EP3959483A1 - Zugangskontrollsystem und verfahren zum betreiben eines zugangskontrollsystems - Google Patents

Zugangskontrollsystem und verfahren zum betreiben eines zugangskontrollsystems

Info

Publication number
EP3959483A1
EP3959483A1 EP20720061.9A EP20720061A EP3959483A1 EP 3959483 A1 EP3959483 A1 EP 3959483A1 EP 20720061 A EP20720061 A EP 20720061A EP 3959483 A1 EP3959483 A1 EP 3959483A1
Authority
EP
European Patent Office
Prior art keywords
radio
mobile radio
determined
mobile
devices
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
EP20720061.9A
Other languages
German (de)
English (en)
French (fr)
Inventor
Florian TRÖSCH
Armin Wittneben
Henry Ruben Lucas SCHULTEN
Janick Daniel ZWYSSIG
Marc Kuhn
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Inventio AG
Original Assignee
Inventio AG
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Inventio AG filed Critical Inventio AG
Publication of EP3959483A1 publication Critical patent/EP3959483A1/de
Pending legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W4/00Services specially adapted for wireless communication networks; Facilities therefor
    • H04W4/02Services making use of location information
    • H04W4/029Location-based management or tracking services
    • GPHYSICS
    • G01MEASURING; TESTING
    • G01CMEASURING DISTANCES, LEVELS OR BEARINGS; SURVEYING; NAVIGATION; GYROSCOPIC INSTRUMENTS; PHOTOGRAMMETRY OR VIDEOGRAMMETRY
    • G01C21/00Navigation; Navigational instruments not provided for in groups G01C1/00 - G01C19/00
    • G01C21/20Instruments for performing navigational calculations
    • G01C21/206Instruments for performing navigational calculations specially adapted for indoor navigation
    • GPHYSICS
    • G01MEASURING; TESTING
    • G01SRADIO DIRECTION-FINDING; RADIO NAVIGATION; DETERMINING DISTANCE OR VELOCITY BY USE OF RADIO WAVES; LOCATING OR PRESENCE-DETECTING BY USE OF THE REFLECTION OR RERADIATION OF RADIO WAVES; ANALOGOUS ARRANGEMENTS USING OTHER WAVES
    • G01S5/00Position-fixing by co-ordinating two or more direction or position line determinations; Position-fixing by co-ordinating two or more distance determinations
    • G01S5/02Position-fixing by co-ordinating two or more direction or position line determinations; Position-fixing by co-ordinating two or more distance determinations using radio waves
    • G01S5/0205Details
    • G01S5/021Calibration, monitoring or correction
    • GPHYSICS
    • G01MEASURING; TESTING
    • G01SRADIO DIRECTION-FINDING; RADIO NAVIGATION; DETERMINING DISTANCE OR VELOCITY BY USE OF RADIO WAVES; LOCATING OR PRESENCE-DETECTING BY USE OF THE REFLECTION OR RERADIATION OF RADIO WAVES; ANALOGOUS ARRANGEMENTS USING OTHER WAVES
    • G01S5/00Position-fixing by co-ordinating two or more direction or position line determinations; Position-fixing by co-ordinating two or more distance determinations
    • G01S5/02Position-fixing by co-ordinating two or more direction or position line determinations; Position-fixing by co-ordinating two or more distance determinations using radio waves
    • G01S5/0278Position-fixing by co-ordinating two or more direction or position line determinations; Position-fixing by co-ordinating two or more distance determinations using radio waves involving statistical or probabilistic considerations
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/20Individual registration on entry or exit involving the use of a pass
    • G07C9/28Individual registration on entry or exit involving the use of a pass the pass enabling tracking or indicating presence
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W4/00Services specially adapted for wireless communication networks; Facilities therefor
    • H04W4/30Services specially adapted for particular environments, situations or purposes
    • H04W4/33Services specially adapted for particular environments, situations or purposes for indoor environments, e.g. buildings
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C2209/00Indexing scheme relating to groups G07C9/00 - G07C9/38
    • G07C2209/60Indexing scheme relating to groups G07C9/00174 - G07C9/00944
    • G07C2209/61Signal comprising different frequencies, e.g. frequency hopping
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C2209/00Indexing scheme relating to groups G07C9/00 - G07C9/38
    • G07C2209/60Indexing scheme relating to groups G07C9/00174 - G07C9/00944
    • G07C2209/63Comprising locating means for detecting the position of the data carrier, i.e. within the vehicle or within a certain distance from the vehicle
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/20Individual registration on entry or exit involving the use of a pass
    • G07C9/22Individual registration on entry or exit involving the use of a pass in combination with an identity check of the pass holder

