GB2580896A - Methods and systems for controlling access to a secured area - Google Patents

Methods and systems for controlling access to a secured area Download PDF

Info

Publication number
GB2580896A
GB2580896A GB1900846.5A GB201900846A GB2580896A GB 2580896 A GB2580896 A GB 2580896A GB 201900846 A GB201900846 A GB 201900846A GB 2580896 A GB2580896 A GB 2580896A
Authority
GB
United Kingdom
Prior art keywords
gantry
individual
secured
access terminal
user identifiers
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Withdrawn
Application number
GB1900846.5A
Other versions
GB201900846D0 (en
Inventor
Mirza Zainab
Meyer Hans-Joachim
Teo Alex
Sunil Nicholas Fernandes Brian
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Continental Automotive GmbH
Continental Automotive Singapore Pte Ltd
Original Assignee
Continental Automotive GmbH
Continental Automotive Singapore Pte Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Continental Automotive GmbH, Continental Automotive Singapore Pte Ltd filed Critical Continental Automotive GmbH
Priority to GB1900846.5A priority Critical patent/GB2580896A/en
Publication of GB201900846D0 publication Critical patent/GB201900846D0/en
Publication of GB2580896A publication Critical patent/GB2580896A/en
Withdrawn legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • EFIXED CONSTRUCTIONS
    • E05LOCKS; KEYS; WINDOW OR DOOR FITTINGS; SAFES
    • E05GSAFES OR STRONG-ROOMS FOR VALUABLES; BANK PROTECTION DEVICES; SAFETY TRANSACTION PARTITIONS
    • E05G5/00Bank protection devices
    • E05G5/003Entrance control
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/00174Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
    • EFIXED CONSTRUCTIONS
    • E05LOCKS; KEYS; WINDOW OR DOOR FITTINGS; SAFES
    • E05YINDEXING SCHEME RELATING TO HINGES OR OTHER SUSPENSION DEVICES FOR DOORS, WINDOWS OR WINGS AND DEVICES FOR MOVING WINGS INTO OPEN OR CLOSED POSITION, CHECKS FOR WINGS AND WING FITTINGS NOT OTHERWISE PROVIDED FOR, CONCERNED WITH THE FUNCTIONING OF THE WING
    • E05Y2800/00Details, accessories and auxiliary operations not otherwise provided for
    • E05Y2800/40Protection
    • E05Y2800/424Protection against unintended use
    • E05Y2800/426Protection against unintended use against unauthorised use
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/00174Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
    • G07C2009/00753Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated by active electrical keys
    • G07C2009/00769Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated by active electrical keys with data transmission performed by wireless means
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/00174Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
    • G07C9/00571Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated by interacting with a central unit

Abstract

A mantrap security system 100 for controlling access to a secure area by passing through at least a first and second gantry, 120 and 140, and method (figure 3) for using the same, comprises: a first terminal 122 for verifying an individual 170 based on one or more first identifiers, where the first gantry is switched from a secure state to a release state in response to authentication of the first identifiers; and a second terminal 142 for verifying an individual based on one or more second identifiers, where the second gantry is switched from a secure state to a release state in response to authentication of the second identifiers and the first gantry being in a secured state. The user identifiers may be entered via a mobile device 180, such as a mobile phone, tablet, smart watch or personal digital assistant, instead of a physical input device located near the gantries. The first and second user identifiers may comprise biometric characteristics, such as fingerprints, facial features or a voice print. The system may also comprise a sensor system 150 for determining the number of persons who passed through the first gantry when in a released state.

