GB2596187A - Access control system - Google Patents

Access control system Download PDF

Info

Publication number
GB2596187A
GB2596187A GB2105469.7A GB202105469A GB2596187A GB 2596187 A GB2596187 A GB 2596187A GB 202105469 A GB202105469 A GB 202105469A GB 2596187 A GB2596187 A GB 2596187A
Authority
GB
United Kingdom
Prior art keywords
access
access control
user
door
cloud
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
GB2105469.7A
Other versions
GB202105469D0 (en
Inventor
Kennedy Robert
George Cardno Ashley
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Red Security Solutions Ltd
Original Assignee
Red Security Solutions Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Red Security Solutions Ltd filed Critical Red Security Solutions Ltd
Publication of GB202105469D0 publication Critical patent/GB202105469D0/en
Publication of GB2596187A publication Critical patent/GB2596187A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/00174Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
    • G07C9/00563Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys using personal physical data of the operator, e.g. finger prints, retinal images, voicepatterns
    • GPHYSICS
    • G01MEASURING; TESTING
    • G01KMEASURING TEMPERATURE; MEASURING QUANTITY OF HEAT; THERMALLY-SENSITIVE ELEMENTS NOT OTHERWISE PROVIDED FOR
    • G01K13/00Thermometers specially adapted for specific purposes
    • AHUMAN NECESSITIES
    • A61MEDICAL OR VETERINARY SCIENCE; HYGIENE
    • A61BDIAGNOSIS; SURGERY; IDENTIFICATION
    • A61B5/00Measuring for diagnostic purposes; Identification of persons
    • A61B5/01Measuring temperature of body parts ; Diagnostic temperature sensing, e.g. for malignant or inflamed tissue
    • GPHYSICS
    • G01MEASURING; TESTING
    • G01JMEASUREMENT OF INTENSITY, VELOCITY, SPECTRAL CONTENT, POLARISATION, PHASE OR PULSE CHARACTERISTICS OF INFRARED, VISIBLE OR ULTRAVIOLET LIGHT; COLORIMETRY; RADIATION PYROMETRY
    • G01J5/00Radiation pyrometry, e.g. infrared or optical thermometry
    • G01J5/0022Radiation pyrometry, e.g. infrared or optical thermometry for sensing the radiation of moving bodies
    • G01J5/0025Living bodies
    • GPHYSICS
    • G01MEASURING; TESTING
    • G01JMEASUREMENT OF INTENSITY, VELOCITY, SPECTRAL CONTENT, POLARISATION, PHASE OR PULSE CHARACTERISTICS OF INFRARED, VISIBLE OR ULTRAVIOLET LIGHT; COLORIMETRY; RADIATION PYROMETRY
    • G01J5/00Radiation pyrometry, e.g. infrared or optical thermometry
    • G01J5/02Constructional details
    • G01J5/04Casings
    • GPHYSICS
    • G01MEASURING; TESTING
    • G01JMEASUREMENT OF INTENSITY, VELOCITY, SPECTRAL CONTENT, POLARISATION, PHASE OR PULSE CHARACTERISTICS OF INFRARED, VISIBLE OR ULTRAVIOLET LIGHT; COLORIMETRY; RADIATION PYROMETRY
    • G01J5/00Radiation pyrometry, e.g. infrared or optical thermometry
    • G01J5/02Constructional details
    • G01J5/04Casings
    • G01J5/041Mountings in enclosures or in a particular environment
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/32User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/20Individual registration on entry or exit involving the use of a pass
    • G07C9/22Individual registration on entry or exit involving the use of a pass in combination with an identity check of the pass holder
    • G07C9/25Individual registration on entry or exit involving the use of a pass in combination with an identity check of the pass holder using biometric data, e.g. fingerprints, iris scans or voice recognition
    • G07C9/257Individual registration on entry or exit involving the use of a pass in combination with an identity check of the pass holder using biometric data, e.g. fingerprints, iris scans or voice recognition electronically

Abstract

An access control system having an application to be downloaded to a mobile device of a user, one or more access control vestibules 100, a cloud server and database; each vestibule having at least a first door 120, second door 130, at least one internal area 110, and a processor. In response to the application detecting an access control tile 125 on or near the first door, a handshake message is sent to the cloud including the IMEI number of the mobile device. If access is allowed the processor initiates opening of the first door. On entering the internal area, the user is subject to an additional security check and a second handshake message is sent to the cloud in response to the application detecting an access control tile 115 in the internal area. If access is allowed the processor initiates opening of the second door, otherwise the processor initiates opening of the first door to allow the user to exit. The access control tile may include a QR code or NFC tag. Access may be refused if the GPS location of the mobile device does not match the GPS location of the tile.