Definitions

  • the technology described here relates generally to an access control system that allows an authorized user access to a restricted area in a building.
  • Embodiments of the technology relate in particular to a
  • Access control system with a transmitting and receiving device for radio signals and a method for operating such an access control system.
  • Access control systems can be designed in the most varied of ways.
  • the refinements can relate, for example, to the way in which users (persons) have to identify themselves as authorized to access, e.g. B. with a key, a magnetic, chip or RFID card or a mobile electronic device (z. B. mobile phone).
  • WO 2010/112586 A1 describes an access control system in which a mobile phone carried by a user sends an identification code to an access node.
  • the access node sends an access code to the mobile phone, which shows the access code on a display. If the user holds the mobile phone up to a camera so that it can capture the displayed access code, the access control system checks whether the captured access code is valid. If it is valid, the user is granted access.
  • One aspect of such a technology relates to a method of operating a system for controlling access to a restricted-access zone in a building, in which a lock separates the restricted-access zone from a public zone.
  • the system comprises radio devices which are each arranged at a fixed distance from the lock and which define a monitoring area.
  • Radio devices are designed for radio communication with mobile telephony devices that are within radio range and assigned to users, a first mobile telephony device at a first position of a first user being at a distance from each of the radio devices.
  • a control device of the system is communicatively connected to a building device, and a data storage device stores processing instructions for situation-specific calibration modes.
  • a signal processing device is connected to the data storage device, the radio devices and the control device
  • the procedure evaluates radio communication in
  • Situation indicator that shows the prevailing radio situation there.
  • An indicator for a received signal field strength based on a radio communication with the first mobile radio device is recorded for each radio device.
  • the method selects a calibration mode assigned to the situation indicator and reads it
  • a current position of the first mobile radio device is recorded as a function of the
  • Another aspect of the technology relates to a system for controlling access to a restricted area in a building.
  • the system includes
  • Radio devices that are each arranged at a fixed distance from the lock and define a monitoring area.
  • the radio devices are designed for radio communication with mobile telephony devices that are within radio range and assigned to users, a first mobile telephony device at a first position of a first user being at a distance from each of the radio devices.
  • the control device of the system is communicatively connected to a building device, and a data storage device stores processing instructions for situation-specific calibration modes.
  • a signal processing device is connected to the data storage device, the radio devices and the control device communicatively connected.
  • the signal processing device is designed to evaluate the radio communication in the monitoring area and to determine at least one situation indicator therefrom, which indicates a radio situation prevailing in the monitoring area.
  • the signal processing device is designed to detect an indicator for a received signal field strength based on a radio communication with the first mobile radio device for each radio device and to select the calibration mode assigned to the at least one situation indicator.
  • Signal processing device is also designed that the selected
  • Mobile radio device as a function of the detected received signal field strength indicators according to the read processing instructions.
  • the technology described here creates an access control system in which, in order to determine the position, it is first assessed which radio situation is in the
  • the calibration mode determines the processing instructions with which the current position of a user is determined. This allows flexible adaptation of the position determination to the
  • the radio signal therefore propagates differently in such a situation than during a reference situation with a single user moving along a defined reference path.
  • Processing instructions which are based on this reference situation therefore deliver, among other things. U. not the most accurate position determination.
  • a calibration mode can therefore be selected that takes the high traffic volume into account. If, on the other hand, the traffic volume is low, the processing instructions can be based on the reference situation.
  • the number of users can also indicate the number of active mobile radio devices present in the surveillance area.
  • the number of wireless devices can be can therefore be selected as a situation indicator in one embodiment.
  • the number of mobile radio devices or in addition, depending on the configuration of the
  • Access control system e.g. B. depending on the conditions in the building, at least one of the following situation indicators can be selected: a mobile radio device type, a spatial orientation of a mobile radio device, an entry point of the user in the surveillance area, sensor data generated by a mobile radio device, a time, a number of radio devices, an im Access control system available
  • RSSI Received Signal Strength Indicator
  • BLE Bluetooth Low Energy
  • radio signals are sent and evaluated in accordance with Bluetooth technology, in particular BLE technology. This is an advantage mainly because this technology is used in
  • Mobile radio devices is usually available and users can use the device they are familiar with in connection with the access control system. This is done in a convenient way for a user because, for example, the user is not familiar with the
  • the data storage device stores data determined in a calibration phase which can be read in an application phase.
  • the data relate, for example, to a radio signal strength reference value which was determined in the calibration phase from radio communication between one of the radio devices and a reference mobile radio device arranged at a reference distance for this purpose.
  • the data can also be a reference radio signal pattern as a function of a position of the reference mobile radio device concern, wherein the reference radio signal pattern was determined from the radio communication of the radio devices with the reference mobile radio device in the calibration phase.
  • the data can relate to a loss coefficient determined in the calibration phase for each of the radio devices as a function of the reference position of the reference mobile radio device.
  • first processing instructions for a first calibration mode can determine the position according to FIG.
  • NA is a number of radio devices and di (p) is a Euclidean distance between an i-th radio device (6) and a variable position (p) of the user (4), whereby one can be determined by means of the reference radio signal pattern (FP ) the determined distance (d'i) between the mobile radio device (2) and an i-th radio device (6) results as follows:
  • the loss coefficient is according to
  • j 1, ..., N j ⁇ denotes the j-th measurement in a k-th path segment of a specified path for the i-th radio device, the path segments being specified in a calibration phase.
  • second processing instructions can define a determination of a trajectory of a movement of the user for a second calibration mode, the determination being based on the defined locations of the
  • Radio devices the detected indicators for the received signal field strengths and the radio signal strength reference value, wherein loss coefficients are determined by means of a maximum likelihood estimation, with residual costs according to a negative log likelihood function including the determined
  • the data storage device also stores an individual identifier of the first mobile radio device, which is transmitted by the first mobile radio device.
  • the identifier can be used to infer the user who owns the first mobile radio device. So can in one
  • Embodiment checked whether the user is authorized to access. in the
  • the signal processing device is configured
  • the control device To supply a control signal to the control device when a specified rule is met based on the identifier and the determined current position of the mobile radio device.
  • the control device is designed to initiate a building action corresponding to the established rule, in particular to release the lock.
  • FIG. 1 shows a schematic representation of an exemplary situation in a building with an access control system according to an exemplary embodiment
  • Radio communication situation for the situation shown in Figure 1 in the building; 3 shows an exemplary representation of a model, including an exemplary one
  • FIG. 4 shows a flow chart of an exemplary embodiment of a method for operating an access control system
  • FIG. 5 shows a flow chart of an embodiment of a calibration method for determining a reference constant
  • FIG. 6 shows a flow diagram of an exemplary embodiment of a calibration method for determining a loss coefficient
  • FIG. 7 shows a flow diagram of a further exemplary embodiment of a method for operating an access control system
  • FIG. 8 shows a flow chart of an additional exemplary embodiment of a method for operating an access control system.
  • 1 is a schematic illustration of an exemplary situation in a building with an access control system 1. For reasons of illustration, only a few walls 3, rooms 24 and zones 20, 22 of the building are shown. The rooms 24 can, for. B. offices, apartments, halls and / or elevator cars of an elevator system. In the situation shown in FIG. 1, there is a user 4 in zone 22 who is carrying a mobile radio device 2. The zone 22 is subject to these examples
