EP3923257A1 - Dispositif de sécurité, système et procédé - Google Patents

Dispositif de sécurité, système et procédé Download PDF

Info

Publication number
EP3923257A1
EP3923257A1 EP21178718.9A EP21178718A EP3923257A1 EP 3923257 A1 EP3923257 A1 EP 3923257A1 EP 21178718 A EP21178718 A EP 21178718A EP 3923257 A1 EP3923257 A1 EP 3923257A1
Authority
EP
European Patent Office
Prior art keywords
processor
access point
tamper
acceleration
sensor
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Withdrawn
Application number
EP21178718.9A
Other languages
German (de)
English (en)
Inventor
Boaz MENIS
Nissim TUGENDHAFT
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Essence Security International Ltd
Original Assignee
Essence Security International Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Essence Security International Ltd filed Critical Essence Security International Ltd
Publication of EP3923257A1 publication Critical patent/EP3923257A1/fr
Withdrawn legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G08SIGNALLING
    • G08BSIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
    • G08B13/00Burglar, theft or intruder alarms
    • G08B13/02Mechanical actuation
    • G08B13/08Mechanical actuation by opening, e.g. of door, of window, of drawer, of shutter, of curtain, of blind

Definitions

  • the present invention relates to a device, system and method for premises security, for example a security device having inbuilt tamper detection.
  • a premises may have multiple openable and/or closable access points, for example doors and/or windows.
  • An access point may comprise any point in the premises that may be used to access the premises, whether or not it is intended as a point of entry.
  • an openable window may not be intended to be used to enter to the premises, but may provide a potential access point to an intruder trying to enter the premises, or at least to a body part, e.g. an arm, of the intruder.
  • an access point comprises at least two components, wherein at least one of the components is moveable so that there is a relative movement of one of the components with respect to the other. Relative movement of the components results in the opening and closing of the access point.
  • a first component of the access point is a moveable barrier, for example a door, gate or window.
  • a second component of the access point is a fixed component, for example a door frame, gate frame or window frame.
  • the moveable barrier is moveable between open and closed states for respectively entering or blocking entry to the space.
  • a security device may be used to detect a change of state of the access point.
  • the security device may be mounted on the access point.
  • the security device may be battery operated.
  • the security device may transmit a wireless signal to another device, for example to a control hub of a security system, when a change of state of the access point is detected.
  • a wireless signal may be transmitted only when the change of state is relevant to security, for example, when the change of state is an unauthorised opening of the access point.
  • the security device may be mounted on the access point.
  • the security device may be mounted to a frame of the access point, for example a door or window frame.
  • the security device may be mounted on the moveable barrier.
  • the security device is mounted on one moveable barrier, and the access point comprises a further moveable barrier, for example in the case of two sliding doors.
  • the security device may be part of a system that also comprises a second device.
  • the security device may be mounted to a first component of the access point and the second device may be mounted to a second, different component of the access point. Separation of the security device from the second device may be detected to detect an open or closed state of the access point.
  • the security device may comprise a magnetic sensor and the second device may comprise a magnet, or vice versa.
  • the security device may be configured to detect a change of the state of the access point without use of any such second device.
  • the change of state may be identified based on sensed kinematics and/or orientation of a moveable barrier of the access point, for example using a multi-axis accelerometer.
  • a security device may be tampered with to prevent detection of the change of state.
  • the tampering may be by physically removing the security device from its installed position.
  • the security device may be adhesively mounted.
  • the tampering may involve ripping the device from the access point.
  • Such a tampering may be referred to as a physical tamper.
  • the devices and methods described in the present application may solve one or more of the above problems and/or provide useful market alterative(s).
  • a security device for use at an access point of a premises.
  • the security device comprises a sensor configured to sense acceleration of the security device and to produce a sensor output in response to sensing the acceleration.
  • the security device further comprises a processor configured to identify a potential tamper event; process the sensor output to determine whether values for a parameter of the sensor output meet a detection condition over a sustained period of time following the identifying of the potential tamper event; and designate the potential tamper event as a tamper event if the values meet the detection condition over the sustained period of time.
  • Determining whether the sensor output meets the detection condition over the sustained period of time may allow tamper events to be distinguished from other types of events, for example normal door opening or door closing events.
  • tamper events may be distinguished from shock events, for example a shock event caused by someone banging on a door. Accuracy of tamper detection may be improved. A number of false tamper detections may be reduced.
  • the detection condition may be representative of a characteristic acceleration that is distinguishable from at least one of a typical acceleration caused upon a moving part of the access point when opening, or a typical acceleration caused by a shock event.
  • the identifying of the potential tamper event may comprise processing the sensor output to determine that a value for a further parameter of the sensor output meets a predefined condition.
  • the determining that the value for the further parameter of the sensor output meets the predefined condition may comprise comparing the value for the further parameter to a further threshold.
  • the identifying of the potential tamper event may comprise determining, by the processor, that a change of state of the access point has occurred.
  • the device may further comprise a magnetic sensor for sensing a magnetic field and producing magnetic sensor output in response to sensing the magnetic field.
  • the processor may be configured to process the magnetic sensor output to perform the determining that the change of state of the access point has occurred.
  • the security device may be for use at an access point of a premises.
  • the access point may comprise at least a first component and a second component. At least one of the first component and second component may be moveable to move relative to the other of the first component and second component (108), to open and close the access point. At least one of the first and second component may be rotatable around a hinge.
  • the first component and/or the second component may comprise a door.
  • the first component and/or the second component may comprise a window.
  • the first component and/or the second component may comprise a gate.
  • the first component and/or the second component may comprise a door frame, window frame or gate frame.
  • the sustained period of time may be longer than a typical time for which values of the parameter meet the predefined condition when a normal opening or closing action of the first and/or second component of the access point is performed.
  • the sustained period of time may be longer than a typical time for which values of the parameter meet the detection condition when a shock event occurs.
  • the sustained period of time may be between 50 ms and 500 ms, optionally between 50 ms and 250 ms, further optionally between 75 ms and 125 ms.
  • the sustained period of time may be 100 ms.
  • the sustained period of time may be greater than 20 ms, optionally greater than 30 ms, further optionally greater than 40 ms, further optionally greater than 50 ms, further optionally greater than 75 ms, further optionally greater than 100 ms.
  • the sustained period of time may be less than 500 ms, optionally less than 400 ms, further optionally less than 300 ms, further optionally less than 200 ms, further optionally less than 150 ms, further optionally less than 125 ms, further optionally less than 100 ms.
  • Meeting the detection condition may comprise exceeding a threshold value for 10 consecutive sample points.
  • Meeting the detection condition may comprise exceeding a threshold value for at least 5 consecutive sample points, optionally at least 10 sample points, further optionally at least 15 sample points.
  • the sample points may be spread, e.g. evenly spaced, over any of the above sustained periods of time, but in some embodiments, more particularly, a 100 ms period.
  • the processor may be further configured to initiate a detection window in response to identifying the potential tamper event.
  • the processor may be further configured to determine that the tamper event has occurred only if the sustained period of time occurs within the detection window.
  • the detection window may be at least 200 ms, optionally at least 500 ms, optionally at least 750 ms. Additionally or alternatively, the detection window may be less than 5 s, optionally less than 2 s, further optionally less than 1.5 s. For example, the detection window may be between 0.5 seconds and 1.5 seconds, or more specifically 1 second, in some embodiments.
  • the sensor may be configured to switch from a first mode to a second mode in response to the identifying of the potential tamper event.
  • the first mode may be higher power than the second mode.
  • the first and second modes may operate at different sampling rates, or in other embodiments, the second mode may be a waking mode and the first mode may be a sleep mode in some embodiments or even an off mode in some embodiments.
  • the sensor and/or processor may be configured to switch from the first mode to the second mode in response to a determination of an opening of the access point.
  • the sensor and/or processor may be configured to switch from the first mode to the second mode in response to a determination of a non-closed state.
  • the determined non-closed state is a determined open state in some embodiments.
  • the sensor and/or processor may be configured to switch from the second mode to the first mode after expiration of the detection window.
  • the sensor and/or processor may be configured to switch from the second mode to the first mode in response to a determination that a non-closed state has ceased.
  • the determined non-closed state is a determined open state in some embodiments.
  • the sensor and/or processor may be configured to switch from the second mode to a third, different mode after expiration of the detection window.
  • the second mode and third mode may operate at different sampling rates.
  • the first mode and third mode may operate at different sampling rates.
  • the accelerometer may be turned off or in a sleep mode. The accelerometer may not sample when in the third mode.
  • the processor may be further configured to trigger an alarm in response to determining that a tamper event has occurred.
  • the processor may be further configured to trigger an alarm in response to values for the parameter of the sensor output meeting the detection condition over the sustained period of time.
  • the processor may be further configured to instruct a transmitter to send a message to a further device in response to determining that a tamper event has occurred.
  • the processor may be further configured to instruct a transmitter to send a message to a further device in response to values for the parameter of the sensor output meeting the detection condition over the sustained period of time.
  • the further device may comprise or form part of a control hub.
  • the further device may comprise or form part of a monitoring system.
  • the further device may comprise a remote server.
  • the sensor may comprise or form part of an accelerometer.
  • the sensor may be configured to measure acceleration on each of three axes.
  • the axes may be orthogonal.
  • the parameter may comprise or be representative of acceleration on a single axis.
  • the further parameter may comprise or be representative of acceleration on a single axis.
  • the single axis may be a preselected one of the three axes.
  • the single axis may be any one of the three axes.
  • the parameter may comprise or be representative of acceleration on two axes.
  • the further parameter may comprise or be representative of acceleration on two axes.
  • the two axes may be preselected from the three axes.
  • the two axes may be any two of the three axes.
  • the further parameter may be the same as the parameter.
  • the further threshold value may be the same as the threshold value.
  • the threshold value may be lower than the further threshold value.
  • the threshold value may be 350 milli-g.
  • the threshold value may be greater than 100 milli-g, optionally greater than 200 milli-g, further optionally greater than 300 milli-g, further optionally greater than 350 milli-g, further optionally greater than 400 milli-g, further optionally greater than 500 milli-g.
