EP3440638A1 - Kontrolle von aufenthaltsdauer und aufenthaltsbereich - Google Patents
Kontrolle von aufenthaltsdauer und aufenthaltsbereichInfo
- Publication number
- EP3440638A1 EP3440638A1 EP17717649.2A EP17717649A EP3440638A1 EP 3440638 A1 EP3440638 A1 EP 3440638A1 EP 17717649 A EP17717649 A EP 17717649A EP 3440638 A1 EP3440638 A1 EP 3440638A1
- Authority
- EP
- European Patent Office
- Prior art keywords
- building
- access
- person
- action
- information
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
- 238000012544 monitoring process Methods 0.000 title description 7
- 230000009471 action Effects 0.000 claims abstract description 251
- 238000000034 method Methods 0.000 claims abstract description 191
- 238000013475 authorization Methods 0.000 claims description 83
- 230000033001 locomotion Effects 0.000 claims description 27
- 230000004913 activation Effects 0.000 claims description 15
- 238000013528 artificial neural network Methods 0.000 claims description 8
- 238000004422 calculation algorithm Methods 0.000 claims description 4
- 238000004590 computer program Methods 0.000 abstract 1
- 230000015654 memory Effects 0.000 description 29
- 238000004891 communication Methods 0.000 description 22
- 238000007726 management method Methods 0.000 description 20
- 230000006399 behavior Effects 0.000 description 16
- 230000001960 triggered effect Effects 0.000 description 7
- 230000008859 change Effects 0.000 description 6
- 230000006870 function Effects 0.000 description 6
- 238000012545 processing Methods 0.000 description 6
- 230000009849 deactivation Effects 0.000 description 4
- 238000009795 derivation Methods 0.000 description 4
- 230000001133 acceleration Effects 0.000 description 3
- 238000012790 confirmation Methods 0.000 description 3
- 230000000694 effects Effects 0.000 description 3
- 238000004458 analytical method Methods 0.000 description 2
- 230000005540 biological transmission Effects 0.000 description 2
- 230000001413 cellular effect Effects 0.000 description 2
- 238000010586 diagram Methods 0.000 description 2
- 238000005516 engineering process Methods 0.000 description 2
- 230000005358 geomagnetic field Effects 0.000 description 2
- 230000003287 optical effect Effects 0.000 description 2
- 230000000737 periodic effect Effects 0.000 description 2
- 230000003068 static effect Effects 0.000 description 2
- 230000000007 visual effect Effects 0.000 description 2
- 206010000117 Abnormal behaviour Diseases 0.000 description 1
- 208000010201 Exanthema Diseases 0.000 description 1
- 238000003491 array Methods 0.000 description 1
- 238000004364 calculation method Methods 0.000 description 1
- 239000000969 carrier Substances 0.000 description 1
- 238000006243 chemical reaction Methods 0.000 description 1
- 238000005352 clarification Methods 0.000 description 1
- 230000000881 depressing effect Effects 0.000 description 1
- 238000001514 detection method Methods 0.000 description 1
- 201000005884 exanthem Diseases 0.000 description 1
- 210000002569 neuron Anatomy 0.000 description 1
- 230000035515 penetration Effects 0.000 description 1
- 206010037844 rash Diseases 0.000 description 1
- 230000000306 recurrent effect Effects 0.000 description 1
- 230000009467 reduction Effects 0.000 description 1
- 230000008439 repair process Effects 0.000 description 1
- 230000003252 repetitive effect Effects 0.000 description 1
- 238000012360 testing method Methods 0.000 description 1
Classifications
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07C—TIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
- G07C9/00—Individual registration on entry or exit
- G07C9/20—Individual registration on entry or exit involving the use of a pass
- G07C9/27—Individual registration on entry or exit involving the use of a pass with central registration
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07C—TIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
- G07C9/00—Individual registration on entry or exit
- G07C9/30—Individual registration on entry or exit not involving the use of a pass
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07C—TIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
- G07C9/00—Individual registration on entry or exit
- G07C9/00174—Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
- G07C9/00896—Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys specially adapted for particular uses
- G07C9/00904—Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys specially adapted for particular uses for hotels, motels, office buildings or the like
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07C—TIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
- G07C9/00—Individual registration on entry or exit
- G07C9/20—Individual registration on entry or exit involving the use of a pass
- G07C9/28—Individual registration on entry or exit involving the use of a pass the pass enabling tracking or indicating presence
-
- G—PHYSICS
- G08—SIGNALLING
- G08B—SIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
- G08B13/00—Burglar, theft or intruder alarms
-
- G—PHYSICS
- G08—SIGNALLING
- G08B—SIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
- G08B21/00—Alarms responsive to a single specified undesired or abnormal condition and not otherwise provided for
- G08B21/18—Status alarms
- G08B21/22—Status alarms responsive to presence or absence of persons
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07C—TIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
- G07C2209/00—Indexing scheme relating to groups G07C9/00 - G07C9/38
- G07C2209/04—Access control involving a hierarchy in access rights
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07C—TIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
- G07C2209/00—Indexing scheme relating to groups G07C9/00 - G07C9/38
- G07C2209/60—Indexing scheme relating to groups G07C9/00174 - G07C9/00944
- G07C2209/63—Comprising locating means for detecting the position of the data carrier, i.e. within the vehicle or within a certain distance from the vehicle
Definitions
- the invention relates, inter alia, to methods, devices, systems and programs which serve to control, in particular, the length of stay and the location area when a person performs an action, for example when a deliverer delivers or picks up a shipment.
- Receiver must pick up the shipment there. But this can also increase the effort and reduce the comfort for the recipient.
- Various embodiments of the invention allow for the performance of services by third parties, even if the person responsible (such as the resident of the house or apartment) is not present.
- Various embodiments of the invention can, in particular, configure and further develop the delivery or the collection of consignments in such a way that consignments can be delivered safely and / or picked up safely and for the customer.
- an exemplary method performed by at least one device comprising:
- an exemplary method performed by at least one device comprising the method:
- an exemplary method performed by at least one device comprising:
- An exemplary apparatus includes means for carrying out one or more of the example methods according to the different aspects or is arranged to execute it.
- Another exemplary device comprises at least one processor and at least one memory, wherein the memory stores a program comprising program instructions, the memory and the program being arranged to at least cause, with the processor, one or more of the devices
- a processor for example, a control unit, a microprocessor, a microcontroller such as a
- Microcontroller a digital signal processor (DSP), an application specific
- ASIC Integrated Circuit
- FPGA Field Programmable Gate Arrays
- an exemplary apparatus further includes means for storing information such as program memory and / or main memory.
- an exemplary inventive device further includes means for receiving and / or transmitting information over a network, such as one
- exemplary devices of the invention are interconnected and / or connectable via one or more networks.
- An exemplary device is, for example, a data processing system which is set up in terms of software and / or hardware in order to be able to carry out the respective steps of an exemplary method according to the corresponding aspect.
- a data processing system are a A computer, a desktop computer, a server, a thin client and / or a portable computer, such as a laptop computer, a tablet computer, a wearable, a personal digital assistant or a smartphone.
- an exemplary device according to the first aspect (also called a first device) is or includes a portable device or part thereof.
- a portable device is understood to mean, in particular, that it weighs less than 5 kg, in particular less than 1 kg.
- the device is for example a terminal.
- the portable device is a computer, a laptop, a tablet
- a device configured to transmit and / or receive signals according to the IEEE 802.11 standard fWLAN), the Bluetooth (Low Energy) standard and / or the NFC standard.
- an exemplary device (also called a second device) is or includes a server or part thereof.
- a device includes or may exchange data with a database.
- an exemplary device according to the third aspect (also called a third device) is or includes an electronic lock, a beacon, or a part thereof.
- a beacon is understood in particular to mean a device which can repeatedly (in particular periodically) transmit (identification) signals ("broadcasting"), in particular based on the Bluetooth technology, which signals can then be obtained from nearby (portable) electronic devices be received.
- a Bluetooth beacon is a Bluetooth beacon that supports the Bluetooth low-energy mode, or a Bluetooth low-energy beacon.
- a Bluetooth beacon may be any Bluetooth beacon that complies with current or future standards. Alternatively or additionally, a beacon can also receive corresponding signals. It is understood, however, that other types of beacons may also be used, such as devices that transmit ultra wide band (UWB) signals, ultrasonic signals or other radio signals.
- UWB ultra wide band
- a beacon may be a standalone device or integrated into or attached to another device.
