EP1634260B1 - Method and device for securing objects - Google Patents

Method and device for securing objects Download PDF

Info

Publication number
EP1634260B1
EP1634260B1 EP04738580A EP04738580A EP1634260B1 EP 1634260 B1 EP1634260 B1 EP 1634260B1 EP 04738580 A EP04738580 A EP 04738580A EP 04738580 A EP04738580 A EP 04738580A EP 1634260 B1 EP1634260 B1 EP 1634260B1
Authority
EP
European Patent Office
Prior art keywords
data
archive
objects
signal
network
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Expired - Lifetime
Application number
EP04738580A
Other languages
German (de)
French (fr)
Other versions
EP1634260A1 (en
Inventor
Norbert Pieper
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Deutsche Post AG
Original Assignee
Deutsche Post AG
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Deutsche Post AG filed Critical Deutsche Post AG
Publication of EP1634260A1 publication Critical patent/EP1634260A1/en
Application granted granted Critical
Publication of EP1634260B1 publication Critical patent/EP1634260B1/en
Anticipated expiration legal-status Critical
Expired - Lifetime legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G08SIGNALLING
    • G08BSIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
    • G08B13/00Burglar, theft or intruder alarms
    • G08B13/18Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength
    • G08B13/189Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength using passive radiation detection systems
    • G08B13/194Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength using passive radiation detection systems using image scanning and comparing systems
    • G08B13/196Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength using passive radiation detection systems using image scanning and comparing systems using television cameras
    • G08B13/19695Arrangements wherein non-video detectors start video recording or forwarding but do not generate an alarm themselves
    • GPHYSICS
    • G08SIGNALLING
    • G08BSIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
    • G08B13/00Burglar, theft or intruder alarms
    • G08B13/22Electrical actuation
    • G08B13/24Electrical actuation by interference with electromagnetic field distribution
    • G08B13/2402Electronic Article Surveillance [EAS], i.e. systems using tags for detecting removal of a tagged item from a secure area, e.g. tags for detecting shoplifting
    • G08B13/2451Specific applications combined with EAS
    • G08B13/2454Checking of authorisation of a person accessing tagged items in an EAS system
    • GPHYSICS
    • G08SIGNALLING
    • G08BSIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
    • G08B13/00Burglar, theft or intruder alarms
    • G08B13/22Electrical actuation
    • G08B13/24Electrical actuation by interference with electromagnetic field distribution
    • G08B13/2402Electronic Article Surveillance [EAS], i.e. systems using tags for detecting removal of a tagged item from a secure area, e.g. tags for detecting shoplifting
    • G08B13/2451Specific applications combined with EAS
    • G08B13/2457Lending systems using EAS tags wherein the tags are reusable, e.g. they can be activated and deactivated more than once, e.g. for a library
    • GPHYSICS
    • G08SIGNALLING
    • G08BSIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
    • G08B13/00Burglar, theft or intruder alarms
    • G08B13/22Electrical actuation
    • G08B13/24Electrical actuation by interference with electromagnetic field distribution
    • G08B13/2402Electronic Article Surveillance [EAS], i.e. systems using tags for detecting removal of a tagged item from a secure area, e.g. tags for detecting shoplifting
    • G08B13/2451Specific applications combined with EAS
    • G08B13/2462Asset location systems combined with EAS

Definitions

  • the invention relates to a method for securing objects, preferably within closed buildings, in particular for securing objects that belong to the inventory of an office.
  • a device for securing issued tools or equipment is from the German utility model DE 200 11 952 U1 known.
  • a transponder is attached to each workpiece of a tool collection, which contains information about the type of tool, an ongoing serial number and the information about the normal workstation by means of a 128-bit information.
  • the normal workstation can either be a toolbox or a fixed storage space, as long as there is a fixed receiver for exchanging signals with the transponders attached to the tools at this workstation.
  • the receiver is in turn connected to a computer which enables the evaluation of the signals received by the receiver and transmitted by the transponder located in the toolbox or at the workstation. It is therefore possible at any time during the internal work processes, the current stock of a specific Toolbox or workstation.
  • each employee is assigned a separate transponder by means of which the tool box belonging to the employee can be opened.
  • a device for the automatic detection and identification of a merchandise security label by a base station is known.
  • the security tag attached to the product to be secured houses a transponder having its own LF transceiver unit used to communicate with the base station. If, for example, a transponder enters the sphere of action of the electromagnetic field provided by the base unit, a control signal is transmitted by the base station which is received by the transponder and in turn causes the transponder to emit a response signal. This response signal is further processed by the base station and triggers a transmission pulse at the base station in the event of a successful check, which in turn is received by the transponder.
  • This transmit-receive sequence can be used to integrate predetermined verification criteria, the non-compliance of which leads to the triggering of an alarm.
  • a preferred embodiment provides to synchronize the alarm signals of a plurality of transponders located in the effective range of the electromagnetic field of the base station, so that a secure detection of a received alarm signal is ensured by the base station.
  • Another device for electronic anti-theft device is from the German patent application DE 38 07 936 A1 known.
  • the document discloses a particularly preferred Construction of a combined with a barcode, in its dimensions extremely small passive transponder whose receiver is tuned to twice the transmission frequency and thus insensitive to reflections of the fundamental wave of the transmitter.
  • the stationary transmitting device is realized either by means of conventional transceivers from the field of high-frequency technology or by array antennas in stripline technology, so that the passage through the product marked with the transponder by the constructed by the stationary transceiver electromagnetic field to the passive transponder stimulates radiation. The radiation emitted by the passive transponder can then be used to trigger an alarm signal.
  • a device for finding files is by the German patent application DE 100 33557 A1 known.
  • signal transmitters are attached to the files in the form of transponders and the coded signals emitted by the transponders are detected by transceivers preferably mounted on the ceilings and subsequently made available to a database for internal administration.
  • a central computer allows using an adapted administrative routine to process the existing records in such a way that at any time the current location of any file can be determined from the file.
  • transponders passive or active functional structure
  • European patent EP 1 040 447 B1 or in the European patent specification EP 0 762 535 B1 ,
  • the state of the art in the field of securing objects essentially describes devices for the explicit recognition of signalers attached to objects as soon as they are within a predetermined range.
  • the US patent US 6,195,006 B1 describes an inventory system in which items loaned to customers are each provided with a transponder. At an article delivery point, the signals emitted by the transponders and identification features of customers to whom the articles are issued are recorded and transmitted to a database. Return of the articles takes place at one or more return points where transponder signals of returned articles are collected and transmitted to the database.
  • the invention has for its object to further develop a generic method so that it can be determined whether individual objects were removed without permission from a predetermined area, in particular a closed building or an area of a building, the method should be carried out so that a transport of legitimate objects that can be moved out of the protected spatial area can take place undisturbed.
  • a method for securing objects is carried out such that the receiving unit detects a presence of the identification means, wherein the objects to be secured are equipped with an identification means or connected to the identification means, the identification means during a transport of the object to be secured is detected by a receiving unit and electronic data for detecting the presence of the identification means are stored, the electronic data being such that they allow a unique assignment of the signal detected by the receiving unit to the identification means, and that regardless of the detection of the identification means a Acquisition of information takes place, which allow an identification of a person to be secured a conveyed person.
  • a first preferred embodiment of the invention is characterized in that the person transporting the object to be secured is detected in that the authorization card of the person is detected in a controlled manner in an automated checking step.
  • a particularly preferred embodiment of the invention is characterized in that the identification data of the objects to be protected and the identification data of the persons to be secured objects to be detected separately, wherein the identification data of the objects and / or the identification data of persons in a against an outer Access secured data area to be backed up.
  • This embodiment of the invention is particularly suitable for use in application areas in which, within the protected area, a large number of persons are active whose personal rights require special protection.
  • this embodiment of the invention makes it possible to prevent legitimate transport operations of objects to be secured from being arbitrarily connected with the persons carrying them.
  • this makes it possible for access to stored identification data of persons and / or linking of the identification data of the persons with identification data of objects to be secured to be performed only under special conditions.
  • a particularly expedient embodiment of the invention makes it possible to detect persons who have unlawfully transported objects from the area to be secured, but to prevent access to identification data of persons who have legitimately spent objects from the area to be protected.
  • an automated Processing routine is started.
  • the automated processing routine includes generation of a warning.
  • a further preferred embodiment of the invention is characterized in that access to the secure data area only after entering at least one authorization code.
  • a further advantageous embodiment of the invention provides a method for securing objects within protected areas, in which the objects to be protected carry a transmitter, the transmitter provides a coded signal in the presence of a reception field, detects the coded signal via a receiving unit and then is converted into electronically processable coded data to be performed so that the receiving unit amplifies the electronic data that the electronic data is transmitted via an interface to a first data transmission line, that the coded data is stored in a data storage means that upon receipt of the coded data Recording unit for video data is activated, and that the video data is stored.
  • Another object of the invention is a device for securing objects within closed buildings, wherein the object to be protected carries a transmitter which provides a coded signal in the presence of a reception field, wherein the coded signal detected by a receiving unit and then coded into electronically processable Data is converted.
  • the device includes a receiving unit, wherein the receiving unit amplifies the electronic data, that the device includes an interface, wherein the interface allows a connection between the receiving unit and the first data transmission line, that the interface is such, that the coded data can be transmitted to a data transmission network and that the data transmission network connects the interface to a data archive Processing and storage of data connects, and thus the encoded data can be stored within the archive, wherein the encoded data trigger a switching operation, a located in proximity to the receiving field recording unit for processing video data, the measured by the recording unit video data by means of a transmitted second data transmission line to the archive and stored in the archive, wherein after expiration of a time interval within which no further receiving event due to a signal of the same coding was carried out, a reading of the previously associated with coding stored data of the object and the video data is triggered.
  • a particularly preferred embodiment of the invention provides that the receiving unit for receiving and amplifying the coded signal can process at least one of the following signal types: electromagnetic waves, acoustic waves, or infrared radiation.
  • the receiving unit enables a transmission of signals.
  • the first and the second data transmission line is in each case a medium for the loss-free transmission of data.
  • a particularly preferred embodiment of the invention provides that the first data transmission line is a RS 232 cable.
  • the second data transmission line is a coaxial cable.
  • a particularly preferred embodiment of the invention provides that the interface is a gateway.
  • the receiver and the interface form a unit with a common power supply.
  • a particularly preferred embodiment of the invention provides that the data transmission network consists of at least one RS 485 bus and at least one data transmission line.
  • the data transmission line is a RS 485 cable.
  • a particularly preferred embodiment of the invention provides that at least one data archive is connected to the data transmission network.
  • the data archive has at least one composite video input (BNC) and a maximum of four composite video inputs (BNC).
  • a particularly preferred embodiment of the invention provides that the data archive is connected to a local network, whereby data from the archive is provided for evaluation at mutually different locations within the network.
  • the local network is an Ethernet.
  • a particularly preferred embodiment of the invention provides that the evaluation of the data by a computer having a means for processing Internet standards has.
  • the data archive is a digital data archive.
  • a particularly preferred embodiment of the invention provides that the digital data archive uses a hard disk to store the data.
  • the data archive is an analog data archive.
  • a particularly preferred embodiment of the invention provides that the transmitter provides at least one of the following signal types for providing the coded signals: electromagnetic waves, acoustic waves, or infrared radiation.
  • the transmitter for providing the coded signals is a transponder.
  • a particularly preferred embodiment of the invention provides that the transmitter is a semi-active transponder.
  • the objects preferably belong to an office inventory, such as fax machines, mobile phones, laser beamer, data carriers or files.
  • the presence of the signal generator in the detection field or also the transmission-reception field, which is preferably an electromagnetic field, is either used to generate an alarm signal or used for registration and storage of the signal generator inherent, coded data.
  • the data processing routine is usually for the following sequence used: after the signal detection, a statement is made by means of the signal coding, which optionally where at any time in interaction with the detection field, the location of the detection field indirectly makes a statement about the current location of the object.
  • the invention is fundamentally combinable with known anti-theft methods and that known anti-theft systems can in principle be reconfigured for carrying out the invention, the invention enables a considerably more comprehensive mode of operation.
  • the invention makes it possible to realize an article surveillance system in which unauthorized stealing of objects to be secured is effectively avoided without the need for deactivating security tags.
  • the sharing of e.g. Fax machines, mobile telephones, portable computers, laser beacons or data carriers within a building complex, preferably an office building requires the design of a device which, in principle, allows the workers in the building complex to use the above objects and - if necessary - to delocalize, but preferably should do so at all times
  • a process is initiated which allows the back-reference between the person who has taken the object and the object.
  • the invention is particularly suitable for use in closed buildings, such as office buildings, since one could equip a means for personal identification, such as a company card, with an additional transponder whose signals evoked in a detection field would allow a reference back to the carrier of the card.
  • a conceivable device could be such that as a result of a coincident impact of a coded signal of the transponder attached to an object and a further coded signal of the further transponder located on the company identity card, upon entering the detection area a storage process is triggered which records all encoded data.
  • the guarantee of success of such a merchandise security device is dependent on wearing the personal identification means.
  • the wearing of a foreign means of identification could lead to illegal back payments.
  • Another aspect of a consumer protection system is the protection of data privacy with the simultaneous use of the commodities by a plurality of authorized users, the objects are to be integrated at any time within a system, which determines an unauthorized stealing an item and allows a return to the stranger , while maintaining data protection.
  • the invention thus enables a highly effective data-protected consumer article security system which is particularly suitable for use within enclosed buildings.
  • Figure 1 is a schematic representation of the device according to the invention again.
  • the device according to the invention includes a computer for processing recorded video data and the encoded data of the transmitter located on an object to be protected.
  • is in no way limiting. It may be any unit suitable for performing calculations, such as a workstation, a personal computer, a microcomputer, or circuitry suitable for performing calculations and / or comparisons.
  • archive is to be understood in particular as a superordinate, computer-controlled memory which systematically collects and manages data and information.
  • the content of this archive is queried in a structured manner with at least one suitable means for data processing and output.
  • the data processing means may be based on a logical problem-oriented structure of the data for storage on a mass storage device.
  • Some known symbol-oriented structures are known by the abbreviations BASIC, PASCAL, C ( ++ ), COBOL, or Java and are used to develop complex systems.
  • Internet-based structures are also known.
  • the Internet is to be understood here as an open mass network of "gateway" computers that are structurally connected by a uniform Internet Protocol address scheme as well as physically via data lines.
  • a computer-aided network is processed by a complex system of data Means and the data lines connecting the data processing means described, wherein a network may differ by a particular configuration of another network.
  • a LAN is preferably to be understood as meaning a data transmission network which allows spatially limited communication via a server and thus enables the exchange of information.
  • client and " server " are used for the computers that are on a network, such that one server is available to multiple clients.
  • the server provides the clients eg memory, computing time or files.
  • Some typical examples of a LAN are the interconnected computers of a university or a company. For the connected stations, the data and peripheral management (eg printer, modem, etc.) can be shared.
  • a typical LAN is the " Ethernet ", which works on the bus principle. An Ethernet currently operates at normal speed and with coaxial cables at a speed up to 10 Mbps (Mega bit per second). The newer " Fast Ethernet " provides for transmission speeds of up to 100 Mbps.
  • a LAN is a network that can be connected to other LANs; a variety of virtual LANs make up the VLAN.
  • Typical features of the Internet include: (1) " Telnet” for calling programs on other computers, (2) " FTP ( File Transfer Protocol ) " for transferring files to other computers, (3) “ World Wide Web ( WWW) “or (4)” Gopher "for subject-based access to information systems worldwide.
  • the Internet is linked as global network GAN, via TCP / IP (TCP / IP stands for T ransmission C ontrol P rotocol / I nternet P rotocol and is a set of protocols. As both complement each other (TCP is a supervisory authority for IP) they are often mentioned together.
  • a typical Internet-based structure is Hypertext Markup Language (HTML) , which determines the exchange of hypertext documents on the WWW and builds on TCP / IP. Hypertexts are text documents displayed on a graphical user interface with the possibility of triggering actions on specially marked words or symbols.
  • HTML Hypertext Markup Language
  • Another Internet-based structure is Extensible Markup Language (XML) , which is an evolution of HTML. XML makes it much easier to create complex hypertext documents in the WWW traffic. XML should be used extensively, especially in the " e-commerce " area of the Internet.
  • Interfaces are used in a particularly advantageous embodiment of the device according to the invention. Interfaces provide the interface between software or hardware systems, where software interfaces are methods for translating data from one program into another program, eg by means of a conversion of the data. It is also possible to use hardware interfaces. A particularly advantageous embodiment of a hardware interface binds electronic and coded data to a data transmission network.
  • a gateway computer which is referred to below as a gateway.
  • a gateway may be a node computer between networks that interconnects compatible and incompatible networks, allowing homogeneous and heterogeneous networks to be interconnected. Through a gateway it is e.g. it is possible to connect networks consisting of computers to a mainframe, although these systems do not use the same rule complexes.
  • a gateway forwards all data packets whose network address matches a network address behind the gateway. By means of a routing table, an addressee is addressed, who can convey the data packet up to the final destination address, possibly also another gateway. Gateways are e.g. used in two incompatible e-mail systems to exchange electronic mail and data or, advantageously, to connect to a data communications network.
  • Data links either allow connections between components within a network, or are used to connect to a network, and thus may have a linking component between external units and represent a network.
  • the above-mentioned interfaces prove to be extremely advantageous connection points.
  • Typical components to connect to are servers, clients, interfaces or routers.
  • Particularly preferred are connections between signal receivers, interfaces, data archives or video devices.
  • the RS232 standard describes the serial connection between a data terminal and a data transmission device with their electrical and mechanical properties.
  • the RS232 interface or the RS232 data transmission line in the device according to the invention has proved to be particularly advantageous for serial data transmission over short distances.
  • the RS232 standard defines a 25 pin SUB-D connector as standard connector.
  • As a guideline for the maximum achievable transmission distance by means of an RS232 data transmission line a distance of 15 to 30 meters can be called.
  • the RS485 standard (interface or line) is an extension of the RS232 standard and is designed as a bidirectional bus system for up to 32 subscribers. Physically, both interfaces differ only insignificantly. Since the RS485 standard is intended for long distances, it has proven to be particularly advantageous to use RS485 data transmission lines for the connections between an interface and a data archive.
  • a particular advantage of the method according to the invention is the unique implementation of data protection.
  • Data protection here means the entirety of the measures for the protection of electronic data in the data transmission via data lines and for the protection of stored electronic data.
  • the measures essentially cover the following subareas: (1) hardware protection, (2) software protection, (3) data carrier protection, (4) organization.
  • the data protection is realized in such a way that the identification data of the objects and / or the identification data of the persons are saved in a data area which is particularly secure against external access. Furthermore, the electronic data about the removal of an object from the secured area is deleted when the object to be protected is returned to the secured area.
  • identification means are suitable for unambiguously identifying the objects to be protected.
  • transponders In order to implement a monitoring procedure that is as automated as possible, in which persons who enter or leave the secured area are impaired as little as possible, it is advantageous to use transponders.
  • any transponder is suitable for use in the various embodiments of the invention.
  • Both passive and semi-active and active transponders are suitable for use in object security systems according to the invention, as well as methods and devices for implementing object security systems according to the invention.
  • Half-active transponders are stimulated by a transmitted signal to send a signal in turn.
  • the semi-active transponder is activated by an electromagnetic signal of a first frequency.
  • the half-active transponders are stimulated by the activation to transmit an electromagnetic signal of a second frequency.
  • semi-active transponders are used, which are activated by an electromagnetic field with a first frequency of, for example, about 125 kHz. Particularly advantageous activation frequencies in the range of 5 to 200 kHz.
  • semi-active transponders are used, which are activated by first frequencies in the MHz range.
  • activation ranges in the order of several meters, preferably in the order of 1 m to 10 m can be achieved.
  • Activation with the electromagnetic field of the first frequency causes the semi-active transponders to emit a signal in turn.
  • the transmission of the electromagnetic signal of the transponder is in a different frequency range than the electromagnetic fields used for the activation of the semi-active transponder.
  • the semi-active transponders transmit in a frequency range of several 100 MHz, for example in the range of a radio frequency of 433 MHz.
  • the signal emitted by the transponders contains the respective transponder number, so that the transponder serves as an identification means for the objects to be protected in this way.
  • the semi-active transponders preferably each contain their own energy source, for example a battery.
  • the range of the signal emitted by the transponders is preferably chosen to be sufficiently large to enable secure detection of the transponders. It is preferably several meters, preferably about 2 to 50 m. Transmission ranges are in the order of 20 to 30 m Particularly advantageous, since in this case a reliable detection of all objects transported from the area to be secured can be combined with a greater distance to the detector and avoidance of erroneous detection of objects not moved out of the area to be secured.