Description

METHODS AND SYSTEMS FOR CONTROLLING ACCESS TO A SECURED AREA
TECHNICAL FIELD
The present disclosure relates to methods and systems for controlling access to a secured area.
BACKGROUND
Security systems used for controlling access to restricted areas such as buildings and rooms containing confidential information, high value objects and/or automated teller machines (ATM) frequently rely on user authentication as a means for deciding if an individual should be allowed access. Accord-ingly, designing security systems which make it difficult for unauthorised individuals to gain entry by circumventing security measures is one of the key challenges.
There are various known strategies for mitigating the risk of security breaches. They include multi-factor authentication processes which require two or more different types of user identifiers to be verified before a user can be authenticated and allowed access. Use of biometric data associated with an authorised person such as fingerprint and facial recognition as a form of user identifier also helps to reduce the risk of impersonation and sharing of credentials. However, the above-mentioned strategies do not adequately address the issue of an intruder who tries to gain access by tailgating an authorised person while the latter is entering a secured area. Further-more, equipping each access point with multiple input devices to facilitate the entry of user identifier can also be costly both in terms of installation and maintenance. This problem is exacerbated when a security system is used to control access to buildings with many access points.
In view of the foregoing, there is a need for security systems 5 which are more efficient at preventing unauthorised access to secured areas by tailgating. Preferably, implementations of such security systems are also cost efficient.
SUMMARY
Aspects of this disclosure provide methods and security systems for controlling access to a secured area which is accessible by passing through at least a first and second gantry One aspect of this disclosure provides a method for controlling access to a secured area accessible by passing through at least a first and a second gantry. The method comprises verifying that an individual is an authorised person who is permitted to enter the secured area based on one or more first user identifiers entered when the individual is in the proximity of a first access terminal and switching the first gantry from a secured to a release state in response to the individual being authenticated as an authorised person based on the one or more first user identifiers. The method also comprises switching the first gantry from the release to secured state and verifying that the individual is an authorised person based on one or more second user identifiers entered when the individual is in the proximity of a second access terminal. The second gantry is switched from the secured to the release state in response to a plurality of safe entry criteria being met. The safe entry criteria may comprise the individual being authenticated as an authorised person based on the one or more second user identifiers, and the first gantry being in a secured state. The first and second user identifiers may comprise a password such as a string of characters, biometric data representative of an authorised person or a combination thereof. In some implementations, at least one of the first or second user identifiers comprises biometric characteristics of an authorised person. The biometric characteristics comprises fingerprint, facial features, voice print or a combination thereof. There may be two or more first and second user identifiers in order to increase the level of security.
In some implementations, at least one of the first or second user identifiers is entered by the individual via a mobile device. Suitable mobile devices include mobile phones, personal digital assistants, tablets and smart watches. Use of mobile device access provides cost savings advantages in that it eliminates the need for physical input devices to be installed at each gantry and correspondingly, the cost of installing and maintaining such devices. The individual's mobile device may also be responsible for verifying that an individual is an authorised person who is permitted to enter the secured area based on the one or more first user identifiers and/or verifying that the individual is an authorised person who is permitted to enter the secured area based on the one or more second user identifiers. The method may also comprise the step of detecting for the presence of the mobile device in the proximity of the first access terminal and/or second access terminal. The first access terminal and/or second access terminal may be configured to trigger the mobile device to request that the individual enters the one or more first and/or second user identifiers in response to detecting the presence of the mobile device in the proximity thereof.
In another exemplary implementation of this disclosure, the method further comprises comprising determining based on sensor data collected by a sensor system for detecting when a person passes through the first gantry, the number of persons who passed through the first gantry when the first gantry was in the release state. The sensor system may be installed on the first gantry and may be a laser sensor for sensing movement. The method may comprise triggering an alarm when the number of persons who have passed through the first gantry when the first gantry was in the release state is more than one. On the other hand, the step of verifying that the individual is an authorised person based on the one or more second user identifiers entered may be executed in response to the number of persons who have passed through the first gantry when the first gantry was in the release state being one. In one variation, the safe entry criteria further comprises requiring the number of persons who have passed through the first gantry when the first gantry was in the release state to be one. Requiring only one person to have passed through when the first gantry was in the release state is advantageous in that it serves to confirm that there are no tailgaters before the second gantry is released.
