although according to preferred embodiment, invention has been described, those skilled in the art should
, can be to the order of device, method and method and step in the case where not departing from the design of the present invention, spirit and scope when clear
Carry out various changes.More specifically, it should be clear that some components may be added to, be attached to or be alternative in described herein
Component, while identical or similar result can be obtained.It is all such clearly similar to be replaced for those skilled in the art
Generation and modification are considered to belong to the spirit of the invention limited, within scope and spirit.
Feature disclosed above and function and alternative solution can be incorporated into many other different systems or should
In.Those skilled in the art can carry out can not predicting at present or unexpected various substitute, change, change or change
Enter, each be also intended to during these substitute, change, change or improved is covered by disclosed embodiment.
Claims (20)
1. a kind of method for being used to control the access to restricted area, including:
Determine whether that someone wants to enter into the restricted area by electronic circuit;
First unique identifier associated using the wearable access sensors WAS with being worn by the people checks the people
Whether it is authorized to and enters the restricted area;
When it is determined that the people is authorized into the restricted area, the portable communication device PCD of the people is set to send second
Unique identifier and available for the positional information for determining positions of the PCD in surrounding environment;
Confirm that the people is currently located at the accessing points of the restricted area using second unique identifier and positional information;
And
When it is determined that the people wants to enter into the restricted area, the people, which is authorized to, enters the restricted area, and the people
When being currently located at the accessing points of the restricted area, mechanical actuator is set to activate so that the people enters the limitation
In region.
2. according to the method described in claim 1, wherein being connect based on the wearable access sensors WAS for pointing out to wear from the people
The received signal strength indicator device rssi measurement data of power present in the signal of receipts determine whether the people wants to enter into
The restricted area.
3. according to the method described in claim 1, wherein electric in the energy of electromagnetic field collection being arranged in the WAS based on pointing out
The rate of change data of the rate of change of the charging voltage of the energy storage device used in road determine that it is described whether the people wants to enter into
Restricted area.
4. according to the method described in claim 1, wherein using the skill based on received signal strength indicator device RSSI by the PCD
Art obtains the positional information.
5. method according to claim 4, wherein the technology based on RSSI includes:
Perform operation to detect the medium access control MAC Address of the available network in the range of it by the PCD;And
Collect the RSSI levels of the signal received from the equipment associated with the MAC Address of the available network.
6. method according to claim 5, wherein RSSI levels and related to the MAC Address of the available network
The known location of the equipment of connection is used to confirm that whether the people is currently located at the accessing points of the restricted area.
7. according to the method described in claim 1, in addition to determine whether the PCD is located at apart from described in the restricted area
Within accessing points certain radius.
8. method according to claim 7, wherein when it is determined that the PCD is located at the access apart from the restricted area
When within point certain radius, activate the mechanical actuator.
The people is indicated 9. according to the method described in claim 1, being additionally included in and the mechanical actuator is recorded after activating
Enter the information of the restricted area in the specific time.
10. according to the method described in claim 1, in addition to by the WAS energy acquisition circuit from by be arranged in one or
Energy is collected in the electromagnetic field of the access control equipment transmitting of the accessing points of multiple restricted areas.
11. a kind of system, including:
The wearable access sensors WAS worn by people;
The portable communication device PCD that the people possesses;
At least one electronic circuit communicated with least one in the WAS and the PCD, wherein the electronic circuit by with
It is set to
Determine whether the people wants to enter into the restricted area,
First unique identifier associated using the WAS with being worn by the people check the people whether be authorized into
Enter the restricted area;
When it is determined that the people is authorized into the restricted area, the PCD is set to send the second unique identifier and available
In it is determined that the positional information of positions of the PCD in surrounding environment;
Confirm that the people is currently located at the accessing points of the restricted area using second unique identifier and positional information;
And
Mechanical actuator, when it is determined that the people wants to enter into the restricted area, the people, which is authorized to, enters the restricted area,
And when the people is currently located at the accessing points of the restricted area, the mechanical actuator is activated so that people's energy
Enough enter the restricted area.
12. system according to claim 11, wherein whether wanting to enter into the determination of the restricted area on the people
It is the reception signal based on power present in the signal for pointing out to receive from the wearable access sensors WAS worn by the people
Volume indicator rssi measurement data are made.
13. system according to claim 11, wherein whether wanting to enter into the determination of the restricted area on the people
It is the change of the charging voltage based on the energy storage device for pointing out to use in the energy of electromagnetic field Acquisition Circuit being arranged in the WAS
What the rate of change data of rate were made.
14. system according to claim 11, wherein the positional information is strong using reception signal is based on by the PCD
Spend indicator RSSI technology acquisition.
15. system according to claim 14, wherein the technology based on RSSI includes:
Perform operation to detect the medium access control MAC Address of the available network in the range of it by the PCD;And
Collect the RSSI levels of the signal received from the equipment associated with the MAC Address of the available network.