Landscapes

  • Engineering & Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • Automation & Control Theory (AREA)
  • Computer Security & Cryptography (AREA)
  • General Physics & Mathematics (AREA)
  • Electromagnetism (AREA)
  • Multimedia (AREA)
  • Library & Information Science (AREA)
  • Burglar Alarm Systems (AREA)
  • Transition And Organic Metals Composition Catalysts For Addition Polymerization (AREA)
  • Radar Systems Or Details Thereof (AREA)
  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)
  • Alarm Systems (AREA)
  • Processes Of Treating Macromolecular Substances (AREA)
  • Storage Device Security (AREA)

Abstract

A method and a device for securing objects that are present in protected spatial areas, whereby the objects to be secured are provided with an identifier or linked with an identifier and said identifier is detected by a receiving unit when the object to be secured is displaced. For this purpose, the receiving unit detects the presence of the identifier and electronic data for proving the presence of the identifier are stored. The electronic data are adapted to allow an unambiguous assignment of the signal detected by the receiving unit to the identifier. Data are detected independently of the detection of the identifier that allow an identification of a person carrying an object to be secured.

Description

Die Erfindung betrifft ein Verfahren zum Sichern von Objekten, vorzugsweise innerhalb von geschlossenen Gebäuden, insbesondere zur Sicherung von Objekten, die zum Inventar eines Büros gehören.The invention relates to a method for securing objects, preferably within closed buildings, in particular for securing objects that belong to the inventory of an office.

Eine Vorrichtung zur Sicherung von ausgegebenen Werkzeugen oder Geräten ist aus der deutschen Gebrauchsmusterschrift DE 200 11 952 U1 bekannt. Hierbei wird an jedem Werkstück einer Werkzeugsammlung ein Transponder befestigt, der mittels einer 128 Bit großen Information Daten über die Art des Werkzeuges, eine laufende Seriennummer und die Angabe über den normalen Arbeitsplatz enthält. Der normale Arbeitsplatz kann dabei entweder ein Werkzeugkasten oder ein fester Ablageplatz sein, solange an diesem Arbeitsplatz ein ortsfester Empfänger zum Austausch von Signalen mit den an den Werkzeugen befestigten Transpondern ist. Der Empfänger ist seinerseits mit einem Rechner verbunden, der die Auswertung der durch den Empfänger empfangenen und mittels der im Werkzeugkasten oder am Arbeitsplatz befindlichen Werkzeuge angebrachten Transponder ausgesendeten Signale ermöglicht. Es ist somit zu jedem Zeitpunkt während der innerbetrieblichen Arbeitsabläufe möglich, sich den aktuellen Bestand der in einem bestimmten Werkzeugkasten oder Arbeitsplatz befindlichen Werkzeuge anzeigen zu lassen. In einer weiteren Ausführungsform der Vorrichtung wird jedem Mitarbeiter ein eigener Transponder zugeordnet, mittels dessen der zum Mitarbeiter zugehörige Werkzeugkasten geöffnet werden kann.A device for securing issued tools or equipment is from the German utility model DE 200 11 952 U1 known. In this case, a transponder is attached to each workpiece of a tool collection, which contains information about the type of tool, an ongoing serial number and the information about the normal workstation by means of a 128-bit information. The normal workstation can either be a toolbox or a fixed storage space, as long as there is a fixed receiver for exchanging signals with the transponders attached to the tools at this workstation. The receiver is in turn connected to a computer which enables the evaluation of the signals received by the receiver and transmitted by the transponder located in the toolbox or at the workstation. It is therefore possible at any time during the internal work processes, the current stock of a specific Toolbox or workstation. In a further embodiment of the device, each employee is assigned a separate transponder by means of which the tool box belonging to the employee can be opened.