- An electronic lock is understood in particular to be a lock which functions based on electric current. In particular, an electronic lock may be actuated (ie, in particular unlocked, unlocked, opened or locked, locked, closed) based on an authentication and without the use of a physical key. The authentication takes place
- an access authorization information such as a numeric code, a password, a passphrase or biometric information.
- the access authorization information may also be stored in a portable device (such as a device according to the first aspect) and transmitted to the electronic lock via infrared, Bluetooth, RFID and / or NFC technology.
- An exemplary electronic lock may in particular include or include the functionality of a beacon as described above.
- an exemplary system includes one or more devices configured to perform or include means for performing one or more of the example methods according to the different aspects.
- Another exemplary system according to the invention comprises
- one or more devices arranged to carry out or comprising means for carrying out the method according to the first aspect
- An exemplary inventive program according to the invention comprises
- An exemplary program according to the invention may be in or on one
- a computer-readable storage medium to be stored which contains one or more exemplary programs and is designed, for example, as a magnetic, electrical, electromagnetic, optical and / or different type of storage medium.
- a computer-readable storage medium is preferably physical (ie "touchable"), for example as a data carrier device
- Such a data carrier device is for example portable or permanently installed in a device
- Examples of such a data carrier device are volatile or non-volatile random access memories (RAM) such as NOR flash memory or with sequential access such as NAND flash memory and / or read-only-access (ROM) memory or read-write access
- RAM volatile or non-volatile random access memories
- NOR flash memory such as NOR flash memory
- ROM read-only-access
- computer readable should be understood to mean that the storage medium can be read from and / or written to by a computer or a data processing system, for example by a processor.
- the person is, for example, a service provider, in particular a deliverer or supplier.
- the action to be performed by the person is a service which in particular requires access to the building or building section.
- the action is a delivery or pickup of a shipment or a delivery.
- the building is, for example, a (residential) house, in particular a single-family house or an apartment building. It is also possible that the building is an office building, a warehouse or a garage. Accordingly, a building section can
- a building section may be a separate unit, such as an apartment or a staircase of a building, such as one
- a building section may be a room or an office of a building.
- a predefined area of a building or building section can accordingly be part of a building or a building section,
- the predefined area may be or include the entrance area of a building or building section.
- the predefined area is an access-near (for example door-near) area of the building or
- a predefined area is, for example, a two- or three-dimensional area of the building or building section.
- the predefined building section is a few square meters.
- the building, the building section and / or the predefined area can
- non-public such as a residential building, an apartment or a part thereof
- partially public for example, a staircase of an apartment building
- a predefined amount of time is a predefined amount of time in the range of hours, minutes, or seconds.
- the predefined period of time is between a minimum value and a maximum value, for example, the predefined period of time is in a range of 1 second to 10 minutes.
- the predefined time duration according to the first aspect and according to the second aspect may be the same or different durations.
- the predefined time duration according to the first aspect is shorter than the predefined time duration according to the second aspect.
- the predefined time duration according to the first aspect is equal to the predefined time duration according to the second aspect.
- the predefined time duration according to the first aspect is in the range of seconds
- the predefined time duration according to the second aspect is in the range of minutes (for example, 1 minute or 5 minutes).
- the access is preferably a door, for example an apartment door, a front door or an elevator door. It is also conceivable that the entrance is a gate.
- the access can be secured, for example, by locking the access, for example by means of an electronic lock, in particular as described with respect to a device according to the third aspect.
- access in the case can only be opened by a pusher action (such as depressing the latch).
- the Access can only be opened from the inside, but not from the outside.
- the Access can be secured, for example, by access via the
- Locked also called locked, locked or locked
- the access is then additionally secured by a rigid latch, which engages in a matching recess.
- the access can then not be opened only by a handle operation, but must first be unlocked.
- the checking may be performed by means of a device which can be considered to carry the device with it.
- a device which can be considered to carry the device with it.
- provision of (information) may in particular consist of or include a transmission (of the information).
- obtaining (information) may consist of or include receiving (the information).
- Providing, receiving, transmitting and / or receiving can in particular take place via a wired or a wireless connection to a communication system, for example via a communication interface. Examples of a communication system are a local area network (LAN)
- LAN local area network
- WAN wide area network
- wireless network such as the IEEE 802.11 standard, the Bluetooth (LE) standard and / or the NFC standard
- wired network a cellular network, a telephone network, and / or the Internet.
- the method further comprises: Requesting access authorization information to allow access for the person to perform the action in the building or the building
- the access authorization information may enable the person to secure the secured access and thus gain access to the building or
- the request can be made in particular via an encrypted communication.
- the request is initiated by the person by means of a user input on a device (such as in the first aspect).
- the access authorization information is requested, for example, from a device according to the second aspect (for example, a remote server).
- the method further comprises:
- the request is sent in particular by a device according to the first aspect, in particular via an encrypted communication.
- the method further comprises:
- the position information is determined on the basis of a communication network, for example based on a wireless network, such as a mobile radio network (for example, a GSM network).
- a wireless network such as a mobile radio network (for example, a GSM network).
- the position information is determined on the basis of a global navigation satellite system (such as NAVSTAR GPS, GLONASS or Galileo).
- a device according to the first aspect for example receive and evaluate corresponding signals of the system or the network. Since it can be assumed that the person carries a device according to the first aspect, the determined position information is representative of the position of the person.
- the determined position information is then provided, for example, and in particular sent to a device according to the second aspect.
- requesting an access authorization information comprises sending the determined position information. This allows, for example, a server-side plausibility check, in particular whether the person requesting the access authorization information actually stays in front of the corresponding building or building section for which the access authorization information is requested.
- the method further comprises:
- the position information received (received, for example, from a device according to the first aspect) makes it possible to check the plausibility. If, for example, it is determined on the basis of the position information which has been obtained representative of the position of the person that the person requesting the access authorization information actually stays in front of the corresponding building or building section for which the access authorization information is requested, this is
- Plausibility check successful In the case of a positive plausibility check, it is possible, in particular, to provide access authorization information.
- the method further comprises:
- the access authorization information can in particular be sent to a device according to the first aspect.
- an authorization was granted for this purpose (for example by email, SMS or push message).
- the access authorization information for the action to be performed or an authorization to provide the access authorization information for the action to be performed is (manually) released when the
- the method according to the second aspect may include checking whether the
- the method further comprises:
- the access authorization information allows the person access to the building or building section.
- the access authorization information allows access to be unlocked, for example, by unlocking and / or unlocking an electronic lock (for example, according to the third aspect) of the access.
- the access authorization information comprises, for example, a (digital)
- the access authorization information includes or is based at least in part on a digital certificate.
- the access authorization information comprises a password or a passcode.
- the obtained access authorization information for enabling an access for the person to perform the action in the building or the building section information accessible over unauthorized access information representative of the predefined period of time.
- Information representative of the predefined time duration includes, for example, data from which the predefined time duration can be determined or which specify the time duration (for example in seconds). If the predefined time duration is (first) determined by the received access authorization information, the predefined time duration can be varied and, in particular, determined as a function of the situation, for example for each action to be performed individually to the respective person.
- the method further comprises:
- the provided access authorization information may correspond, for example, to or comprise the obtained access authorization information.
- the access authorization information is sent to a device according to the third aspect (for example, an electronic lock).
- the access authorization information is wirelessly transmitted, for example by radio.
- the conditional access information may include or at least partially be based on a digital certificate. Also, providing the
- Access authorization information is provided by the fact that the
- Access authorization information (eg, a password or passcode) is displayed by a device according to the first aspect of the person so that the person can then unlock an access electronic lock.
- a device e.g., a password or passcode
- Access authorization information can only be used once.
- the access authorization information is usable only in a certain period of time.
- providing the access authorization information comprises providing Information representative of the predefined time period.
- data representative of the predefined time period is sent from a device according to the first aspect to a device according to the third aspect.
- a device according to the third aspect (for example an electronic lock or a beacon) can then emit signals for the predefined period of time (repeated or periodic), for example deriving a position of a device according to the first aspect (and thus of the person) in the Allow building or building section.
- a check can be made as to whether the person has merely been in a predefined area of a building or building section in order to carry out the action.
- the predefined time duration is determined on the basis of action-specific information with regard to the respective action to be performed and / or on the basis of empirical values relating to actions already performed.