16. system according to claim 15, wherein the RSSI levels and the MAC Address phase with the available network
The known location of the equipment of association is used to confirm that the people is currently located at the accessing points of the restricted area.
17. system according to claim 11, wherein the electronic circuit is additionally configured to determine that the PCD is located at distance
Within the accessing points certain radius of the restricted area.
18. system according to claim 17, wherein when it is determined that the PCD is located at the visit apart from the restricted area
When asking within a certain radius, the mechanical actuator is caught actuating.
19. system according to claim 11, wherein the electronic circuit is additionally configured in the mechanical actuator quilt
So that record indicates that the people enters the information of the restricted area in the specific time after actuating.
20. system according to claim 11, wherein the WAS is included from by being arranged in one or more restricted areas
The energy acquisition circuit of energy is collected in the electromagnetic field of the access control equipment transmitting of accessing points.
Applications Claiming Priority (7)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US201462086241P | 2014-12-02 | 2014-12-02 | |
US62/086,241 | 2014-12-02 | ||
US14/558,796 | 2014-12-03 | ||
US14/558,796 US9384607B1 (en) | 2014-12-03 | 2014-12-03 | Access control system |
US201562205953P | 2015-08-17 | 2015-08-17 | |
US62/205,953 | 2015-08-17 | ||
PCT/US2015/063542 WO2016090053A1 (en) | 2014-12-02 | 2015-12-02 | Dual level human identification and location system |
Publications (2)
Publication Number | Publication Date |
---|---|
CN107209964A true CN107209964A (en) | 2017-09-26 |
CN107209964B CN107209964B (en) | 2021-05-11 |
Family
ID=55066770
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201580075132.3A Active CN107209964B (en) | 2014-12-02 | 2015-12-02 | Double-layer personnel identification and positioning system |
Country Status (6)
Country | Link |
---|---|
EP (1) | EP3227870A1 (en) |
KR (1) | KR102517260B1 (en) |
CN (1) | CN107209964B (en) |
AU (1) | AU2015358535B2 (en) |
CA (1) | CA2972429C (en) |
WO (1) | WO2016090053A1 (en) |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN107845172A (en) * | 2017-11-14 | 2018-03-27 | 南京物联传感技术有限公司 | A kind of smart lock security system and method for work with autonomous classification ability |
CN111316335A (en) * | 2017-10-11 | 2020-06-19 | 米尔鲍尔有限两合公司 | System for monitoring a person |
Families Citing this family (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
KR102169842B1 (en) * | 2019-11-27 | 2020-10-27 | 영남대학교 산학협력단 | Method for measuring indoor position, apparatus and system for executing the method |
Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1682005A (en) * | 2002-07-13 | 2005-10-12 | 罗格·烘伯 | Autorisations, regulation, characterisation, localisation, locking and theft security system (here also referred to as lock-loop DSS) |
US20080143478A1 (en) * | 2006-12-19 | 2008-06-19 | Denso Corporation | Mobile unit and electronic key system using the same |
EP2068535A1 (en) * | 2006-09-28 | 2009-06-10 | Panasonic Corporation | Portable telephone and access control method |
CN101499183A (en) * | 2008-02-03 | 2009-08-05 | 张明哲 | Control system, apparatus and method |
CN102542644A (en) * | 2010-12-17 | 2012-07-04 | 株式会社东海理化电机制作所 | Electronic key system and electronic key |
US20140049361A1 (en) * | 2012-08-16 | 2014-02-20 | Schlage Lock Company Llc | Wireless reader system |
Family Cites Families (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US7284125B2 (en) * | 2000-03-23 | 2007-10-16 | Tietech Co. Ltd. | Method and apparatus for personal identification |
JP2002149600A (en) * | 2000-11-08 | 2002-05-24 | Sony Corp | Information processor, processing method, recording medium and service providing system |
WO2006090476A1 (en) * | 2005-02-25 | 2006-08-31 | Super Wave Co., Ltd. | Wireless authentication method and wireless authentication system |
CA2647194C (en) * | 2006-03-20 | 2016-08-16 | Gerald R. Black | Mobile communication device |
US20130278382A1 (en) * | 2007-07-27 | 2013-10-24 | Lucomm Technologies, Inc. | Systems and methods for object localization and path identification based on rfid sensing |
US9311586B2 (en) * | 2011-03-22 | 2016-04-12 | Jamie Robinette | Apparatus and method for locating, tracking, controlling and recognizing tagged objects using active RFID technology |
US20140085050A1 (en) * | 2012-09-25 | 2014-03-27 | Aliphcom | Validation of biometric identification used to authenticate identity of a user of wearable sensors |
JP6107267B2 (en) * | 2013-03-18 | 2017-04-05 | 株式会社日本自動車部品総合研究所 | Vehicle system, in-vehicle device, and portable device |