Aus der deutschen Offenlegungschrift DE 197 45 953 A1 ist eine Vorrichtung zur automatischen Detektion und Identifikation eines Warensicherungsetikettes durch eine Basisstation bekannt. Das am zu sichernden Produkt befestigte Warensicherungsetikett beherbergt einen Transponder, der über eine eigene NF-Sende-Empfangseinheit verfügt, die zur Kommunikation mit der Basisstation verwendet wird. Tritt beispielsweise ein Transponder in den Wirkungsbereich des durch die Basiseinheit bereitgestellten elektromagnetischen Feldes, wird durch die Basisstation ein Kontrollsignal ausgesendet, das vom Transponder empfangen wird und den Transponder seinerseits zur Abstrahlung eines Antwortsignals veranlasst. Dieses Antwortsignal wird von der Basisstation weiterverarbeitet und löst im Falle einer erfolgreichen Überprüfung einen Sendeimpuls an der Basisstation aus, der wiederum vom Transponder empfangen wird. Diese Sende-Empfangsabfolge kann dazu benutzt werden, vorher festgelegte Überprüfungskriterien zu integrieren, deren Nichteinhalten zum Auslösen eines Alarms führt. Ein bevorzugtes Ausführungsbeispiel sieht vor, die Alarmsignale von mehreren im Wirkungsbereich des elektromagnetischen Feldes der Basisstation befindlichen Transpondern zu synchronisieren, so dass ein sicheres Erkennen eines empfangenen Alarmsignals durch die Basisstation gewährleistet wird.From the German Offenlegungschrift DE 197 45 953 A1 a device for the automatic detection and identification of a merchandise security label by a base station is known. The security tag attached to the product to be secured houses a transponder having its own LF transceiver unit used to communicate with the base station. If, for example, a transponder enters the sphere of action of the electromagnetic field provided by the base unit, a control signal is transmitted by the base station which is received by the transponder and in turn causes the transponder to emit a response signal. This response signal is further processed by the base station and triggers a transmission pulse at the base station in the event of a successful check, which in turn is received by the transponder. This transmit-receive sequence can be used to integrate predetermined verification criteria, the non-compliance of which leads to the triggering of an alarm. A preferred embodiment provides to synchronize the alarm signals of a plurality of transponders located in the effective range of the electromagnetic field of the base station, so that a secure detection of a received alarm signal is ensured by the base station.

Eine weitere Vorrichtung zur elektronischen Diebstahlsicherung ist aus der deutschen Offenlegungsschrift DE 38 07 936 A1 bekannt. Die Druckschrift offenbart eine besonders bevorzugte Konstruktion von einem mit einem Barcode kombinierten, in seinen Dimensionen äußerst kleinen passiven Transponder, dessen Empfänger auf die doppelte Sendefrequenz abgestimmt und dadurch unsensitiv gegenüber Reflexionen der Grundwelle des Senders ist. Die stationäre Sendeeinrichtung wird entweder mittels üblicher Sende-Empfangseinrichtungen aus dem Bereich der Hochfrequenztechnik oder durch Array-Antennen in stripline Technik realisiert, so dass das Durchschreiten des mit dem Transponder gekennzeichneten Produkts durch das von der stationären Sende-Empfangseinheit aufgebaute elektromagnetische Feld den passiven Transponder dazu anregt, Strahlung auszusenden. Die durch den passiven Transponder ausgesendete Strahlung kann daraufhin zum Auslösen eines Alarmsignals verwendet werden.Another device for electronic anti-theft device is from the German patent application DE 38 07 936 A1 known. The document discloses a particularly preferred Construction of a combined with a barcode, in its dimensions extremely small passive transponder whose receiver is tuned to twice the transmission frequency and thus insensitive to reflections of the fundamental wave of the transmitter. The stationary transmitting device is realized either by means of conventional transceivers from the field of high-frequency technology or by array antennas in stripline technology, so that the passage through the product marked with the transponder by the constructed by the stationary transceiver electromagnetic field to the passive transponder stimulates radiation. The radiation emitted by the passive transponder can then be used to trigger an alarm signal.

Eine Vorrichtung zum Auffinden von Akten ist durch die deutsche Offenlegungsschrift DE 100 33557 A1 bekannt. Hierbei werden Signalgeber in Form von Transpondern an den Akten befestigt und die von den Transpondern ausgesendeten kodierten Signale durch vorzugsweise an den Decken montierten Sende-Empfangseinrichtungen detektiert und anschließend einer Datenbank zur internen Verwaltung zur Verfügung gestellt. Ein zentraler Computer ermöglicht mittels einer angepassten Verwaltungsroutine die bestehenden Datensätze dergestalt zu verarbeiten, dass jederzeit der aktuelle Aufenthaltsort einer beliebigen Akte aus dem Aktenbestand ermittelt werden kann.A device for finding files is by the German patent application DE 100 33557 A1 known. In this case, signal transmitters are attached to the files in the form of transponders and the coded signals emitted by the transponders are detected by transceivers preferably mounted on the ceilings and subsequently made available to a database for internal administration. A central computer allows using an adapted administrative routine to process the existing records in such a way that at any time the current location of any file can be determined from the file.

Verschiedene Vorrichtungen zur Konstruktion und Weiterentwicklung von Transpondern (passiver oder aktiver Funktionsaufbau) findet man beispielsweise in der europäischen Patentschrift EP 1 040 447 B1 oder in der europäischen Patentschrift EP 0 762 535 B1 .Various devices for the construction and development of transponders (passive or active functional structure) can be found for example in the European patent EP 1 040 447 B1 or in the European patent specification EP 0 762 535 B1 ,

Der bisherige Stand der Technik zum Thema Sicherung von Gegenständen beschreibt vom Wesen her Vorrichtungen zur expliziten Erkennung von an Gegenständen befestigten Signalgebern, sobald diese sich innerhalb eines vorgegebenen Bereiches befinden.The state of the art in the field of securing objects essentially describes devices for the explicit recognition of signalers attached to objects as soon as they are within a predetermined range.

Die US-Patentschrift US 6 195 006 B1 beschreibt ein Inventarsystem, bei dem Artikel, die an Kunden ausgeliehen werden, mit jeweils einem Transponder versehen werden. An einer Artikelausgabestelle werden die von den Transpondern ausgesendete Signale sowie Identifizierungsmerkmale von Kunden, an welche die Artikel ausgegeben werden, erfasst und an eine Datenbank übermittelt werden. Eine Rückgabe der Artikel erfolgt an einer oder mehreren Rückgabestellen, an denen Transpondersignale zurückgegebener Artikel erfasst und an die Datenbank übermittelt werden.The US patent US 6,195,006 B1 describes an inventory system in which items loaned to customers are each provided with a transponder. At an article delivery point, the signals emitted by the transponders and identification features of customers to whom the articles are issued are recorded and transmitted to a database. Return of the articles takes place at one or more return points where transponder signals of returned articles are collected and transmitted to the database.

Aus der US-Patentschrift US 5 745 036 beschreibt ein Warensicherungssystem für ein Kaufhaus, bei dem Waren mit Transpondern versehen sind, die Signale mit Identifzierungscodes der Waren emittieren. Das System umfasst mehrere Kassen und einen Computer, in dem an den Kassen erfasste Identifikationscodes von bezahlten Waren gespeichert werden. Im Bereich des Kaufhausausgangs werden die Identifikationscodes zusammen mit Datum und Zeit erfasst und es werden, ebenfalls mit Angabe von Datum und Zeit, Videoaufnahmen der die Waren transportierenden Personen gemacht. Zur Erkennung von Diebstählen werden die an den Kassen erfassten Identifikationscodes regelmäßig mit den am Kaufhausausgang erfassten Codes verglichen und die entsprechenden Videodaten ausgewertet.From the US patent US 5,745,036 describes a merchandise security merchandise system in which merchandise is provided with transponders that emit signals with identification codes of the merchandise. The system comprises a plurality of cash registers and a computer in which cash register identification codes of paid goods are stored. In the area of the department store exit, the identification codes are recorded together with the date and time, and video recordings of the persons transporting the goods are made, also indicating the date and time. In order to detect theft, the identification codes recorded at the cash registers are regularly compared with the codes recorded at the department store outlet and the corresponding video data are evaluated.

Der Erfindung liegt die Aufgabe zugrunde, ein gattungsgemäßes Verfahren so weiter zu entwickeln, dass sich ermitteln lässt, ob einzelne Gegenstände unerlaubt aus einem vorgegebenen Bereich, insbesondere einem geschlossenen Gebäude oder einem Bereich eines Gebäudes entfernt wurden, wobei das Verfahren so durchgeführt werden soll, dass ein Transport von berechtigterweise aus dem geschützten Raumbereich verbringbaren Objekten unbeeinträchtigt erfolgen kann.The invention has for its object to further develop a generic method so that it can be determined whether individual objects were removed without permission from a predetermined area, in particular a closed building or an area of a building, the method should be carried out so that a transport of legitimate objects that can be moved out of the protected spatial area can take place undisturbed.

Erfindungsgemäß wird diese Aufgabe durch ein Verfahren nach dem Patentanspruch 1 gelöst.According to the invention this object is achieved by a method according to claim 1.

Es ist insbesondere vorgesehen, dass ein Verfahren zur Sicherung von Objekten so durchgeführt wird, dass die Empfangseinheit ein Vorhandensein des Identifikationsmittels erfasst, wobei die zu sichernden Objekte mit einem Identifikationsmittel ausgestattet oder mit dem Identifikationsmittel verbunden sind, das Identifikationsmittel bei einem Transport des zu sichernden Objektes von einer Empfangseinheit erfasst wird und elektronische Daten zum Nachweis des Vorhandenseins des Identifikationsmittels gespeichert werden, wobei die elektronischen Daten so beschaffen sind, dass sie eine eindeutige Zuordnung des von der Empfangseinheit erfassten Signals zu dem Identifikationsmittel ermöglichen, und dass unabhängig von der Erfassung des Identifikationsmittels eine Erfassung von Informationen erfolgt, die eine Identifizierung einer ein zu sicherndes Objekts befördernde Person ermöglichen.It is in particular provided that a method for securing objects is carried out such that the receiving unit detects a presence of the identification means, wherein the objects to be secured are equipped with an identification means or connected to the identification means, the identification means during a transport of the object to be secured is detected by a receiving unit and electronic data for detecting the presence of the identification means are stored, the electronic data being such that they allow a unique assignment of the signal detected by the receiving unit to the identification means, and that regardless of the detection of the identification means a Acquisition of information takes place, which allow an identification of a person to be secured a conveyed person.

Hierdurch ist es möglich, dass eine Vielzahl von Objekten aus einem Gebäude transportiert werden kann, ohne dass eine Veränderung eines diese Objekte sichernden Identifikations-mittels erforderlich ist, und ohne dass eine Beeinträchtigung der Personen erfolgt, die diese Objekte berechtigterweise aus dem zu sichernden Bereich transportieren.This makes it possible that a plurality of objects can be transported out of a building, without requiring a modification of an identification means securing these objects, and without any impairment of the persons who legitimately transport these objects from the area to be protected ,

Eine erste bevorzugte Ausführungsform der Erfindung zeichnet sich dadurch aus, dass die das zu sichernde Objekt transportierende Person dadurch erfasst wird, dass der Berechtigungsausweis der Person in einem automatisierten Überprüfungsschritt kontrolliert erfasst wird.A first preferred embodiment of the invention is characterized in that the person transporting the object to be secured is detected in that the authorization card of the person is detected in a controlled manner in an automated checking step.

Hierdurch ist es möglich, auf eine besonders einfache und sichere Weise zu ermitteln, welche Person ein zu sicherndes Objekt aus dem geschützten Bereich herausgebracht hat.This makes it possible to determine in a particularly simple and secure manner, which person has brought out an object to be secured from the protected area.

Ferner ist es vorteilhaft, das Verfahren so durchzuführen, dass eine Videoaufnahme der das zu sichernde Objekt transportierenden Person erfolgt.Furthermore, it is advantageous to carry out the method in such a way that a video recording of the person transporting the object to be secured takes place.

Hierdurch ist gleichfalls eine sichere Identifikation von Personen möglich, die zu sichernde Objekte aus dem geschützten Bereich herausgebracht haben.As a result, a secure identification of persons who have brought out objects to be protected from the protected area is also possible.

Eine besonders bevorzugte Ausführungsform der Erfindung zeichnet sich dadurch aus, dass die Identifikationsdaten der zu sichernden Objekte und die Identifikationsdaten der die zu sichernden Objekte transportierenden Personen voneinander getrennt erfasst werden, wobei die Identifikationsdaten der Objekte und/oder die Identifikationsdaten der Personen in einem gegen einen äußeren Zugriff besonders gesicherten Datenbereich gesichert werden.A particularly preferred embodiment of the invention is characterized in that the identification data of the objects to be protected and the identification data of the persons to be secured objects to be detected separately, wherein the identification data of the objects and / or the identification data of persons in a against an outer Access secured data area to be backed up.

Diese Ausführungsform der Erfindung eignet sich insbesondere für einen Einsatz in Anwendungsgebieten, bei dem innerhalb des geschützten Bereichs eine Vielzahl von Personen tätig sind, deren Persönlichkeitsrechte eines besonderen Schutzes bedürfen.This embodiment of the invention is particularly suitable for use in application areas in which, within the protected area, a large number of persons are active whose personal rights require special protection.

Insbesondere ermöglicht es diese Ausführungsform der Erfindung zu verhindern, dass berechtigte Beförderungsvorgänge von zu sichernden Objekten beliebig mit den sie befördernden Personen verbunden werden können.In particular, this embodiment of the invention makes it possible to prevent legitimate transport operations of objects to be secured from being arbitrarily connected with the persons carrying them.