- the predefined time period is determined on the basis of action-specific information with regard to the respective action to be performed and / or on the basis of empirical values relating to actions already performed within the framework of an exemplary embodiment of the method according to the second aspect.
- the method further comprises:
- Action-specific information is understood to be information that is specific to the specific action to be performed and, in particular, that is needed
- the action-specific information may be, for example, information about the number of shipments to be delivered or picked up. A larger number of shipments can then increase the predefined time duration.
- the action-specific information can also relate to the building or the building section in which the action is to be carried out. For example, the location (for example, floor) of the
- Building section (such as the apartment) influence the predefined period of time, as about a delivery or picking up one (or more) program (s) in a higher floor can take more time.
- the predefined time period may be based on empirical values with respect to
- information about performed actions of the same kind can be taken into account.
- Section of the building (for example, a delivery to the same apartment or to an apartment on the same floor).
- the method further comprises:
- unlocking can be achieved by unlocking, unlocking and / or opening the access (that is to say, in particular, an electronic lock).
- Information indicative of a successful release can be obtained, for example, by receiving a corresponding signal (in particular from a device according to the third aspect, such as an electronic lock).
- the method may further comprise:
- a device which receives the information indicative of a successful release, can in turn provide this information, for example, to send to a device according to the second aspect. It can be considered, which communication links are available, so for example whether the corresponding device according to the first aspect has access to the Internet (the information can then be sent over the Internet, for example) or not (the information can be sent over the GSM mobile network, for example by means of SMS).
- the method may further comprise:
- the information indicative of a successful unlocking of the unauthorized access access can be sent as described by a device according to the first aspect. Alternatively, it is also possible that the information is sent from a device according to the third aspect.
- the method further comprises:
- the method further comprises:
- Access authorization information to allow access for the person to perform the action in the building or building section via the access secured against unauthorized access or at least based on the receipt of the information indicative of a successful unlocking of the unauthorized access access.
- Unauthorized access to secure access can be used to start determine the length of stay of the person in the building or section of the building. For example, the beginning of the length of stay is indicative of the time the lock was made or the time of receipt of the information.
- a timer is initialized (for example, started and / or
- the timer can go forward. It can then check whether the length of stay of the person in the building or building section is less than or not more than a predefined period of time
- checking includes whether the timer is less than the predefined amount of time.
- the timer eg starting with the predefined time duration
- Checking whether the length of stay of the person in the building or building section is less than or not more than a predefined period of time may then include, for example, checking whether the timer has expired.
- the method further comprises:
- Section of the building has been provided via the access which can be secured against unauthorized access or if the information is indicative of a
- additional persons for example, an administrator or a resident of the building or the building section.
- a false alarm can be avoided by the burglar alarm system.
- the method further comprises: Obtaining one or more signals that enable a location to be derived in the building or building section;
- the one or more signals may include, for example, signal (s) according to the IEEE 802.11 standard, signal (s) according to the Bluetooth (LE) standard, (an) RFID signal (e ) (for example, according to the NFC standard) and / or (a) signal (s) of a communication network (for example, a mobile network).
- the signal (s) may be transmitted, for example, from one (or more) device (s) according to the third aspect (eg, an electronic lock and / or one or more (Internet-enabled) beacons (s)).
- the signal (s) obtained may, for example, also be a signal (s) based on the earth's magnetic field (eg, representative of the strength and / or direction of the earth's magnetic field), which is a derivative of Enable position.
- signals based on the Earth's magnetic field can be used to determine if the person has entered the building. Since the signal (s) make it possible to derive the position in the building or building section, it is possible, in particular, to determine the position of a device according to the first aspect (and thus to determine the position of the person performing the action).
- the signal (s) are thus in particular at least partially specific or characteristic (for example with respect to the signal strength) of the position at which the signal (s) are received. In this case, the signal (s), for example, a determination of a position relative to the building, the
- Facade section or the earth's surface or a position relative to a transmitter of the signals can be Facade section or the earth's surface or a position relative to a transmitter of the signals.
- a position in the building or building section can be derived relative to the predefined area, in particular whether the position lies in the predefined area or outside the predefined area.
- the building, a section of the building or a part of it can be previously by a
- the user or occupant has been measured in relation to the signal (s), for example, by measuring the signal (s) at different (known) locations.
- a (digital) map for example in the form of a so-called radio map based on radio signals or the geomagnetic field
- radio map for example in the form of a so-called radio map based on radio signals or the geomagnetic field
- the signal or signals (e) for example, an electronic door lock
- e for example, an electronic door lock
- Threshold at least part of the predefined range in which the person is allowed to perform the action (permission range). For example, defines an area in which the signal or signals (e) are not received
- At least part of the area in which the person may not stay to perform the action (prohibition area). It is also conceivable that an area in which the signal or signals (for example a beacon) are to be received (for example above a threshold value) is at least a part of the area in which the person is not staying to carry out the action may (prohibition area).
- a plurality of devices (in particular according to the third aspect) which can transmit corresponding signals, for example an electric door lock and one or more beacons.
- the one or more signal (s), which allow a derivation of a position in the building or building section, in particular by a method according to the third aspect may be provided, for example, after receiving information for unlocking or indicative for a successful Entêt a against unauthorized access of secure access, over which a building or
- the signal (s) are provided only for the predefined period of time. That is, after the predefined time has elapsed, preferably no provision of the signal or of the signals takes place.
- the provision of the one or more signals may at least partially define a predefined area of the building or building section in which a person may stay in order to carry out an action.
- the method further comprises:
- the method further comprises:
- the predefined time duration according to the first aspect and the predefined time duration according to the second aspect are preferably independent
- the method further comprises: Obtaining sensor data from one or more sensors, wherein the sensor data is representative of a person's behavior;
- a sensor of the one or more sensors is for example a motion sensor acceleration sensor, a magnetic field sensor, a gyroscope, a magnetometer, an infrared sensor and / or a fingerprint sensor.
- the sensor (s) are for example part of a device, in particular according to the first aspect.
- the sensors may be mobile or stationary sensors of other devices. Since the sensor data are representative of a person's behavior, the
- the sensor data may be representative of a movement of the person.
- a pattern check is performed based on the sensor data.
- a pattern may be indicative of a deviation of the person from a predefined behavior.
- the person is checked on the basis of one or more sensors whether no or too little movement of the respective device takes place, from which it can be deduced, for example, that the person has deposited the device.
- it can be checked whether the person carries the respective device with him and / or holds in his hand.
- it is checked by means of a fingerprint sensor (for example, periodically) whether a person's finger is recognized.
- it is checked on the basis of one or more sensors whether the person's range of movement corresponds to a predefined behavior, for example less than or no more than a predefined threshold (for example less than 2 meters).
- a throwing of the respective device takes place.
- a (too) regular movement for example a commuting
- a fake (artificial) Movement can be derived.
- radio signals in particular according to the IEEE 802.11 standard, the Bluetooth standard or the NFC standard
- a behavior in particular a movement Person to close.
- the strength and / or change of the signals which can be influenced and / or caused, for example, by shading, reflection and / or the Doppler effect, are taken into account.
- this can be one or more
- Object density (s) in the immediate vicinity) that are representative of one or more persons are measured. It is also possible to determine properties and / or changes of the environment (including persons) from these signals or their change, for example the number or a change in the number of persons. For example, if a reduction in object density is detected, it is possible to infer a second, removing person. Exemplary operating principles are described in [1] or [2]. If it is determined that the person deviates from a predefined behavior, one of the devices according to the first aspect can, for example, output a (in particular visual and / or audible) indication to the person. Additionally or alternatively, as a further measure, the predefined time duration can be shortened, for example by a timer running faster.
- a motion detector for example a PIR sensor placed in the building or building section can be used for this purpose.
- a movement outside the predefined range can be detected by the motion detector.
- the sensor data can then be evaluated by the sensor itself or by a device according to the first and / or second aspect.
- a motion detector is activated, for example, if a
- the electronic door lock (for example by means of Bluetooth) sends an activation signal to an alarm unit comprising the motion detector (as described in more detail below).
- the electronic door lock can be configured, for example, such that the activation signal is only sent when a person worthy of surveillance (for example, service provider as opposed to trusted friends and family) releases the electronic lock.
- a method carried out by at least one device comprising:
- the at least one device is or comprises an electronic door lock.
- the person unlocks the door lock by means of a portable device (for example a smartphone).