  • Zone 22 Situations of no access restriction and is also referred to below as public zone 22.
  • a lock 14 separates the public zone 22 from the zone 20, which is subject to restricted access and adjoins the rooms 24.
  • Zone 20 is also referred to below as restricted-access zone 20.
  • a person skilled in the art recognizes that, depending on the building situation, each room 24 can be viewed as a restricted-access zone 20.
  • the term “building” in this description is to be understood as meaning, for example, residential and / or commercial buildings, sports arenas, airports, ships.
  • the access control system 1 comprises according to one embodiment
  • RFi radio devices 6
  • i 1, 2, ... N
  • RF radio devices
  • Each of the radio devices 6 sends and receives radio signals during operation in accordance with a defined standard for radio communication, as stated elsewhere in this description.
  • the radio devices 6 are arranged stationary at fixed locations; these locations can be specified in relation to a building plan, for example for a building floor using x-y coordinates.
  • the location of the lock 14 can be specified in a similar manner for a building floor by means of x-y coordinates.
  • data indicating the locations of the radio devices 6 and the location of the lock 14 are stored in the access control system 1, for example in a data storage device 18 (hereinafter also referred to as storage device 18).
  • the radio devices 6 arranged in this way define an area that is monitored by the access control system 1; this area is hereinafter referred to as
  • Designated monitoring area Depending on the building situation, the For example, border the monitoring area on a main entrance door, a landing door or an elevator door, the locations of which are also specified in the building plan and are therefore known. If a user 4 comes through such a door into the monitoring area, for example a door movement can be detected, a current position of the user 4 results from the known location of this door. Since the user 4 is moving away from the door, this current position can be used as Starting position of the movement in the monitoring area can be considered.
  • a radio device 6 can be located in a prominent location, such as B. the said doors, be arranged to define this location as the starting position.
  • the access control system 1 also comprises a signal processing device 8 (shown as a DSP) and a control device 10, 12 connected to the signal processing device 8.
  • the memory device 18 is also connected to the
  • the signal processing device 8 is communicatively connected to the radio devices 6, which is indicated by a double arrow 9.
  • the control device 10, 12 comprises a control system 12 (shown in Fig. 1 as ACS) for the access control system 1, which z. Legs
  • the building device can be a control device 16 (CTRL) for the lock 14 or a control system 10 for an elevator system (shown in FIG. 1 as an ECS). In relation to the elevator system, some or all of the rooms shown are 24 elevator cars.
  • CTRL control device 16
  • ECS elevator system
  • the control device 10, 12 comprises the control system 10 for the elevator system.
  • the person skilled in the art will recognize that the control system 12 for the access control system 1 and the control system 10 for the elevator system can be separate systems and can accordingly be represented as separate systems.
  • the technology described here can be used in an advantageous manner in order to operate the access control system 1 with the lowest possible complexity and to grant the user 4 convenient access to the restricted-access zone 20.
  • the person skilled in the art recognizes that there is more than one user 4 in the
  • the technology determines a position of the user 4 using a
  • the channel model uses indicators for received signal strength indicators (RSSI) for the current position in relation to the individual
  • Radio devices 6 are determined. This channel model is dependent on a radio situation prevailing in the surveillance area, e.g. B. a number of mobile radio devices 2 present, their types (e.g. iPhone devices or Android devices) and / or directional information (e.g. position / orientation of a mobile radio device 2), and a situation indicator determined therefrom.
  • the adaptation takes place according to a calibration mode selected for the radio situation; the selected calibration mode can be based on previously determined and stored values (e.g. reference values) or can do without such a previous value determination.
  • This technology implemented in the access control system 1 improves the accuracy of the position determination. In one embodiment, the improvement in accuracy is supported in that the radio signals are sent in accordance with a standard for Bluetooth technology and / or that the highest possible degree of diversity is provided in the access control system 1 (as explained elsewhere in this description).
  • a radio signal sent by the mobile radio device 2 includes an individual identifier (e.g. device ID, serial number, device address), by means of which it can be checked whether the user 4 is authorized to access, should he want access and not just pass the lock 14. If the user 6 moves along one of the routes 26, 28 shown by way of example in FIG.
  • the position of the user 4 that changes over time (also referred to as a trajectory) can be tracked.
  • position determinations are carried out at fixed discrete time intervals; the time intervals can be selected, for example, depending on the radio technology. If a comparison of the determined position with the location of the lock 14 shows that the user 4 is at the Lock 14 is located, a corresponding building action is initiated if a specified rule is met; for example, if the access authorization is determined, he is granted access.
  • Access control system 1 and its components specified.
  • the radio devices 6 of the access control system 1 are shown in FIG.
  • Embodiment arranged in the public zone 22 and in the restricted-access zone 20.
  • the monitoring area extends over both zones 20, 22.
  • two radio devices 6 RFi, RF2
  • two radio devices 6 RF3, RF4
  • the radio devices 6 can only be arranged in one of the two zones 20, 22 and that the number and arrangement of the
  • Radio equipment 6 can be selected depending on the conditions in the building.
  • An arrangement of the radio devices 6 in both zones 20, 22, i. H. on both sides of the lock 14, however, has the advantage that the position is determined with essentially the same accuracy, regardless of the direction in which the user 4 is moving.
  • the lock 14 separates the restricted-access zone 20 from the public zone 20.
  • the lock 14 can be a physical barrier, e.g. B. a door, a revolving or sliding door, a barrier or a turnstile, or be designed without such a physical barrier.
  • the access control system 1 uses the lock 14 to ensure that only authorized users 4 enter the
  • Access restricted zone 20 for example by blocking or releasing the physical barrier.
  • the access control system 1 can control access, for example, by initiating a security measure when an unauthorized user 4 enters the restricted-access zone 20, e.g. B. an optical and / or acoustic alarm is triggered; alternatively or in addition, a notification of a security service can be initiated.
  • a possibly existing information device can also be activated to z. B. to inform a user 4.
  • FIG. 2 shows a schematic illustration of an exemplary radio situation for the situation in the building shown in FIG. 1.
  • the user 4 is at a position P, which is referred to as the (actual) position P in the following.
  • the technology described here uses the channel model to determine the position of the mobile radio device 2 and thus the position of the user 4.
  • the position of the user 4 determined in this way is referred to below as position P '; it can be the same as the actual position P of the user 4, but it can also differ more or less therefrom, especially under real conditions in the building.
  • the four radio devices 6 (RFi, RF 2 , RF 3 , RF 4 ) are shown, which are arranged in the area around the lock 14.
  • the user 4 and the mobile radio device 2 are at the (actual) position P, from which they are each a distance from one of the radio devices 6; in FIG. 2 these are the distances di, d2, d 3 , d 4
  • Mobile radio device 2 of the user 4 and each radio device 6 radio signals are sent and received. For each of these radio signals, a position P can be used
  • Received signal strength indicator (RSSIi) can be determined; in Fig. 2 these are the
  • the radio fingerprint FP comprises all received signal strength indicators RSSE measured for the position P; in FIG. 2 these are the four
  • Received signal strength indicators RSSE that is to say of the radio fingerprint FP determined for this position, can be used in one exemplary embodiment to determine a position of a mobile radio device 2 to be determined approximately.
  • Received signal strength indicators RSSE and the radio pattern FP can in the
  • Storage device 18 are stored.
  • FIG. 2 also shows a situation which, according to an exemplary embodiment, is used to determine one or more reference values.
  • the reference value or values determined in this way can be used in a calibration mode.
  • the user 4 has a reference mobile radio device 2a and is at a distance do from a radio device 6 selected for determining reference values; in FIG. 2, this is the radio device 6 marked RFi.
  • a reference value determined for this is shown as RSSI d . Further information on this is given elsewhere in this description.
  • Diversity technology is the redundant transmission of data via stochastically independent channels that are only prone to errors with a low probability at the same time.
  • Various forms of diversity operating modes are known: In the case of time diversity, the information in the useful data is time-shifted several times and thus transmitted several times over the same radio channel in order to compensate for time-dependent fluctuations in the signal strength.