Beispielsweise ist es hierdurch möglich, dass nur unter besonderen Voraussetzungen ein Zugriff auf gespeicherte Identifikationsdaten von Personen und/oder eine Verknüpfung der Identifikationsdaten der Personen mit Identifikationsdaten von zu sichernden Objekten erfolgt.By way of example, this makes it possible for access to stored identification data of persons and / or linking of the identification data of the persons with identification data of objects to be secured to be performed only under special conditions.

Eine besonders zweckmäßige Ausführungsform der Erfindung ermöglicht es, zwar Personen zu ermitteln, die Gegenstände widerrechtlich aus dem zu sichernden Bereich transportiert haben, jedoch einen Zugriff auf Identifikationsdaten der Personen, die berechtigterweise Gegenstände aus dem zu schützenden Bereich verbracht haben, zu verhindern.A particularly expedient embodiment of the invention makes it possible to detect persons who have unlawfully transported objects from the area to be secured, but to prevent access to identification data of persons who have legitimately spent objects from the area to be protected.

Zur Verhinderung eines Zugriffs auf zu schützende Personendaten ist es besonders vorteilhaft, dass ermittelt wird, welche der aus dem geschützten Raumbereich verbrachten Gegenstände zurückgebracht werden.In order to prevent access to personal data to be protected, it is particularly advantageous to determine which objects returned from the protected area are returned.

Ferner ist es vorteilhaft, das Verfahren so durchzuführen, dass elektronische Daten über das Entfernen eines Objekts aus dem gesicherten Bereich gelöscht werden, wenn das zu sichernde Objekt in den gesicherten Bereich zurückgebracht wird.Furthermore, it is advantageous to carry out the method so that electronic data about the removal of an object from the secure area are deleted when the secured Object is returned to the secured area.

Dies hat sowohl den Vorteil, dass die Gefahr eines Missbrauchs von gespeicherten Daten verringert wird, als auch, dass der für die Datenspeicherung erforderliche Speicherplatz verringert wird.This has the advantage of both reducing the risk of misuse of stored data and of reducing the storage space required for data storage.

Ferner ist es zweckmäßig, dass überprüft wird, ob Objekte innerhalb eines vorgebbaren Zeitraums wieder in den zu sichernden Bereich zurückgebracht wurden, und dass für den Fall, dass eines der zu sichernden Objekte nicht innerhalb des vorgebbaren Zeitraums in den geschützten Bereich zurückgebracht wurde, eine automatisierte Bearbeitungsroutine gestartet wird.Furthermore, it is expedient to check whether objects have been returned to the area to be secured within a predefinable period of time, and in the event that one of the objects to be secured has not been returned to the protected area within the specifiable period, an automated Processing routine is started.

Hierdurch ist es möglich, ein Entwenden von gesicherten Objekten automatisiert zu erfassen, ohne dass eine Beeinträchtigung von berechtigten Transportvorgängen der gesicherten Objekte erfolgt.This makes it possible to automatically detect a stealing of secured objects, without any impairment of legitimate transport operations of the secured objects.

Ferner ist es vorteilhaft, dass die automatisierte Bearbeitungsroutine eine Erzeugung eines Warnhinweises beinhaltet.Furthermore, it is advantageous that the automated processing routine includes generation of a warning.

Eine weitere bevorzugte Ausführungsform der Erfindung zeichnet sich dadurch aus, dass ein Zugriff auf den gesicherten Datenbereich erst nach Eingabe wenigstens eines Berechtigungscodes erfolgt.A further preferred embodiment of the invention is characterized in that access to the secure data area only after entering at least one authorization code.

Ferner ist es zweckmäßig, dass ein Zugriff auf den besonders gesicherten Datenbereich nur nach der voneinander unabhängigen Eingabe von zwei verschiedenen Berechtigungscodes erfolgt.Furthermore, it is expedient that access to the particularly secure data area only takes place after the independent entry of two different authorization codes.

Eine weitere vorteilhafte Ausführungsform der Erfindung sieht vor, ein Verfahren zur Sicherung von Objekten innerhalb von geschützten Raumbereichen, bei dem die zu sichernden Objekte einen Sender tragen, der Sender in Anwesenheit eines Empfangsfeldes ein kodiertes Signal bereitstellt, das kodierte Signal über eine Empfangseinheit detektiert und anschließend in elektronisch verarbeitbare kodierte Daten konvertiert wird, so durchzuführen, dass die Empfangseinheit die elektronischen Daten verstärkt, dass die elektronischen Daten über eine Schnittstelle an eine erste Datenübertragungsleitung übermittelt werden, dass die kodierten Daten in einem Datenspeicherungsmittel gespeichert werden, dass bei Empfang der kodierten Daten eine Aufzeichnungseinheit für Videodaten aktiviert wird, und dass die Videodaten gespeichert werden.A further advantageous embodiment of the invention provides a method for securing objects within protected areas, in which the objects to be protected carry a transmitter, the transmitter provides a coded signal in the presence of a reception field, detects the coded signal via a receiving unit and then is converted into electronically processable coded data to be performed so that the receiving unit amplifies the electronic data that the electronic data is transmitted via an interface to a first data transmission line, that the coded data is stored in a data storage means that upon receipt of the coded data Recording unit for video data is activated, and that the video data is stored.

Ein weiterer Gegenstand der Erfindung ist eine Vorrichtung zur Sicherung von Objekten innerhalb von geschlossenen Gebäuden, wobei das zu sichernde Objekt einen Sender trägt, welcher in Anwesenheit eines Empfangsfeldes ein kodiertes Signal bereitstellt, wobei das kodierte Signal über eine Empfangseinheit detektiert und anschließend in elektronisch verarbeitbare kodierte Daten konvertiert wird.Another object of the invention is a device for securing objects within closed buildings, wherein the object to be protected carries a transmitter which provides a coded signal in the presence of a reception field, wherein the coded signal detected by a receiving unit and then coded into electronically processable Data is converted.

Diese Vorrichtung zeichnet sich dadurch aus, dass die Vorrichtung eine Empfangseinheit enthält, wobei die Empfangseinheit die elektronischen Daten verstärkt, dass die Vorrichtung eine Schnittstelle enthält, wobei die Schnittstelle eine Verbindung zwischen der Empfangseinheit und der ersten Datenübertragungsleitung ermöglicht, dass die Schnittstelle so beschaffen ist, dass die codierten Daten an ein Datenübertragungsnetzwerk übermittelt werden können, und dass das Datenübertragungsnetzwerk die Schnittstelle an ein Datenarchiv zur Verarbeitung und Speicherung von Daten anschließt, und somit die kodierten Daten innerhalb des Archivs hinterlegt werden können, wobei die kodierten Daten einen Schaltvorgang auslösen, eine in räumlicher Nähe zum Empfangsfeld befindliche Aufzeichnungseinheit zur Verarbeitung von Videodaten aktiviert, wobei die von der Aufzeichnungseinheit gemessenen Videodaten mittels einer zweiten Datenübertragungsleitung an das Archiv übertragen und im Archiv gespeichert werden, wobei nach Ablauf eines Zeitintervalls innerhalb dessen kein weiteres Empfangsereignis infolge eines Signals derselben Kodierung erfolgte, ein Auslesen der zuvor zur Kodierung zugehörigen gespeicherten Daten des Objekts sowie der Videodaten ausgelöst wird.This device is characterized in that the device includes a receiving unit, wherein the receiving unit amplifies the electronic data, that the device includes an interface, wherein the interface allows a connection between the receiving unit and the first data transmission line, that the interface is such, that the coded data can be transmitted to a data transmission network and that the data transmission network connects the interface to a data archive Processing and storage of data connects, and thus the encoded data can be stored within the archive, wherein the encoded data trigger a switching operation, a located in proximity to the receiving field recording unit for processing video data, the measured by the recording unit video data by means of a transmitted second data transmission line to the archive and stored in the archive, wherein after expiration of a time interval within which no further receiving event due to a signal of the same coding was carried out, a reading of the previously associated with coding stored data of the object and the video data is triggered.

Eine besonders bevorzugte Ausführungsform der Erfindung sieht vor, dass die Empfangseinheit zum Empfang und der Verstärkung des kodierten Signals mindestens eine der folgenden Signalarten verarbeiten kann: elektromagnetische Wellen, akustische Wellen, oder Infrarotstrahlung.A particularly preferred embodiment of the invention provides that the receiving unit for receiving and amplifying the coded signal can process at least one of the following signal types: electromagnetic waves, acoustic waves, or infrared radiation.

Ferner ist es vorteilhaft, dass die Empfangseinheit ein Senden von Signalen ermöglicht.Furthermore, it is advantageous that the receiving unit enables a transmission of signals.

Es ist zudem vorteilhaft, dass die erste und die zweite Datenübertragungsleitung jeweils ein Medium zum verlustfreien Übertragen von Daten ist.It is also advantageous that the first and the second data transmission line is in each case a medium for the loss-free transmission of data.

Eine besonders bevorzugte Ausführungsform der Erfindung sieht vor, dass die erste Datenübertragungsleitung ein RS 232 Kabel ist.A particularly preferred embodiment of the invention provides that the first data transmission line is a RS 232 cable.

Ferner ist es vorteilhaft, dass die zweite Datenübertragungsleitung ein Koaxial-Kabel ist.Furthermore, it is advantageous that the second data transmission line is a coaxial cable.

Eine besonders bevorzugte Ausführungsform der Erfindung sieht vor, dass die Schnittstelle ein Gateway ist.A particularly preferred embodiment of the invention provides that the interface is a gateway.

Ferner ist es vorteilhaft, dass der Empfänger sowie die Schnittstelle eine Einheit mit einer gemeinsamen Energieversorgung bilden.Furthermore, it is advantageous that the receiver and the interface form a unit with a common power supply.

Eine besonders bevorzugte Ausführungsform der Erfindung sieht vor, dass das Datenübertragungsnetzwerk aus mindestens einem RS 485 Bus sowie mindestens einer Datenübertragungsleitung besteht.A particularly preferred embodiment of the invention provides that the data transmission network consists of at least one RS 485 bus and at least one data transmission line.

Ferner ist es vorteilhaft, dass die Datenübertragungsleitung ein RS 485 Kabel ist.Furthermore, it is advantageous that the data transmission line is a RS 485 cable.

Eine besonders bevorzugte Ausführungsform der Erfindung sieht vor, dass mindestens ein Datenarchiv an das Datenübertragungsnetzwerk angeschlossen ist.A particularly preferred embodiment of the invention provides that at least one data archive is connected to the data transmission network.

Ferner ist es vorteilhaft, dass das Datenarchiv über mindestens einen FBAS (BNC) Videoeingang und maximal vier FBAS (BNC) Videoeingänge verfügt.Furthermore, it is advantageous that the data archive has at least one composite video input (BNC) and a maximum of four composite video inputs (BNC).

Eine besonders bevorzugte Ausführungsform der Erfindung sieht vor, dass das Datenarchiv an ein lokales Netzwerk angeschlossen ist, wodurch an voneinander verschiedenen Orten innerhalb des Netzwerks Daten aus dem Archiv zur Auswertung bereitgestellt werden.A particularly preferred embodiment of the invention provides that the data archive is connected to a local network, whereby data from the archive is provided for evaluation at mutually different locations within the network.

Ferner ist es vorteilhaft, dass das lokale Netzwerk ein Ethernet ist.Furthermore, it is advantageous that the local network is an Ethernet.

Eine besonders bevorzugte Ausführungsform der Erfindung sieht vor, dass die Auswertung der Daten durch einen Computer mit einem Mittel zur Verarbeitung von Internetstandards verfügt.A particularly preferred embodiment of the invention provides that the evaluation of the data by a computer having a means for processing Internet standards has.

Ferner ist es vorteilhaft, dass das Datenarchiv ein digitales Datenarchiv ist.Furthermore, it is advantageous that the data archive is a digital data archive.

Eine besonders bevorzugte Ausführungsform der Erfindung sieht vor, dass das digitale Datenarchiv eine Festplatte zur Speicherung der Daten verwendet.A particularly preferred embodiment of the invention provides that the digital data archive uses a hard disk to store the data.

Ferner ist es vorteilhaft, dass das Datenarchiv ein analoges Datenarchiv ist.Furthermore, it is advantageous that the data archive is an analog data archive.

Eine besonders bevorzugte Ausführungsform der Erfindung sieht vor, dass der Sender zur Bereitstellung der kodierten Signale mindesten eine der folgenden Signalarten bereitstellt: elektromagnetische Wellen, akustische Wellen, oder Infrarotstrahlung.A particularly preferred embodiment of the invention provides that the transmitter provides at least one of the following signal types for providing the coded signals: electromagnetic waves, acoustic waves, or infrared radiation.