Another aspect of the disclosure provides a security system for controlling access to a secured area that is accessible by passing through at least a first and a second gantry. The security system comprising a first access terminal operable to switch the first gantry between a secured state and a release state, the first access terminal being configured to switch the first gantry from the secured to the release state in response to an individual being authenticated as an authorised person based on one or more first user identifiers entered when the individual is in the proximity of the first access terminal. The security system also comprises a second access terminal operable to switch the second gantry between the secured state and the release state, the second access terminal configured to determine if a safe entry criteria is met and in response to the safe criteria being met switch the second gantry from the secured to the release state. The safe criteria comprises: the individual being authenticated as an authorised person based on one or more second user identifiers, and the first gantry being in a secured state. The first and second access terminals may be separate devices or the same device such as a central gantry controller. The first and second access terminals may be configured to allow the individual to enter the one or more first or second user identifiers via a mobile device such as a mobile phone, smart watch or personal digital assistant. The second access terminal may also be configured to communicate with a sensor system. for detecting when a person passes through the first gantry. In some implementations, the second access terminal is configured to determine the number of persons who have passed through the first gantry when the first gantry was in the release state based on sensor data from the sensor system. The safe entry criteria may further comprise requiring only one person to have passed through the first gantry when the first gantry is in the release state.
The details of one or more implementations of the disclosure are set forth in the accompanying drawings and the description 25 below. Other aspects, features, and advantages will be apparent from the description and drawings, and from the claims.
BRIEF DESCRIPTION OF THE FIGURES
Other objects and aspects will become apparent from the following description of implementations with reference to the accompanying drawings in which: Fig. 1 is a schematic view of a system 100 for controlling access to a secured area according to one implementation of this disclosure; Fig. 2 is a schematic view of a system 200 for controlling access to a secured area according to another implementation of this disclosure; and Fig. 3 shows a flowchart illustrating an exemplary method 300 10 for controlling access to a secured area according to one implementation of this disclosure.
DETAILED DESCRIPTION
In the following detailed description, reference is made to the accompanying figures. In the figures, similar symbols typically identify similar components, unless context dictates otherwise.
FIG. 1 shows a security system 100 for controlling access to a secured area in accordance with one implementation of this disclosure. In this example, an authorised person is required to pass through both a first and second gantry (120, 140) in order to enter the secured area. The first and second gantries are normally in a secured state and are operable to switch from a secured to a release state upon authentication of an individual as a person who is authorised to enter. In this disclosure, secured state refers to a state where the gantry is closed and locked. Release state, on the other hand, refers when a gantry is unlocked, and a user can pass through. The gantry may be physically open in the release state or closed but unlocked. The security system 100 in the FIG. 1 implementation comprises a first access terminal 122, a second access terminal 142 and a user database 160. The first access terminal 122 is configured to cause the switching of the first gantry 120 between secured and release states. The first access terminal may also be configured to determine whether conditions 5 for switching the first gantry from a secured to a release state and vice versa are met. In the FIG. 1 implementation, the second access terminal 142 is configured to perform similar functions but for the second gantry 140. By way of example, the first and second access terminals (122, 142) may be mounted 10 to walls adjacent to the first and second gantries respectively or attached to the gantries themselves.
In some implementations, each access terminal (122, 142) may comprise a computing processor, a hardware memory in communi-cation with the processor and a network interface. In another variation, each access terminal may also comprise multiple processors and/or memories located in different housing. Accordingly, references to a processor or memory associated with an access terminal will be understood to include references to a collection of processors and/or memories that operate to perform the functions of an access terminal described in this disclosure. The memory stores information accessible by the processor such as program instructions for implementing one or more steps for controlling access to a secured area discussed in this disclosure as well as data which may be stored, retrieved or otherwise used by the processor. For example, if the processor is located in the first access terminal 122, the processor may check if conditions for releasing the first gantry have been met and if the answer is affirmative, cause the release of the first gantry based on instructions stored in the memory. Each access terminal also contains a network interface which may be configured to allow for wireless communications between the access terminal and other devices or modules. Such wireless communications include communications via cellular network, Internet protocol (IP) network, Blue-tooth or a combination thereof. For example, the processor in the first or second access terminal (122, 142) may wish to know if the first or second gantry is in a release or secured state. The access terminals may also pass instructions to the respective gantries, instructing for a change of state. Additionally, the networ:c interface in an access terminal may also be used to facilitate communications between the access terminal and other devices or modules. For example, the FIG. 1 implementation comprises a sensor system 150 operable to detect if a person has passed through the first gantry 120. By way of example, the sensor system 150 may comprise a laser sensor mounted on the first gantry for detecting the movement of persons past the gantry. In some variations, the first access terminal may communicate with the sensor system 150 in order to determine if a close gantry criterion for switching the first gantry from a release to secured state has been met. The close gantry criterion may, for example, require one person to have passed through the first gantry from the time it is switched to a release state. A processor in the second access terminal 142 may also communicate with the sensor system. 150 to determine if one of the safe entry criteria for releasing the second gantry 140 has been met. Such safe entry criteria may require only one person to have passed through the first gantry when it was in the release state.