  • In the case of spatial diversity two or more transmit-receive paths are operated. This is mostly realized by spatially separated antennas that are operated in parallel. Depending on the procedure, the
  • Receiving device then z. B. from the strongest received signal.
  • Frequency diversity is the same signal simultaneously over two or more
  • BLE technology other known radio technologies can be used, e.g. B. a WLAN / WiFi technology.
  • the mobile device 2 sends z. B. as a radio signal from an attention notice referred to as an advertising event. All radio devices 6 located within radio range receive this radio signal, and each of these radio devices 6 can determine the signal strength of the radio signal it receives, from which the received signal strength indicator RSSIi results.
  • each radio device 6 sends an advertising event as a radio signal and the mobile radio device 2 uses this to determine the signal strengths or the received signal strength indicators RSSE (further explanations are given below).
  • the BFE technology Bluetooth 5.0
  • three main radio channels are used, each of which has a relatively small bandwidth and is separated from one another by a relatively large frequency spacing; further details on the BFE technology, in particular on the communication protocol, are known to the person skilled in the art, so that explanations on this do not appear necessary at this point.
  • diversity can be implemented by averaging measurements of the received signal strength indicators RSSE that follow one another in time. These are normally independent of time, since they are transmitted over different radio channels and thus over different frequencies.
  • the measurement of the received signal strength indicators RSSIi can take place by the mobile radio device 2 (or the reference mobile radio device 2a) and / or by the radio devices 6 or the signal processing device 8.
  • the radio devices 6 can be continuous
  • the mobile radio device 2 receives these packets and can determine all reception signal strength indicators RSSE associated therewith.
  • the measured values are now available on the mobile radio device 2.
  • a software application also referred to as an app
  • sensor values IMU data
  • IMU Inertial Measurement Unit
  • Access control system 1 is then informed of the determined position by mobile radio device 2.
  • the mobile radio device 2 continuously sends out advertising event packets.
  • the radio devices 6 receive these packets and can determine all reception signal strength indicators RSSE associated therewith.
  • the measured values are now available in the radio devices 6 and can be stored in the memory device 18 provided with a time stamp.
  • Signal processing device 8 processes this data in accordance with the technology described here in order to determine the position of mobile radio device 2.
  • IMU data can be transmitted from the mobile radio device 2 to the signal processing device 8 and used when determining the position. The following is a description of the technology based on the second case.
  • FIG. 3 shows an exemplary basic illustration for determining a position of the user 4 according to the situations shown in FIGS. 1 and 2.
  • Position determination is based on a channel model (block 38). Depending on the configuration, the position can be determined using one of several calibration modes (block 36), the calibration mode being dependent on one
  • This position determination can also be modified using a time filtering (block 34) and / or sensor values (block 32).
  • the sensor values are generated by a sensor module (IMU, Inertial Measurement Unit) of the mobile radio device 2.
  • the current position P ′ of the mobile radio device 2 results from the channel model adapted in accordance with one of the calibration modes, which is indicated in FIG. 3 by a block 30.
  • An exemplary time course of the position P ′ in the x-y plane is indicated in a block 40.
  • the lock 14 is located, for example, in the x direction at xo; it can also be seen from this that the position determination according to the technology described here extends over both zones 20, 22.
  • the technology described here is based on a concept that describes a loss of signal strength during transmission over a transmission channel.
  • the transmission channel comprises the signal path from the mobile radio device 2 (including its antenna) over the air to one of the radio devices 6 (including its antenna), which can also contribute to the losses. Antenna losses and In the technology described here, multipath propagation is called
  • Mobile radio device 2 emanate or end several signal paths. Such a concept is known to those skilled in the art as a channel model. According to the channel model used here, the average received signal strength indicator is RSSI (d) (in dBm) as a function of
  • RSSI (d) M (RSSI do ) - 10 a log 10 () + W,
  • G antenna gain / loss variable.
  • a momentary radio situation prevails in the monitoring area at a given point in time (only the radio signals (Bluetooth technology) between the mobile radio device 2 and the radio devices 6 are considered, but not any other radio signals present in the building). Because every mobile radio device 2 with a
  • Radio signal also sends out at least one individual identifier
  • Mobile radio devices 2 are differentiated; this can affect the number of im
  • the identifier can be a telephone number, an international mobile subscriber identifier (International Mobile Subscriber Identity (IMSI)), a device ID (International Mobile Station Equipment Identity (IMEI)), a device address (Media Access Control (MAC)
  • IMSI International Mobile Subscriber Identity
  • IMEI International Mobile Station Equipment Identity
  • MAC Media Access Control
  • the device ID generally indicates the type of mobile radio device 2 (e.g. an iPhone from Apple or a so-called Android smartphone from another manufacturer).
  • the number of mobile radio devices 2 represents a situation indicator, as does the type of mobile radio device 2. Further situation indicators are a point of entry of the user 4 into the monitoring area (e.g. the prominent place mentioned), sensor data generated by a mobile radio device 2, a user Identifier, a time, a number of radio devices 6, a (computer) computing power available in the access control system 1, a density of the radio devices 6 and a room size. From the evaluation of the radio communication in the monitoring area, at least one of these situation indicators can be determined that the radio situation in
  • Situation indicators can be recorded in order to display the radio situation, and that not all of the aforementioned situation indicators in the access control system 1 can be determined at a certain time or for a certain mobile radio device 2.
  • the situation indicator is used to select a calibration mode that is appropriate to the situation and through which the channel model is adapted.
  • Three different calibration modes, each with several possible calibration algorithms, are described below:
  • a reference mobile radio device-based calibration mode which is based on a dedicated calibration run with a reference mobile radio device 2a in a calibration phase and is described below in connection with FIG. 6; a cellular device independent calibration mode based on a
  • Received power (PR, ®) in the reference distance do and the loss coefficient a can differ considerably for different radio situations and mobile radio devices 2.
  • PR, ® Received power
  • the knowledge of these parameters is important for a given system and a given radio situation, especially if the propagation environment for the radio signals changes.
  • the parameters can be determined with or without knowledge of the path of the user 4 in a calibration phase or a calibration phase can be omitted.
  • Loss coefficient a describe the path losses, determined on the basis of measurements between the radio devices 6 and knowledge of the locations of the radio devices 6.
  • each radio device 6 is used as an individual transmitter, while the remaining radio devices 6 are receivers.
  • Sends z. B. a first radio device 6 radio test signals to all other radio devices 6, the received signal strength indicators RSSE determined by them are stored.
  • the first radio device 6 that was previously transmitting then changes to a receiver mode and the next radio device 6 begins to transmit. This process is repeated until all radio devices 6 have sent radio test signals once.
  • the received signal strength indicators RSSE can be used to determine the corresponding
  • One advantage of self-calibration is that it can be automated without great effort and repeated if necessary, e.g. B. with changes in the environment. You can z. B. can be used when the mobile radio device 2 is located in the vicinity of the radio equipment 6 due to the building situation (e.g. a building door leads directly into the surveillance area) when its position is to be determined; this can e.g. B. detected by said radio fingerprinting in order to select the mode of self-calibration.
  • the automated real-time calibration mode has the advantage that it requires little or no prior knowledge and thus reduces the installation effort.
  • the automated real-time calibration mode manages without a special calibration phase.
  • the position of the mobile radio device 2 is determined without prior knowledge other than the locations of the radio devices 6.
  • these parameters are viewed as interference parameters and are determined in real time together with the position of the mobile radio device 2.
  • This approach eliminates the need for calibration, since the corresponding optimization does not depend on the reference RSSI values or the loss coefficients ⁇ .
  • the algorithm can adapt to new propagation environments or to an antenna pattern of the mobile radio device 2.
  • the accuracy can be improved if only the loss coefficients a, as
  • the automated real-time calibration mode determines the trajectory of the movement from the start of the measurement to the current point in time.
  • the real-time automated calibration mode is iterative; it is based on the assumption that the first position of the user 4 is known. As explained above, this can be the case if the user 4 comes directly into the surveillance area through a landing door or elevator door and moves away from it