Ferner ist es vorteilhaft, dass der Sender zur Bereitstellung der kodierten Signale ein Transponder ist.Furthermore, it is advantageous that the transmitter for providing the coded signals is a transponder.

Eine besonders bevorzugte Ausführungsform der Erfindung sieht vor, dass der Sender ein halbaktiver Transponder ist.A particularly preferred embodiment of the invention provides that the transmitter is a semi-active transponder.

Ferner ist es vorteilhaft, dass die Objekte vorzugsweise zu einem Büroinventar, wie Faxgeräte, Mobiltelefone, Laserbeamer, Datenträger oder Akten gehören.Furthermore, it is advantageous that the objects preferably belong to an office inventory, such as fax machines, mobile phones, laser beamer, data carriers or files.

Die Präsenz der Signalgeber im Detektionsfeld oder auch Sende-Empfangsfeld, welches vorzugsweise ein elektromagnetisches Feld ist, wird entweder zur Generierung eines Alarmsignals oder zur Registrierung und Speicherung von dem Signalgeber innewohnenden, kodierten Daten verwendet. Es ist eine Vielzahl an möglichen Einsatzarten realisierbar. Bei Vorrichtungen bzw. Verfahren, welche die Erzeugung eines kodierten Signals mittels eines am Gegenstand befestigten Signalgebers dazu benutzen, um die empfangenen kodierten Daten separat in einem Speicher abzulegen, wobei letzterer an eine Datenverarbeitungsroutine angeschlossen ist, wird die Datenverarbeitungsroutine in der Regel für den folgenden Ablauf eingesetzt: nach erfolgter Signaldetektion wird mittels der Signalkodierung eine Aussage darüber getroffen, welcher Gegenstand gegebenenfalls zu welchem Zeitpunkt in Wechselwirkung mit dem Detektionsfeld stand, wobei der Standort des Detektionsfelds indirekt eine Aussage über den aktuellen Aufenthaltsort des Gegenstandes trifft.The presence of the signal generator in the detection field or also the transmission-reception field, which is preferably an electromagnetic field, is either used to generate an alarm signal or used for registration and storage of the signal generator inherent, coded data. There is a variety of possible types of use feasible. In devices which use the generation of a coded signal by means of a signal-attached to the object to store the received coded data separately in a memory, the latter being connected to a data processing routine, the data processing routine is usually for the following sequence used: after the signal detection, a statement is made by means of the signal coding, which optionally where at any time in interaction with the detection field, the location of the detection field indirectly makes a statement about the current location of the object.

Obwohl die Erfindung grundsätzlich mit bekannten Warensicherungsverfahren kombinierbar ist und sich bekannte Warensicherungssysteme grundsätzlich für die Durchführung der Erfindung umgestalten lassen, ermöglicht die Erfindung jedoch eine erheblich umfassendere Funktionsweise.Although the invention is fundamentally combinable with known anti-theft methods and that known anti-theft systems can in principle be reconfigured for carrying out the invention, the invention enables a considerably more comprehensive mode of operation.

Insbesondere ist es durch die Erfindung möglich, ein Warensicherungssystem zu betreiben, bei dem zu sichernde Objekte aus einem geschützten Bereich verbracht werden können, ohne dass hierzu eine Deaktivierung oder Entfernung von Sicherungsetiketten erforderlich ist.In particular, it is possible by the invention to operate a merchandise security system in which objects to be secured can be moved out of a protected area without the need for deactivating or removing security tags.

Insbesondere ermöglicht es die Erfindung, ein Warensicherungssystem zu realisieren, bei dem ohne das Erfordernis einer Deaktivierung von Sicherungsetiketten ein unbefugtes Entwenden von zu sichernden Objekten wirksam vermieden wird.In particular, the invention makes it possible to realize an article surveillance system in which unauthorized stealing of objects to be secured is effectively avoided without the need for deactivating security tags.

Im Zuge einer umfangreicheren Veranschaulichung der erzielten Funktionalität wird dazu das folgende Beispiel angeführt: Die gemeinsame Nutzung von z.B. Faxgeräten, Mobiltelefonen, tragbaren Computern, Laserbeamern oder Datenträgern innerhalb eines Gebäudekomplexes, vorzugsweise eines Bürogebäudes, erfordert die Ausgestaltung einer Vorrichtung, die es prinzipiell den Arbeitern im Gebäudekomplex erlaubt, die obigen Gegenstände zu benutzen und - falls erforderlich - zu delokalisieren, allerdings sollte vorzugsweise jederzeit, wenn ein Gegenstand aus einem Bereich innerhalb des Gebäudes oder dem Gebäude selbst entnommen wird, ein Vorgang in Gang gesetzt werden, der die Rückbezüglichkeit zwischen der Person, die den Gegenstand entnommen hat und dem Gegenstand ermöglicht.In the course of a more complete illustration of the functionality achieved, the following example is given: the sharing of e.g. Fax machines, mobile telephones, portable computers, laser beacons or data carriers within a building complex, preferably an office building, requires the design of a device which, in principle, allows the workers in the building complex to use the above objects and - if necessary - to delocalize, but preferably should do so at all times When an object is removed from an area within the building or the building itself, a process is initiated which allows the back-reference between the person who has taken the object and the object.

Diese Rückbezüglichkeit ermöglicht, dass man Rückschlüsse über die Art, wie und wer den entsprechenden Gegenstand durch den Detektionsbereich geführt hat, ziehen kann. Auf der anderen Seite ist es nicht immer ohne weiteres möglich, den Träger, beziehungsweise die Person, die sich im Besitz des zu sichernden Gegenstandes befindet, dergestalt zu kennzeichnen, dass ein eindeutiger Bezug zwischen dem Gegenstand und dem Träger der Ware herzustellen ist. Eine Möglichkeit bestünde darin, sämtlichen Personen, die den Gegenständen zugänglich sind, jeweils einen weiteren Signalgeber zukommen zu lassen, der personenbezogene Daten an einen Empfänger weitersendet, sobald er in das Detektionsfeld eintritt.This feedback makes it possible to draw conclusions about the way and who guided the corresponding object through the detection area. On the other hand, it is not always readily possible to identify the wearer, or the person who is in possession of the object to be secured, in such a way that a clear link must be established between the object and the wearer of the goods. One possibility would be to provide each person who is accessible to the objects, in each case with a further signal generator, which transmits personal data to a recipient as soon as he enters the detection field.

Die Erfindung eignet sich insbesondere für einen Einsatz in geschlossenen Gebäuden, beispielsweise Bürogebäuden, da man ein Mittel zur personenbezogenen Identifikation, z.B. ein Firmenausweis, mit einem zusätzlichen Transponder ausstatten könnte, dessen in einem Detektionsfeld evozierten Signale einen Rückbezug auf den Träger der Karte zulassen würde. Eine denkbare Vorrichtung könnte derart beschaffen sein, dass infolge eines koinzidenten Auftreffens eines kodierten Signals des an einem Gegenstand angebrachten Transponders und eines weiteren kodierten Signals des am Firmenausweis befindlichen weiteren Transponders bei Betreten des Detektionsbereichs ein Speichervorgang ausgelöst wird, der sämtliche kodierten Daten aufzeichnet. Die Erfolgsgarantie einer solchen Warensicherungsvorrichtung ist allerdings abhängig vom Tragen des personenbezogenen Identifikationsmittels. Zudem könnte das Tragen eines fremden Identifikationsmittels zu unrechtmäßigen Rückbezügen führen.The invention is particularly suitable for use in closed buildings, such as office buildings, since one could equip a means for personal identification, such as a company card, with an additional transponder whose signals evoked in a detection field would allow a reference back to the carrier of the card. A conceivable device could be such that as a result of a coincident impact of a coded signal of the transponder attached to an object and a further coded signal of the further transponder located on the company identity card, upon entering the detection area a storage process is triggered which records all encoded data. However, the guarantee of success of such a merchandise security device is dependent on wearing the personal identification means. In addition, the wearing of a foreign means of identification could lead to illegal back payments.

Ein weiterer Aspekt eines erfindungsgemäßen Gebrauchsgegenstandssicherungssystems liegt in der Wahrung des Datenschutzes bei gleichzeitiger Nutzung der Gebrauchsgegenstände durch eine Vielzahl an befugten Nutzern, wobei die Gegenstände zu jeder Zeit innerhalb eines Systems eingebunden sein sollen, welches ein unbefugtes Entwenden eines Gegenstandes ermittelt und einen Rückbezug zum Entwendenden ermöglicht, bei gleichzeitiger Wahrung des Datenschutzes.Another aspect of a consumer protection system according to the invention is the protection of data privacy with the simultaneous use of the commodities by a plurality of authorized users, the objects are to be integrated at any time within a system, which determines an unauthorized stealing an item and allows a return to the stranger , while maintaining data protection.

Die Erfindung ermöglicht somit ein äußerst effektives datengeschütztes Gebrauchsgegenstandsicherungssystem, das sich insbesondere für einen Einsatz innerhalb von geschlossenen Gebäuden eignet.The invention thus enables a highly effective data-protected consumer article security system which is particularly suitable for use within enclosed buildings.

Weitere Vorteile, Besonderheiten und vorteilhafte Weiterbildungen der Erfindung ergeben sich aus den Unteransprüchen und der nachfolgenden Darstellung eines bevorzugten Ausführungsbeispiels anhand der Zeichnungen.Further advantages, features and advantageous developments of the invention will become apparent from the dependent claims and the following description of a preferred embodiment with reference to the drawings.

Abbildung 1 gibt eine schematische Darstellung der erfindungsgemäßen Vorrichtung wieder.Figure 1 is a schematic representation of the device according to the invention again.

Vorzugsweise beinhaltet die erfindungsgemäße Vorrichtung einen Computer zur Verarbeitung von aufgezeichneten Videodaten sowie der kodierten Daten des an einem zu sichernden Objekt befindlichen Senders.Preferably, the device according to the invention includes a computer for processing recorded video data and the encoded data of the transmitter located on an object to be protected.

Der Begriff "Computer" ist dabei in keiner Weise einschränkend zu verstehen. Es kann sich hierbei um eine beliebige, zur Durchführung von Berechnungen geeignete Einheit handeln, beispielsweise eine Workstation, einen Personalcomputer, einen Mikrocomputer oder eine zur Durchführung von Berechnungen und /oder Vergleichen geeignete Schaltung.The term "computer" is in no way limiting. It may be any unit suitable for performing calculations, such as a workstation, a personal computer, a microcomputer, or circuitry suitable for performing calculations and / or comparisons.

Unter dem Begriff Archiv ist insbesondere ein übergeordneter, computergesteuerter Speicher zu verstehen, der systematisch Daten und Informationen sammelt und verwaltet. Der Inhalt dieses Archivs wird mit mindestens einem geeigneten Mittel zur Datenverarbeitung strukturiert abgefragt und ausgegeben. Das Mittel zur Datenverarbeitung kann auf einer logischen problemorientierten Struktur der Daten zur Ablegung auf einen Massenspeicher basieren.The term archive is to be understood in particular as a superordinate, computer-controlled memory which systematically collects and manages data and information. The content of this archive is queried in a structured manner with at least one suitable means for data processing and output. The data processing means may be based on a logical problem-oriented structure of the data for storage on a mass storage device.

Einige bekannte symbolorientierte Strukturen sind unter den Kürzeln BASIC, PASCAL, C(++), COBOL, oder Java bekannt und dienen zur Entwicklung von komplexen Systemen. Darüber hinaus sind auch auf dem Internet basierende Strukturen bekannt. Das Internet ist hierbei als ein offenes Massennetzwerk von "Gateway"-Rechnern zu verstehen, die strukturell durch ein einheitliches Internet-Protokoll-Adressenschema sowie physisch über Datenleitungen verbunden sind.Some known symbol-oriented structures are known by the abbreviations BASIC, PASCAL, C ( ++ ), COBOL, or Java and are used to develop complex systems. In addition, Internet-based structures are also known. The Internet is to be understood here as an open mass network of "gateway" computers that are structurally connected by a uniform Internet Protocol address scheme as well as physically via data lines.

Im Sinne der erfindungsgemäßen Vorrichtung wird ein computergestütztes Netzwerk durch ein komplexes System an Daten verarbeitenden Mitteln und den die Daten verarbeitenden Mitteln verbindenden Datenleitungen beschrieben, wobei sich ein Netzwerk durch eine bestimmte Konfiguration von einem weiteren Netzwerk unterscheiden kann.For the purposes of the device according to the invention, a computer-aided network is processed by a complex system of data Means and the data lines connecting the data processing means described, wherein a network may differ by a particular configuration of another network.