- the activation signal is a radio signal, in particular a Bluetooth signal. For example, that will
- an activation signal sent via a Bluetooth transmitter is provided depending on whether the person belongs to a predefined group of people. For example, an activation signal is provided if the person is a person worth monitoring, for example belonging to one or more predefined groups of persons (for example service providers). For example, an activation signal is not provided or one
- Trusted person belongs to one or more predefined groups of people (for example, friends, acquaintances, family).
- the information for unlocking includes information about the person or person
- Group of persons to which the person belongs For example, the occupant of the building or building section has defined the appropriate groups of people.
- the one or more predefined groups of persons are stored by the device (for example the electronic door lock).
- the activation signal is received by an alarm unit.
- the alarm unit based on the activation signal, the alarm unit or parts thereof are activated.
- the alarm unit is in the building or
- the alarm unit comprises a Bluetooth receiver, a motion detector (in particular a PIR sensor), a
- Photocell a camera unit, a WLAN unit, a battery and / or a microcontroller.
- at least one motion detector of the alarm unit is activated by the activation signal.
- the alarm unit comprises a camera unit (for example, for static or moving images), this can also be switched on by the activation signal,
- data of the camera unit is preferably encrypted by means of the WLAN unit to a server (for example, an access management platform), for example (only) the resident of the house can access the data.
- the motion detector is designed to measure the penetration depth of the person in the building or the building section.
- the motion detector is designed to measure the penetration depth of the person in the building or the building section.
- Alarm unit whether the person is in a permitted area. For example, the alarm unit checks if the person is in a prohibited area. For example, the alarm unit sends a notification (for example by SMS, call, email or instant message) if it is determined that the person is in a prohibited area.
- a server such as the Access Management Platform stores data representative of the incident.
- the method further includes obtaining information to secure access by the person, and providing a deactivation signal.
- the deactivation signal is a radio signal, in particular a Bluetooth signal.
- the deactivation signal is received by the alarm unit.
- the deactivation signal deactivates the alarm unit or parts thereof.
- the alarm unit or parts thereof is deactivated when the
- Motion detector detects no movement over a defined period of time.
- the checking whether based on at least the sensor data the person deviates from a predefined behavior is based at least on a rule-based algorithm and / or an artificial neural network.
- An artificial neural network (also known as an artificial neural network, KNN) is understood to mean networks of artificial neurons. For example, single-layered, multi-layered and / or recurrent networks. For example, sensor data from a variety of devices (such as in the first aspect) associated with a plurality of persons is used to train the neural network, such that a trained neural network is obtained. Likewise, the
- Sensor data of a variety of devices are used, and / or to determine the rules of the algorithm.
- the method further comprises:
- a repeated or periodic check is made as to whether the person has left the building or the building section. For example, a check is made (at least then) as to whether the person has left the building or the building section when the predefined time has elapsed. For example, there is (at least then) a check as to whether the person has left the building or the building section when no more signals are received, which enable a derivation of a position in the building or building section. For example, a check is made (at least then) as to whether the person has left the building or the building section if it is determined based on the signals which allow a derivation of a position in the building or building section that the person is not merely in the predefined one Area has stopped.
- checking whether the person has left the building or the building section is based at least on checking whether the access of the building or building section which can be secured against unauthorized access is secured from the outside.
- An externally secured access for example, an externally locked or locked electronic lock
- An externally secured access reliably relieves the person leaving the building or building section.
- information is received indicatively for securing access from the outside.
- this information may be sent from an electronic lock as a device according to the third aspect.
- the method may further comprise:
- information for securing has been sent to an electronic lock (for example, by a device according to the first aspect, when the person leaves the building or the building section), so that access is secured (from outside) by the electronic lock.
- an electronic lock for example, by a device according to the first aspect, when the person leaves the building or the building section
- access is secured (from outside) by the electronic lock.
- a beacon for example, in addition to a beacon
- Information indicative of a successful backup will be sent and received by the beacon. This information may then be provided by the electronic lock or by the beacon again.
- the method may further comprise:
- checking whether the person has left the building or the building section is based at least on checking whether the position of the person lies outside the building or building section. For example, information is indicative of a position of the Person received outside the building or building section. For example, a position information representative of the position of the person is obtained.
- the position information can be determined on the basis of a communication network such as a mobile network (for example a GSM network) or on the basis of a global navigation satellite system
- information can also be indicative of an activity of the person at a location outside the building or the building section
- information is indicatively obtained for unlocking access to another building or part of the building, which can be secured against unauthorized access, from which it can be concluded that the position of the person lies outside the building or building section.
- the check is made as to whether the person has left the building or the building section when it is determined that the predefined period of time has elapsed. Additionally or alternatively, checking whether the person has left the building or the building section may also occur before the predefined period of time has elapsed. Additionally or alternatively, the check of whether the person has left the building or the building section can be made if it is determined that the person has not just been in the predefined area.
- a notification it is possible for a notification to be provided if it is determined that the person has been in a building or building section for no less than or more than the predefined period of time and / or not only in a predefined area of the building or building Housing section has stopped.
- the notification may be, for example, an alarm signal.
- the notification can also be regarded as a silent alarm.
- the notification may in particular be sent to a device according to the second aspect.
- it is first checked which communication connection (for example an Internet connection or a mobile radio connection) is available before the notification of an available one
- communication connection for example an Internet connection or a mobile radio connection
- Communication link (for example, via the Internet or via the GSM mobile network using SMS) is sent.
- the method further comprises:
- the method further comprises:
- a successfully performed Action is, for example, a successful pick up or delivery of one or more shipments by a deliverer. It is possible that the decision as to whether the action was successful will be made on the basis of additional conditions. In particular, the information that the action has been carried out can be sent to a device according to the second aspect.
- the method further comprises:
- a check is made as to whether the action was successfully performed before and / or after the predefined time period (according to the second aspect) has elapsed. For example, checking whether the action has been successfully performed based on received information that the action has been successfully performed, which was sent from a device according to the first or third aspect. Also in the context of the method according to the second aspect, information that the action has been carried out successfully can be provided and sent, for example, to an administrator or a resident of the building or of the building section.
- the method further comprises:
- Such querying or triggering thereof can take place.
- Information representative of the reason or reasons why the predefined time period has elapsed and / or the predefined area has left may, for example, be sent to a device according to the second aspect (in particular a server). For example, done Such queries or triggers thereof only if there is Internet access.
- the method further comprises:
- the information representative of justification why the predefined time period has elapsed and / or the predefined area has been left is preferably stored (by a device according to the second aspect). Based on the stored information, the predefined time duration and / or the predefined range can be optimized for future actions to be performed. In this respect, a method according to the second aspect may further include optimizing the predefined time duration and / or the predefined range for actions to be performed on the basis of information representative of reasons why the predefined time period has elapsed and / or the predefined area has left.
- additional persons for example an administrator or a resident of the building or of the building section
- the person is a deliverer and / or the action to be performed is delivering or picking up a shipment.
- a delivery person is responsible for mail delivery, courier, express and other postal services.
- a deliverer is, for example, a letter and
- mailing can in particular be a mailing (for example, a letter, a postcard, a
- Printed matter an advertising mail, a throwing shipment, etc.
- a Kleingutier for example, a book item, a parcel, a business parcel, a package, a consignment, etc.
- the method further comprises:
- the burglar alarm system detects an access of a person in the building or building section (for example, in a room). For example, this information is sent to a device according to the second aspect, which then receives it. For example, the device according to the second aspect checks whether the registered access is pre-approved and thus authorized. In this case, information about the authorization of the person's access into the building or the building section can then be sent to the burglar alarm system. Thus, a false alarm can be avoided by the burglar alarm system.
- Fig. 1 is a block diagram of an embodiment of the invention
- Fig. 2a-f is a flowchart of a first embodiment
- 3a-c an exemplary schematic representation of different areas of a
- Fig. 5a, b is a flowchart of a second embodiment
- FIG. 1 shows a block diagram of an exemplary embodiment of a
- the device 1 designed as a data processing system serves as an example for devices according to the different aspects; in particular, a device according to the first, second or third aspect (for example device 100, 200, 300 or 350) can be designed according to the device 1.
- the device 1 can in this respect, for example, a computer, a desktop computer, a server, a thin client or a portable computer, such as a laptop computer, a tablet computer, a personal digital assistant (PDA), a smartphone or in Handheld scanner, his.
- the device may perform the function of a server or a client.