  • Received signal strength indicator RSSE for each radio device 6 can for each
  • Radio device 6 the loss coefficient a can be determined. The so determined
  • Loss coefficients m are then used to determine the (new) position of the user 4. This new position determination is then used to determine new loss coefficients ai on the basis of two received signal strength indicators RSSE per radio device 6. This process is then continued iteratively for the entire route.
  • the (old) data obtained through this iterative procedure can be used in an extension in order to initially achieve a certain minimum stability of the position determination.
  • This algorithm is based on earlier but outdated information on the loss coefficients a. While these lead to inaccurate position determinations, their accuracy is often superior to the initial positions determined by means of the iterative approach at the beginning of a run.
  • the first 10-30 measurements, in particular the first 20-25 measurements can be used. This number of measurements is sufficient to obtain preliminary and stable positions for a correct estimation of the loss coefficients a.
  • a calibration phase is provided which, for. B. is carried out when the access control system 1 is put into operation on site.
  • a reference constant mean value M (RSSI d o)
  • several loss coefficients a can be determined.
  • the calibration in particular with regard to the reference constant M (RSSI d o), can be carried out centrally if the radio devices 6 are structurally identical and have essentially identical radio properties, for example at the manufacturer or supplier of the access control system 1. If necessary, the calibration phase can be repeated after commissioning.
  • the reference mobile radio device 2a is guided in the calibration phase along a defined route (and thus known position information) and received signal strength indicators RSSE are measured and stored together with the known position information. It is not necessary that the exact distance is known, it is sufficient that it is roughly defined, with a beginning, an end and a constant speed between the beginning and the end.
  • this approach is expanded in that the route is divided into individual route segments (k) by different ones
  • Loss coefficient a for the path loss for each radio device 6 and each path segment (k) to be determined For a user 4 whose position is to be determined, the algorithm selects the path segment (k) in which the user 4 could be (determined by means of radio fingerprinting), and consequently assigns each radio device 6 the corresponding loss coefficient a for this Path segment (k) to. Further
  • FIG. 4 shows a flow chart of an exemplary embodiment of a method for operating the access control system 1, the position of the user 4 being determined in an application phase.
  • FIG. 4 shows a flow chart of an exemplary embodiment of a method for operating the access control system 1, the position of the user 4 being determined in an application phase.
  • the user 4 is, as shown by way of example in FIGS. 1 and 2, with the mobile phone 2 in the vicinity of the lock 14. Although only the user 4 is shown, the person skilled in the art recognizes that other users and mobile phone devices may be present.
  • the Bluetooth function of the mobile radio device 2 and any associated software application are activated, and a calibration phase is complete.
  • the storage device 18 is configured for the technology described here; In particular, it stores building data (e.g. building or floor plans) and processing instructions for the aforementioned situation-specific calibration modes.
  • the processing instructions include algorithms for the various
  • Calibration phase determined data e.g. reference distance do, reference radio signal pattern, reference received signal strength indicators.
  • the storage device 18 also stores data (online) determined in the application phase.
  • the user 4 moves, for example, along the route 26 from the public zone 22 in the direction of the restricted-access zone 20. It is assumed that the mobile phone 2 is already within radio range of the radio devices 6 (RFi-RF 4 ).
  • the method begins in a step TI and ends in a step T6.
  • radio communication in the monitoring area is evaluated by the signal processing device 8.
  • this radio communication represents the entirety of the radio signals transmitted and considered in the monitored area (Bluetooth technology).
  • the signal processing device 8 uses this to determine, for example, the identifiers of the mobile telephony devices 2 present.
  • the signal processing device 8 also detects the signal strength with which the
  • Radio signals are received by the radio devices 6 and / or the mobile radio devices 2 present.
  • a received signal strength indicator RSSIi based on a radio communication with a mobile radio device 2 is detected by the signal processing device 8 for each radio device 6.
  • a situation indicator is determined by the signal processing device 8, the one prevailing in the monitoring area
  • the situation indicator is determined based on the evaluation made in step T2. Exemplary situation indicators are mentioned above.
  • a step T4 at least one is assigned to the situation indicator
  • At least one rule is defined in the access control system 1, in particular in a computer program and / or a processor of the signal processing device 8.
  • Those skilled in the art will recognize that several rules can be established. Examples of such a rule are given below:
  • Storage device 18 a calibration data set (processing instructions) for the reference mobile radio device-supported calibration mode is present. This calibration mode can be selected in particular if the entry point is the starting point of a calibration run.
  • situation indicators show a user identifier and the time in addition or as an alternative to the situation indicators mentioned in the preceding rule, a check is made as to whether a position determination according to a calibration mode has already taken place for this user 4 for a similar time. If this is the case, this calibration mode can be selected again.
  • Self-calibration or the automated real-time wiring mode. But shows z. If, for example, a situation indicator shows the time and it is known that this corresponds to a rush hour with many users 4 present, self-calibration can be selected because it can adapt to changed environmental conditions.
  • the access control system 1 or its computer system can be used to a greater or lesser extent or have less or more computing power available. If the available computing power is used as a situation indicator, z. B. the more computation-intensive automated real-time calibration mode can be selected if the computer system has sufficient computing power available.
  • the signal processing device 8 reads the processing instructions assigned to this calibration mode from the
  • step T5 the position P ′ of the first mobile radio device 2 is determined according to the processing instructions that have been read.
  • the position ' is determined according to an exemplary embodiment as described in connection with FIG. 7.
  • an exemplary embodiment for using the determined position P ′ is also given.
  • the method ends in step T6.
  • Fig. 5 shows a flow chart of an embodiment of a
  • Calibration method for determining an average value of the reference constant RSSI do is designated as M (RSSI d o).
  • the description of the wiring method is made with reference to the situations shown in FIGS. 1 and 2, the reference mobile radio device 2a being used in the calibration phase (this can be identical to the mobile radio device 2).
  • the method begins in a step S1 and ends in a step S6.
  • a reference distance do is established in a step S2.
  • the reference distance do is the distance between the reference mobile radio device 2a and a selected radio device 6 (in FIG. 1 this is the radio device 6 referred to as RFi).
  • the reference distance do is preferably equal to or less than 1 m; in one
  • each received signal strength indicator RSSI do is measured in relation to the radio signal arriving at the radio device 6. With the reference distance do unchanged, the reference mobile radio device 2a is rotated or moved around the selected radio device 6. An antenna of the reference mobile radio device 2a thus assumes different antenna orientations in relation to the selected radio device 6 (angular diversity). In addition, this results in a high (spatial) diversity. After each change in the antenna alignment, at least one received signal strength indicator RSSI do is determined and stored in the memory device 18. The number of measurements and the number of changed
  • Antenna orientations can be specified in a calibration specification.
  • step S3 If the specified measurements have been carried out in step S3, the mean value of those measured and stored in step S3 is used in step S4
  • Received signal strength indicators RSSI d (in dBm) determined.
  • This mean value M (RSSI d o) of the reference constant RSSI d o is stored in a step S5 in the memory device 18 and is available for a position determination in an application phase.
  • Radio device 6 are deactivated and the method ends in step S6.
  • FIG. 6 shows a flow diagram of an exemplary embodiment of a calibration method for determining the loss coefficient a. The description of the
  • the calibration method also takes place with reference to the situations shown in FIGS. 1 and 2 and the reference mobile radio device 2a.
  • the method begins in a step A1 and ends in a step A9.
  • Received signal strength (RSSI measurements) carried out while the reference mobile radio device 2a is moved in the building along a specified route.
  • the route for the given situation in the building is determined in a step A2.
  • the route 26 shown in Fig. 1 can be selected.
  • the route 26 is divided into a number (N k ) of route segments.
  • N k the number of route segments.
  • Path segments be the same or different lengths.