Description

Access Control System
Background
Access control vestibules are used to control access between two or more physically separated areas.
Generally, access control vestibules serve to prevent unauthorised persons from entering an area. Whether or not a person is authorised may typically be determined 10 by a user swiping an ID card to gain access However, users may swap or confuse ID cards resulting in incorrect persons having access through an access control.
Further, in a site with multiple access control points, a user may have access to the site hut attempting to enter through the wrong vestibule. Entry to a site through an incorrect access point could result in a congestion within the access-controlled area.
There is a need for are more secure method of confirming that the correct user is entering an access-controlled area. There is also a need for a system that ensures that the correct user Is entering an access-controlled area at the right entrance point.
There is also a need to control the time users access a site and that, particularly on large sites, and project/enterprises which cover large geographic area to enable working time and time in restricted areas to be not only enforced but for users to be assisted in complying.
There is also a need in controlled work environments, in particular on rail networks, to integrate access control with signalling requirements for the efficient operation and improve safety.
Summary
The present invention in its various aspects is as set out in the appended claims.
The present invention provides: An access control system comprising an access control application configured to be downloaded onto a mobile device of a user, one or more access control vestibules, a 10 cloud server and a database stored in the cloud; a user's access details are stored against the IMEI number of the user's mobile device in the database; the one or more access control vestibules each comprise: at least a first door and a second door and at least one internal area; the internal area further comprising at least one additional security check; wherein the first door and second door are normally closed; a processor configured to communicate with the access control application via the cloud; and a plurality of access tiles, at least one access tile on or proximate to the first door on the exterior of the vestibule and at least one access tile on the internal area; the access control application configured to detect access control tiles and; in response to the detecting the access control tile on or proximate to the first door triggering the mobile device to send a first handshake message to the cloud; the first handshake message including at least the IMEI number of the mobile device; upon receiving the first handshake message, the cloud checks whether the access details stored against the IMEI number allow for access through access control vestibule; if access is allowed, the cloud sends a message to the processor to indicate that the first handshake was successful; upon receiving indication that the first handshake was successful, the processor initiates opening of the first door; if access is not allowed, the cloud sends a message to the application to indicate that the first handshake was unsuccessful; the access control vestibule further configured to subject the user to the additional security check once the user has entered the internal area; in response to the detecting the access control tile in the internal area, the access control application further configured to trigger the mobile device to send a second handshake message to the cloud; the second handshake message including at least the!MEI number of the mobile device; upon receiving the second handshake message, the cloud checks whether the access details stored against the IMEI number allow for access through access control vestibule; if access is allowed, the cloud sends a message to the processor to indicate that the second handshake was successful; if the processor receives indication that the second handshake was successful, and the user passed the at least one additional security check, the processor initiates opening of the second door to allow the user to pass through; if access is not allowed, the cloud sends a message to the processor to indicate that the second handshake was unsuccessful; if the processor receives indication that the second handshake was unsuccessful, or if the user fails the at least one additional security check; the processor initiates opening of the first door to allow the user to exit the access control vestibule.
Description
An access control system comprising an access control application configured to be downloaded onto a mobile device of a user, one or more access control vestibules and a database stored in the cloud.
A user's access details are stored against the IMEI number of the user's mobile device in the database.
The one or more access control vestibules each comprise at least a first door and a second door and at least one internal area; wherein the internal area further comprises at least one additional security check.
The access control vestibule may be configured to provide access between a first unregulated area and a second, access-controlled area. The first door may therefore provide for access between the first, unregulated area and the internal area of the vestibule with the second door providing access between the internal area of the vestibule and the second, access-controlled area.