The security system 100 is configured to verify an individual as an authorised person before he or she is allowed into the secured area. Such verification is obtained by requiring the individual to enter at least one user identifier when in the proximity of the first and second access terminals (122, 142) respectively. The security system in FIG. 1 is set up for mobile device access whereby an individual 170 enters user identifiers into his or her mobile device 180 instead of a physical input device located near the gantries such as at the access terminals. Examples of suitable mobile devices include mobile phones, personal digital assistants, tablets and smart watches. Other implementations of this disclosure may alter- natively or additionally provide for entry of user identifiers via physical input devices located near the gantries. Use of mobile device access provides cost savings advantages in that it eliminates the need for physical input devices to be installed at each gantry and correspondingly, the cost of in- stalling and maintaining such devices. The first and second access terminals (122, 142) in FIG. 1 are configured to communicate wirelessly with mobile devices 180 located within a predetermined perimeter of the terminal. The mobile devices of authorised persons may be installed with a secure access ap-plication which allows the mobile device to be used as an access device as described in this disclosure. Preferably, an individual is required to authenticate him or herself as an authorised user before the secure access application can be installed on their mobile device. In one implementation, the secure access application prompts the individual 170 to enter one or more first user identifiers in order to be allowed access past the first gantry 120. The request may be made as a visual message via a graphical user interface (GUI) on the mobile device. The application may mare the request upon re-ceiving a request from the individual 170 to pass through the first gantry. Alternatively, the first access terminal 122 may also be configured to detect for the presence of a mobile device within a predetermined perimeter that is equipped with the secure access application. Upon the detection of such a mobile device 180, the first access terminal 122 triggers the secure access application to issue user identifier requests. The user identifiers may comprise a password such as a string of characters, biometric data representative of an authorised user or a combination thereof. Examples of biometric data include fingerprints, facial features, voice print, iris and retinal characteristics. Accordingly, a mobile device used for accessing a secured area will have to be equipped with input devices capable of receiving the requisite user identifiers. Examples include physical or touch screen keyboards, cameras for facial recognition, microphones for receiving user voice input and fingerprint scanners. In order to provide for enhanced security, the first access terminal 122 may require multiple user identifiers to be authenticated before releasing the first gantry. For example, an individual may be required to enter two types of biometric data in order to be authenticated as an authorised person.
The list of authorised persons who are allowed to access the secured area and user authorisation information corresponding to each authorised person may be stored on the user database 160 of the security system. The user authorisation information would include user identifier information used to verify if an individual is an authorised person allowed to enter the secured area. The user database 160 may be located at the same premises as the secured area or remotely on a cloud server. In the FIG. 1 implementation, the individual's mobile device 180 is responsible for authenticating if an individual is an authorised person. Such verification may be carried out by the secure access application installed on mobile device 180. Accordingly, the individual's mobile device communicates wirelessly with the user database in order to verify if the one or more user identifiers entered by the individual corresponds to that of an authorised person. Examples of suitable wireless communications include cellular network and internet protocol (IP) network communications. If an individual is authenticated as an authorised person, his or her mobile phone 180 will notify the first access terminal that the individual 170 has been authenticated as an authorised person. In other implementations such as the security system 200 shown in FIG. 2, a first and second access terminal (222, 242) responsible for controlling the switching of a first and second gantry (220, 240) may be responsible for verifying that an individual 270 is an authorised person instead. Accordingly, an individual's mobile device 280 is only serves as a means for the individual to enter user identifiers. User identifiers collected from the individual are then wirelessly transmitted from the mobile device transmits user identifiers to the respective first and second access terminals (222, 242). The access terminals (222, 242) then communicates with a user database 260 to verify if an individual is an authorised user. As such in FIG. 2, the user database 260 and access terminals are configured to com-municate with each other.
Going back to the FTC. 1 example, the first access terminal 122 may be configured to cause the switching of the first gantry 120 from the secured to release state in response to the individual being authenticated as an authorised person based on the one or more first identifiers. In some variations, the first access terminal may be configured to cause a switching of the first gantry back to the secured state determining that one or more close gantry criteria has been satisfied. The close gantry criteria may include receipt of a signal from the sensor system. 150 indicating that a person has passed through the first gantry after the first gantry was released. In some variations, the first access terminal may be further configured to switch to an inactive state upon receipt of the signal that a person has passed through the first gantry after the first gantry was released. The first access terminal may remain in the inactive state where it stops detecting for the presence of mobile devices within the predetermined perimeter and/or receive first user identifiers from another individual until the original individual has passed through the second gantry. The close gantry criteria may also be defined in terns of the time elapsed since the release of the first gantry or a combination of both. For example, the first gantry may be switched back to the secured state if no person has been detected as passing through after a certain duration has elapsed since the release of the first gantry.