  • the threshold value may be less than 1000 milli-g, optionally less than 750 milli-g, further optionally less than 500 milli-g, further optionally less than 500 milli-g, further optionally less than 400 milli-g, further optionally less than 350 milli-g.
  • the further threshold value may be 350 milli-g.
  • the further threshold value may be greater than 100 milli-g, optionally greater than 200 milli-g, further optionally greater than 300 milli-g, further optionally greater than 350 milli-g, further optionally greater than 400 milli-g, further optionally greater than 500 milli-g.
  • the further threshold value may be less than 1000 milli-g, optionally less than 750 milli-g, further optionally less than 500 milli-g, further optionally less than 500 milli-g, further optionally less than 400 milli-g, further optionally less than 350 milli-g.
  • the processor may be configured to set the threshold value in dependence on a material and/or size and/or construction of the first component of the access point.
  • the processor may be configured to set the threshold value in dependence on a material and/or size and/or construction of the second component of the access point.
  • the processor may be configured to set the further threshold value in dependence on a material and/or size and/or construction of the first component of the access point.
  • the processor may be configured to set the further threshold value in dependence on a material and/or size and/or construction of the second component of the access point.
  • the processor may be configured to set the threshold value using an installation vector determined by a calibration process.
  • the processor may be configured to set the further threshold value using an installation vector determined by a calibration process.
  • the installation vector may comprise or represent a respective value of acceleration for each of a plurality of axes of the security device when the security device is not in motion.
  • the sensor and the processor may be housed within a common housing of the security device.
  • the security device may further comprise a battery configured to power the sensor and the processor.
  • the battery may be housed within the common housing.
  • the security device may further comprise a transmitter configured to send data to a or the further device.
  • the transmitter may be housed within the common housing.
  • the security device may further comprise a receiver configured to receive data from the further device. The receiver may be housed within the common housing.
  • a security method comprising sensing, by a sensor of a security device for a premises, acceleration of the security device; providing, by the sensor, a sensor output in response to the sensing of the acceleration; identifying, by the processor, a potential tamper event; processing, by the processor, the sensor output to determine whether values for a parameter of the sensor output meet a detection condition over a sustained period of time following the identifying of the potential tamper event; and designating, by the processor, the potential tamper event as a tamper event if the values for the parameter of the sensor output meet the detection condition over the sustained period of time.
  • a computer-readable medium comprising instructions which, when executed by a processor, cause the processor to perform the steps of: receiving a sensor output of a sensor of a security device for a premises; identifying a potential tamper event; processing the sensor output to determine whether values for a parameter of the sensor output meet a detection condition over a sustained period of time following the identifying of the potential tamper event; and designating the potential tamper event as a tamper event if the values for the parameter of the sensor output meet the detection condition over the sustained period of time.
  • a method comprising: mounting a security device to a mounting surface at an access point of a premises, the security device comprising a sensor configured to sense acceleration of the security device and produce a sensor output in response to the sensing of the acceleration; processing, by a processor, the sensor output to determine an installation vector for the security device; and storing, by the processor, the determined installation vector.
  • the installation vector may comprise or represent a respective value of acceleration for each of a plurality of axes of the security device when the security device is not in motion.
  • the method may further comprise processing, by the processor, the sensor output to: identify a potential tamper event; process the sensor output to determine whether values for a parameter of the sensor output meet a detection condition over a sustained period of time following the identifying of the potential tamper event, wherein the processing of the sensor output is dependent on the installation vector, and designate the potential tamper event as a tamper event if the values for the parameter of the sensor output meet the detection condition over the sustained period of time.
  • a security device for use at an access point of a premises, comprising: a sensor configured to sense acceleration of the security device and to produce a sensor output in response to sensing the acceleration; and a processor configured to operate in a tamper detection mode, the operating in the tamper detection mode comprising processing the sensor output to detect at least one tamper event; wherein the processor is configured to disable the tamper detection mode in response to a determination that the access point is in a closed state.
  • the processor may be further configured to provide the determination that the access point is in the closed state.
  • the providing of the determination that the access point is in the closed state may comprise processing output of a further sensor to obtain values for a separation parameter that is representative of a separation between the security device and a further device. Additionally, or alternatively, the determination that the access point is in the closed state may be based on the sensor output.
  • the processor may be further configured to enable the tamper detection mode in response to a determination that the access point is not in the closed state.
  • the determination that the access point is not in the closed state may comprise a determination that the access point is in an open state.
  • the determination that the access point is not in the closed state may comprise a determination that the access point is in a magnetic tamper state.
  • the processor may be further configured to provide the determination that the access point is not in the closed state.
  • the providing of the determination that the access point is not in the closed state may comprise processing output of a or the further sensor to obtain values for a or the separation parameter that is representative of a separation between the security device and a or the further device. Additionally, or alternatively, the determination that the access point is not in the closed state may be based on the sensor output.
  • the processor may be configured to disable the tamper detection mode in response to a determination that a change of state of the access point from the open state to the closed state has occurred.
  • the processor may be configured to enable the tamper detection mode in response to a determination that a change of state of the access point from the closed state to the open state has occurred.
  • the processor may be further configured to trigger an alarm in response to the detecting of the tamper event.
  • the processor may be further configured to trigger an alarm in response to determining that the at least one tamper event has occurred.
  • the processor may be further configured to instruct a transmitter to send a message to a further device in response to determining that the at least one tamper event has occurred.
  • the processor may be further configured to instruct a transmitter to send a message to a further device in response to the detecting of the tamper event.
  • the further device may comprise or form part of a control hub.
  • the further device may comprise or form part of a monitoring system.
  • the processor may be further configured to operate in a shock detection mode.
  • the operating in the shock detection mode may comprise processing the sensor output to detect at least one shock event.
  • the processor may be further configured to switch from the tamper detection mode to the shock detection mode in response to a determination that a state of the access point has changed from a non-closed state to a closed state.
  • the processor may be further configured to switch from the shock detection mode to the tamper detection mode in response to a determination that a state of the access point has changed from a closed state to a non-closed state.
  • the sensor may comprise or form part of an accelerometer.
  • the sensor may be configured to measure acceleration on each of three axes.
  • the axes may be orthogonal.
  • the device may further comprise a magnetic sensor for sensing a magnetic field and producing magnetic sensor output in response to sensing the magnetic field.
  • the processor may be configured to process the magnetic sensor output to provide the determination that the access point is in the closed state.
  • the processor may be configured to process the magnetic sensor output to provide the determination that the access point is in a non-closed state.
  • the non-closed state may comprise an open state.
  • the non-closed state may comprise a magnetic tamper state.
  • the processor may be configured to process the magnetic output to provide a determination that a state of the access point has changed from a closed state to a non-closed state.
  • the processor may be configured to process the magnetic output to provide a determination that a state of the access point has changed from a non-closed state to a closed state.
  • the access point may comprise at least a first component and a second component. At least one of the first component and second component may be moveable to move relative to the other of the first component and second component to open and close the access point. At least one of the first and second component may be rotatable around a hinge.
  • the first component and/or the second component may comprise a door.
  • the first component and/or the second component may comprise a window.
  • the first component and/or the second component may comprise a gate.
  • the first component and/or the second component may comprise a door frame, window frame or gate frame.
  • the magnetic sensor may be mounted on one of the first and second components.
  • the magnetic sensor may be configured to sense a magnetic field of a magnet mounted on the other of the first and second components.
  • the detecting of the at least one tamper event may comprise: identifying a potential tamper event; processing the sensor output to determine whether values for a parameter of the sensor output meet a detection condition over a sustained period of time following the identifying of the potential tamper event; and designating the potential tamper event as a tamper event if the values for the parameter of the sensor output meet the detection condition over the sustained period of time.
  • Determining whether the values for the parameter meet the detection condition may comprise comparing the values to a threshold value.
  • the sensor may be configured to switch from a first mode to a second mode in response to the determining of the potential tamper event.
  • a security method comprising: sensing, by a sensor of a security device for use at an access point of a premises, an acceleration of the security device; providing, by the sensor, a sensor output in response to sensing the acceleration; operating a processor of the security device in a tamper detection mode, the operating in the tamper detection mode comprising processing the sensor output to detect at least one tamper event; and disabling, by the processor, the tamper detection mode in response to a determination that the access point is in a closed state.
  • a computer-readable medium comprising instructions which, when executed by a processor, cause the processor to perform the steps of: receiving a sensor output from a sensor of a security device for use at an access point of a premises; operating in a tamper detection mode, the operating in the tamper detection mode comprising processing the sensor output to detect at least one tamper event; and disabling the tamper detection mode in response to a determination that the access point is in a closed state.
  • a security device for use at an access point of a premises, comprising: a sensor configured to sense acceleration of the security device and produce a sensor output in response to sensing the acceleration; and a processor configured to operate in a shock detection mode, the operating in the shock detection mode comprising processing the sensor output to detect at least one shock event; wherein the processor is further configured to disable the shock detection mode in response to a determination that the access point is not in a closed state.
  • the processor may be further configured to provide the determination that the access point is not in the closed state.