  • the index k indicates for which this
  • the switched-on reference mobile radio device 2a is initially located at the beginning of the route 26 and is moved from there at a constant speed along the route 26. If the reference mobile radio device 2a is in one of the path segments (index k), the received signal strength indicator RSSI, k is determined and stored in a step A4 for each radio device 6 (index i), namely as often as (index j, number of measurements per Path segment) until the reference mobile radio device 2a reaches the end of the current path segment. At the end of the moment
  • the reference mobile radio device 2a sends a segment signal over the path segment.
  • the signaling of the end of a distance segment ensures that the RSSI measured values can be correctly assigned, processed and saved. Is z. B. for each radio device 6 (index i) and within one
  • an average value of the RSSI, k - is obtained over all measurements (index j) of a respective path segment (index k) for each individual radio device 6 (index i). Measured values formed.
  • an empirical covariance matrix I ' w is determined over the entire distance 26.
  • the values o of the main diagonal of this matrix are saved. These diagonal elements are a measure of the different
  • Model error variance of the individual radio devices 6.
  • the covariance matrix I ' w relates to the remaining model error 8 k, j :
  • a step A8 the mean values M (RSSI, .k ).
  • the loss coefficients a, .k and the covariance matrix I ' w are stored. They are then available for a position determination in the application phase.
  • the reference mobile radio device 2a and the selected radio device 6 can then be deactivated and the method ends in step S6.
  • the information obtained and stored in the calibration phase is used in the application phase in order to determine a current position P 1 of the user 4. Since the user 4 is moving in the building, his movement can be followed when the
  • Position determination is repeated at successive intervals.
  • the positions P 1 determined in this way result in the named trajectory (position path).
  • Time intervals can be selected as required.
  • FIG. 7 shows a flow diagram of an exemplary embodiment of a method for operating the access control system 1, the position P 1 (or a plurality of positions) of the user 4 being determined in the application phase.
  • the user 4 is with the mobile radio device 2 in the vicinity of the lock 14, the Bluetooth function of the mobile radio device 2 being activated.
  • Software application is also activated.
  • the user 4 moves, for example, along the route 26 from the public zone 22 to the restricted-access zone 20. It is assumed that the mobile radio device 2 is already within radio range of the radio devices 6 (RFi-RF 4 ). Im described here
  • the mobile radio device 2 sends the attention notice referred to as an advertising event as a radio signal, and all radio devices 6 within radio range receive this radio signal.
  • the method begins in a step B1 and ends in a step B12.
  • the mobile radio device 2 If the mobile radio device 2 communicates with one of the radio devices 6, the mobile radio device 2 also transmits a specific identifier. In FIG. 7, this identifier is determined in a step BIO.
  • the identifier can be a telephone number, a device address (Media Access Control (MAC) address) or another identifier that identifies the MAC address.
  • MAC Media Access Control
  • Mobile radio device 2 clearly identifies his. Since a mobile radio device 2 provides a user 4 is generally permanently assigned, the identifier of the mobile radio device 2 is also indirectly assigned to the user 4.
  • the access control system 1 stores the identifiers of the mobile radio devices 2 assigned to the authorized user 4, for example in the memory device 18 in which a user profile is created for each user 4.
  • the name of the user 4 and his access authorizations can be specified in the user profile, for example which rooms 24 he has access to. It can also be specified on which days and at which times of the day the access authorization exists.
  • the identified identifier is in one embodiment in
  • Storage device 18 is stored. In the memory device 18, measured and / or calculated values, for example for this user 4, can be clearly assigned to the identifier
  • a is for each of the radio device 6
  • Received signal strength indicators RSSIi takes place in the described here
  • the radio devices 6 the determination taking place synchronously, d. H. the radio devices 6 have a common time reference (for example identical clocks, which allows the reception signal strength indicators RSSIi to be determined at the same time).
  • the mobile radio device 2 is located at a current position, so that for the current position z.
  • B. four received signal strength indicators RSSIi (i 1, 2, 3, 4) are present. With each subsequent measurement there are again four
  • the received signal strength indicators RSSE are stored in one embodiment in the memory device 18, for. B. a group of four received signal strength indicators RSSIi per measurement.
  • a current radio pattern (FP in FIG. 2) is determined.
  • a radio pattern also referred to as radio fingerprint
  • RSSE received signal strength indicators
  • Received signal strength indicators RSSIi which represent the radio fingerprint for this location.
  • a path segment (k) is determined, specifically the path segment (k) in which the user 4 is currently located.
  • the current radio fingerprint determined in step B3 is used in order to search the memory device 18 for the same or at least very similar radio fingerprint.
  • each radio device 6 is an average value (M (RSSI, .k.
  • Received signal strength indicators RSSEi j assigned which is stored in the memory device 18. If the current wireless fingerprint (or its
  • Received signal strength indicators with the radio fingerprint stored for a path segment (k) (or its averaged received signal strength indicators (M (RSSE kj )) to a certain extent, this results in the path segment (k) in which the user 4 is currently located. Exact coverage is not required; the process searches for the stored radio fingerprint that is most similar to the current radio fingerprint.
  • a step B5 the loss coefficients a ⁇ k are read which are assigned to the path segment (k) determined in step B4.
  • the loss coefficients a ⁇ k are stored in the memory device 18, as set out in connection with step A8 of FIG. Reading thus takes place in that the memory device 18 is searched for the loss coefficients a, .k assigned to it by means of the determined path segment (k).
  • a loss coefficient a, .k is specific for each path segment (k) and specific for each of the radio devices 6.
  • a weighting factor Wi is determined in a step B6.
  • the weighting factor Wi can be determined by the following equation: w i
  • the current position P 'of the user is determined.
  • the current position P ' is a vector and indicates the xy position coordinates at a specific point in time.
  • the instantaneous position P ′ determined in this way can be the same as the actual position P of the user 4, but it can also deviate therefrom to a certain extent, especially under real conditions in the building.
  • the determination is made according to the following equation: (log di (p) - log d ' j ) 2 ,
  • N A number of radio devices 6,
  • RSSE is a current measured value at the i-th radio device 6.
  • the position P ′ corresponds to a snapshot while the user 4 moves along the route 26.
  • the position P 'determined in step B7 can
  • This further processing can include temporal filtering, as shown in box 34 of FIG. 3, consideration of sensor values, as shown in box 32 of FIG. 3, or a combination thereof. This is shown in a step B8 in FIG.
  • time filtering can be carried out because a large number of successive position determinations are carried out. Accordingly, a large number of positions P 'is determined, including outliers, ie positions that deviate too much from neighboring values. The influence of these outliers can be reduced by filtering over time. In one embodiment, an average over five is determined
  • a Kalman filter in particular a so-called extended Kalman filter (EKF)
  • EKF extended Kalman filter
  • Kalman Filters and Advanced Kalman Filters are known to those skilled in the art, e.g. B. from I. Guvenc, et al., "Enhancements to RSS Based Indoor Tracking Systems Using Kalman Filters", International Signal Processing Conference (ESPC) and Global Signal Processing Expo (GPSx), 2003.
  • a Kalman filter is generally used to To reduce errors in real measured values and to provide estimates for non-measurable system variables. The prerequisite for this is that the values of interest can be described by a mathematical model, for example in the form of equations of motion. Kalman filters work with alternating prediction and measurement steps which require a state space vector x, a vector state update function f and an observation space vector z or a vector measurement function h.
  • the state of a system is often understood to be the smallest set of determinants that completely describes the system. This is in the context of the model in the form of a multidimensional vector x with a corresponding
  • Equation of motion f the so-called equation of state, shown.
  • the vector function f m describes the expected transitions between temporally successive states (x mi and x m ) at each point in time m, assumed according to the motion model.
  • the process of observations z m of the true system status reflects the characteristics of the observer or the measuring apparatus resist. These are compared with the system states expected according to the equation of motion via the so-called
  • the vector function / m (x m _i) is used for this.
  • the vector function f m is selected in each time step in such a way that it can be assumed that the user 4 is moving at a constant speed and with the same orientation.
  • the predicted state space vector x ⁇ red which so far is based only on the last state and the transition function, is to be improved by using current measurements.