Mittels eines Netzwerkes können somit mehrere Daten verarbeitende Mittel, die miteinander verbunden sind, zentrale Speicher und Daten, Drucker, Scanner usw. gemeinsam benutzt werden. Es sind unter anderem die folgenden Netzwerke bekannt:

  1. (1) mehrere Rechner, die räumlich begrenzt miteinander verbunden werden: "Local Area Network (LAN)". (2) Mehrere Rechner, die über ein weites Gebiet mithilfe von Telefonleitungen miteinander verbunden sind: " Wide Area Network (WAN)". (3) Netzwerk, das die Welt umspannt: " Global Area Network (GAN)". (4) Homogenes Netzwerk: Netz mit gleichartigen Rechnern und Software. (5) Heterogenes Netzwerk: Netz mit verschiedenartigen Rechnern und Software.
By means of a network, a plurality of data processing means connected to each other, central memories and data, printers, scanners, etc. can be shared. Among others, the following networks are known:
  1. (1) several computers that are spatially limited: " Local Area Network (LAN) ". (2) Multiple computers connected by telephone lines over a wide area: " Wide Area Network (WAN)". (3) Network spanning the world: " Global Area Network (GAN) ". (4) Homogeneous network: network with similar computers and software. (5) heterogeneous network: network with various computers and software.

Unter einem LAN ist vorzugsweise ein Datenübertragungsnetzwerk zu verstehen, das räumlich begrenzt die Kommunikation über einen Server ermöglicht und somit den Informationsaustausch ermöglicht. Herkömmlicherweise werden die Begriffe "Client" und "Server" für die Computer verwendet, die sich in einem Netzwerk befinden, und zwar dergestalt, dass ein Server für mehrere Clients zur Verfügung steht. Der Server stellt den Clients z.B. Speicherplatz, Rechenzeit oder Dateien zur Verfügung. Einige typische Beispiele für ein LAN sind die miteinander verbundenen Computer einer Universität oder einer Firma. Für die angeschlossenen Stationen lässt sich die Daten- und Peripherieverwaltung (z.B. Drucker, Modem etc.) gemeinsam benutzen. Ein typisches LAN ist das "Ethernet", das auf dem Bus-Prinzip arbeitet. Ein Ethernet arbeitet zurzeit mit normalen und mit Koaxialkabeln mit einer Geschwindigkeit von bis zu 10 Mbps (Mega bit per second). Das neuere "Fast Ethernet" sorgt für Übertragungsgeschwindigkeiten von bis zu 100 Mbps. Ferner ist ein LAN ein Netzwerk, das mit anderen LANs verbunden werden kann; eine Vielzahl von virtuellen LANs bildet das VLAN.A LAN is preferably to be understood as meaning a data transmission network which allows spatially limited communication via a server and thus enables the exchange of information. Conventionally, the terms " client " and " server " are used for the computers that are on a network, such that one server is available to multiple clients. The server provides the clients eg memory, computing time or files. Some typical examples of a LAN are the interconnected computers of a university or a company. For the connected stations, the data and peripheral management (eg printer, modem, etc.) can be shared. A typical LAN is the " Ethernet ", which works on the bus principle. An Ethernet currently operates at normal speed and with coaxial cables at a speed up to 10 Mbps (Mega bit per second). The newer " Fast Ethernet " provides for transmission speeds of up to 100 Mbps. Further, a LAN is a network that can be connected to other LANs; a variety of virtual LANs make up the VLAN.

Typische Leistungsmerkmale des Internets sind u.a.: (1) "Telnet " für den Aufruf von Programmen auf anderen Computern, (2) "FTP (File Transfer Protocol)" für die Übertragung von Dateien auf andere Computer, (3) "World Wide Web (WWW)" oder (4) " Gopher " für den themenbezogenen Zugriff auf Informationssysteme in aller Welt. Das Internet ist als weltweites Netz GAN, über TCP/IP verknüpft (TCP/IP steht für Transmission Control Protocol/Internet Protocol und ist ein Satz von Protokollen. Da beide sich ergänzen (TCP ist eine Kontrollinstanz für IP), werden sie häufig zusammen erwähnt.Typical features of the Internet include: (1) " Telnet " for calling programs on other computers, (2) " FTP ( File Transfer Protocol ) " for transferring files to other computers, (3) " World Wide Web ( WWW) "or (4)" Gopher "for subject-based access to information systems worldwide. The Internet is linked as global network GAN, via TCP / IP (TCP / IP stands for T ransmission C ontrol P rotocol / I nternet P rotocol and is a set of protocols. As both complement each other (TCP is a supervisory authority for IP) they are often mentioned together.

Eine typische auf dem Internet basierende Struktur ist die "Hypertext Markup Language (HTML)", die den Austausch von Hypertext-Dokumenten im WWW bestimmt und auf TCP/IP aufbaut. Hypertexte sind hierbei Textdokumente, dargestellt auf einer grafischen Oberfläche mit der Möglichkeit, durch Aktivierungen auf besonders gekennzeichnete Worte oder Symbole Aktionen auszulösen. Eine weitere auf dem Internet basierende Struktur ist die "Extensible Markup Language (XML)", welche eine Fortentwicklung von HTML darstellt. XML ermöglicht die deutlich vereinfachte Erstellung von komplexen Hypertext-Dokumenten im Datenverkehr des WWW. XML soll insbesondere im "E-Commerce"-Bereich des Internets umfassend eingesetzt werden.A typical Internet-based structure is Hypertext Markup Language (HTML) , which determines the exchange of hypertext documents on the WWW and builds on TCP / IP. Hypertexts are text documents displayed on a graphical user interface with the possibility of triggering actions on specially marked words or symbols. Another Internet-based structure is Extensible Markup Language (XML) , which is an evolution of HTML. XML makes it much easier to create complex hypertext documents in the WWW traffic. XML should be used extensively, especially in the " e-commerce " area of the Internet.

Schnittstellen werden in einer besonders vorteilhaften Ausführungsform der erfindungsgemäßen Vorrichtung eingesetzt. Schnittstellen stellen die Verbindungsstelle zwischen Software- oder Hardwaresystemen dar, wobei Software-Schnittstellen Verfahren zur Übersetzung von Daten eines Programms in ein anderes Programm sind, z.B. mittels einer Konvertierung der Daten. Ferner besteht die Möglichkeit, Hardware-Schnittstellen einzusetzen. Eine besonders vorteilhafte Ausführungsform einer Hardware-Schnittstelle bindet elektronische und kodierte Daten an ein Datenübertragungsnetzwerk an.Interfaces are used in a particularly advantageous embodiment of the device according to the invention. Interfaces provide the interface between software or hardware systems, where software interfaces are methods for translating data from one program into another program, eg by means of a conversion of the data. It is also possible to use hardware interfaces. A particularly advantageous embodiment of a hardware interface binds electronic and coded data to a data transmission network.

Eine weitere, vorteilhafte Ausführung einer Hardware-Schnittstelle ist ein Gateway-Rechner der nachfolgend als Gateway bezeichnet wird. Bei einem Gateway kann es sich beispielsweise um einen Knotenrechner zwischen Netzwerken handeln, der kompatible und inkompatible Netzwerke miteinander verbindet, was es ermöglicht, homogene und heterogene Netzwerke miteinander zu verbinden. Durch ein Gateway ist es z.B. möglich, Netzwerke, bestehend aus Computern, mit einem Großrechner zu verbinden, obwohl diese Systeme nicht die gleichen Regelkomplexe benutzen. Ein Gateway leitet alle Datenpakete weiter, deren Netzwerkadresse mit einer Netzwerkadresse hinter dem Gateway übereinstimmen. Mittels einer Routing-Tabelle wird ein Adressat angesprochen, der das Datenpaket bis zur endgültigen Zieladresse vermitteln kann, unter Umständen auch ein weiteres Gateway. Gateways werden z.B. bei zwei inkompatiblen E-Mail-Systemen benutzt, um elektronische Post und Daten miteinander austauschen zu können, oder vorteilhafterweise zur Datenanbindung an ein Datenübertragungsnetzwerk.Another advantageous embodiment of a hardware interface is a gateway computer which is referred to below as a gateway. For example, a gateway may be a node computer between networks that interconnects compatible and incompatible networks, allowing homogeneous and heterogeneous networks to be interconnected. Through a gateway it is e.g. it is possible to connect networks consisting of computers to a mainframe, although these systems do not use the same rule complexes. A gateway forwards all data packets whose network address matches a network address behind the gateway. By means of a routing table, an addressee is addressed, who can convey the data packet up to the final destination address, possibly also another gateway. Gateways are e.g. used in two incompatible e-mail systems to exchange electronic mail and data or, advantageously, to connect to a data communications network.

Datenübertragungsleitungen gestatten entweder Verbindungen zwischen den Komponenten innerhalb eines Netzwerks, oder werden zur Anbindung an ein Netzwerk benutzt und können somit eine Verknüpfungskomponente zwischen externen Einheiten und einem Netzwerk darstellen. In diesem Zusammenhang erweisen sich die oben erwähnten Schnittstellen als äußerst vorteilhafte Verbindungsstellen. Typische zu verbindende Komponenten sind Server, Clients, Schnittstellen oder Router. Besonders bevorzugt sind Verbindungen zwischen Signalempfängern, Schnittstellen, Datenarchiven oder Videoeinrichtungen. Zurzeit existiert eine Vielzahl unterschiedlicher Datenübertragungsleitungen, wobei es sich als besonders zweckmäßig erwiesen hat, koaxiale Leitungen, RS232 oder RS485 Leitungen einzusetzen.Data links either allow connections between components within a network, or are used to connect to a network, and thus may have a linking component between external units and represent a network. In this connection, the above-mentioned interfaces prove to be extremely advantageous connection points. Typical components to connect to are servers, clients, interfaces or routers. Particularly preferred are connections between signal receivers, interfaces, data archives or video devices. At present, there are a variety of different data transmission lines, and it has proven to be particularly useful to use coaxial lines, RS232 or RS485 lines.

Allgemein beschreibt die RS232-Norm die serielle Verbindung zwischen einem Datenendgerät und einer Datenübertragungseinrichtung mit ihren elektrischen und mechanischen Eigenschaften. Darüber hinaus hat sich die RS232-Schnittstelle bzw. die RS232-Datenübertragungsleitung bei der erfindungsgemäßen Vorrichtung als besonders vorteilhaft für serielle Datenübertragungen über kurze Distanzen erwiesen. Die RS232-Norm definiert als Standard-Steckverbindung einen 25 poligen SUB-D-Stecker. Als Richtmaß für die maximal erzielbare Übertragungstrecke mittels einer RS232-Datenübertragungsleitung kann eine Distanz von 15 bis 30 Metern genannt werden.In general, the RS232 standard describes the serial connection between a data terminal and a data transmission device with their electrical and mechanical properties. In addition, the RS232 interface or the RS232 data transmission line in the device according to the invention has proved to be particularly advantageous for serial data transmission over short distances. The RS232 standard defines a 25 pin SUB-D connector as standard connector. As a guideline for the maximum achievable transmission distance by means of an RS232 data transmission line, a distance of 15 to 30 meters can be called.

Die RS485-Norm (Schnittstelle bzw. Leitung) stellt eine Erweiterung der RS232-Norm dar und ist als ein bidirektionales Bussystem für bis zu 32 Teilnehmern konzipiert. Physikalisch unterscheiden sich beide Schnittstellen nur unwesentlich. Da die RS485 Norm für große Entfernungen bestimmt ist, hat es sich als besonders vorteilhaft erwiesen, RS485-Datenübertragungsleitungen für die Verbindungen zwischen einer Schnittstelle und einem Datenarchiv zu verwenden.The RS485 standard (interface or line) is an extension of the RS232 standard and is designed as a bidirectional bus system for up to 32 subscribers. Physically, both interfaces differ only insignificantly. Since the RS485 standard is intended for long distances, it has proven to be particularly advantageous to use RS485 data transmission lines for the connections between an interface and a data archive.

Ein besonderer Vorteil des erfindungsgemäßen Verfahrens ist die einzigartige Umsetzung des Datenschutzes. Unter Datenschutz ist hierbei die Gesamtheit der Maßnahmen zum Schutz von elektronischen Daten bei der Datenübertragung über Datenleitungen sowie zum Schutz von gespeicherten elektronischen Daten zu verstehen. Die Maßnahmen erstrecken sich im Wesentlichen auf folgende Teilbereiche: (1) Hardwareschutz, (2) Softwareschutz, (3) Datenträgerschutz, (4) Organisation. Beim erfindungsgemäßen Verfahren ist der Datenschutz dergestalt realisiert, dass die Identifikationsdaten der Objekte und/oder die Identifikationsdaten der Personen in einem gegen einen äußeren Zugriff besonders gesicherten Datenbereich gesichert werden. Ferner werden die elektronischen Daten über das Entfernen eines Objekts aus dem gesicherten Bereich gelöscht, wenn das zu sichernde Objekt in den gesicherten Bereich zurückgebracht wird.A particular advantage of the method according to the invention is the unique implementation of data protection. Data protection here means the entirety of the measures for the protection of electronic data in the data transmission via data lines and for the protection of stored electronic data. The measures essentially cover the following subareas: (1) hardware protection, (2) software protection, (3) data carrier protection, (4) organization. In the method according to the invention, the data protection is realized in such a way that the identification data of the objects and / or the identification data of the persons are saved in a data area which is particularly secure against external access. Furthermore, the electronic data about the removal of an object from the secured area is deleted when the object to be protected is returned to the secured area.