  • the providing of the determination that the access point is not in the closed state may comprise processing output of a further sensor to obtain values for a separation parameter that is representative of a separation between the security device and a further device. Additionally, or alternatively, the determination that the access point is not in the closed state may be based on the sensor output.
  • the processor may be further configured to enable the shock detection mode in response to a determination that the access point is in the closed state.
  • the processor may be further configured to provide the determination that the access point is in the closed state.
  • the providing of the determination that the access point is in the closed state may comprise processing output of a or the further sensor to obtain values for a or the separation parameter that is representative of a separation between the security device and a or the further device. Additionally, or alternatively, the determination that the access point is in the closed state may be based on the sensor output.
  • the processor may be configured to disable the shock detection mode in response to a determination of a change of state of the access point from the closed state to the open state.
  • the processor may be configured to enable the shock detection mode in response to a determination of a change of state of the access point from the open state to the closed state.
  • the processor may be configured such that the detecting of the at least one shock event disregards features of the sensor output occurring within a delay period after a determination that the access point has ceased to be in the closed state.
  • the delay period may be at least 50 ms, optionally at least 100 ms, further optionally at least 200 ms.
  • the processor may initiate the delay period in response to the determination that the access point has ceased to be in the closed state.
  • the processor may initiate the delay period in response to a determination that a state of the access point has changed from a closed state to a non-closed state.
  • the non-closed state may comprise an open state.
  • the non-closed state may comprise a magnetic tamper state.
  • the processor may be further configured to trigger an alarm in response to the detecting of the at least one shock event.
  • the processor may be further configured to trigger an alarm in response to determining that the at least one shock event has occurred.
  • the processor may additionally or alternatively be configured to instruct a transmitter to send a message to a further device in response to the detecting of the at least one shock event.
  • the processor may be further configured to instruct a transmitter to send a message to a further device in response to determining that the at least one shock event has occurred.
  • the sensor may comprise or form part of an accelerometer.
  • the sensor may be configured to measure acceleration on each of three axes.
  • the axes may be orthogonal.
  • the detecting of the at least one shock event may comprise determining that a value for a third parameter of the sensor output exceeds at least one shock threshold value.
  • the third parameter of the sensor output may be representative of an energy of motion of the security device.
  • the third parameter of the sensor output may be integrated over a predetermined integration time.
  • the at least one shock threshold value may comprise a first shock threshold representative of gross shock.
  • the first shock threshold may correspond to a first integration time.
  • the at least one shock threshold value may comprise a second shock threshold representative of repetitive shock.
  • the second shock threshold may correspond to a second, different integration time.
  • the device may further comprising a magnetic sensor for sensing a magnetic field and producing magnetic sensor output in response to sensing the magnetic field.
  • the processor may be configured to process the magnetic sensor output to provide the determination that the access point is not in the closed state.
  • the processor may be configured to process the magnetic sensor output to provide the determination that the access point is in a non-closed state.
  • the non-closed state may comprise an open state.
  • the non-closed state may comprise a magnetic tamper state.
  • the access point may comprise at least a first component and a second component. At least one of the first component and the second component may be moveable to move relative to the other of the first component and the second component to open and close the access point. At least one of the first and second component may be rotatable around a hinge.
  • the first component and/or the second component may comprise a door.
  • the first component and/or the second component may comprise a window.
  • the first component and/or the second component may comprise a gate.
  • the first component and/or the second component may comprise a door frame, window frame or gate frame.
  • the magnetic sensor may be mounted on one of the first and second components.
  • the magnetic sensor may be configured to sense a magnetic field of a magnet mounted on the other of the first and second components.
  • the processor may be further configured to operate in a tamper detection mode.
  • the operating in the tamper detection mode may comprise processing the sensor output to detect at least one tamper event.
  • the processor may be further configured to switch from the tamper detection mode to the shock detection mode in response to a determination that a state of the access point has changed from a non-closed state to a closed state.
  • the processor may be further configured to switch from the shock detection mode to the tamper detection mode in response to a determination that a state of the access point has changed from a closed state to a non-closed state.
  • the non-closed state may comprise an open state.
  • the non-closed state may comprise a magnetic tamper state.
  • a security method comprising sensing, by a sensor of a security device for use at an access point of a premises, acceleration of the security device; producing, by the sensor, a sensor output in response to the sensing of the acceleration; operating a processor of the security device in a shock detection mode, the operating in the shock detection mode comprising processing the sensor output to detect at least one shock event; and disabling, by the processor, the shock detection mode in response to a determination that the access point is not in a closed state.
  • a computer-readable medium comprising instructions which, when executed by a processor, cause the processor to perform the steps of: receiving a sensor output from a sensor of a security device for use at an access point of a premises; operating in a shock detection mode, the operating in the shock detection mode comprising processing the sensor output to detect at least one shock event; and disabling the shock detection mode in response to a determination that the access point is not in a closed state.
  • features in one aspect may be applied as features in any other aspect, in any appropriate combination.
  • method features may be provided as device features or vice versa.
  • Features of an apparatus of one aspect may be provided as features of an apparatus of another aspect.
  • Features of a method of one aspect may be provided as features of a method of another aspect.
  • FIG 1 is a schematic illustration of a system in accordance with an embodiment.
  • the system is mounted at an access point.
  • the access point comprises a door 108 and its corresponding door frame or surround 106.
  • the door provides a moveable barrier whose movement allows the opening and closing of the access point.
  • the door 108 may slide relative to the door frame 106.
  • the door 106 may rotate around a hinge (not shown).
  • the access point may comprise any openable or breakable structure, for example a window or gate.
  • the access point may further comprise any corresponding frame or surround.
  • Coordinate axes are shown, with x being horizontal along a plane of the door 108 when closed, y being vertical, and z being horizontal perpendicular to the plane of the door 108 when closed. In other embodiments, any suitable coordinate system may be used. Cartesian axes and/or rotational axes may be defined.
  • the system comprises a security device 102 and a second device 104.
  • the second device 104 comprises a magnet 110.
  • the security device 102 has a surface (not shown) for mounting the sensor device against a first component of the access point, which in the embodiment of Figure 1 is the door frame 106.
  • the second device 104 has a surface (not shown) for mounting the second device 104 against a second component of the access point.
  • the second component of the access point is the door frame 106.
  • the security device 102 may be mounted on the door 108 and the second device 104 may be mounted on the door frame 106. In further embodiments, the security device 102 may be mounted on any first component of the access point, and the second device 104 may be mounted on any second component of the access point, wherein the first component and second component are relatively moveable. Any suitable method of mounting the security device 102 and second device 104 may be used. For example, the security device 102 and second device 104 may each be adhesively mounted.
  • the security device 102 and second device 104 are shown in exaggerated size in Figure 1 to increase the clarity of the figure. The figure is not to scale.
  • FIG. 2 is a schematic illustration of components of the security device 102.
  • the security device 102 comprises an accelerometer 212 and a magnetic sensor 214.
  • the security device 102 further comprises a processor 204, a memory 206 and a transceiver 208.
  • the security device 102 further comprises a battery 210 configured to power the security device 210. In the present embodiment, the security device 102 does not require a connection to mains power.
  • the accelerometer 212, magnetic sensor 214, processor 204, memory 206, transceiver 208 and battery 210 are housed within a common housing.
  • the accelerometer 212, magnetic sensor 214, processor 204, memory 206, transceiver 208 and battery 210 may be housed within any suitable housing or housings.
  • the security device 102 may not include one or more of the accelerometer 212, magnetic sensor 214, processor 204, memory 206, transceiver 208 and battery 210.
  • the accelerometer 212 is configured to sense acceleration of the security device on each of three orthogonal axes.
  • the accelerometer 212 may be replaced or supplemented by any sensor configured to sense acceleration of the security device.
  • the sensor may sense acceleration in any one or more axes.
  • the magnetic sensor 214 is configured to sense magnetic field. In use, the magnetic sensor 214 senses a magnetic field of the magnet 110. The magnetic field sensed by the magnetic sensor 214 is dependent on the separation between the magnetic sensor 214 and the magnet 110. A change in the position of the door 108, for example from closed to open, causes a change in the magnetic field that is sensed by the magnetic sensor 214.
  • the magnetic sensor 214 may be replaced or supplemented by a different sensor that may be used in sensing an open or closed state of the access point, for example an electrical or optical sensor.
  • the magnet 110 may be replaced or supplemented by a corresponding component, for example a light source.
  • At least one sensor component of the security device is configured for use in detecting an open state or closed state of the access point without the use of a corresponding component in the second device 104, for example without the presence of a magnet 110 or light source.
  • the second device 104 may be omitted.
  • the security device 102 is mounted on a moveable component of the access point.
  • the accelerometer 212 may be used to detect an open state or closed state of the access point, for example by detecting movement from an open state to a closed state or from a closed state to an open state.
  • the processor 204 comprises processing circuitry which is configured to receive and process output from the accelerometer 212 and magnetic sensor 214.
  • the processor 204 may store data in and/or retrieve data from the memory 206.
  • the transceiver 208 is a wireless transceiver configured to transmit signals to, and receive signals from, a control hub 114.
  • the security device 102 may comprise any suitable transmitter and/or receiver for transmitting signals to and/or receiving signals from the control hub 114.
  • the processor 204 is configured to instruct the transceiver 208 to wirelessly transmit data to the control hub 114.
  • the control hub 114 comprises a processor (not shown) and a wireless transceiver (not shown) configured to transmit signals to, and receive signals from, the security device 102.
  • the wireless transceiver of the control hub 114 is also configured to transmit signals to and/or receive signals from further security devices, or other devices.
  • the processor of the control hub 114 and the processor 204 may each comprise one or more processing chips and/or components.
  • each processor may comprise: control circuitry; and/or processor circuitry; and/or at least one application specific integrated circuit (ASIC); and/or at least one field programmable gate array (FPGA); and/or single or multi-processor architectures; and/or sequential/parallel architectures; and/or at least one programmable logic controllers (PLCs); and/or at least one microprocessor; and/or at least one microcontroller; and/or a central processing unit (CPU); and/or a graphics processing unit (GPU).