The one or more access control vestibules each further comprise a processor configured to communicate with the access control application via the cloud. The one or more access control vestibules each further comprise a plurality of access tiles. At least one access tile on or proximate to the first door on the exterior of the vestibule and at least one access tile on the internal area.
The access control application configured to detect access control tiles and; in response to the detecting the access control tile on or proximate to the first door triggering the mobile device to send a first handshake message to the cloud; the first handshake message including at least the IMEI number of the mobile device. The access control application detects access tiles using one or more detection means of the mobile device, for example an NEC reader and or a camera. The fact that the application is configured to be downloaded onto a mobile device of a user allows the application to utilise the hardware of the user's mobile device to detect access tiles.
Upon receiving the first handshake message, the cloud checks whether the access details stored against the IMEI number allow for access through access control vestibule. If access is allowed, the cloud sends a message to the processor to indicate that the first handshake was successful. Upon receiving indication that the first handshake was successful, the processor initiates opening of the first door.
If access is not allowed, the cloud sends a message to the application to indicate that the first handshake was unsuccessful.
The access control vestibule is further configured to subject the user to the additional security check once the user has entered the internal area. In response to the detecting the access control tile in the internal area, the access control application further configured to trigger the mobile device to send a second handshake message to the cloud, the second handshake message including at least the IMEI number of the mobile device.
Upon receiving the second handshake message, the cloud checks whether the access details stored against the IMEI number allow for access through access control vestibule. If access is allowed, the cloud sends a message to the processor to indicate that the second handshake was successful; if the processor receives indication that the second handshake was successful, and the user passed the at least one additional security check, the processor initiates opening of the second door to allow the user to pass through.
If access is not allowed, the cloud sends a message to the processor to indicate that the second handshake was unsuccessful; if the processor receives indication that the second handshake was unsuccessful, or if the user fails the at least one additional security check; the processor initiates opening of the first door to allow the user to exit the access control vestibule.
This system is preferable over other access control systems as it is contactless, so reduces the need for swipes or key entry. This is more hygienic.
Further a user cannot pass on their credentials to another mobile device because the app links their details to the IMEI number of their mobile device. This prevents the equivalent of swapping ID cards.
The International Mobile Equipment Identity (IMEI) is a number, unique to a given physical mobile phone. This provides a direct link to a user as users rarely surrender their phones to others and even if they do then rarely with access details so that they could mimic use of the user's identity.
to In particular, in the present invention the IM El information is optionally combined with biometric information to further ensure that the user of the physical mobile phone is a specific individual. The combination of these features ensures that access permissions and location monitoring are specific to a particular individual with the benefit that the IMEI number enables the identity of the user to be preliminary early established at key points whilst for general information purposes and the issuing of warnings et cetera, such as at short notice, may be relied upon as an indicator of the identity of the user.
The mobile devices of the present invention may preferably be 3GPP and iDEN mobile phones.
In a further feature of the present invention the features of Global System for Mobile Communications (GSM) may can be combined with the IM El information so as to disable a mobile phone which is identified as being lost, stolen or otherwise incorrectly used in conjunction with the access control system of the present invention.
A further benefit of using the user's mobile device is that many mobile devices have biometric authentication. The biometric authentication may be by facial recognition, fingerprint scanning or voice recognition. This adds an extra layer of security that prevents a user from passing their mobile device to another user. The preferred method of identification is voice recognition, this is particular helpful in environments where users are required to wear protective hand were and facial coverings may also be present. Such an environment may be in a railway network. In a preferred feature the mobile phone is accessed by means of a Bluetooth enabled microphone in a facemask, (such as to prevent dust or other contamination). This has the further advantage that were such personal protective equipment is monetary then the access can only take place when those features are actively in place, such that the microphone may be used. Similarly, Bluetooth enabled headphones, such as noise protection headphones may also be used. By the system communicating with the mobile phone to Detective such Bluetooth enabled microphone/headphones are in place this simultaneously validates the presence of the required personal protective equipment.
The access tile may comprise a QR code. A OR code may be preferable as it can be read by any mobile device that has a camera. QR code reading is reliable and quick, therefor an access tile comprising a OR code is preferable in a situation where there are a high volume of users needing to move through the access control vestibule.
The access tile may comprise an NEC tag. NEC tag reading takes longer that OR code scanning but is more secure. Therefore, an access tile comprising an NEC tag is preferable in the situation where security is of the upmost importance.