Darüber hinaus ist es aus Gründen des Datenschutzes besonders vorteilhaft zu überprüfen, ob Objekte innerhalb eines vorgebbaren Zeitraums wieder in den zu sichernden Bereich zurückgebracht wurden, und dass nur für den Fall, dass eines der zu sichernden Objekte nicht innerhalb des vorgebbaren Zeitraums in den geschützten Bereich zurückgebracht wurde, eine automatisierte Bearbeitungsroutine gestartet wird. Ferner erfolgt ein Zugriff auf den gesicherten Datenbereich erst nach Eingabe wenigstens eines Berechtigungscodes. Zudem erfolgt ein Zugriff auf einen besonders gesicherten Datenbereich nur nach der voneinander unabhängigen Eingabe von zwei verschiedenen Berechtigungscodes.In addition, for reasons of data protection, it is particularly advantageous to check whether objects have been returned to the area to be secured within a predefined period of time, and that only in the event that one of the objects to be secured is not within the specified period in the protected area an automated processing routine is started. Furthermore, access to the secured data area is only after entering at least one authorization code. In addition, access to a specially secured data area only takes place after the independent entry of two different authorization codes.

Grundsätzlich eignen sich unterschiedliche Identifikationsmittel zur eindeutigen Identifizierung der zu sichernden Objekte.In principle, different identification means are suitable for unambiguously identifying the objects to be protected.

Um ein möglichst weitgehend automatisiertes Überwachungsverfahren zu realisieren, bei dem Personen, die den gesicherten Bereich betreten, beziehungsweise verlassen, möglichst wenig beeinträchtigt werden, ist es vorteilhaft, Transponder einzusetzen.In order to implement a monitoring procedure that is as automated as possible, in which persons who enter or leave the secured area are impaired as little as possible, it is advantageous to use transponders.

Für einen Einsatz in den verschiedenen Ausführungsformen der Erfindung eignen sich grundsätzlich beliebige Transponder.In principle, any transponder is suitable for use in the various embodiments of the invention.

Für einen Einsatz in erfindungsgemäßen Objektsicherungssystemen, sowie Verfahren und Vorrichtungen zur Realisierung erfindungsgemäßer Objektsicherungssysteme eignen sich sowohl passive als auch halb-aktive und aktive Transponder.Both passive and semi-active and active transponders are suitable for use in object security systems according to the invention, as well as methods and devices for implementing object security systems according to the invention.

Um eine möglichst zuverlässige Identifikation der Objekte mit einer hohen Erfassungsrate zu kombinieren, ist es besonders vorteilhaft, halb-aktive Transponder einzusetzen.To combine the most reliable identification of the objects with a high detection rate, it is particularly advantageous to use semi-active transponder.

Halb-aktive Transponder werden durch ein ausgesendetes Signal dazu angeregt, ihrerseits ein Signal auszusenden.Half-active transponders are stimulated by a transmitted signal to send a signal in turn.

Vorzugsweise erfolgt eine Aktivierung der halb-aktiven Transponder durch ein elektromagnetisches Signal einer ersten Frequenz. Die halb-aktiven Transponder werden durch die Aktivierung dazu angeregt, ein elektromagnetisches Signal einer zweiten Frequenz zu senden.Preferably, the semi-active transponder is activated by an electromagnetic signal of a first frequency. The half-active transponders are stimulated by the activation to transmit an electromagnetic signal of a second frequency.

Beispielsweise werden halb-aktive Transponder eingesetzt, die durch ein elektromagnetisches Feld mit einer ersten Frequenz von beispielsweise etwa 125 kHz aktiviert werden. Besonders vorteilhaft sind Aktivierungsfrequenzen im Bereich von 5 bis 200 kHz. Darüber hinaus werden halb-aktive Transponder eingesetzt, die durch erste Frequenzen im MHz-Bereich aktiviert werden.For example, semi-active transponders are used, which are activated by an electromagnetic field with a first frequency of, for example, about 125 kHz. Particularly advantageous activation frequencies in the range of 5 to 200 kHz. In addition, semi-active transponders are used, which are activated by first frequencies in the MHz range.

Hierdurch lassen sich Aktivierungs-Reichweiten in der Größenordnung von mehreren Metern, vorzugsweise in der Größenordnung von 1 m bis 10 m erreichen.As a result, activation ranges in the order of several meters, preferably in the order of 1 m to 10 m can be achieved.

Durch die Aktivierung mit dem elektromagnetischen Feld der ersten Frequenz werden die halb-aktiven Transponder dazu veranlasst, ihrerseits ein Signal auszusenden. Vorzugsweise erfolgt die Absendung des elektromagnetischen Signals der Transponder in einem anderen Frequenzbereich als der für die Aktivierung der halb-aktiven Transponder eingesetzten elektromagnetischen Felder.Activation with the electromagnetic field of the first frequency causes the semi-active transponders to emit a signal in turn. Preferably, the transmission of the electromagnetic signal of the transponder is in a different frequency range than the electromagnetic fields used for the activation of the semi-active transponder.

In einer besonders bevorzugten Ausführungsform senden die halb-aktiven Transponder in einem Frequenzbereich von mehreren 100 MHz, beispielsweise im Bereich einer Funkfrequenz von 433 MHz.In a particularly preferred embodiment, the semi-active transponders transmit in a frequency range of several 100 MHz, for example in the range of a radio frequency of 433 MHz.

Insbesondere enthält das von den Transpondern ausgesendete Signal die jeweilige Transpondernummer, sodass die Transponder auf diese Weise als ein Identifikationsmittel für die zu sichernden Objekte dient.In particular, the signal emitted by the transponders contains the respective transponder number, so that the transponder serves as an identification means for the objects to be protected in this way.

Die halb-aktiven Transponder enthalten vorzugsweise jeweils eine eigene Energiequelle, beispielsweise eine Batterie.The semi-active transponders preferably each contain their own energy source, for example a battery.

Die Reichweite des von den Transpondern ausgesendeten Signals wird vorzugsweise ausreichend groß gewählt, um eine sichere Erfassung der Transponder zu ermöglichen. Sie beträgt vorzugsweise mehrere Meter, vorzugsweise etwa 2 bis 50 m. Sendereichweiten in der Größenordnung von 20 bis 30 m sind besonders vorteilhaft, da sich hierbei eine zuverlässige Erfassung sämtlicher aus dem zu sichernden Bereich verbrachter Objekte mit einem größeren Abstand zum Detektor und einer Vermeidung einer irrtümlichen Erfassung von nicht aus dem zu sichernden Bereich verbrachten Objekten vereinen lässt.The range of the signal emitted by the transponders is preferably chosen to be sufficiently large to enable secure detection of the transponders. It is preferably several meters, preferably about 2 to 50 m. Transmission ranges are in the order of 20 to 30 m Particularly advantageous, since in this case a reliable detection of all objects transported from the area to be secured can be combined with a greater distance to the detector and avoidance of erroneous detection of objects not moved out of the area to be secured.

BezugszeichenlisteLIST OF REFERENCE NUMBERS

(1)(1)
Empfangseinheitreceiver unit
(2)(2)
Schnittstelleinterface
(3)(3)
DatenübertragungsnetzwerkData transmission network
(4)(4)
Datenarchivdata archive
(5)(5)
Lokales NetzwerkLocal network
(6)(6)
Computercomputer
(7)(7)
Aufzeichnungseinheitrecording unit
(8)(8th)
Sendertransmitter
(9)(9)
Erste DatenübertragungsleitungFirst data transmission line
(10)(10)
Zweite DatenübertragungsleitungSecond data transmission line

Claims (22)

  1. A method for securing objects inside closed buildings,
    - whereby the object to be secured has a transmitter that, in the presence of a receiving field, supplies an encoded signal,
    - whereby the encoded signal is detected by a receiving unit and subsequently converted into electronically processable encoded data,
    - whereby an interface is connected to the receiving unit by means of a first data transmission line,
    - whereby the interface is connected to a data archive for purposes of processing and storing data, and whereby the data archive is configured in such a way that consequently the encoded data can be stored in the archive,
    characterized in that
    the encoded data triggers a switching operation that activates a recording unit that is located in a spatial vicinity of the receiving field and that serves to process video data, whereby the video data taped by the recording unit is transmitted to the archive by means of a second data transmission line and then stored in the archive, whereby, after the expiration of a time interval during which no other receiving event occurred as a result of a signal of said encoding, a reading out of the stored data of the object previously belonging to the encoding as well as of the video data is triggered.
  2. The method according to Claim 1,
    characterized in that
    it is ascertained which of the objects taken out of the secure area have been brought back.
  3. The method according to Claim 1,
    characterized in that
    the receiving unit for receiving and amplifying the encoded signal can process at least one of the following types of signal: electromagnetic waves, acoustic waves or infrared radiation.
  4. The method according to Claim 1,
    characterized in that
    the receiving unit allows the transmission of signals.
  5. The method according to Claim 1,
    characterized in that
    the first and the second data transmission lines are each a means for the loss-free transfer of data.
  6. The method according to Claim 1,
    characterized in that
    the first data transmission line is an RS 232 cable.
  7. The method according to Claim 1,
    characterized in that
    the second data transmission line is a coaxial cable.
  8. The method according to Claim 1,
    characterized in that
    the interface is a gateway.
  9. The method according to Claim 1,
    characterized in that
    the receiver as well as the interface form a unit having a shared power supply.
  10. The method according to Claim 1,
    characterized in that
    the interface is configured in such a way that the encoded data can be transmitted to a data transmission network, whereby the data transmission network connects the interface to the data archive
  11. The method according to Claim 10,
    characterized in that
    at least one data archive is connected to the data transmission network.
  12. The method according to Claim 11,
    characterized in that
    the data archive has at least one FBAS (BNC) video input and, at the maximum, four FBAS (BNC) video inputs.
  13. The method according to Claim 11,
    characterized in that
    the data archive is connected to a local network, as a result of which data from the archive is supplied for evaluation purposes to different places within the network.
  14. The method according to Claim 13,
    characterized in that
    the local network is an Ethernet.
  15. The method according to Claim 13,
    characterized in that
    the data is evaluated by a computer having a means for processing Internet standards.
  16. The method according to Claim 1,
    characterized in that
    the data archive is a digital data archive.
  17. The method according to Claim 16,
    characterized in that
    the digital data archive uses a hard disk in order to store the data.
  18. The method according to Claim 1,
    characterized in that
    the data archive is an analog data archive.
  19. The method according to Claim 1,
    characterized in that
    the transmitter for supplying the encoded signals supplies at least one of the following types of signal: electromagnetic waves, acoustic waves or infrared radiation.
  20. The method according to Claim 1,
    characterized in that
    the transmitter for supplying the encoded signals is a transponder.
  21. The method according to Claim 20,
    characterized in that
    the transmitter is a semi-active transponder.
  22. The method according to Claim 1,
    characterized in that
    the objects preferably belong to an office inventory such as fax machines, cell phones, laser beamers, data media or files.
EP04738580A 2003-06-05 2004-05-27 Method and device for securing objects Expired - Lifetime EP1634260B1 (en)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
DE10325909A DE10325909A1 (en) 2003-06-05 2003-06-05 Method and device for securing objects
PCT/DE2004/001111 WO2004109616A1 (en) 2003-06-05 2004-05-27 Method and device for securing objects

Publications (2)

Publication Number Publication Date
EP1634260A1 EP1634260A1 (en) 2006-03-15
EP1634260B1 true EP1634260B1 (en) 2009-08-12

Family

ID=33494894

Family Applications (1)

Application Number Title Priority Date Filing Date
EP04738580A Expired - Lifetime EP1634260B1 (en) 2003-06-05 2004-05-27 Method and device for securing objects

Country Status (10)

Country Link
US (1) US7518509B2 (en)
EP (1) EP1634260B1 (en)
JP (1) JP4789800B2 (en)
CN (1) CN100492426C (en)
AT (1) ATE439659T1 (en)
CA (1) CA2527034A1 (en)
DE (2) DE10325909A1 (en)
HK (1) HK1080977A1 (en)
NO (1) NO20055760L (en)
WO (1) WO2004109616A1 (en)