  • ASIC application specific integrated circuit
  • FPGA field programmable gate array
  • PLCs programmable logic controllers
  • microprocessor and/or at least one microcontroller
  • CPU central processing unit
  • GPU graphics processing unit
  • transceiver 208 is shown as being distinct from corresponding processor 204 but in some embodiments at least part of the processing aspects of the transceiver 208 may have hardware in common with at least one processor component of the corresponding processing circuitry 204.
  • a memory may be separate from each processor and/or partly or wholly integrated onto a common chip(s) with the processor.
  • the memory may store code that, when read by the processing circuitry, causes performance of any of the methods described herein, and/or as illustrated in in the drawings.
  • the memory may comprise: volatile memory, for example, one or more dynamic random access (DRAM) modules and/or static random access memory (SRAM) modules; and/or nonvolatile memory, for example, one or more read only memory (ROM) modules, which for example may comprise a Flash memory and/or other electrically erasable programmable read-only memory (EEPROM) device.
  • the code may for example be software, firmware, or hardware description language (HDL) or may be any combination of these or any other form of code for one or more processors that is known by a person skilled in the art.
  • HDL hardware description language
  • the memory 206 of the security device 102 may instead, or at least in part be provided by a memory device(s) that may in some embodiments be separate or removable from the device.
  • a memory device(s) may comprise magnetic storage devices (e.g., hard disk, floppy disk, magnetic strips), optical disks (e.g., compact disk (CD), digital versatile disk (DVD)), smart cards, and removable flash memory devices (e.g., card, stick, key drive).
  • the memory components may be distributed.
  • a distributed server may store code, which may be downloaded to the device for execution by processing circuitry described herein, to perform any method described herein that is executable by the processing circuitry.
  • the downloaded code may be stored on local memory of the device before execution by the processing circuitry.
  • the system of Figure 1 may further comprise a server (not shown) and/or a monitoring system (not shown) that are remote from the control hub 114.
  • the control hub 114 may be configured to communicate wirelessly with the server and/or monitoring system.
  • the monitoring system may comprise a monitoring system that is used to monitor multiple premises.
  • the monitoring system may, additionally or alternatively comprise a smartphone or other personal portable device, such as may be in the possession of an owner of the premises.
  • FIG 3 is a flow chart 300 illustrating in overview a method of an embodiment.
  • a sensor for example accelerometer 212 of Figure 2 , is configured to sense acceleration of a security device 102.
  • a processor 204 is configured to process output of the sensor to determine that a tamper event has occurred.
  • the tamper event may comprise physical removal of the security device 102 from an access point by an intruder.
  • the sensor senses acceleration of the security device 102.
  • the senor produces a sensor output in response to sensing the acceleration.
  • a processor 204 identifies a potential tamper event.
  • the processor 204 processes the sensor output to determine whether values for a parameter of the sensor output meet a detection condition over a sustained period of time following the identifying of the potential tamper event.
  • the processor 204 designates the potential tamper event as a tamper event if the values for the parameter of the sensor output meet the detection condition over the sustained period of time.
  • FIG 4 is a flow chart 400 illustrating in overview a method of an embodiment in which a processor 204 operates in, and disables, a tamper detection mode for detecting tamper events.
  • a sensor for example accelerometer 212 of Figure 2 , is configured to sense acceleration of a security device 102.
  • a processor 204 is configured to process output of the sensor in a tamper detection mode to determine that a tamper event has occurred.
  • the sensor senses acceleration of the security device.
  • the senor produces a sensor output in response to sensing the acceleration.
  • a processor 204 operates in a tamper detection mode.
  • the operating in a tamper detection mode comprises processing the sensor output to detect at least one tamper event.
  • the processor 204 disables the tamper detection mode in response to a determination that the access point is in a closed state.
  • the tamper detection mode is not used when the access point is determined to be in the closed state.
  • the tamper detection mode is used when the access point is determined not to be in the closed state.
  • FIG. 5 is a flow chart 500 illustrating in overview a method of an embodiment in which a processor 204 operates in, and disables, a shock detection mode for detecting shock events.
  • a sensor for example accelerometer 212 of Figure 2 , is configured to sense acceleration of a security device 102.
  • a processor 204 is configured to process output of the sensor in a shock detection mode to determine that a shock event has occurred.
  • the sensor senses acceleration of the security device.
  • the senor produces a sensor output in response to sensing the acceleration.
  • a processor 204 operates in a shock detection mode.
  • the operating in the shock detection mode comprises processing the sensor output to detect at least one shock event.
  • the processor 204 disables the shock detection mode in response to a determination that the access point is not in a closed state.
  • the shock detection mode is used when the access point is determined to be in the closed state.
  • the shock detection mode is not used when the access point is determined not to be in the closed state.
  • FIG. 6 is a flow chart 600 illustrating in overview a calibration method in accordance with an embodiment.
  • a security device 102 is mounted to a mounting surface at an access point of a premises.
  • the security device 102 may be mounted to a door frame 106 or door 108. Any suitable method of mounting may be used, for example adhesive mounting.
  • the security device 102 comprises a sensor configured to sense acceleration of the security device 102 and produce a sensor output in response to the sensing of the acceleration.
  • the sensor may be an accelerometer 212 and the sensor output may be representative of acceleration in three orthogonal axes. In steady state, which may also be described as resting state, the output of the accelerometer 212 is indicative of the gravitational force vector.
  • a processor 204 processes the sensor output to determine an installation vector for the security device 102.
  • the installation vector may comprise or represent a respective value of acceleration for each of a plurality of axes of the security device when the security device is not in motion.
  • the installation vector may comprise steady state acceleration values for x, y and z axes.
  • the processor 204 stores the determined installation vector of the security device 102.
  • the stored steady state acceleration values may be used as offsets when calculating subsequent changes in acceleration.
  • the processor 204 may store the determined installation vector in a memory 206.
  • the processor 204 may use the installation vector to determine an orientation of a coordinate system of the accelerometer 212 and thus of the security device 102 relative to an environment in which it is installed. For example, it may be determined that x, y and z coordinates of the accelerometer 212 are aligned with two perpendicular horizontal axes and a vertical axis, respectively. In some embodiments, a mathematical manipulation, for example a rotation matrix, may be used to adjust for any misalignment in axes.
  • the processor 204 may determine one or more axes of interest based on the determined installation vector and/or further information about the access point. For example, if a component of the access point is known to move within a horizontal plane only, the processor may determine that movement along the vertical axis is particularly relevant to tampering. The processor 204 determines the orientation of the vertical axis based on the stored installation vector.
  • the processor 204 identifies a potential tamper event.
  • the identifying of a potential tamper event means that there is a determination that tampering may have occurred, but that further processing, which may be based on further measurement, is required to determine whether or not such tampering occurred.
  • the processor 204 processes the sensor output to determine whether values for a parameter of the sensor output meet a detection condition over a sustained period of time following the identifying of the potential tamper event.
  • the determining whether values for the parameter meet the detection period over the sustained period of time may be in dependence on the stored installation vector. For example, the processor 204 may use acceleration values of the installation vector as offset values when determining changes in acceleration.
  • the processor 204 designates the potential tamper event as a tamper event if the values for the parameter of the sensor output meet the detection condition over the sustained period of time.
  • a determined installation vector may be used by the processor in any suitable manner, for example to inform any suitable action or decision.
  • the use of a calibration process may enable the security device 102 to be installed in any orientation, rather than a prescribed orientation.
  • a calibration process may be repeated while the security device 102 is installed. For example, the calibration process may be repeated at a predetermined calibration interval.
  • the security device 102 of Figures 1 and 2 is configured to perform the methods of Figures 3 , 4 , 5 and 6 .
  • a security device 102 may be configured to perform any one, two or three of the methods of Figures 3 , 4 , 5 and 6 , or to perform all of the methods of Figures 3 , 4 , 5 and 6 .
  • Figure 7a is a flow chart 700 illustrating in overview a tamper detection method in accordance with an embodiment.
  • the security device 102 is operated in a tamper detection mode.
  • a tamper condition is identified based on an output of an accelerometer being greater than a threshold magnitude for more than a threshold amount of time.
  • any suitable method of determining a tamper event may be used.
  • stages of Figure 7a as described below may be preceded by a calibration method as described above with reference to stages 602 to 606 of Figure 6 , or by any other suitable calibration method.
  • a sensor of the security device 102 is active.
  • the sensor is configured to sense acceleration of the security device 102.
  • the sensor may also be referred to as a tamper detection sensor.
  • the sensor is the accelerometer 212 of Figure 2 .
  • the accelerometer 212 is configured to sense acceleration in each of the orthogonal axes.
  • the three orthogonal axes on which acceleration is sensed may be the x, y and z axes as illustrated in Figure 1 .
  • any sensor configured to sense acceleration may be used.
  • the senor produces a sensor output that is representative of acceleration.
  • the sensor samples acceleration on each of the three axes at a sampling rate of 100 Hz.
  • the sensor outputs values for acceleration on each axis every 10 ms. In other embodiments, a different sampling rate may be used.
  • the processor 204 processes the sensor output.
  • the processor 204 is operating in a lower-power mode of operation, which may be referred to as a sleep mode.
  • the processor is configured to operate in more than one sleep mode, for example, a sleep mode and a deep sleep mode.
  • the processor 204 compares acceleration on each of the three axes to a first threshold value for acceleration.
  • a different respective first threshold value may be used for each of the axes.
  • the acceleration values may represent a difference between a measured acceleration and an acceleration sensed by the sensor due to gravity. In other words, a determined acceleration due to gravity may be used as an offset to the measured accelerations to determine the acceleration values.
  • the first threshold value for the y axis may take into account acceleration due to gravity.
  • the acceleration value compared to the first threshold value may be an absolute value for acceleration, such that the acceleration value that is compared to the first threshold value is always a positive number.
  • the processor 204 determines whether any of the accelerations exceeds its respective first threshold value. If none of the accelerations exceeds its respective first threshold value, the method of Figure 7a returns to stage 702 and the sensor continues to sense acceleration and produce sensor output that is representative of the acceleration.
  • stage 710 the processor 204 determines that a potential tamper event is occurring based on the determination that the first threshold value has been exceeded. The processor 204 determines a potential tamper event has occurred if any of the accelerations exceeds its first threshold value at any one sample time.
  • the processor 204 transitions from the lower-power mode of operation, which may be referred to as a sleep mode, to a higher-power mode of operation, which may be referred to as a waking mode.