One or more of the access tiles may be provided by a screen, the screen in communication with the processor of the vestibule. The screen may be configured to display a code, for example a QR code. Having the access tiles provided by screens allows the access tiles to be configurable. For example, if a vestibule is functioning as an exit from an access-controlled area, the access tile proximate may to the first door may be left blank to prevent users from entering the access-controlled area thorough the vestibule. The one or more access control vestibules may comprise means to detect its own GPS position. If the GPS location of the vestibule changes, the processor may cause the screens of the access control tiles of the vestibule to not show any code. This ensures that if the vestibule is moved, that the access tiles will need to be configured to prevent users with access to the previous location having access to the area that it the vestibule has moved to.
The cloud may store a list of users who have successfully passed through the access control vestibule and at what time they did so.
The access control system may further be configured such that the first and second handshake messages further includes the GPS location of the mobile device. In this case the GPS location of each access tile may be stored at the cloud and wherein access will only be granted if the GPS location of the mobile device matches the GPS location of the access tile. This adds a further layer of security as the correct mobile device associated with the IMEI number must be in the correct location along with the access tile. If the access tile had been moved, then access would not be granted.
The access control system may be configured such that only one of the first door and second door may be open at any given time. This is preferable as it prevents a user form passing through the internal area without registering the access tile of the internal area and being subject to the at last one additional security check. The first and second doors are preferably normally closed. When they are opened by the processor, they may remain open only for a predetermined amount of time before closing again.
As mentioned above, the access control vestibule may be configured to provide access between a first unregulated area and a second, access-controlled area. The first door may therefore provide for access between the first, unregulated area and the internal area of the vestibule with the second door providing access between the internal area of the vestibule and the second, access-controlled area.
The internal area may comprise a speaker configured to provide audio instruction to the user. The user may be instructed, for example to scan the access tile, face a camera, stand on a certain point on the floor, exit through one of the doors. In this case, the processor will be connected to the speaker and instruct the speaker to output the appropriate instruction to the user. This will ensure that access through the vestibule runs more smoothly. For example, if the user thought that they had scanned the access tile on the internal area but the scan had not been successful, the processor could use the speaker to repeat the instruction to scan the tile. Alternatively, or in addition to the speaker, the access control application may instruct the user as to what steps to take whilst moving through the access control vestibule. The access control application may deliver instruction through the speakers of the mobile device and/or it may display visual instructions on a display of the mobile device.
The internal area may comprise one or more cctv cameras connected to the processor; each of the one or more cctv cameras configured to provide live video of 10 the internal area. This enables the processor to analyse the one or more live video feeds to provide information on what is happening in the internal area.
The processor may be configured to determine from the live video of the internal area how many people are in the internal area; and if there is more than one person in the internal area, preventing the second door from opening. This prevents a user with access from taking a person without access through the vestibule with them. The processor may open the first door until one of the users has left. If the internal area has a speaker, the processor may use the speaker to instruct the people inside the internal area that only one person is allowed at a time and that all but one must leave. Alternatively, in a high security environment, the processor may prevent either door from opening and send an alert to the relevant persons such as a site manager, security. Alternatively, the processor may be configured to alert the authorities. Additionally, person counting allows for the processor to determine when a user has entered the internal area, the processor can use this information to determine when to close the first door behind the user. Similarly, after a user has passed the security checks and second handshake in the internal area and the second door has been opened, the processor can use the person counting functionality to determine when the user has left the internal area and therefore when to close the second door.
The processor may be configured to determine from the live video of the internal area whether there is a person down situation in the internal area, i.e., has the user collapsed or showing other signs of being in need of medical assistance. This protects lone workers. If a lone worker were to enter the vestibule and collapse, if there was no one else around, for example waiting for them on the other side or waiting to enter the vestibule after they had passed, it is conceivable that they could remain undetected for some time. By analysing the one or more live video feeds, the processor can detect a person down situation and send an alert to someone to come and provide assistance.