In this disclosure, additional safe entry criteria will have to be met before an individual is allowed to pass through the second gantry. The objective of the safe entry criteria being to mitigate the problem of tailgating. In accordance with this disclosure, the safe entry criteria include requiring an individual to be authenticated as an authorised person based on one or more second user identifiers entered when the individual is in the proximity of a second access terminal, and the first gantry to be in a secured state. The second gantry will be switched from the secured to the release state only when the safe criteria are met. Preferably, the safe entry criteria also require the authorised person identified based on the second user identifiers to be the same as the person authenticated based on the first user identifiers. The security system in FIG. 1 is setup to similarly provide for mobile device access at the second gantry 140. Accordingly, the discussions on mobile device access at the first gantry are similarly applicable here. As with the first gantry, the second gantry may also be additionally or alternatively be equipped with physical input devices for an individual to enter user identifiers. In some implementations, the safe entry criteria may additionally require only one person to have passed through when the first gantry was in the release state. This additional criterion is directed at ensuring that there is no tailgating before proceeding to release the second gantry 140. It is particularly useful for addressing situations where the first gantry is physically open in the release state and an intruder slips through the first gantry before it is completely returned to a closed position in the secured state. In one variation, the second access terminal 140 may be configured to cause the sounding of an alarm if more than one person is detected as having passed through the first gantry when it is in the release state. Although the access terminals are responsible for determining when the gantries should be released and secured in the FIG. 1 and 2 implementations, this is not intended to be limiting on the disclosure. For example, a central gantry controller may be responsible for controlling the state of the gantries instead. The central gantry controller may also be responsible for authenticating if an individual is an authorised person based on user identifiers entered at an individ-ual's mobile device or a physical input device located near a gantry.
Fig. 3 shows a flowchart illustrating an exemplary process 300 for controlling access to a secured area in accordance with one implementation of this disclosure. The secured area is accessible by passing through at least a first and a second gantry. The operations of the process 300 will be described with reference to the security system_ in FIG. I. However, it will be appreciated that this is merely for ease of illustra-tion and other similar systems may also be suitable. It is assumed that prior to the start of process 300, both the first and second gantries (120, 140) are in a secured state. The process starts at block 301 and may be initiated upon the first access terminal 120 detecting the presence of a mobile device 180 within a predetermined perimeter of it. The mobile device may be one which is installed with a secure access application. Other events for initiating the start of the process 300 may also be suitable. For example, the process may also be initiated as a result of an individual making a request for access to the secured area protected by the first and second gantry.
Starting of the process in block 301 triggers the first access terminal 120 to request for one or more first user identifiers from the individual 170 whose mobile device has been detected or who has made the request for entry whichever the case may be. The first access terminal 122 transmits the user authen-tication request to the individual's mobile device 180 and which may then convey the request to the individual visually and/or aurally via a display device and/or speaker located on the mobile device 180. The process then goes on to block 312 when one or more requested first user identifiers entered by the user is received by the mobile device 180. The user identifiers may comprise a password such as a string of characters, biometric data representative of an authorised user or a combination thereof. Accordingly, a mobile device used for accessing a secured area will have to be equipped with input devices capable of receiving the requisite user identifiers needed to authenticate an individual as an authorised person. For example, the mobile device may be equipped with fingerprint scanners and cameras for capturing the fingerprint and facial features of a person. The process then moves on to decision block 320 which involves determining if the individual 170 is an authorised person who is permitted to enter the secured area based on the one or more first user identifiers entered when the individual is in the proximity of the first access terminal 120. In the FIG. 1 implementation, this verification is performed by the individual's mobile device. The first user identifiers may also be transmitted from the individual's mobile device to a first access terminal which will conduct the verification like in the FIG. 2 implementation. A mobile device 180 in the FIG. 1 implementation may perform the verification by looking up a user database 160 containing user authorisation information of persons who are authorised to enter the secured area. The user authorisation information includes user identifier information which will be used as a basis for identi- fying if an individual is an authorised person. For instance, the security system may require an individual to enter both a password and fingerprint image as first user identifiers before the first gantry 120 can be released for him to pass through. Therefore, in block 320, the individual's mobile de-vice 180 will check with the user database 160 if the password and fingerprint pattern entered by the individual matches that of an authorised person. If the individual is not an authorised person, the process goes to block 322 where the mobile device notifies the individual that he or she is not authorised to enter the secured area. The mobile device may also notify the individual which one of the user identifiers does not match that of an authorised person. For example, the mobile device may inform the individual that the password keyed in is incorrect. After the individual has been notified, the process goes to block 390 and ends. On the other hand, if the individual is determined to be an authorised person based on the one or more first user identifiers entered, the process goes on to block 330. In another implementation, the process of determining if the individual is an authorised person in block 320 may also be carried out by the first access terminal 122 instead of the individual's mobile device 180.
In block 330, the first access terminal switches the first gantry from the secured to release state upon being notified by the mobile device 180 that the individual is an authorised person based on the one or more first identifiers. As discussed, earlier the first gantry may simply become unlocked when switched to a release state or the first gantry may be moved to an open position like in the opening of a door. After the first gantry is released in block 330, the process goes to decision block 340 which determines if close gantry criterion for switching the first gantry back to the secured state has been met. The close gantry criterion may require that a person as passed through the first gantry. The sensor system 150 may be used for detecting if a person has passed through the first gantry 122. If the close gantry criteria is met, that is, a person has passed through the first gantry, the process goes on to block 342. In the FIG. 3 implementation, the process of checking if a person has passed through the first gantry continues for a predetermined time, t, before a timeout is called and the process goes to block 390 and ends. In block 342, the first gantry is switched from the release to secured state. In some implementations, the first access terminal may also be switched to an inactive state in block 342 or after the first gantry has already been returned to the secured state. The first access terminal 122 may remain in the inactive state where it stops detecting for the presence of mobile devices within the predetermined perimeter and/or receive first user identifiers from another individual until the original individual has passed through the second gantry 142.