- Processor 10 of device 1 is in particular a microprocessor
- Microcontroller microcontroller, digital signal processor (DSP),
- ASIC Application Specific Integrated Circuit
- FPGA Field Programmable Gate Array
- Processor 10 executes program instructions stored in program memory 12 and, for example, stores intermediate results or the like in working or main memory 11.
- program memory 120 is a nonvolatile memory such as a flash memory, a magnetic memory, an EEPROM memory ( electrically erasable programmable read only memory) and / or optical memory.
- Main memory 11 is, for example, a volatile or nonvolatile memory, in particular a random access memory (RAM) such as a static RAM (SRAM), a dynamic RAM (DRAM), a ferroelectric RAM (FeRAM). and / or a magnetic RAM memory (MRAM).
- RAM random access memory
- SRAM static RAM
- DRAM dynamic RAM
- FeRAM ferroelectric RAM
- MRAM magnetic RAM memory
- Program memory 12 is preferably a local with the device 1 fixed
- Data carriers are for example hard disks which are built into the device 1.
- the data carrier may, for example, also be a data carrier which can be connected to the device 1 in a separable manner, such as a memory stick, a removable data carrier, a portable hard disk, a CD, a DVD and / or a floppy disk.
- Program memory 12 contains, for example, the operating system of the device 1, which is loaded at least partially into main memory 11 when the device 1 is started and executed by the processor 10.
- the operating system of device 1 is, for example, a Windows, UNIX, Linux, Android, Apple iOS and / or MAC operating system.
- the operating system in particular allows the use of the device 1 for data processing. It manages, for example, resources such as main memory 11 and - -
- Program memory 12 network interface 13, input and output device 14, provides basic programming interfaces to other programs, among other things
- Processor 10 controls the communication interface 13, which may be, for example, a network interface and configured as a network card, network module and / or modem.
- the communication interface 13 is in particular configured to establish a connection of the device 1 with other devices, in particular via a (wireless) communication system, for example a network, and to communicate with these
- receive data (via the communication system) and forward to processor 10 and / or receive data from processor 10 and (via the communication system).
- Examples of a communication system are a local area network (LAN), a wide area network (WAN), a wireless network (for example, according to the IEEE 802.11 standard, the Bluetooth (LE) standard and / or the NFC standard), a wired one Network, a mobile network, a telephone network and / or the Internet.
- LAN local area network
- WAN wide area network
- wireless network for example, according to the IEEE 802.11 standard, the Bluetooth (LE) standard and / or the NFC standard
- a wired one Network for example, a mobile network, a telephone network and / or the Internet.
- processor 10 may control at least one input / output device 14.
- Input / output device 14 is, for example, a keyboard, a mouse, a display unit, a microphone, a touch-sensitive display unit, a speaker, a reader, a drive and / or a camera.
- Input / output device 14 may, for example, receive inputs from a user and forward them to processor 10 and / or receive and output information for the user of processor 10.
- Figs. 2a to 2f show a flowchart of a first embodiment
- the interfaces between the figures are marked with letters in the flow chart.
- the embodiment relates to the delivery of a parcel by a deliverer 400.
- the example is also transferable to other actions to be performed by other persons.
- the illustrated embodiment is in this case with a mobile device 100 (for example, a mobile phone or a handheld scanner) of the deliverer 400 as exemplary device according to the first aspect for performing a
- a server 200 as an exemplary device according to the second aspect for performing a
- an electronic door lock 300 and a beacon 350 each performed as exemplary devices according to the third aspect for performing an exemplary method according to the third aspect.
- actions are performed by a management application 500.
- the deliverer 400 related actions are shown.
- the embodiment is particularly suitable for delivery in a private security zone, for example, in an apartment behind an apartment door.
- the deliverer 400 with the mobile device 100 is in front of a home of the person to whom the package is to be delivered (action 401) .
- the mobile device 100 has access to the Internet and can be used for the position of the deliverer 400
- the deliverer 400 operates the mobile device and requests access to the home via an input device (action 402]
- Access authorization information and also sends position data, based for example on GPS data or the signal strength of the mobile network (action 101).
- the server 200 receives the request and in any case checks the plausibility of the requested access on the basis of a position of the mobile device 100 representative of the position of the deliverer 400 (action 201).
- the server 200 requests access authorization information from a management application 500. This can be operated, for example, by an employee of the delivery company or the resident of the apartment.
- the management application 500 assigns access authorizations. This can happen ad hoc, that is to say only when the deliverer 400 is located in front of the residential building (action 501). Alternatively, access authorizations may also have already been assigned in advance and stored on the server 200.
- the server 200 receives access authorization information from the management application 500 so that personal and client-specific assignment of access authorizations can be performed by the server 200 (action 202).
- a (first) predefined period of time is determined, for which the deliverer for delivery at most in the apartment to stop, in this example 15 seconds.
- Management application 500 takes place, for example, by means of e-mail, SMS and / or push messages.
- the server 200 assigns a one-time (that is, one use only once), immediate (that is, usable only within a very limited period of time) and time-limited (that is, allows only a certain length of stay) access authorization, and transmits conditional access information to the mobile device 100 (Action 203).
- Sending the access authorization information also includes sending the first predefined time period for which the mailer 400 is allowed to reside at most in the home. Triggered by sending the
- Access authorization information is server-initialized to a timer with a (second) predefined time period and started (action 204).
- the second predefined time period is, for example, 5 minutes.
- This second predefined period of time serves for an additional server-side check of the delivery period of the delivery service, for example in the event that the communication with the mobile device 100 terminates.
- the server 200 After initializing the server-side timer at the second predefined time period, the server 200 sends information representative of the start of home delivery to the management application 500 (action 205) indicating this (action 502).
- the access authorization information is received by the mobile device 100 (action 102).
- the deliverer 400 comes to the door (action 404) and opens the door with the mobile device 100 (action 405).
- the mobile device 100 then transmits access authorization information
- the electronic door lock 300 (preferably including the first predefined time period) to the electronic door lock 300 (action 103), which is then unlocked (eg unlocked and opened) (action 301).
- the electronic lock 300 then sends regular signals for the first predefined period of time which allow the position in the home to be derived, for example Bluetooth signals (action 302).
- the electronic lock can thus check whether the first predefined time duration has been reached (action 303) and then stop sending the signals.
- the information that the door is opened may be sent to the beacon 350, which will then also periodically send (bluetooth) signals permitting deriving the location in the home (action 352).
- the (web-enabled) beacon 350 (or alternatively, the mobile device 100 upon receiving a confirmation that the door is opened or is open) may forward the information to the server 200 indicative of unlocking the door (action 351).
- the deliverer 400 can now deposit the parcel behind the door in the entrance area of the apartment (action 406). In this case, a check is made as to whether the delivery person has stopped for delivery less or not more than the (first and / or second) predefined time period in the apartment and has only been in a predefined area of the apartment, as will be described in more detail below. After sending the conditional access information (action 103) by the
- Mobile device 100 (and preferably receiving confirmation from the electronic lock 300 that the door is unlocked) is checked to see if the mobile device 100 is connected to the Internet (action 106) and if not connected to a cellular network ( Action 107). Depending on the check, information is sent to the server 200 representative of the unlocking of the apartment door and received there via the Internet (action 206) or by SMS or telephone call (action 207). The server 200 in turn sends information representative of the beginning of the
- the mobile device 100 initiates a monitoring of the signals emitted by the electronic door lock 300 and the beacon 350 (action 104) to check the person's detention in the predefined area. This may be based in particular on the reception of the beacon and / or door lock signals and the signal strength are checked. Also, a timer is initialized and started with the first predefined amount of time (action 105). In addition, a sensor monitoring (action 105) comprising the analysis of sensor data (action 108) is started.
- the sensor monitoring (actions 105, 108) shown in FIG. 2b is shown by way of example with further details in FIG. 2f and will now be described in more detail in connection with FIG. 2f.
- the sensors used are preferably sensors of the mobile device 100 itself.
- the range of movement of the mobile device and thus indirectly of the deliverer 400 is measured (action 150).
- a conspicuous behavior of the deliverer 400 is concluded and an alarm signal is output when the movement is above a threshold value (for example a movement of more than 2 m) (action 151).
- sensor data for example, a motion sensor, a
- Acceleration sensor for determining approximately an orientation
- a magnetic field sensor for determining approximately an orientation
- a gyroscope for determining approximately an orientation
- Action 152 Acceleration, geomagnetic field and / or rotation measured (action 152).