  • the transition from sleep mode to waking mode is in response to the determining that a potential tamper event has occurred.
  • the processor 204 wakes up for a period of one second, starting at the time at which the potential tamper event is identified.
  • the processor 204 initiates a detection window in which to determine whether a tamper event has occurred.
  • the detection window is 1 second. In other embodiments, the detection window may be of any appropriate length.
  • the processor 204 processes the sensor output.
  • the processor 204 stores acceleration values for the three axes in memory 206.
  • the processor 204 compares the acceleration values to a respective second threshold value for acceleration for each axis.
  • the second threshold value for each axis is the same as the first threshold value for that axis.
  • the second threshold value may be different from the first threshold value.
  • the second threshold value may be lower than the first threshold value.
  • the processor 204 determines whether the values for acceleration have exceeded the second threshold value for a sustained period of time.
  • the sustained period of time has a predetermined duration of 100 ms.
  • the processor 204 determines that values for acceleration have exceeded the second threshold value for the sustained period of time if values for acceleration for a given axis have exceeded the second threshold value for that axis in 10 consecutive samples.
  • a different number of samples and/or a different sampling rate may be used.
  • a shorter sustained period of time, for example 50 ms, may be used in some embodiments, and likewise the sampling rate may differ.
  • the processor 204 determines whether at least a predetermined number of consecutive samples exceed the second threshold, and therefore whether the values for acceleration exceed the second threshold for at least a sustained period of time having a predetermined duration (since the sample rate is known).
  • the predetermined number is generally selected to be more than 2, which also may have an effect of countering a noise sample.
  • a threshold acceleration and/or predetermined duration of the sustained period of time is too low, there may be too many false tamper detections.
  • the predetermined duration of the sustained period of time is too short, there may be an increase in false tamper detections due to transient accelerations caused by a door opening action being confused for tamper events.
  • the predetermined duration of the sustained period of time is too long, there is an increased chance that any changes in acceleration due to changes in orientation that result from a tamper may not be detected in cases where the orientation change is temporary.
  • Different sizes or materials of doors may impact a time required. For example, different sizes of doors may take different times to open and close.
  • suitable values for the first threshold value, second threshold value and/or predetermined duration may be determined empirically. The empirical determination may be performed prior to installation, based on data collected from prior installations of devices that are the same as device 102.
  • the method proceeds to stage 718.
  • the processor 204 determines whether the detection window has expired. In the present embodiment, the detection window expires 1 second after the identifying of the potential tamper event.
  • the method returns to stage 714 and the processor continues to process the sensor output in the waking mode.
  • stage 720 the processor 204 determines that no tamper event has occurred within the detection window.
  • the processor 204 reverts to sleep mode.
  • stage 720 the method returns to stage 702, in which the accelerometer 212 is active and sensing acceleration.
  • the accelerometer 212 may always have a sampling rate of 100 Hz. In other embodiments, the accelerometer 212 may switch to a different sampling rate during the detection window.
  • stage 716 If at stage 716 it is determined that acceleration has exceeded the second threshold value for a sustained period of time, which in this embodiment is 100 ms or 10 samples, the method proceeds to stage 722.
  • the processor 204 determines that a tamper event has occurred.
  • the processor 204 designates the potential tamper event that was identified at stage 710 as a tamper event.
  • the method proceeds to stage 724 and 726, which may occur simultaneously or in either order.
  • the processor 204 activates an alarm (not shown in Figures 1 and 2 ) which is configured to operate acoustic and/or visual transducers to issue an audible or visible alarm signal.
  • the alarm may form part of the security device 102.
  • the alarm and/or activation thereof by the processor 204 may be omitted.
  • the processor 204 instructs the transceiver 208 to send a message to the control hub 114 in response to the determining that a tamper event has occurred.
  • the message may comprise data that is representative of the tamper event.
  • the message may comprise data that is representative of the sensor output.
  • the control hub 114 may activate an alarm in response to the message.
  • the processor 204 or control hub 114 may instruct a transmitter to send an alert notification to a remote monitoring system and/or server.
  • the control hub 114 may send a notification to an offsite server.
  • a service person may be sent to the premises at which the security device 102 is installed. The service person may check the security device 102. The service person may reinstall or replace the security device 102 if needed. Additionally, security personnel may be dispatched to the premises in response to the notification.
  • the processor 204 remains in a waking mode until a notification is received from the control hub 114 indicating that the processor 204 can return to a sleep mode.
  • the processor 204 may receive a notification from the control hub 114 indicating that the tamper event has been recorded.
  • the processor 204 may receive a notification from the control hub 114 that the tamper event is a false alarm.
  • the processor 204 may return to a sleep mode as soon as it has transmitted the message and/or triggered the alarm.
  • the processor 204 may wake up again, or continue in a waking mode, if accelerations continue to be above the first threshold value and/or the second threshold value.
  • a potential tamper event is determined when the first threshold value is crossed.
  • a potential tamper event may be determined in dependence on a determined change of state of the access point, for example from a closed state to an open state.
  • both the potential tamper event and the occurrence of the tamper event are determined based on values for acceleration.
  • the acceleration may be on any axis. If the acceleration on any axis exceeds the respective first threshold value for that axis, the processor 204 determines the potential start of a tamper event. Then, if the acceleration on any axis exceeds its respective second threshold value for at least 10 consecutive samples (100 ms) within the detection window of 1 second following the potential start of the tamper event, the processor 204 determines that a tamper event has occurred.
  • the processor 204 may use any change in the output of the accelerometer 212 that is beyond a threshold amount for more than a threshold amount of time to detect a physical tamper event.
  • a change in any one or more dimensions may be considered alone, or as a difference in a 3D vector.
  • the processor 204 may determine the potential tamper event based on the comparison of any suitable first parameter to a first threshold value for that first parameter.
  • the first parameter may be a combination of values from multiple axes.
  • the tamper event is determined if acceleration on any given axis exceeds the respective second threshold value for that axis for 10 consecutive samples. The determination considers the axes separately. In other embodiments, the processor 204 determines that a tamper event has occurred if there are 10 consecutive samples in which any axis exceeds its second threshold value. For example, the processor 204 may determine that a tamper event has occurred if the x axis acceleration exceeds its second threshold value for 4 samples, then the y axis acceleration exceeds its second threshold value for the next 6 samples, even if neither the x axis acceleration nor the y axis acceleration exceeds its respective second threshold value for 10 consecutive samples.
  • the processor 204 may determine that a tamper event has occurred based on whether any suitable second parameter has met a suitable detection condition for a sustained period of time.
  • the second parameter is acceleration
  • the detection condition is exceeding the second threshold value for 10 samples at the 10 Hz sampling rate or, equivalently, for 100 ms.
  • the second parameter may be any suitable parameter.
  • Values for the second parameter may be obtained by combining values for acceleration.
  • a value for the second parameter may be a sum or average of values obtained on one or more axes.
  • the detection condition may be met if a given number or proportion of samples exceed the second threshold value within the predetermined duration, for example if 8 samples or 9 samples out of a set of 10 consecutive samples exceed the second threshold value.
  • the detection condition may be based on an integrated acceleration value over a plurality of samples.
  • Any one or more of the stages of Figure 7a may be performed in dependence on an installation vector as determined using a calibration method.
  • acceleration on all of the axes is considered.
  • one or more axes may be selected. Values from two or more axes may be combined, and the combined values compared to a first threshold value and/or a second threshold value for the combination.
  • a selection or combination of axes may be based on a known configuration or pattern of movement of the access point.
  • a tamper condition is identified based on an output of an accelerometer 212 being greater than a threshold value for more than a threshold amount of time, wherein the threshold amount of time is greater than a maximum amount of the time that the acceleration is able to be greater than, or is typically greater than, the threshold by way of opening or closing a door or window on which the accelerometer may be mounted.
  • the threshold amount of time may also be greater than a maximum amount of time for which the acceleration is greater than the threshold by way of a shock event.
  • physical tamper detection may involve fewer false tamper detections, especially but not only in the case of opening and closing doors, and especially when the security device 102 is mounted on a moveable barrier.
  • a physical tamper were to be detected by determining if an acceleration greater than a threshold value is sensed at a single point in time, without also applying a threshold amount of time, it may be the case that false tamper events would occur.
  • the acceleration may rise above the threshold value when the moveable barrier is opened or closed. The acceleration due to opening or closing the moveable barrier may result in a false tamper detection.
  • Shock events are typically represented by short duration acceleration oscillations that decay to zero.
  • An example of a shock event may be someone banging on a door. Shock events may not be sustained in time.
  • Opening and closing motions comprise accelerations that decay to zero because the motion of the moveable barrier eventually is stopped. Thus, any increases in acceleration due to opening or closing are followed by a decrease in acceleration.
  • a physical tamper event is typically accompanied by a prolonged or permanent change in orientation of the device that has been moved. This results in a change in the direction of gravitational force vector, which is sensed by the accelerometer.
  • the security device 102 is mounted on a door frame 106. In other embodiments, the security device 102 is mounted on a moveable barrier, for example door 108.
  • a normal opening or closing movement of the moveable barrier may cause a predictable change of acceleration.
  • moving the door 108 of Figure 1 may result in a change in acceleration in the x axis if the door 108 is a sliding door.
  • Moving the door 108 of Figure 1 may result in a change of acceleration in the x and z axes if the door 108 is a hinged door.
  • the processor 204 is configured to determine a tamper event based on detection of an acceleration that differs from an expected change of acceleration resulting from door opening or closing.
  • a threshold value for acceleration may be set to distinguish a tamper event from normal opening or closing.
  • a duration for the sustained period of time for which a threshold is to be met may differ from a duration of acceleration due to normal opening or closing.
  • the door 108 may rotate around a vertically orientated hinge.
  • Some access point components for example windows, may have a horizontally oriented hinge.
  • movement of the moveable barrier results in a change in steady stage acceleration, when considered from the point of view of a security device 102 mounted on the moveable barrier.
  • the measured gravity vector points in a first direction relative to the security device.
  • the measured gravity vector points in a second direction relative to the security device 102, since the orientation of the security device 102 in space has changed.
  • an access point component that rotates around a vertical hinge has a greater range of possible rotation than an access point that rotates round a horizontal hinge.
  • a door that rotates around a vertical hinge may have a range of rotation of 90 degrees or more.