-
2015
- 2015-12-02 KR KR1020177018346A patent/KR102517260B1/en active IP Right Grant
- 2015-12-02 CN CN201580075132.3A patent/CN107209964B/en active Active
- 2015-12-02 CA CA2972429A patent/CA2972429C/en active Active
- 2015-12-02 EP EP15818112.3A patent/EP3227870A1/en active Pending
- 2015-12-02 AU AU2015358535A patent/AU2015358535B2/en active Active
- 2015-12-02 WO PCT/US2015/063542 patent/WO2016090053A1/en active Application Filing
Patent Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1682005A (en) * | 2002-07-13 | 2005-10-12 | 罗格·烘伯 | Autorisations, regulation, characterisation, localisation, locking and theft security system (here also referred to as lock-loop DSS) |
EP2068535A1 (en) * | 2006-09-28 | 2009-06-10 | Panasonic Corporation | Portable telephone and access control method |
US20080143478A1 (en) * | 2006-12-19 | 2008-06-19 | Denso Corporation | Mobile unit and electronic key system using the same |
CN101499183A (en) * | 2008-02-03 | 2009-08-05 | 张明哲 | Control system, apparatus and method |
CN102542644A (en) * | 2010-12-17 | 2012-07-04 | 株式会社东海理化电机制作所 | Electronic key system and electronic key |
US20140049361A1 (en) * | 2012-08-16 | 2014-02-20 | Schlage Lock Company Llc | Wireless reader system |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN111316335A (en) * | 2017-10-11 | 2020-06-19 | 米尔鲍尔有限两合公司 | System for monitoring a person |
CN107845172A (en) * | 2017-11-14 | 2018-03-27 | 南京物联传感技术有限公司 | A kind of smart lock security system and method for work with autonomous classification ability |
Also Published As
Publication number | Publication date |
---|---|
KR20170102254A (en) | 2017-09-08 |
AU2015358535B2 (en) | 2020-06-18 |
CA2972429C (en) | 2023-03-28 |
CN107209964B (en) | 2021-05-11 |
KR102517260B1 (en) | 2023-03-31 |
CA2972429A1 (en) | 2016-06-09 |
WO2016090053A1 (en) | 2016-06-09 |
EP3227870A1 (en) | 2017-10-11 |
AU2015358535A1 (en) | 2017-07-13 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US9384608B2 (en) | Dual level human identification and location system | |
US20220335759A1 (en) | Method and system for managing door access using beacon signal | |
EP3147686B1 (en) | Systems and methods for object localization and path identification based on rfid sensing | |
EP2888725B1 (en) | A monitoring system | |
US10192373B1 (en) | Tag identification systems and methods | |
US9384607B1 (en) | Access control system | |
US11531082B2 (en) | Device location network | |
CN109983511A (en) | Lock is controlled based on the position of activation signal and portable key device | |
WO2018170493A1 (en) | Precise positioning system and method of using the same | |
CN101027700A (en) | Method and apparatus for detection and tracking of objects within a defined area | |
CN103491627B (en) | A kind of closely real-time accurate positioning method of integrated many algorithms | |
Komai et al. | Elderly person monitoring in day care center using Bluetooth Low Energy | |
CN110022530B (en) | Wireless positioning method and system for underground space | |
US20180174433A1 (en) | Method and apparatus for creating security and control system tracking immunity | |
CN107209964A (en) | Double-deck personal identification and alignment system | |
DE102010043394A1 (en) | Mobile device and infrastructure system | |
WO2019209670A1 (en) | System and method for seamless access & intent identification using mobile phones | |
EP3784986B1 (en) | Systems and methods for trajectory prediction to enable seamless access using mobile devices | |
US20210152980A1 (en) | Destination identification for frictionless building interaction | |
KR101959849B1 (en) | Smart phones access control and smart phones access information management and reporting system using Social Network Service | |
US20210314728A1 (en) | Methods for learning deployment environment specific features for seamless access | |
CA3100660A1 (en) | Method for commissioning system for door identification using location fingerprinting | |
CN108917771A (en) | A kind of indoor navigation system for fire-fighting first aid | |
Li et al. | An effective tracking system based on Wi-Fi trajectory matching | |
US11470445B2 (en) | Methods for access latency reduction through phone pre-connection based on user location |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
REG | Reference to a national code |
Ref country code: HK Ref legal event code: DE Ref document number: 1242033 Country of ref document: HK |
|
TA01 | Transfer of patent application right | ||
TA01 | Transfer of patent application right |
Effective date of registration: 20210407 Address after: Florida, USA Applicant after: SENSORMATIC ELECTRONICS, LLC Address before: Switzerland Rhine falls Neuhausen Applicant before: Tyco Fire and Safety Co.,Ltd. |
|
GR01 | Patent grant | ||
GR01 | Patent grant |