- the data is then checked for patterns in particular (action 153). This can be done, for example, by a rule-based algorithm or an artificial neural network (KNN) (action 154). Examples of undesirable conspicuous behavior (and associated detectable patterns) are discarding
- This sensor data can do this also be checked for (conspicuous) patterns (action 157).
- one or more object density (s) in the immediate vicinity
- the extent and direction of the change can be determined. If, for example, several (different) object densities are determined, it can be established as an example of a conspicuous pattern that more than one person is present. If an abnormal behavior of the deliverer 400 or one or more other persons is concluded, an alarm signal can again be output (action 158).
- a suspicious pattern may be present, as this indicates removal of another person.
- Other sensors can also be used in order to conclude that the deliverer 400 has a conspicuous behavior. For example, by means of a
- Fingerprint sensor of the mobile device 100 (repetitive) checks whether the deliverer 400 holds the mobile device 100 in the hand.
- an (audible and / or visual) alarm may be issued by the mobile device 100 to the deliverer (action 110).
- the predefined time duration can be shortened, for example the timer can run faster (action 110).
- action 110 may be made when the mobile device 100 determines that the deliverer has not just been in the predefined area, for example, because the signals of the electronic lock 300 and / or the beacon 350 are too weak (action 111).
- the beacon 350 may determine that the deliverer has been outside the predefined area (action 353) and / or is within a prohibited zone (action 354).
- FIG. 2b whether the deliverer has only been in the predefined area, will now be described in more detail by means of an example in conjunction with FIG. FIGS. 3a-c show an exemplary schematic illustration of different areas of a building section.
- the access in the form of the door 800 includes an electronic lock, such as the electronic lock 300.
- the electronic lock 300 includes a Bluetooth LE chip both on its inside and outside.
- the electronic lock 300 provides a beacon 801 on its inside and a beacon 802 on its outside (see FIG. 3c).
- the beacons 801, 802 define permission areas 803, 804 in the area in which the signals of beacons 801, 802 may be received (or above a threshold). In this zone, the deliverer is allowed to be during delivery. Thus, if it is determined that the mobile device 100 is in the area 803 or 804, it can be assumed that the mailer 400 is in the predefined area. In contrast, in the area 805, the signals of the beacons 801, 802 are not to be received or only below a threshold value. This area 805 represents a prohibition area outside the predefined area.
- the mobile device 100 is not in the area 803 or 804, it can be assumed that the mail carrier 400 is not just in the predefined area.
- a separate Bluetooth beacon 350 is placed in the entrance area.
- the area 807 in which the signals of the beacon 350 are to be received or above a threshold value is a prohibition area in this case.
- the beacon 350 it can be assumed that the mail carrier 400 is outside the predefined area and thus not only in the predefined area.
- the beacon 350 it is also possible for the beacon 350 to define a further permission area instead of a prohibition area.
- the presence of the mobile device 100 in the respective area can be performed by the mobile device 100.
- the position of the mobile device 100 is determined by the beacons 801, 802, 350.
- the mobile device 100 can periodically (transmit Bluetooth signals which are received by the beacons the received signal strength of the signals sent by the mobile device 100, the position of the mobile device 100 can then be determined.
- a further example is to be shown with reference to FIGS. 4a-c, as an alternative or in combination with the previously described checking whether the deliverer has only been in the predefined area can be carried out.
- the mailer 400 is located in front of the door 800 with the electronic lock 300.
- the electronic lock 300 includes a Bluetooth LE chip, so that the electronic lock also includes a beacon 801.
- the signal strength (eg, the received signal strength) of the signals of the beacon 801 may be measured at opening (eg, shortly before, shortly after, or while) the door 800 The mobile device then has the distance 810 from the beacon 801.
- the door 800 is opened resulting in an increased distance 811 to the beacon 801 and a lower signal strength ( Figure 4b)
- the distance 811 will be substantially equal to the width of the door 800
- a conversion factor can be determined with which the distance between the mobile device 100 and the corresponding beacon can be determined from the received signal strength 100 shows the signal strength of signals of the beacon 35 remote a distance 812 0.
- the deliverer 400 enters the building or the building section to deliver a shipment (Fig. 3c], the signal strengths change according to the distances 813, 814 of the beacons 801, 350.
- the position of the mobile device 100 and thus of the deliverer 400 can be determined. If the deliverer 400 goes too far into the building or the building section, that is to say if the deliverer does not just stay in a predefined area, this can be determined by the mobile device.
- the measured signal strengths and / or the determined conversion factors are transmitted to a server (for example server 200) Optimize the future calculation of the conversion factor by making the underlying model based on the information.
- Embodiment to determine whether the deliverer 400 has only been in the predefined area Others in particular described
- Embodiments are also possible (eg, based on location of the mobile device 100 based on WLAN signals or the earth's magnetic field).
- motion detectors eg, a PIR sensor
- action 112 no signal for deriving the position is received (action 113) and / or it is determined that the deliverer is outside the predefined range, for example because the signal is too weak (action 111, action 353 ), checked whether the deliverer has left the house or apartment. In this case, this is made possible by checking whether the door is locked from the outside (action 114, 115). In principle, however, it is also possible that triggered by other events, a check of the door state (in particular, whether the door is locked from the outside) takes place or to check in another way, whether the house or apartment was abandoned.
- action 406 In the event the deliverer 400 has dropped the package (action 406) and then closed the door and locked it from the outside (action 407), this is determined by the electronic door lock 300 (action 304) and information indicative of a successful save the door to the mobile device 100 and / or the beacon 350 (action 305).
- the regular sending of the signals for deriving the position can be ended (action 306).
- a check of the door state leads to a positive result (that is, it is determined that the door is locked from the outside), so that it can be decided that a successful delivery has been made (action 116).
- information may be sent indicatively to server 200 for successful delivery. Both the room monitoring, the sensor monitoring and the timer can then be ended (action 117).
- the deliverer can close the program on the mobile device if necessary (action 409).
- the server 200 checks whether the delivery was successful (action 209), especially if the second predefined time period has expired (action 208). In particular, if the server has received the information indicative of a successful delivery from the mobile device 100, then information indicative of a successful delivery may be sent to the management application 500, such that an administrator or the administrator
- a preferably silent alarm is triggered (action 118).
- a silent alarm is understood in particular that for the deliverer 400 of the alarm is not recognizable in order to reduce the risk of the mobile device 100 being deactivated or switched off.
- it is checked which communication connection is available to the mobile device 100. This example first checks if there is a connection to the Internet (action 119). If so, a
- Notification indicative of a timeout sent to server 200 (action 120).
- the Sever 200 checks (for example, regularly, in particular, as long as the second predefined time period has not yet expired (see action 208)), whether a time overflow has been reported (action 211). If so, then a notification is sent to the management application 500 so that the user is notified of the timeout (optionally indicating how far the predefined amount of time has been exceeded, action 506).
- the server 200 initiates a query of the reasons why the timeout took place (action 212).
- the mobile device 100 queries the deliverer 400 for the reasons (action 121, action 410).
- the mailer 400 may enter the reasons on the mobile device 100 via an input device (action 411).
- the reasons are sent to and stored by server 200 (action 213).
- a notification may be sent to the management application 500 so that the user is notified of the reasons (action 507).
- a preferably silent alert is also raised (action 122).
- action 122 it is checked which communication connection is available to the mobile device 100. This example first checks if there is a connection to the Internet (action 123). If so, a notification indicative of leaving the area is sent to the server 200 (action 124). The Sever 200 checks (for example, regularly, in particular, as long as the second predefined time period has not yet expired (see action 208)), whether an exit from the area has been reported (action 214). If this is the case, on the one hand a notification to the
- Management application 500 is sent so that the user is notified of leaving the area (action 508).
- the server 200 initiates a query of the reasons why the area was left (action 215).
- the mobile device 100 then asks the deliverer 400 for the reasons (action 125, action 412).
- the deliverer 400 can use an input device to explain the reasons on
- an intruder detection system can provide information indicative of access to the building,
- Burglar alarm system are received. This can be a false alarm of
- the server-side check for an alarm regarding a timeout (action 211) or an exit from the area (action 214) may be repeated (periodically) until the second predefined time period has expired (action 208). If there is no Internet connection (action 119 or 123), in this example it is checked whether the mobile device 100 is connected to a mobile radio network (action 126 or 127). If so, notification is sent to server 200 indicative of a timeout or exit of the area (actions 128 and 129, respectively). This can be done for example by means of SMS or by means of a telephone call.