Block 350 involves determining if the number of persons who have passed through the first gantry when it was in the release state is one. This determination may be made by the second access terminal 142 based on sensor data received from the sensor system. 150 which detects the movement of people past the first gantry. The second access terminal may then cause a number of actions to be taken depending on the outcome of this determination. For example, if the number of persons who have passed through the first gantry is 0, the process goes to block 390 and ends. If the number of persons who have passed through is more than one then the process goes to block 352 where an alarm is caused to be triggered. The first gantry may also be opened in block 352. In some implementations, the first access terminal 122 may be responsible for the above-mentioned operations instead. If the number of persons who have passed through the first gantry is equal to one, the process goes on to block 360 where the second access terminal 142 sends a request to the mobile device 180 asking for one or more second user identifiers from the individual 170. This request may be made when the mobile device 180 is within a transmission and reception zone of the second access terminal 142. The mobile device 180 may then convey the request to the individual visually and/or aurally via a display device and/or speaker located on the mobile device 180. Depending on the desired level of security, the second user identifiers may have some similarity with the first user identifiers or be completely dif-ferent therefrom. The process then goes on to block 362 when one or more requested second user identifiers entered by the user is received by the mobile device 180. In some implementations, the second access terminal may be configured to be in an inactive state until the process goes to block 360. In another implementation, the second access terminal may also be configured to be in an inactive state until the first gantry is returned to the secured state after being released for an individual to pass through such as in block 342. The second access terminal may stop detecting for the presence of mobile devices within the predetermined perimeter and/or request for second user identifiers when it is in an inactive state.
In block 370, the individual's mobile device 180 determines if the individual is an authorised person based on the second user identifiers entered. Such determination may, for example, be carried out by the secure access application installed on mobile device 180. Accordingly, the individual's mobile device 180 communicates wirelessly with the user database 160 to verify if the one or more second user identifiers entered by the individual corresponds to that of an authorised person. Preferably, the authentication process requires the authorised person identified by the second user identifiers to be the same as the one identified by the first user identifiers. In another variation, the second access terminal 142 may also be responsible for verifying if the individual is an authorised person in block 370. If the individual is not an authorised person or not the same authorised person as the one identified using the first user identifiers, the process goes to block 372 where the mobile device causes an alarm. to be triggered. On the other hand, if the individual is an authorised person and optionally, the same as the one associated with the first user identifiers, the process goes on to block 374 where the mobile device 180 informs the second access terminal 142 that the individual is an authorised person. The second access terminal 142 then goes on to determine in block 380 a plurality of safe entry criteria for switching the second gantry from the secured to the release state have been met. In one implementation, the safe entry criteria may comprise requiring the individual asking for access to be authenticated as an authorised person based on the one or more second user identifiers, and the first gantry is in a secured state. Some implementations may also require only one person to have passed through when the first gantry was in the release state in order to confirm that there are no tailgaters before the second gantry is released. For instance, in the FIG. 3 implementation, decision block 350 determines if the number of persons who have passed through the first gantry when it was in the release state is one before the process is allowed to continue on to block 360. Alternatively, this requirement may be included as part of the safe entry criteria and the process of determining if the number of persons who have passed through is one.
If the safe entry criteria are not satisfied, the process goes to block 382 where an alarm is triggered. On the other hand, if the safe entry criteria are satisfied, the process goes to block 384 where the second gantry is switched from. the secured to release state. At block 386, the second gantry 140 is reverted back to the secured state. The second access terminal 142 may be configured to effect the switching of the second gantry 140 back to the secured state after a predetermined duration. The second gantry 140 may also be equipped with a second sensor system used to detect when a person has passed through and the second access terminal 142 configured to switch the second gantry back to the secured state in response to such detection. After the second gantry is closed in block 386, the process goes to block 390 and ends.
The detailed description above serves the purpose of explaining the principles of the present disclosure and its practical application, thereby enabling others skilled in the art to understand the disclosure for various exemplary embodiments and with various modifications as are suited to the particular use contemplated. The detailed description is not intended to be exhaustive or to limit the present disclosure to the precise embodiments herein. ',Codifications and equivalents will be apparent to practitioners skilled in this art and are encompassed within the scope and spirit of the appended claims. For instance, although the above examples illustrate the disclosure as being applied to secured areas which are accessible via two gantries, this is not intended to be limiting on the disclosure. This disclosure may also be applied to secured areas which require a user to pass through more than two gantries. This disclosure may also be applied to secured areas which are subdivided into multiple zones with different authorised persons for each zone.