  • a window that rotates around a horizontal hinge may have a range of rotation of, for example, 20 degrees.
  • the second threshold in the horizontal hinge case may be selected to be greater than that caused by, say, a 20 degree or rotation of the gravity vector (9.8ms ⁇ -2). Otherwise, a 20 degree opening of a window on the horizontal hinge with the sensor on the window, would result in more than 10 consecutive samples above the threshold (since in in the steady state it will be above the threshold), thus being mischaracterised as a physical tamper.
  • FIG. 7b is a flow chart 730 illustrating in overview a tamper detection method in accordance with an embodiment.
  • a security device 102 comprises an accelerometer 212, a magnetic sensor 214 and a processor 204 which may be mounted on a static part (e.g. a door frame 106) or a moving part (e.g. a door 108) of an access point.
  • a second device 104 comprising a magnet 110 is mounted on the other of the parts of the access point.
  • the accelerometer 212 of the security device is active to sense acceleration of the security device 102.
  • the accelerometer 212 produces a sensor output that is representative of acceleration.
  • the sensor may sample acceleration on each of the three axes at a sampling rate of 100 Hz.
  • the magnetic sensor 214 is operable to sense magnetic field.
  • the magnetic sensor 214 samples magnetic field at regular intervals, for example every second or every 0.1 second or every 0.5 seconds.
  • an output of the magnetic sensor 214 indicates that the door 108 has been opened.
  • the output of the magnetic sensor 214 may indicate a decrease in magnetic field.
  • a potential tamper event is determined in response to the change in magnetic field, since physical removal of the security device 102 is expected to result in a reduction in the sensed magnetic field. At this point in time it is unknown whether the change in magnetic field is due to such a physical tamper event, a magnetic event, or an access point opening event, and for this reason the event is treated as only a "potential" tamper event, which may more specifically be treated as a potential physical tamper event.
  • the processor 204 transitions from sleep mode to a waking mode. In the embodiment of Figure 7b , the processor 204 wakes up for a period of one second, starting at the time at which the potential tamper event is identified. The processor 204 initiates a detection window in which to determine whether a tamper event has occurred. In the present embodiment, the detection window is 1 second. In other embodiments, the detection window may be of any appropriate length.
  • stage 714 to 726 which are the same as stages 712 to 726 of Figure 7a as described above.
  • the embodiment of Figure 7b differs from the embodiment of Figure 7a in that potential tamper event is determined, and the detection window is started, in response to the output of the magnetic sensor 214 rather than in response to the output of the accelerometer 212.
  • the determining of whether or not the potential tamper event is a tamper event is based on the output of the accelerometer 212 in both the embodiment of Figure 7a and the embodiment of Figure 7b .
  • a change of state of the access point is detected using a magnetic sensor of the security device in combination with a magnet of the second device 104.
  • the security device may be configured to detect a change of the state of the access point without use of any such second device.
  • the change of state may be identified based on sensed kinematics and/or orientation of a moveable barrier of the access point, for example using a multi-axis accelerometer. Any suitable method of sensing a change of state may be used to determine a potential tamper event and to start a detection window.
  • the accelerometer 212 may operate using the same sampling rate throughout. In other implementations, a sampling rate of the accelerometer 212 may change.
  • the accelerometer 212 may switch between different modes, or may be switched off. For example, the accelerometer 212 may be switched on, or its sampling rate may be increased, when the potential tamper event is triggered by the determining of the door opening. The accelerometer 212 may be switched off, or its sampling rate may be decreased, when the detection window ends.
  • FIG 8 is a flow chart 800 illustrating in overview a method comprising operation of the processor 204 of the security device 102 in two different detection modes.
  • a first detection mode is a tamper detection mode in which the processor 204 operates as described above with reference to Figure 7a .
  • a second detection mode is a shock detection mode in which the processor 204 operates to detect shock.
  • a single three-dimensional accelerometer is used for both shock sensing and physical tamper detection. Shock sensing and physical tamper detection are not performed at the same time. Instead, the processor 204 alternates between a shock detection mode and a tamper detection mode.
  • the security device 102 is mounted on a static part (e.g. frame 106 of Figure 1 ) surrounding a moveable barrier or the moveable barrier (e.g. door 108 of Figure 1 ), and the second device 104 is mounted on the other of the parts.
  • a static part e.g. frame 106 of Figure 1
  • the moveable barrier e.g. door 108 of Figure 1
  • the second device 104 is mounted on the other of the parts.
  • the magnetic sensor 214 is operable to sense magnetic field.
  • the magnetic sensor 214 samples magnetic field at regular intervals, for example every second or every 0.1 second or every 0.5 seconds.
  • the processor 204 processes the output of the magnetic sensor.
  • the accelerometer 212 is operable to sense acceleration.
  • the accelerometer 212 samples acceleration at regular intervals. For example, the accelerometer 212 may sample at a rate of 100 Hz.
  • the processor 204 determines that the barrier of the access point is closed based on the output of the magnetic sensor 214. For example, the processor 204 may compare a sensed magnetic field to a magnetic field that is expected when the magnetic sensor 214 is in proximity to the magnet 110 of the second device 104.
  • the processor 204 operates in a shock detection mode in response to the determination that the barrier is closed. In the shock detection mode, the processor 204 does not perform tamper detection.
  • the processor 204 processes the output of the accelerometer 212 to determine whether a shock event has occurred.
  • the processor 204 is configured to recognise two different forms of shock.
  • the processor 204 determines that a gross shock event has occurred if a first shock threshold value is exceeded.
  • a gross shock may be a single shock event having energy above the first shock threshold value.
  • An example of a gross shock event could be a window breaking.
  • the first shock threshold value may be several g (several times the acceleration due to gravity).
  • the processor 204 determined that a repetitive shock has occurred if an integrated output of the accelerometer 212 over a given time exceeds a second shock threshold value.
  • the time over which the output is integrated may be, for example, 20 seconds or 30 seconds.
  • a repetitive shock event may comprise repeated small shocks.
  • An example of a repetitive shock event could be a person drilling through a door.
  • the processor 204 may instruct the transceiver 208 to transmit a message to the control hub 114 notifying the control hub 114 that a shock event has occurred.
  • the processor 204 may trigger an alarm in dependence on determining that a shock event has occurred.
  • the processor 204 may continue in shock detection mode for as long as it determines, based on the output of the magnetic sensor 214, that the barrier is closed.
  • the processor 204 determines that the barrier has been opened.
  • the processor 204 may determine that the barrier has been opened based on a change in the sensed magnetic field. For example, the determining may be based on a comparison of values of the sensed magnetic field to a magnetic threshold value. For example, the processor 204 may determine that the barrier has been opened if a value for the sensed magnetic field falls below an expected value for magnetic field when the barrier is closed. In other embodiments, any suitable method of determining that the barrier has been opened may be used.
  • the processor 204 switches from a shock detection mode to a tamper detection mode in response to the determining that the barrier has been opened.
  • the processor 204 processes the output of the accelerometer 212 to determine whether a tamper event has occurred. For example, the processor 204 may compare the output of the accelerometer 212 to a first threshold value and second threshold value as described above. While in tamper detection mode, the processor 204 does not process the output of the accelerometer 212 to determine whether a shock event has occurred.
  • the processor 204 may instruct the transceiver 208 to transmit a message to the control hub 114 and/or trigger an alarm.
  • the processor 204 continues in shock detection mode while the processor 204 determines, based on the magnetic sensor output, that the barrier is open.
  • the processor 204 determines, based on the magnetic sensor output, that the barrier has been closed. For example, the processor 204 may determine that a value for the magnetic sensor output meets an expected value for magnetic sensor output when the barrier is closed.
  • the processor 204 switches from tamper detection mode to shock detection mode.
  • the processor 204 initiates a delay period starting from a time at which it is determined that the barrier has been closed.
  • the processor 204 does not consider output received within the delay period when determining whether a shock event has occurred.
  • the closing of a barrier for example a door, may cause some continued movement of the barrier for a short period (e.g. 1 second) after the barrier is closed. By disregarding output received within the delay period, a risk of false shock event detections due to the barrier closing may be reduced.
  • the processor 204 processes output of the accelerometer 212 to determine whether a shock event has occurred.
  • the steps of Figure 8 may be repeated many times.
  • the processor 204 may switch from a tamper detection mode to a shock detection mode whenever the barrier is closed, and may switch from a shock detection mode to a tamper detection mode whenever the barrier is open.
  • the processor 204 processes the output of the accelerometer 212 in shock detection mode and in tamper detection mode. However, the processor 204 applies different thresholds and detection criteria in each of shock detection mode and tamper detection mode.
  • a single accelerometer is used for shock sensing and physical tamper detection, but not at the same time.
  • the physical tamper mode is disabled.
  • the output of the accelerometer 212 is analysed to determine whether there is a physical tamper event. The analysis switches back to shock sensing mode when a door close event is detected, for example based on sensed magnetic field.
  • the shock sensing may be based on a first accelerometer and the physical tamper detecting may be based on a second accelerometer.
  • the processor 204 determines an open state of the access point and a closed state of the access point based on output of the magnetic sensor 214.
  • An open state is a state in which the processor 204 determines that the barrier of the access point is open, which may include configurations in which the access point is not fully closed. However, it is noted the determining of an open state or closed state is based on the information available to the processor 204, but there may be some circumstances in which the determining of the open state does not reflect the real state of the barrier. For example, if the security device is removed from its mounting by physical tampering, the processor 204 initially determines an open state because of a change in the magnetic field as detected by the magnetic sensor. Thus, in such a scenario, the security device may determine an open state even if the barrier is actually closed, at least until a tamper state is detected.
  • the processor 204 is also configured to process the output of the magnetic sensor 214 to determine a magnetic tamper state. It is known that an intruder may attempt to circumvent detection of a door opening action by tampering with the magnetic sensor 214. For example, the intruder may position an external magnet next to the magnetic sensor 214 with the intention of causing the processor 204 to determine a door closed state even when the door has been opened. However, the magnetic sensor output caused by a magnetic tamper event may differ from the magnetic sensor output in a closed state. For example, introducing an external magnet near the magnetic sensor 214 may cause magnetic field to rise unexpectedly.
  • the processor 204 may determine that a magnetic tamper has occurred if an output of the magnetic sensor increases beyond a normal output in the closed state. In other embodiments, any suitable criterion or criterion may be used to determine that the access point is in a magnetic tamper state. The processor 204 may set one or more magnetic sensor thresholds to which to compare the output of the magnetic sensor 214.
  • the tamper detection mode described above is configured to detect physical tamper, for example the removal of the security device 102 from the access point. Magnetic tamper may be detected in the (physical) tamper detection mode and/or in the shock detection mode.