  • Two different exemplary embodiments can be used for this (the two exemplary embodiments differ in the vectorial measurement functions h m and the corresponding ones
  • the position determinations (positions P ') from the previous position determination methods are used as a measurement.
  • the predicted state space vector xj, red is corrected with these position determinations. So it follows:
  • the vectorial measurement function h m ⁇ r (on which the channel model is based) is used to calculate which RSSI values can be expected if the user 4 is really in one of the predicted values
  • the method takes sensor values into account when determining the position.
  • the mobile radio device 2 contains an inertial measurement unit (IMU) (IMU measurement unit). Is this
  • Mobile radio device 2 designed as a so-called smartphone, this usually contains an IMU measuring unit.
  • the IMU measuring unit is a spatial combination of several inertial sensors, e.g. B. Accelerometers, magnetometers, pedometers and
  • Rotation rate sensors In the case of a smartphone, the IMU measuring unit detects e.g. B. its inclination, Uage and / or rotation. This is known z. B. by a compass function of the smartphone or a function that rotates the screen display, depending on how the smartphone is held by the user 4.
  • the mobile radio device 2 determines, for example, the
  • the steps of the user 4 can be counted from the acceleration values.
  • the known dead reckoning method is used to determine the speed of movement of the user 4 from the direction of movement and the steps counted.
  • the dead reckoning allows the current approximate location of a moving object based on the direction of movement and speed.
  • the signal processing device 8 receives the measured values from the IMU measuring unit. After The IMU data were measured together with the RSSI measurements to the
  • the sensor data are merged with the position and the received signal strength indicator RSSI.
  • the change in the movement of the user 4 over time can in particular be better followed. For example, if the user 4 changes the
  • a step B9 it is checked whether a rule specified in the access control system 1 is fulfilled.
  • the identifier determined in step BIO is used to check whether a user profile exists for user 4. If there is a user profile, the user 4 is known in the access control system 1 and it can be checked whether he is authorized to access at this point in time. If, on the other hand, the identifier is not stored in the access control system 1, there is no access authorization for the user 4.
  • the lock 14 is to be released when the user 4 is authorized to access. If it is a barrier-free lock, the rule can state that no measures (e.g. alarm) need to be taken. If, on the other hand, the user 4 is not authorized to access, the rule can stipulate that the lock 14 remains blocked and / or that a safety measure is to be initiated (e.g.
  • the rule can also stipulate that a building action specified in his user profile is to be carried out for the (access-authorized) user 4.
  • the building action can consist, for example, in that a destination call is triggered for user 4 (according to the data of the user profile existing for this user 4), an elevator is assigned to this destination call by elevator control 10 and the assigned elevator is assigned to user 4 at lock 14 or the mobile device 2 is displayed.
  • the building action is carried out in a step B1.
  • Those skilled in the art will recognize that several building actions can also be carried out in combination, e.g. B. Unlocking the lock 14 and triggering an elevator call.
  • the method ends in step B12.
  • a plausibility check can be provided in the method. Such a check is intended to identify whether a position that has been determined can be plausible at all, that is to say, any obvious inaccuracy that may be present is to be recognized. An obvious inaccuracy can be, for example, that the determined position is outside the
  • the position determined can be viewed as an outlier and rejected.
  • step CI shows a flow diagram of an additional exemplary embodiment of a method for operating an access control system, which begins in a step CI and ends in a step C18. It can be seen in particular that, after the calibration mode has been selected in a step C3, the method is divided into two method branches.
  • a first branch of the method determines the position of a user 4 in accordance with the automated real-time calibration mode, and a second
  • Method branch determines the position of the user 4 according to the calibration mode supported by the reference mobile radio device, which is based on a calibration run with a reference mobile radio device 2a in a calibration phase.
  • the reference mobile radio device-supported calibration mode is described in connection with FIGS. 6 and 7, wherein the steps B3-B7 shown in FIG. 7 essentially correspond to those shown in FIG.
  • step C15 corresponds to step BIO
  • step C2 corresponds to step B2
  • steps C9, C16 and C17 which correspond to steps B8, B9 and B1, respectively.
  • Calibration mode selected. The choice is made analogously to the choice disclosed in step T4 of FIG. 4 based on at least one situation indicator that indicates the
  • step C4 those determined in step C2 in relation to the user 4 are determined
  • the storage takes place z. B. in the storage device 18.
  • a step C5 all of them are stored for the user 4 in step C4
  • Received signal strength indicators RSSIi combined into a signal strength vector.
  • a step C6 the mean value of the reference received signal strength indicators M (RSSI do ) determined in the calibration phase is read from the memory device 18.
  • a step C8 the position of the user 4 is determined.
  • Cost optimization function can be determined.
  • the loss coefficients a are determined by means of a maximum likelihood estimation based on a previously possible position path.
  • the maximum likelihood estimation is known to the person skilled in the art and in statistics refers to a parametric estimation method. To put it simply, that parameter is selected as the estimate, according to whose distribution the realization of the observed data appears most plausible.
  • the resulting residual costs, according to a negative log-likelihood function, are calculated taking into account the loss coefficient m determined as a function of the
  • the minimization can be carried out using minimization algorithms which are known to the person skilled in the art, for example using the known Levenberg-Marquardt algorithm.
  • the software product MATLAB from The MathWorks, Ine., USA can be used for the cost optimization function.
  • the most current element of the position path thus found is then used as the determined current position P '.
  • the method can carry out the further steps C9, C16 and C17.
  • the method ends in step C18.
  • the signal processing device 8 is designed to use the technology described here in connection with one or more algorithms for machine learning (also referred to as machine leaming), with the The aim of automatically further developing the accuracy of position determination or position tracking.
  • machine learning also referred to as machine leaming
  • Computer program is programmed to execute the corresponding algorithm or algorithms.
  • Machine learning algorithms typically consist of a training phase and a deployment phase.
  • the computer program accesses one or more data records stored in the storage device 18 which were created in the training phase.
  • Such a data record contains data on position determinations that have already taken place (e.g.
  • Situation indicators received signal strength indicators RSSE, for example also whether a position determination or position tracking was successful. If one
  • Position tracking was successful can be verified afterwards, for example, if the user 4 who came in through a door A actually walks through a door B.
  • currently determined data radio situation, current received signal strength indicators RSSIi
  • RSSIi current received signal strength indicators
  • the mobile device 2 can, for. B. have an application-specific software application (also referred to as an app) that can be activated by the user 4, for example.
  • the application-specific software application is used in connection with access control and the use of elevators.
  • the application-specific software controls the generation and transmission of the radio signal.
  • this software can also generate the identifier of the mobile radio device 2, for example an identifier that is unique to the mobile radio device 2 and cannot be changed over time.
  • Such an identifier generated by software is an alternative to a device identification number and a telephone number, which can also be used as an identifier.
  • the mobile radio device 2 can be, for example, a mobile phone, a smartphone or a tablet PC, these devices usually being equipped with hardware that enable radio communication.
  • the mobile radio device 2 can, however, also be glasses with a miniature computer or another computer-aided device worn on the body (also referred to as a “wearable device”), in particular a smartwatch.
  • a graphical user interface also referred to as graphical user interface, GUI
  • GUI graphical user interface
  • one aspect of the technology described here relates to a system for controlling access to a restricted-access zone in a building, and another aspect relates to a method for controlling access to a
  • restricted access zone in a building are made and used.
  • Additional aspects of the technology described here relate to a system and a method for calibrating parameters for position determination, as described, for example, in connection with FIGS. 5 and 6. This calibration can take place and be claimed independently of the access control and independently of the determination of the position or its course over time.
  • one aspect of the technology described here relates to a system in which one or more algorithms for machine ueaming are used in order to automatically further develop the accuracy of the position determination or position tracking.