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US8581985B2 (en) * 2008-11-10 2013-11-12 Invue Security Products Inc. Merchandise security system including display stand having video camera

Family Cites Families (15)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
DE3807936A1 (en) * 1988-03-10 1989-09-21 Leiendecker Hans Juergen Electronic anti-theft system
KR100459839B1 (en) * 1995-08-22 2005-02-07 미쓰비시 마테리알 가부시키가이샤 Antennas and transponders for transponders
US5745036A (en) * 1996-09-12 1998-04-28 Checkpoint Systems, Inc. Electronic article security system for store which uses intelligent security tags and transaction data
IL120326A0 (en) * 1997-02-26 1997-06-10 Shapira Aharon Anti-theft method and system
US5914671A (en) * 1997-02-27 1999-06-22 Micron Communications, Inc. System and method for locating individuals and equipment, airline reservation system, communication system
US5963134A (en) * 1997-07-24 1999-10-05 Checkpoint Systems, Inc. Inventory system using articles with RFID tags
DE19745953C2 (en) * 1997-10-17 2002-12-05 Anatoli Stobbe Anti-theft system and method for automatic detection and identification of an anti-theft tag by a base station
WO1999034325A1 (en) * 1997-12-23 1999-07-08 Em Microelectronic-Marin S.A. Active transponder switchable into passive transponder
US7286158B1 (en) * 1999-12-22 2007-10-23 Axcess International Inc. Method and system for providing integrated remote monitoring services
US6373389B1 (en) * 2000-04-21 2002-04-16 Usm Systems, Ltd. Event driven information system
DE20011952U1 (en) * 2000-07-10 2001-10-11 PSW Elektronik GmbH, 84489 Burghausen Device for securing issued tools or devices
DE10033557A1 (en) * 2000-07-11 2002-01-24 Georg Siegel Gmbh Zur Verwertu Automatic localization of files in the rooms of a building, involves using computer to determine location and information of files in different locations of building based on detection signals from sensor device
US7123126B2 (en) * 2002-03-26 2006-10-17 Kabushiki Kaisha Toshiba Method of and computer program product for monitoring person's movements
US7123149B2 (en) * 2003-02-21 2006-10-17 Zachry Construction Corporation Tagging and tracking system for assets and personnel of a commercial enterprise
US6989749B2 (en) * 2003-11-21 2006-01-24 The United States Of America As Represented By The Secretary Of The Navy Electronic check out system

Also Published As

Publication number Publication date
NO20055760D0 (en) 2005-12-05
CN100492426C (en) 2009-05-27
JP2006526821A (en) 2006-11-24
HK1080977A1 (en) 2006-05-04
CA2527034A1 (en) 2004-12-16
DE502004009893D1 (en) 2009-09-24
US20060146133A1 (en) 2006-07-06
CN1833261A (en) 2006-09-13
NO20055760L (en) 2005-12-05
WO2004109616A1 (en) 2004-12-16
DE10325909A1 (en) 2005-01-05
EP1634260A1 (en) 2006-03-15
US7518509B2 (en) 2009-04-14
ATE439659T1 (en) 2009-08-15
JP4789800B2 (en) 2011-10-12

Similar Documents

Publication Publication Date Title
DE60031294T2 (en) SAFE DELIVERY OR ACCEPTANCE SYSTEM
DE60113234T2 (en) DEVICE AND METHOD FOR THE SAFE TRANSPORT OF AN OBJECT
DE102006037033B4 (en) RFID asset management method and system for vehicles
DE10164574A1 (en) Goods storage and delivery compartment uses local transmission network to transmit code to receiver in compartment, which transmits generated code via wide radio network
EP2947612A1 (en) System for securing parcels
DE102004013369A1 (en) Electronic access control system has an electronic or electromagnetic identification device and identification devices for use with either such device together with central access checking equipment and means for lock control
EP1634260B1 (en) Method and device for securing objects
CN114117387A (en) Substation tool monitoring method and device, computer equipment and storage medium
EP3321215A1 (en) Message providing system for use of a refuse container
CN104678958B (en) A kind of remote supervisory method of article
DE60211975T2 (en) Control device for monitoring, neutralizing and / or destroying valuables, documents and / or objects
CN107122933A (en) Logistic management system
CN107730757A (en) Parking lot management method and device
DE102015104680A1 (en) Communication system and parcel box for shipping goods
EP3633640A2 (en) Bearing device, method for triggering an alarm when opening such a control unit for the transmission of an alarm signal
EP2941985A2 (en) Locking device for a flap of a storage compartment
AT521361B1 (en) Delivery device, delivery system and method for the delivery of shipments
EP1410267A2 (en) Method for distributing goods
DE102014103468A1 (en) Method of operating a lockable parcel box, system and lockable parcel box
WO2015055260A1 (en) System and method for sending postal shipments
EP4049252A1 (en) Security system, method for emitting an alarm signal, bus, use of a security system
CN205507782U (en) National treasury goes out warehouse entry system of making an inventory of goods in a warehouse
WO2015052611A1 (en) Method for finding missing objects and use of the method
DE10118827A1 (en) Process for automatic comparison of a quantity of data and shipping logistics system
DE10357023A1 (en) Lost object location system uses passive object markers with standard protocol link through transmission units to recognition units

Legal Events

Date Code Title Description
PUAI Public reference made under article 153(3) epc to a published international application that has entered the european phase

Free format text: ORIGINAL CODE: 0009012

17P Request for examination filed

Effective date: 20060105

AK Designated contracting states

Kind code of ref document: A1

Designated state(s): AT BE BG CH CY CZ DE DK EE ES FI FR GB GR HU IE IT LI LU MC NL PL PT RO SE SI SK TR

AX Request for extension of the european patent

Extension state: LT LV

REG Reference to a national code

Ref country code: HK

Ref legal event code: DE

Ref document number: 1080977

Country of ref document: HK

RAX Requested extension states of the european patent have changed

Extension state: LV

Payment date: 20060105

Extension state: LT

Payment date: 20060105

GRAP Despatch of communication of intention to grant a patent

Free format text: ORIGINAL CODE: EPIDOSNIGR1

GRAS Grant fee paid

Free format text: ORIGINAL CODE: EPIDOSNIGR3

GRAA (expected) grant

Free format text: ORIGINAL CODE: 0009210

AK Designated contracting states

Kind code of ref document: B1

Designated state(s): AT BE BG CH CY CZ DE DK EE ES FI FR GB GR HU IE IT LI LU MC NL PL PT RO SE SI SK TR

AX Request for extension of the european patent

Extension state: LT LV

REG Reference to a national code

Ref country code: GB

Ref legal event code: FG4D

Free format text: NOT ENGLISH

REG Reference to a national code

Ref country code: CH

Ref legal event code: EP

REG Reference to a national code

Ref country code: IE

Ref legal event code: FG4D

REF Corresponds to:

Ref document number: 502004009893

Country of ref document: DE

Date of ref document: 20090924

Kind code of ref document: P

REG Reference to a national code

Ref country code: HK

Ref legal event code: GR

Ref document number: 1080977

Country of ref document: HK

REG Reference to a national code

Ref country code: CH

Ref legal event code: NV

Representative=s name: R. A. EGLI & CO. PATENTANWAELTE

LTIE Lt: invalidation of european patent or patent extension

Effective date: 20090812

PG25 Lapsed in a contracting state [announced via postgrant information from national office to epo]

Ref country code: ES

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20091123

Ref country code: FI

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20090812

Ref country code: SE

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20090812

PG25 Lapsed in a contracting state [announced via postgrant information from national office to epo]

Ref country code: SI

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20090812

Ref country code: PL

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20090812

REG Reference to a national code

Ref country code: IE

Ref legal event code: FD4D

PG25 Lapsed in a contracting state [announced via postgrant information from national office to epo]

Ref country code: PT

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20091212

Ref country code: BG

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20091112

PG25 Lapsed in a contracting state [announced via postgrant information from national office to epo]

Ref country code: RO

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20090812

Ref country code: IE

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20090812

Ref country code: CZ

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20090812

Ref country code: DK

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20090812

Ref country code: EE

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20090812

PG25 Lapsed in a contracting state [announced via postgrant information from national office to epo]

Ref country code: SK

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20090812

PLBE No opposition filed within time limit

Free format text: ORIGINAL CODE: 0009261

STAA Information on the status of an ep patent application or granted ep patent

Free format text: STATUS: NO OPPOSITION FILED WITHIN TIME LIMIT

26N No opposition filed

Effective date: 20100517

PG25 Lapsed in a contracting state [announced via postgrant information from national office to epo]

Ref country code: GR

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20091113

PG25 Lapsed in a contracting state [announced via postgrant information from national office to epo]

Ref country code: MC

Free format text: LAPSE BECAUSE OF NON-PAYMENT OF DUE FEES

Effective date: 20100531

PGFP Annual fee paid to national office [announced via postgrant information from national office to epo]

Ref country code: CH

Payment date: 20110524

Year of fee payment: 8

PGFP Annual fee paid to national office [announced via postgrant information from national office to epo]

Ref country code: AT

Payment date: 20110512

Year of fee payment: 8

Ref country code: NL

Payment date: 20110520

Year of fee payment: 8

PGFP Annual fee paid to national office [announced via postgrant information from national office to epo]

Ref country code: DE

Payment date: 20120531

Year of fee payment: 9

PG25 Lapsed in a contracting state [announced via postgrant information from national office to epo]

Ref country code: CY

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20090812

PGFP Annual fee paid to national office [announced via postgrant information from national office to epo]

Ref country code: GB

Payment date: 20120522

Year of fee payment: 9

Ref country code: BE

Payment date: 20120524

Year of fee payment: 9

Ref country code: FR

Payment date: 20120601

Year of fee payment: 9

PG25 Lapsed in a contracting state [announced via postgrant information from national office to epo]

Ref country code: HU

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20100213

Ref country code: LU

Free format text: LAPSE BECAUSE OF NON-PAYMENT OF DUE FEES

Effective date: 20100527

PGFP Annual fee paid to national office [announced via postgrant information from national office to epo]

Ref country code: IT

Payment date: 20120525

Year of fee payment: 9

PG25 Lapsed in a contracting state [announced via postgrant information from national office to epo]

Ref country code: TR

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20090812

REG Reference to a national code

Ref country code: NL

Ref legal event code: V1

Effective date: 20121201

REG Reference to a national code

Ref country code: CH

Ref legal event code: PL

REG Reference to a national code

Ref country code: AT

Ref legal event code: MM01

Ref document number: 439659

Country of ref document: AT

Kind code of ref document: T

Effective date: 20120527

PG25 Lapsed in a contracting state [announced via postgrant information from national office to epo]

Ref country code: LI

Free format text: LAPSE BECAUSE OF NON-PAYMENT OF DUE FEES

Effective date: 20120531

Ref country code: CH

Free format text: LAPSE BECAUSE OF NON-PAYMENT OF DUE FEES

Effective date: 20120531

Ref country code: AT

Free format text: LAPSE BECAUSE OF NON-PAYMENT OF DUE FEES

Effective date: 20120527

PG25 Lapsed in a contracting state [announced via postgrant information from national office to epo]

Ref country code: NL

Free format text: LAPSE BECAUSE OF NON-PAYMENT OF DUE FEES

Effective date: 20121201

BERE Be: lapsed

Owner name: DEUTSCHE POST A.G.

Effective date: 20130531

GBPC Gb: european patent ceased through non-payment of renewal fee

Effective date: 20130527

PG25 Lapsed in a contracting state [announced via postgrant information from national office to epo]

Ref country code: DE

Free format text: LAPSE BECAUSE OF NON-PAYMENT OF DUE FEES

Effective date: 20131203

REG Reference to a national code

Ref country code: DE

Ref legal event code: R119

Ref document number: 502004009893

Country of ref document: DE

Effective date: 20131203

PG25 Lapsed in a contracting state [announced via postgrant information from national office to epo]

Ref country code: IT

Free format text: LAPSE BECAUSE OF NON-PAYMENT OF DUE FEES

Effective date: 20130527

Ref country code: BE

Free format text: LAPSE BECAUSE OF NON-PAYMENT OF DUE FEES

Effective date: 20130531

REG Reference to a national code

Ref country code: FR

Ref legal event code: ST

Effective date: 20140131

PG25 Lapsed in a contracting state [announced via postgrant information from national office to epo]

Ref country code: GB

Free format text: LAPSE BECAUSE OF NON-PAYMENT OF DUE FEES

Effective date: 20130527

PG25 Lapsed in a contracting state [announced via postgrant information from national office to epo]

Ref country code: FR

Free format text: LAPSE BECAUSE OF NON-PAYMENT OF DUE FEES

Effective date: 20130531