  • the processor 204 may switch to the tamper detection mode in response to a determination of any state that is not the closed state. For example, the processor 204 may switch to the tamper detection mode if it determines that the state of the access point has changed from closed to open. The processor 204 may switch to the tamper detection mode if it determines that the state of the access point has changed from closed to magnetic tamper.
  • the processor 204 transmits different tamper notification types, e.g. for a physical tamper and a magnetic tamper, respectively. In other embodiments, the processor 204 transmits a tamper notification that does not define whether the tamper event was caused by a physical or magnetic tamper.
  • a summary of actions resulting from a physical tamper may be as follows. Firstly, a case is considered in which the door is closed when a physical tamper action is performed.
  • the physical tamper action may comprise physical removal of the security device from an access point surface to which it is affixed. The physical removal of the security device 102 causes increased acceleration along one or more axes.
  • the magnetic sensor 214 detects a change in magnetic field, which is due to a change in position of the security device 102 relative to the magnet 110.
  • the processor 204 processes an output of the magnetic sensor 214 and determines that the access point is in a non-closed state.
  • the determining that the access point is in a non-closed state may comprise determining that the access point is in an open state.
  • the determining that the access point is in a non-closed state may comprise determining that the access point is in a magnetic tamper state.
  • the processor 204 only determines the state of the access point as being a closed state or a non-closed state, or between a closed state and an open state, and does not determine a magnetic tamper state. As discussed above, in some circumstances, the state of the access point determined by the processor 204 may not correctly reflect a non-closed state of the access point. For example, the processor 204 may determine an open state when a physical tamper has occurred, at least until the physical tamper is detected. In another example, the processor 204 may determine a magnetic tamper state, but a magnetic tamper state may occur when the access point is open, or when the access point is closed.
  • the processor 204 switches from shock detection mode to tamper detection mode.
  • the processor 204 sets at least one physical tamper threshold.
  • the physical tamper thresholds comprise the first threshold value and the second threshold value.
  • the processor 204 determines that the first threshold value has been crossed.
  • the processor 204 is woken up.
  • the processor 204 determines that the second threshold value has been crossed for the predetermined duration of 100 ms. In this example, the second threshold value and the first threshold value are the same.
  • the processor 204 detects that the physical tamper has occurred.
  • the physical tamper triggers the processor 204 to detect a change in state from a closed state to a non-closed state based on the output of the magnetic sensor.
  • the processor 204 switches from the shock detection mode to the tamper detection mode based on the detected change of state from the closed state to the non-closed state.
  • the processor 204 determines that a physical tamper has occurred by processing the output of the accelerometer 212 in the physical tamper mode.
  • a physical tamper occurs while the access point is determined to be in a magnetic tamper state
  • the detection of physical tamper is performed in the same manner to the case in which a physical tamper occurs while the access point is determined to be in an open state.
  • the detection of physical tamper can be positive only when the access point is determined to be in an open state or in a magnetic tamper state.
  • the device 102 When the device 102 is removed from its mounted position it results in a determination by the processor that the access point is in the open state because the removal of the security device 102 will result in the separation of the magnetic sensor 214 from the magnet 110.
  • the processor 202 thinks the access point is open. Since the processor 102 doesn't know whether the access point is actually open or there has been a tamper event, it checks to see if there was a tamper event, or more in specifically, at least a physical tamper event.
  • the processor 204 wakes up when a last determined state of the access point is a closed state, and a change in state is then detected based on an output of the magnetic sensor.
  • the processor 204 wakes up when a last state is a magnetic tamper state, and the magnetic tamper state is exited.
  • the processor 204 wakes up when a last determined state of the access point was open, and any of the low or high thresholds of any of the three axes for physical tamper are crossed.
  • the accelerometer 212 samples for 1 second at a sample rate of 100 Hz for a total of 100 samples per axis.
  • the processor 204 counts a number of consecutive samples that are out of the thresholds per each axis. If this count is above MIN_COUNT, a physical tamper event is declared.
  • Figure 9 shows a plot 900 of acceleration in milli-g (i.e. 9.8 mm/s/s; also denoted herein as mg) against sample number for an example of a tamper event.
  • Figure 9 plots acceleration against sample number for acceleration on an x axis, shown as line 910, acceleration on a y axis, shown as line 920, and acceleration on a z axis, shown as line 930.
  • the axes are as shown in Figure 1 .
  • the x and z axes are in a horizontal plane, and the y axis is vertical.
  • Each axis has respective high and low thresholds.
  • the x axis has a low threshold value 912 and a high threshold value 914.
  • the low threshold value 912 is zero minus a first threshold value for the x axis, representing an acceleration of the first threshold value in a negative x direction.
  • the high threshold value 914 is zero plus the first threshold value for the x axis, representing an acceleration of the first threshold value in a positive x direction.
  • the first threshold value for the x axis is around 750 milli-g.
  • An absolute value for acceleration on the x axis exceeds the first threshold value if the acceleration on the x axis falls below the low threshold value 912 or rises above the high threshold value 914.
  • acceleration on the x axis does not cross its threshold. Acceleration on the x axis does not exceed its first threshold value.
  • the y axis has a low threshold value 922 and a high threshold value 924.
  • y is vertical. Therefore, a baseline level for acceleration in the y axis may be taken to be acceleration due to gravity, which is 1 g, or 1000 mg, in a downwards direction.
  • the low threshold value 922 for the y axis is -1000 mg minus a first threshold value for the y axis.
  • the high threshold value is -1000 mg plus the first threshold value for the y axis. In the example of Figure 9 , the first threshold value for the y axis is around 200 milli-g.
  • An absolute value for a difference in acceleration between the measured acceleration on the y axis and an offset value of -1000 mg is determined.
  • the absolute value for the difference exceeds the first threshold value if the acceleration on the y axis falls below the low threshold value 922 for the y axis, or rises above the high threshold value 924 for the y axis.
  • the acceleration 920 for the y axis crosses the low threshold value 922 in a first instance highlighted by a circle 950.
  • the crossing highlighted by circle 950 only crosses the low threshold value at a single sample.
  • the acceleration 920 for the y axis crosses the high threshold value 924 in a second instance highlighted by a circle 952.
  • the crossing highlighted by circle 952 only crosses the high threshold value at a single sample.
  • the acceleration 920 for the y axis also crosses its high threshold value at sample 48. The crossing point is illustrated by a dashed line 940.
  • the acceleration 920 for the y axis continues to be higher than its high threshold value until the end of the plot 900 at sample 100.
  • the y axis has 52 consecutive samples above the high threshold.
  • the z axis of Figure 9 has a low threshold value 932 and a high threshold value 934.
  • the low threshold value 932 is zero minus a first threshold value for the z axis.
  • the high threshold value 934 is zero plus the first threshold value for the z axis.
  • the first threshold value for the z axis is around 450 milli-g. An absolute value for acceleration on the z axis exceeds the first threshold value if the acceleration on the z axis falls below low threshold value 932 or rises above high threshold value 934.
  • the z axis acceleration 930 crosses its high threshold value 934 at sample number 30, which is indicated by a dashed line 942 at a crossing point.
  • the z axis acceleration 930 continues to be above the high threshold value 934 until the end of the plot 900 at sample number 100.
  • the z axis therefore exceeds its first threshold value for 70 consecutive samples.
  • the processor 204 determines a potential start of a tamper event.
  • the processor 204 wakes up in response to the determining of the potential start.
  • the processor 204 initiates a detection window of 1 second. Within the detection window, the processor 204 determines whether 10 consecutive samples exceed a threshold value. In the example of Figure 7a , it is the case that the first 10 consecutive samples in the detection window exceed the threshold value.
  • the processor 204 determines that a tamper event has occurred.
  • the processor 204 sends a message to the control hub 116 and triggers an alarm.
  • Figure 10 shows a plot 1000 of acceleration in milli-g (denoted mg) against sample number for an example of a real door open event.
  • the low and high threshold values 912, 914, 922, 924, 932, 934 are the same as those described above with reference to Figure 9 .
  • Figure 10 plots acceleration against sample number for acceleration on an x axis, shown as line 1010, acceleration on a y axis, shown as line 1020, and acceleration on a z axis, shown as line 1030.
  • the x axis acceleration 1010 does not cross its low threshold value 912 or its high threshold value 914.
  • the y axis acceleration 1020 crosses its low threshold value for a single sample value indicated by circle 1040.
  • the y axis acceleration 1020 crosses its high threshold value for two sample values indicated by circle 1042, but they are not consecutive.
  • the z axis acceleration 1030 crosses its high threshold value for a two consecutive sample values indicated by circle 1044.
  • the z axis acceleration 1030 crosses its high threshold value for a single sample value indicated by circle 1046.
  • the processor 204 determines a potential start of a tamper event.
  • the processor wakes up in response to the determining of the potential start.
  • the processor 204 initiates a detection period of 1 second. Within the detection period, the processor 204 determines whether 10 consecutive samples exceed a threshold value. In the example of Figure 10 , the crossings are very short and it is not the case that 10 consecutive samples exceed a threshold value. No tamper event is detected and the processor returns to a sleep mode.
  • Figure 11 shows a plot 1100 of acceleration in milli-g (denoted mg) against sample number for an example of a door closing event.
  • the low and high threshold values 912, 914, 922, 924, 932, 934 are the same as those described above with reference to Figure 9 .
  • Figure 11 plots acceleration against sample number for acceleration on an x axis, shown as line 1110, acceleration on a y axis, shown as line 1120, and acceleration on a z axis, shown as line 1130. It is noted that the range of acceleration shown in the vertical axis of plot 1100 is larger than that shown in plot 900 of Figure 9 and plot 1000 of Figure 10 .
  • Circle 1140 highlights a sample at which the z axis acceleration crosses its high threshold value 934 for a single sample.
  • Circle 1142 highlights a subsequent sample at which acceleration on each of the x, y and z axes crosses its respective low threshold value 914, 924, 934 for a single sample. Acceleration on the y axis also crosses its low threshold value 924 for a further sample.
  • Circle 1144 highlights a subsequent collection of 3 consecutive samples at which acceleration on the z axis is beyond its high threshold value 934. Each of the crossings respectively indicated by the circles 1142 and 1140 is brief in duration.
  • the processor 204 determines a potential start of a tamper event.
  • the processor wakes up in response to the determining of the potential start.
  • the processor 204 initiates a detection period of 1 second. Within the detection period, the processor 204 determines whether 10 consecutive samples exceed a threshold value. In the example of Figure 11 , the crossings are very short and it is not the case that 10 consecutive samples exceed a threshold value. No tamper event is detected and the processor returns to a sleep mode.
  • high and low threshold values are symmetric around a central value (0 or 1000 milli-g, depending on the axis), which may also be referred to as an offset value.
  • the offset values are representative of steady state acceleration on each axis.
  • any appropriate values for high and low thresholds may be used.
  • the high and low threshold values may not be symmetrical.
  • a high threshold value and low threshold value for the x axis may not be symmetrical around 0.