Landscapes

  • Engineering & Computer Science (AREA)
  • Radar, Positioning & Navigation (AREA)
  • Remote Sensing (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Automation & Control Theory (AREA)
  • Probability & Statistics with Applications (AREA)
  • Mobile Radio Communication Systems (AREA)
  • Selective Calling Equipment (AREA)
EP20720061.9A 2019-04-26 2020-04-24 Zugangskontrollsystem und verfahren zum betreiben eines zugangskontrollsystems Pending EP3959483A1 (de)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
EP19171358 2019-04-26
PCT/EP2020/061410 WO2020216877A1 (de) 2019-04-26 2020-04-24 Zugangskontrollsystem und verfahren zum betreiben eines zugangskontrollsystems

Publications (1)

Publication Number Publication Date
EP3959483A1 true EP3959483A1 (de) 2022-03-02

Family

ID=66290301

Family Applications (1)

Application Number Title Priority Date Filing Date
EP20720061.9A Pending EP3959483A1 (de) 2019-04-26 2020-04-24 Zugangskontrollsystem und verfahren zum betreiben eines zugangskontrollsystems

Country Status (4)

Country Link
EP (1) EP3959483A1 (zh)
CN (1) CN113811742A (zh)
AU (1) AU2020263909B2 (zh)
WO (1) WO2020216877A1 (zh)

Families Citing this family (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
LV15829A (lv) * 2022-08-29 2024-03-20 Elektronikas Un Datorzinātņu Institūts Iekārta un paņēmiens valkājamo iekārtu bezvadu drošības analīzei
CN115953850B (zh) * 2023-03-10 2023-05-09 深圳市深圳通有限公司 超宽带无感支付的通行异常识别装置及方法

Family Cites Families (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP2237234A1 (de) 2009-04-03 2010-10-06 Inventio AG Verfahren und Vorrichtung zur Zugangskontrolle
CN101583147B (zh) * 2009-06-17 2011-01-05 哈尔滨工业大学 一种应用于话务量预测的分段在线支持向量回归方法
US9081080B2 (en) * 2011-03-04 2015-07-14 Qualcomm Incorporated RSSI-based indoor positioning in the presence of dynamic transmission power control access points
CN102395192B (zh) * 2011-03-15 2014-09-24 苏州摩多物联科技有限公司 一种无线传感终端的定位方法和装置
GB201213172D0 (en) * 2012-07-24 2012-09-05 Sensewhere Ltd Method of estimating position of a device
US9442179B2 (en) * 2013-03-11 2016-09-13 Qualcomm Incorporated Tiered positioning assistance data for mobile devices within an indoor environment
US10728244B2 (en) * 2015-02-17 2020-07-28 Sensormatic Electronics, LLC Method and system for credential management
CN110914875B (zh) * 2017-06-09 2022-10-14 开利公司 基于位置的行为监测
CN109005390B (zh) * 2018-08-31 2020-12-04 山东建筑大学 基于信号强度与视频的人员分布模型建立方法及系统

Also Published As

Publication number Publication date
WO2020216877A1 (de) 2020-10-29
AU2020263909A1 (en) 2021-11-11
AU2020263909B2 (en) 2023-08-10
CN113811742A (zh) 2021-12-17

Similar Documents

Publication Publication Date Title
DE60220812T2 (de) Positionsdetektion und standortverfolgung in einem drahtlosen netzwerk
EP2301179B1 (de) Störvorrichtung und verfahren zum stören eines zielsignals
EP1769261B1 (de) Vorrichtung und verfahren zum ermitteln einer aktuellen position eines mobilen gerätes
EP3414633B1 (de) Heimautomatisierungssystem
DE112018001883T5 (de) Belegungsabschätzung mittels nichtparametrischen Online-Änderungspunkt-Erfassungsalgorithmus und Vorrichtungen, Systeme, und Software für Selbiges
DE202005021141U1 (de) Mechanismus zur Lokalisierung von drahtlosen Knoten, der auf beobachtete Ausbreitungsmerkmale von Signalen in drahtlosen Netzwerk-Infrastrukturen reagiert.
EP3610466B1 (de) Besucher-registrierungs- und -zugangskontrollverfahren
EP3610465A1 (de) Zugangskontrollsystem mit funk- und gesichtserkennung
WO2020216877A1 (de) Zugangskontrollsystem und verfahren zum betreiben eines zugangskontrollsystems
WO2019120611A1 (de) Verfahren zur prüfung der zugehörigkeit von funkknoten zu einer funkumgebung mittels einer auswertung von störsignalanteilen
EP1109031A1 (de) Verfahren und Einrichtung zum Lokalisieren eines mobilen Terminals
WO2010128121A1 (de) Konzept zum bestimmen eines schätzwerts einer lage eines empfangselements
DE102009021783A1 (de) Lokalisierungssystem und Verfahren zur Lokalisierung wenigstens eines mobilen Telekommunikationsgeräts mittels Kurzstreckenfunk, insbesondere Bluetooth
WO2020074360A1 (de) System und verfahren zur positionsbestimmung in einem gebäude
WO2017025193A1 (de) Verfahren und vorrichtung zur durchführung einer personenkontrolle
DE102016201310A1 (de) Zugangskontrollverfahren sowie Zugangskontrollsystem
DE10142156B4 (de) Mobile Navigationsvorrichtung für ein zellulares Funknetz sowie Verfahren zum Liefern von Navigationsinformationen
EP3349189A1 (de) Auswertesystem zur auswertung von zumindest einem antriebsparameter wenigstens eines türsystems
DE102009039879B9 (de) Verfahren zum Steuern der Freigabe einer Einrichtung oder eines Dienstes, als Master ausgebildete Sendeempfangseinrichtung sowie System mit derartiger Einrichtung
WO2010121915A2 (de) Verfahren zum rechnergestützten verarbeiten von messungen von merkmalen eines funknetzes
EP3864633B1 (de) Zugangskontrollsystem und verfahren zum betreiben eines zugangskontrollsystems
DE102015121227B4 (de) Verfahren und System zum Detektieren von Bewegungsmustern von mobilen Endgeräten
DE102018104084A1 (de) Beschleunigungs- und schwerkraftdatenbasiertes system und verfahren zum klassifizieren der anordnung eines mobilen netzwerkgeräts an einer person
WO2013120527A1 (de) Funknetzanordnung für ein bauwerk
DE102020130757B3 (de) Verfahren, mobile Kommunikationseinrichtung und Computerprogramm zum dynamischen Einstellen einer Kurzstreckenfunk-Reichweite

Legal Events

Date Code Title Description
STAA Information on the status of an ep patent application or granted ep patent

Free format text: STATUS: UNKNOWN

STAA Information on the status of an ep patent application or granted ep patent

Free format text: STATUS: THE INTERNATIONAL PUBLICATION HAS BEEN MADE

PUAI Public reference made under article 153(3) epc to a published international application that has entered the european phase

Free format text: ORIGINAL CODE: 0009012

STAA Information on the status of an ep patent application or granted ep patent

Free format text: STATUS: REQUEST FOR EXAMINATION WAS MADE

17P Request for examination filed

Effective date: 20210825

AK Designated contracting states

Kind code of ref document: A1

Designated state(s): AL AT BE BG CH CY CZ DE DK EE ES FI FR GB GR HR HU IE IS IT LI LT LU LV MC MK MT NL NO PL PT RO RS SE SI SK SM TR

DAV Request for validation of the european patent (deleted)
DAX Request for extension of the european patent (deleted)
RAP3 Party data changed (applicant data changed or rights of an application transferred)

Owner name: INVENTIO AG