Claims (16)

  1. CLZ\IMS What is claimed is: 1. A method for controlling access to a secured area that is accessible by passing through at least a first and a second gantry, the method comprising: verifying that an individual is an authorised person who is permitted to enter the secured area based on one or more 10 first user identifiers entered when the individual is in the proximity of a first access terminal; switching the first gantry from a secured to a release state in response to the individual being authenticated as an authorised person based on the one or more first user 15 identifiers; switching the first gantry from the release to secured state; verifying that the individual is an authorised person based on one or more second user identifiers entered when the individual is in the proximity of a second access terminal; and switching the second gantry from the secured to the release state in response to a plurality of safe entry criteria being met, wherein the safe entry criteria comprises: the individual being authenticated as an authorised person based on the one or more second user identifiers; and the first gantry being in a secured state.
  2. 2. The method of claim 1, wherein at least one of the first or second user identifiers comprises biometric characteristics of an authorised person.
  3. 3. The method of claim 2 wherein the biometric 35 characteristics comprises fingerprint, facial features, voice print or a combination thereof.
  4. 4. The method according to any of the preceding claims wherein at least one of the first or second user identifiers is entered by the individual via a mobile device.
  5. 5. The method of claim 4 wherein at least one of the following steps is performed by the mobile device: verifying that an individual is an authorised person who is permitted to enter the secured area based on the one or more first user identifiers or verifying that the individual is an authorised person who is permitted to enter the secured area based on the one or more second user identifiers.
  6. 6. The method according to any of the preceding claims 15 further comprising detecting for the presence of the mobile device in the proximity of the first access terminal and/or second access terminal.
  7. 7. The method according to any of the preceding claims further comprising determining based on sensor data collected by a sensor system for detecting when a person passes through the first gantry, the number of persons who passed through the first gantry when the first gantry was in the release state.
  8. 8. The method according to claim. 7 further comprising triggering an alarm when the number of persons who have passed through the first gantry when the first gantry was in the release state is more than one.
  9. 9. The method according to claim 7 wherein the step of verifying that the individual is an authorised person based on the one or more second user identifiers entered is executed in response to the number of persons who have passed through the first gantry when the first gantry was in the release state being one.
  10. 10. The method according to any of the preceding claim wherein the safe entry criteria further comprises requiring the number of persons who have passed through the first gantry when the first gantry was in the release state to be one.
  11. 11. A security system for controlling access to a secured 10 area that is accessible by passing through at least a first and a second gantry, the security system comprising: a first access terminal operable to switch the first gantry between a secured state and a release state, the first access terminal being configured to switch the first gantry from the secured to the release state in response to an individual being authenticated as an authorised person based on one or more first user identifiers entered when the individual is in the proximity of the first access terminal; a second access terminal operable to switch the second gantry between the secured state and the release state, the second access terminal configured to determine if a safe entry criteria is met and in response to the safe criteria being met switch the second gantry from the secured to the release state, wherein the safe criteria comprises: the individual being authenticated as an authorised person based on one or more second user identifiers; and the first gantry being in a secured state.
  12. 12. The security system according to claim 11, wherein the 30 first and second access terminals are the same device.
  13. 13. The security system according to any of claims 11-12 wherein the first and second access terminals are configured to allow the individual to enter the one or more first or 35 second user identifiers via a mobile device.
  14. 14. The security system according to any of claims 11-13, wherein the second access terminal is configured to communicate with a sensor system for detecting when a person passes through the first gantry.
  15. 15. The security system according to claim 14 wherein the second access terminal is configured to determine the number of persons who have passed through the first gantry when the first gantry was in the release state based on sensor data from the sensor system.
  16. 16. The security system according to claim 15 wherein the safe entry criteria further comprises requiring only one person to have passed through the first gantry when the first gantry 15 is in the release state.
GB1900846.5A 2019-01-22 2019-01-22 Methods and systems for controlling access to a secured area Withdrawn GB2580896A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
GB1900846.5A GB2580896A (en) 2019-01-22 2019-01-22 Methods and systems for controlling access to a secured area