- FIGS. 5a, 5b show a flow chart of a second embodiment of inventive method according to the different aspects. The interfaces between the figures are marked with letters in the flow chart. The embodiment also relates to the delivery of a parcel by a deliverer. The example is also transferable to other actions to be performed by other persons.
- Security zone for example a staircase. In this case, no separate beacon 350 is used.
- 5 is not checked in the embodiment of FIG., Whether the deliverer has only been in a predefined area. It is only checked whether the deliverer has been less or not more than a predefined period of time in the house.
- a mobile device 100 ' for example, a mobile phone or a handheld scanner
- deliverer 400' as an exemplary device according to the first aspect for performing a
- Management application 500 'performed. Also, the deliverer 400 'related actions are shown.
- the deliverer 400 may manage access permissions, particularly irrespective of his location and in advance of delivery (action 420'). Thereafter, the mobile device 100 'requests corresponding access authorization information to the server 200' (action 101 ').
- an employee of the delivery company or the resident of the apartment can assign or assign access authorizations in advance of the delivery (action 501').
- Access authorization information from the management application 500 ' so that a personal and client-specific allocation of access authorizations by the server 200 'can take place (action 202').
- a (first) predefined period of time is determined, for which the deliverer 400 'for delivery may stay in the house at most, in this example 60 seconds.
- Sending the access authorization information may also include sending the first predefined time period for which the mailer 400 'is allowed to reside at most in the house.
- Access authorization information is received by the mobile device 100 '(action 102'). It is also possible that the access authorization information is pushed to the mobile device 100 'without prior request. If the deliverer 400 'with the mobile device 100' is located in front of a dwelling house of the person to whom the parcel is to be delivered (action 401 '), the mobile device can deliver it manually by the mailer 400' (or alternatively automatically by the mobile device based on e.g. Position data) access to the house (action 402 '). On the basis of position data, based for example on GPS data or the signal strength of the mobile radio network, the mobile device 100 'checks the plausibility of the requested access at least on the basis of a determined position of the mobile device 100' (action 140 ').
- Time period to the deliverer 400 ', for example via the screen of the mobile device 100' (action 403 ').
- the deliverer 400 ' opens the door with the mobile device 100' (action 405 * ).
- Mobile device 100 ' (and preferably receiving confirmation from the electronic lock 300' that the door is open), it is checked whether the mobile device 100 'has a connection to the Internet (action 106') and, if not, a connection with one Mobile network exists [action 107 '). Depending on the check, information is sent to the server 200' representative of the opening of the front door and received there via the Internet (action 206 ') or by SMS or telephone call (action 207'). The server 200 'in turn sends information representative of the beginning of the
- a server-side timer can not be triggered by the transmission of the access authorization information as in the first embodiment
- a timer is initialized and started with a (second) predefined time duration (action 204 ').
- the second predefined time period is 60 seconds in this case. This second predefined period of time serves for an additional server-side check of the delivery time of the delivery service, for example in the event that the communication with the mobile device 100 'terminates.
- a timer is initialized and started by the mobile device 100 'with the first predefined time duration (action 105').
- action 112 ' it is checked whether the deliverer has left the house. In the case of one
- the deliverer 400 ' will not lock the front door from the outside, but only pull (Action 407').
- the electronic lock can only detect a closing of the door, but in particular no locking of the door lock (action 304 ').
- checking whether the delivery person has left the house is realized by checking whether the position of the person is outside the house. In this case, this check is based on verifying that for the Position of the person representative position information (for example, based on GPS and / or GSM signals) is determined outside the house (action 141 ') and / or whether a release of a door lock of another house is determined (action 142').
- Parcel delivery manually acknowledged (action 408 ').
- the deliverer can close the program on the mobile device if necessary or it remains active in the background (action 409 ').
- the server 200 checks whether the delivery was successful (action 209 "), in particular if the second predefined time period has expired (action 208'). In particular, if the server has received the information indicative of successful delivery from the mobile device 100 ' Indicative of successful delivery to the management application 500 'so that an administrator or resident can be notified of successful delivery (action 504').
- the server-side timer may then also be terminated (action 210 ') in that it is determined that the mailer 400 has not been less than or more than a predefined period of time and / or has not just been in the predefined area in the home, that is, in particular in the event that the server 200 'can not detect successful delivery (Action 209 ') or that action 141' and / or action 142 'does not state that de R deliverer 400 'has left the house will proceed as already described in connection with the first embodiment, that is, the silent alarm described is triggered. It can become so
Landscapes
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Business, Economics & Management (AREA)
- Emergency Management (AREA)
- Lock And Its Accessories (AREA)
- Alarm Systems (AREA)
Abstract
Description
Claims
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
DE102016106514.5A DE102016106514A1 (de) | 2016-04-08 | 2016-04-08 | Kontrolle von Aufenthaltsdauer und Aufenthaltsbereich |
PCT/EP2017/058376 WO2017174780A1 (de) | 2016-04-08 | 2017-04-07 | Kontrolle von aufenthaltsdauer und aufenthaltsbereich |
Publications (1)
Publication Number | Publication Date |
---|---|
EP3440638A1 true EP3440638A1 (de) | 2019-02-13 |
Family
ID=58548672
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
EP17717649.2A Pending EP3440638A1 (de) | 2016-04-08 | 2017-04-07 | Kontrolle von aufenthaltsdauer und aufenthaltsbereich |
Country Status (5)
Country | Link |
---|---|
US (2) | US11288906B2 (de) |
EP (1) | EP3440638A1 (de) |
CN (1) | CN109478351A (de) |
DE (1) | DE102016106514A1 (de) |
WO (1) | WO2017174780A1 (de) |
Families Citing this family (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
DE102017106014B4 (de) | 2017-03-21 | 2019-04-25 | dot GmbH & Co. KG | Verfahren zum Betreiben einer ein Objekt sichernden Einbruchmeldeanlage |
JP6986466B2 (ja) * | 2018-02-22 | 2021-12-22 | トヨタホーム株式会社 | 建物の施解錠システム |
CN110060453A (zh) * | 2019-04-24 | 2019-07-26 | 深圳德里克设备有限公司 | 监控方法及穿戴式设备 |
DE102019211817A1 (de) * | 2019-08-07 | 2021-02-11 | Robert Bosch Gmbh | Verfahren zum Entriegeln eines Zugangselements mittels einer Entriegelungsvorrichtung, Entriegelungsvorrichtung und Smart-Home-System mit einer Entriegelungsvorrichtung |
WO2021214356A1 (es) * | 2020-04-21 | 2021-10-28 | Beabloo, S.L. | Procedimiento para determinar la interacción entre personas en espacios |
US20220335765A1 (en) * | 2021-04-15 | 2022-10-20 | Hall Labs Llc | Motion sensor with beacon advertisement |
US20220338101A1 (en) * | 2021-04-15 | 2022-10-20 | Hall Labs Llc | Motion-based beacon advertisement |
Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20150154850A1 (en) * | 2012-09-21 | 2015-06-04 | Google Inc. | Leveraging neighborhood to handle potential visitor at a smart-home |
US20150279130A1 (en) * | 2009-02-10 | 2015-10-01 | Yikes Llc | System for Permitting Secure Access to a Restricted Area |