Landscapes

  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Burglar Alarm Systems (AREA)
  • Alarm Systems (AREA)
EP21178718.9A 2020-06-10 2021-06-10 Dispositif de sécurité, système et procédé Withdrawn EP3923257A1 (fr)

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
GBGB2008824.1A GB202008824D0 (en) 2020-06-10 2020-06-10 Security device, system and method

Publications (1)

Publication Number Publication Date
EP3923257A1 true EP3923257A1 (fr) 2021-12-15

Family

ID=71615885

Family Applications (1)

Application Number Title Priority Date Filing Date
EP21178718.9A Withdrawn EP3923257A1 (fr) 2020-06-10 2021-06-10 Dispositif de sécurité, système et procédé

Country Status (2)

Country Link
EP (1) EP3923257A1 (fr)
GB (1) GB202008824D0 (fr)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
GB2615892A (en) * 2023-01-17 2023-08-23 Orisec Ltd Sensor for an intruder alarm
GB2617191A (en) * 2022-04-01 2023-10-04 Harper Chalice Group Ltd Closure protection apparatus, system and method

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20130057405A1 (en) * 2011-09-01 2013-03-07 Ecolink Intelligent Technology, Inc. Security apparatus and method
WO2015175697A1 (fr) * 2014-05-13 2015-11-19 Schlage Lock Company Llc Dispositif de verrouillage à capteur de position
AU2014216043A1 (en) * 2014-08-25 2016-03-10 Mcm Electronics Pty Ltd Safe intrusion sensor unit
US10062249B1 (en) * 2017-10-31 2018-08-28 Google Llc Systems and methods of tamper detection

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20130057405A1 (en) * 2011-09-01 2013-03-07 Ecolink Intelligent Technology, Inc. Security apparatus and method
WO2015175697A1 (fr) * 2014-05-13 2015-11-19 Schlage Lock Company Llc Dispositif de verrouillage à capteur de position
AU2014216043A1 (en) * 2014-08-25 2016-03-10 Mcm Electronics Pty Ltd Safe intrusion sensor unit
US10062249B1 (en) * 2017-10-31 2018-08-28 Google Llc Systems and methods of tamper detection

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
GB2617191A (en) * 2022-04-01 2023-10-04 Harper Chalice Group Ltd Closure protection apparatus, system and method
GB2615892A (en) * 2023-01-17 2023-08-23 Orisec Ltd Sensor for an intruder alarm
GB2615892B (en) * 2023-01-17 2024-06-12 Orisec Ltd Sensor for an intruder alarm

Also Published As

Publication number Publication date
GB202008824D0 (en) 2020-07-22

Similar Documents

Publication Publication Date Title
US11199046B2 (en) Lock device having position sensor
US6724316B2 (en) Method and apparatus for detection of motion with a gravitational field detector in a security system
EP3923257A1 (fr) Dispositif de sécurité, système et procédé
CN105917394B (zh) 用于确定在门处的非法闯入的方法和装置
US10114034B2 (en) Door lock including sensor
ES2935634T3 (es) Determinar cuándo un intento de intrusión está en proceso
CA3163604A1 (fr) Systeme de porte electronique
EP3211613B1 (fr) Système et procédé de contact de porte et de fenêtre qui comprennent un accéléromètre mems et un magnétomètre mems
US9947189B2 (en) Home automation device for monitoring the movement of a swinging wing and method for enhancing the reliability of such a device
EP3846144A1 (fr) Appareil et procédé de surveillance d'un point d'accès
US10534010B2 (en) Energy-efficient home-automation device and method for tracking the displacement of a monitored object
US10643440B2 (en) Door/window sensor
CN213781137U (zh) 一种具有双模通信功能的角度检测智能报警装置
EP3874285B1 (fr) Détermination d'une étendue d'ouverture d'une barrière ouvrable sur la base d'un capteur magnétique
EP3874478B1 (fr) Commande de l'état de fonctionnement d'un dispositif capteur à des fins de détection d'effraction
US20120326867A1 (en) System and method for sensing a gate tampering
EP3143366A1 (fr) Dispositif de verrouillage à capteur de position

Legal Events

Date Code Title Description
PUAI Public reference made under article 153(3) epc to a published international application that has entered the european phase

Free format text: ORIGINAL CODE: 0009012

STAA Information on the status of an ep patent application or granted ep patent

Free format text: STATUS: THE APPLICATION HAS BEEN PUBLISHED

AK Designated contracting states

Kind code of ref document: A1

Designated state(s): AL AT BE BG CH CY CZ DE DK EE ES FI FR GB GR HR HU IE IS IT LI LT LU LV MC MK MT NL NO PL PT RO RS SE SI SK SM TR

B565 Issuance of search results under rule 164(2) epc

Effective date: 20211102

STAA Information on the status of an ep patent application or granted ep patent

Free format text: STATUS: THE APPLICATION IS DEEMED TO BE WITHDRAWN

18D Application deemed to be withdrawn

Effective date: 20220616