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
GB1900846.5A GB2580896A (en) 2019-01-22 2019-01-22 Methods and systems for controlling access to a secured area

Publications (2)

Publication Number Publication Date
GB201900846D0 GB201900846D0 (en) 2019-03-13
GB2580896A true GB2580896A (en) 2020-08-05

Family

ID=65655897

Family Applications (1)

Application Number Title Priority Date Filing Date
GB1900846.5A Withdrawn GB2580896A (en) 2019-01-22 2019-01-22 Methods and systems for controlling access to a secured area

Country Status (1)

Country Link
GB (1) GB2580896A (en)

Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5325084A (en) * 1992-04-08 1994-06-28 R. E. Timm & Associates Secure area ingress/egress control system
US20110277518A1 (en) * 2009-01-07 2011-11-17 Lothar Lais Apparatus for a checkpoint
US20150221151A1 (en) * 2014-02-04 2015-08-06 Secure Gravity Inc. Methods and systems configured to detect and guarantee identity for the purpose of data protection and access control
US20160012655A1 (en) * 2014-07-10 2016-01-14 Bank Of America Corporation Accessing Secure Areas Based on Identification via Personal Device
US20160180620A1 (en) * 2014-12-23 2016-06-23 Vivint, Inc. Smart door lock
WO2018007774A1 (en) * 2016-07-06 2018-01-11 EdgeConneX, Inc. System for virtualizing and centralizing the security guard functions of authorization and authentication of entrants at unmanned sites
US20180101671A1 (en) * 2006-08-09 2018-04-12 Assa Abloy Ab Method and Apparatus for Making a Decision on a Card
US9967750B1 (en) * 2016-07-28 2018-05-08 United Services Automobile Association (Usaa) Location verification based on environmental sensor data

Patent Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5325084A (en) * 1992-04-08 1994-06-28 R. E. Timm & Associates Secure area ingress/egress control system
US20180101671A1 (en) * 2006-08-09 2018-04-12 Assa Abloy Ab Method and Apparatus for Making a Decision on a Card
US20110277518A1 (en) * 2009-01-07 2011-11-17 Lothar Lais Apparatus for a checkpoint
US20150221151A1 (en) * 2014-02-04 2015-08-06 Secure Gravity Inc. Methods and systems configured to detect and guarantee identity for the purpose of data protection and access control
US20160012655A1 (en) * 2014-07-10 2016-01-14 Bank Of America Corporation Accessing Secure Areas Based on Identification via Personal Device
US20160180620A1 (en) * 2014-12-23 2016-06-23 Vivint, Inc. Smart door lock
WO2018007774A1 (en) * 2016-07-06 2018-01-11 EdgeConneX, Inc. System for virtualizing and centralizing the security guard functions of authorization and authentication of entrants at unmanned sites
US9967750B1 (en) * 2016-07-28 2018-05-08 United Services Automobile Association (Usaa) Location verification based on environmental sensor data

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
BoonEdamInc, 5 June 2018, "New Circlelock Portal Converts Fire-Rated Swinging Doors into Mantrap Solutions", youtube.com, [online], Available from: https://www.youtube.com/watch?v=oqJnUFfH4SI *

Also Published As

Publication number Publication date
GB201900846D0 (en) 2019-03-13

Similar Documents

Publication Publication Date Title
CN107018124B (en) Remote application for controlling access
JP7216101B2 (en) Access control system and access control method using the same
US20160378961A1 (en) Security system, apparatus and method using additional code
EP3105699B1 (en) Method and apparatus for authenticating security system users and unlocking selected feature sets
US20150339870A1 (en) Dual Access Level Security System and Method
KR101570601B1 (en) An access control method using the mobile device
US11145151B2 (en) Frictionless access control system for a building
JP2011048547A (en) Abnormal-behavior detecting device, monitoring system, and abnormal-behavior detecting method
WO2018102985A1 (en) Method, device, and server for security verification
WO2020096969A1 (en) System and apparatus for a home security system
KR20120103827A (en) System and method for controlling door lock
KR101765080B1 (en) smart door lock system based on iot and the method thereof
CN111698215A (en) Security prevention and control method, device and system based on biological feature recognition
EP3896938B1 (en) Systems and methods for access control using multi-factor validation
CA3148185A1 (en) Multi-factor authentication using confidant verification of user identity
KR20180048133A (en) Method and apparatus for controlling a door opening using a portable terminal
KR102473183B1 (en) Access control system and access control method using the same
US20130038448A1 (en) Access Control System
US11961349B1 (en) Biometric authentication for security sensor bypass
GB2580896A (en) Methods and systems for controlling access to a secured area
CN106250724A (en) A kind of application control method, device and mobile device
KR101063751B1 (en) Biometrics-based Passenger Identification and Information Transmission System
KR101746750B1 (en) Digital doorlock and control method thereof
TWI729657B (en) Security system
KR101561421B1 (en) Security system, apparatus, and method using supplemental code

Legal Events

Date Code Title Description
WAP Application withdrawn, taken to be withdrawn or refused ** after publication under section 16(1)