Family Cites Families (25)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JPH0884374A (ja) * | 1994-09-14 | 1996-03-26 | Alpine Electron Inc | セキュリティ装置 |
DE19721409A1 (de) * | 1997-05-22 | 1998-12-03 | Hks Systems Gmbh | Schüler-Sicherheits-System |
DE19926938A1 (de) * | 1999-03-11 | 2000-01-27 | Thorsten Dzeik | System und Verfahren zur automatischen Erstellung einer leistungsbezogenen Abrechnung des Besuches von Sportstudios und dergleichen und zur indirekten Steuerung der Besucherströme von Sportstudios und dergleichen |
MX2008010761A (es) * | 2006-02-21 | 2009-01-21 | Adt Security Services Inc | Sistema y metodo para entrega remotamente atendida. |
JP5226347B2 (ja) * | 2008-03-04 | 2013-07-03 | キヤノン株式会社 | 領域管理システム及び方法 |
US20170185277A1 (en) * | 2008-08-11 | 2017-06-29 | Icontrol Networks, Inc. | Automation system user interface |
US9558604B2 (en) * | 2009-02-10 | 2017-01-31 | Yikes Llc | System for permitting secure access to a restricted area |
US8325033B2 (en) * | 2009-09-25 | 2012-12-04 | At&T Intellectual Property I, L.P. | Systems and methods for remote building security and automation |
CN201946050U (zh) * | 2010-10-21 | 2011-08-24 | 樊胜云 | 一种带有跟踪功能的访客信息登记管理系统 |
CN103093517A (zh) * | 2011-10-28 | 2013-05-08 | 台湾色彩与影像科技股份有限公司 | 人脸辨识访客管理方法 |
CH705781A1 (de) * | 2011-11-17 | 2013-05-31 | Sven Sauter | Benutzerrechteverwaltung und Zugangskontrollsystem mit Zeitbeschränkung. |
US9208676B2 (en) * | 2013-03-14 | 2015-12-08 | Google Inc. | Devices, methods, and associated information processing for security in a smart-sensored home |
WO2014125028A1 (de) * | 2013-02-15 | 2014-08-21 | Bernhard Mehl | Anordnung zum autorisierten ansprechen mindestens eines in einem gebäude befindlichen bauelements |
CN105075248A (zh) * | 2013-03-29 | 2015-11-18 | 日本电气株式会社 | 对象物体标识设备、对象物体标识方法和对象物体标识程序 |
DE102014105245A1 (de) * | 2013-12-05 | 2015-06-11 | Deutsche Post Ag | Verfahren zum Bewirken einer Änderung eines Betriebsmodus |
US9666000B1 (en) * | 2014-01-04 | 2017-05-30 | Latchable, Inc. | Methods and systems for access control and awareness management |
US9552684B2 (en) * | 2014-02-04 | 2017-01-24 | Secure Gravity Inc. | Methods and systems configured to detect and guarantee identity for the purpose of data protection and access control |
US10657483B2 (en) * | 2014-04-29 | 2020-05-19 | Vivint, Inc. | Systems and methods for secure package delivery |
AU2015215965B2 (en) * | 2014-08-25 | 2016-12-22 | Accenture Global Services Limited | Secure short-distance-based communication and access control system |
US9786107B2 (en) * | 2015-02-23 | 2017-10-10 | Vivint, Inc. | Smart doorman |
US10235646B2 (en) * | 2015-04-10 | 2019-03-19 | Teletracking Technologies, Inc. | Systems and methods for automated real-time task scheduling and management |
US20160343237A1 (en) * | 2015-05-22 | 2016-11-24 | Google Inc. | Systems and methods of integrating sensor output of a mobile device with a security system |
CN105303744B (zh) * | 2015-11-24 | 2017-12-19 | 上海摩软通讯技术有限公司 | 移动设备的防盗方法和防盗系统 |
US10347063B1 (en) * | 2017-03-01 | 2019-07-09 | Alarm.Com Incorporated | Authorized smart access to a monitored property |
US11615623B2 (en) * | 2018-02-19 | 2023-03-28 | Nortek Security & Control Llc | Object detection in edge devices for barrier operation and parcel delivery |
-
2016
- 2016-04-08 DE DE102016106514.5A patent/DE102016106514A1/de active Pending
-
2017
- 2017-04-07 EP EP17717649.2A patent/EP3440638A1/de active Pending
- 2017-04-07 WO PCT/EP2017/058376 patent/WO2017174780A1/de active Application Filing
- 2017-04-07 CN CN201780036347.3A patent/CN109478351A/zh active Pending
-
2018
- 2018-10-08 US US16/153,960 patent/US11288906B2/en active Active
-
2021
- 2021-12-30 US US17/565,654 patent/US20220122399A1/en active Pending
Patent Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20150279130A1 (en) * | 2009-02-10 | 2015-10-01 | Yikes Llc | System for Permitting Secure Access to a Restricted Area |
US20150154850A1 (en) * | 2012-09-21 | 2015-06-04 | Google Inc. | Leveraging neighborhood to handle potential visitor at a smart-home |
Non-Patent Citations (1)
Title |
---|
See also references of WO2017174780A1 * |
Also Published As
Publication number | Publication date |
---|---|
US11288906B2 (en) | 2022-03-29 |
DE102016106514A1 (de) | 2017-10-12 |
US20220122399A1 (en) | 2022-04-21 |
CN109478351A (zh) | 2019-03-15 |
WO2017174780A1 (de) | 2017-10-12 |
US20190043287A1 (en) | 2019-02-07 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
WO2017174780A1 (de) | Kontrolle von aufenthaltsdauer und aufenthaltsbereich | |
EP3077966B1 (de) | Auswahl von zugangskontrollvorrichtungen auf einer zugangsberechtigungsnachweisvorrichtung basierend auf information einer sendung | |
EP3333810B1 (de) | Fachspezifische zugangsberechtigungsinformation | |
EP3104340B1 (de) | Verfahren und vorrichtung zum bewirken des entriegelns und verriegelns zumindest einer tür eines fahrzeugs für eine zustellung | |
EP3610466B1 (de) | Besucher-registrierungs- und -zugangskontrollverfahren | |
DE102014111503B4 (de) | Intelligentes Zustellsystem | |
EP3610465A1 (de) | Zugangskontrollsystem mit funk- und gesichtserkennung | |
CN106897959A (zh) | 一种基于物联网的智能社区安防系统 | |
EP3729385B1 (de) | Zugangskontrollsystem mit funk-authentifizierung und kennworterfassung | |
WO2019121335A1 (de) | Zugangskontrollsystem mit funk- und gesichtserkennung | |
DE102016117387B4 (de) | Verfahren zur Absicherung einer Übergabestelle | |
DE102015016262B4 (de) | Verfahren zum Betreiben eines Zugangssystems für ein Kraftfahrzeug | |
US20200294339A1 (en) | Multi-factor authentication for physical access control | |
EP3493166A1 (de) | Verfahren und vorrichtung für eine sendungsaufbewahrungsvorrichtung | |
EP2635998A1 (de) | Mobiles gerät und infrastruktursystem | |
EP3306578A1 (de) | Berechtigung zum öffnen eines Aufnahmefachs eines unbemannten Fahrzeugs | |
DE102018220754B4 (de) | Zugangssteuersystem und Verfahren zum Steuern eines Zugangs zumindest einer Person in einen Gebäudebereich | |
EP3748590B1 (de) | Wandmontierbares authentifizierungsgerät | |
DE102016108013B3 (de) | Verfahren für ein System zum sicheren Öffnen einer Türe sowie System zum sicheren Öffnen einer Türe | |
US20220215729A1 (en) | Managing access to a restricted site with a barrier and/or barrierless and detecting entry | |
EP1977665A1 (de) | System zur Entgegennahme von Versandstücken | |
EP3893527A1 (de) | Verfahren zum rekonstruieren von infektionsketten | |
DE102020000532A1 (de) | Verfahren zum Betreiben einer Schließanlage einer Haustür sowie Schließanlagensystem für eine Haustür | |
DE102014019754A1 (de) | Intelligentes Zustellsystem |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
STAA | Information on the status of an ep patent application or granted ep patent |
Free format text: STATUS: UNKNOWN |
|
STAA | Information on the status of an ep patent application or granted ep patent |
Free format text: STATUS: THE INTERNATIONAL PUBLICATION HAS BEEN MADE |
|
PUAI | Public reference made under article 153(3) epc to a published international application that has entered the european phase |
Free format text: ORIGINAL CODE: 0009012 |
|
STAA | Information on the status of an ep patent application or granted ep patent |
Free format text: STATUS: REQUEST FOR EXAMINATION WAS MADE |
|
17P | Request for examination filed |
Effective date: 20181005 |
|
AK | Designated contracting states |
Kind code of ref document: A1 Designated state(s): AL AT BE BG CH CY CZ DE DK EE ES FI FR GB GR HR HU IE IS IT LI LT LU LV MC MK MT NL NO PL PT RO RS SE SI SK SM TR |
|
AX | Request for extension of the european patent |
Extension state: BA ME |
|
STAA | Information on the status of an ep patent application or granted ep patent |
Free format text: STATUS: REQUEST FOR EXAMINATION WAS MADE |
|
DAV | Request for validation of the european patent (deleted) | ||
DAX | Request for extension of the european patent (deleted) | ||
STAA | Information on the status of an ep patent application or granted ep patent |
Free format text: STATUS: EXAMINATION IS IN PROGRESS |
|
17Q | First examination report despatched |
Effective date: 20210409 |
|
STAA | Information on the status of an ep patent application or granted ep patent |
Free format text: STATUS: EXAMINATION IS IN PROGRESS |