The internal area may comprise a thermal imaging camera and one of the at least one additional security check comprises a temperature check of the user. The thermal imaging camera is in communication with the processor, the processor configured to control the thermal imaging camera to estimate a body temperature of the user. If the temperature of the user outside of a threshold range, then the processor will prevent the user from leaving the vestibule through the second door. This will prevent unwell workers who have a temperature and may be contagious from entering the access-controlled area where they may infect other workers.
The internal area may comprise a camera. The camera may be configured to take one or more images of the user's face. In this case, one of the at least one additional security check may facial recognition. The camera is in communication with the processor, the processor may use facial recognition software to determine if the user in the internal area is the ser associated with the IMEI number of the mobile device.
In this case, the database may include facial data of the user stored against the IMEI number of the user's mobile device. After the user's mobile device has registered the access tile in the internal area and the second handshake message has been sent to the cloud, if the handshake is successful, the cloud may send the user's facial data to the processor for the processor to check the camera image against. In the case that there are one or more CCTV cameras present in the internal area, the camera may be in addition to any CCTV cameras. Alternatively, one of the one or more CCTV cameras may provide the processor with an image of the user's face. The facial data may include on or more photos of a user's face.
The internal area may comprise a microphone. In this case one of the at least one additional security checks is voice recognition. The microphone will be in communication with the processor. The user may be prompted to speak, either by the app or via a speaker in communication with the processor. In this case, the database may include voice data of the user stored against the IMEI number of the user's mobile device. After the user's mobile device has registered the access tile in the internal area and the second handshake message has been sent to the cloud, if the handshake is successful, the cloud may send the user's voice data to the processor for the processor to check the voice recorded by the microphone against.
The access control system of any preceding claim wherein a user's access details include at least a staff number, the access control vestibules they have access through and at what dates and times. The users access details may further include, as detailed above, any data required for the processor to undertake the at least one addition security check such as facial data or voice data.
Any combination of additional security checks is possible within the scope of the invention. For example, the at least one security check may include both facial recognition and a temperature check.
The access control vestibule may be configured with an access tile on the exterior of the vestibule on or proximate to the second door. This allows the vestibule to be run in reverse as a means of both entering and exiting an access-controlled area. If a user is exiting an access control area, it may be assumed that they had clearance to be in the area, i.e., that they entered the area through one of the one or more vestibules. The user may user their mobile device to register the access tile proximate to the second door. Upon registering the access tile, the access control application may send a message to the cloud indicating that a user is exiting the access-controlled area. In response, the cloud sends a message to the processor to open the second door. In response, the processor will open the second door to allow the user to enter the internal area, once the door has closed behind the user, the processor will open the first door to allow the user to exit the vestibule. This is preferable in that it allows for users to exit an access-controlled area quickly, reducing queues at the exit which could be a safety concern.
Alternatively, in the case where security is of greater concern and to eliminate the possibility of a person gaining access to the access controlled area without passing through the vestibule but leaving through a vestibule, the system may require that in response to the detecting the access control tile on or proximate to the second door, the access control application may trigger the mobile device to send a third handshake message to the cloud; the third handshake message including at least the IMEI number of the mobile device. Upon receiving the third handshake message, the cloud checks whether the access details stored against the IMEI number allow for access to the access-controlled area. If access is allowed, the cloud sends a message to the processor to indicate that the third handshake was successful. Upon receiving indication that the third handshake was successful, the processor initiates opening of the second door second door to allow the user to enter the internal area, once the door has closed behind the user, the processor will open the first door to allow the user to exit the vestibule.
It is preferable that, upon exiting the access control area through an access control vestibule, the cloud saves the time that the user left the access-controlled area. this can be used to ensure that the user does not re-enter before they have had adequate time for rest.
On the exterior of the access control vestibule, proximate to the first door there may be an indication of whether the vestibule is available for use. Said indication may be traffic light system with green indicating that the vestibule is free to use and red indicating that access to the vestibule is prohibited. Alternatively, or in addition, illuminated symbols or words may be used to indicate whether or not the vestibule is available. For example, tick or cross symbology or words such as "stop" and "go".
If the access control vestibule may also function as an exit the access control vestibule may comprise, proximate to the second door, an indication of whether the vestibule is available for use. Said indication may be traffic light system with green indicating that the vestibule is free to use and red indicating that access to the vestibule is prohibited. Alternatively, or in addition, illuminated symbols or words may be used to indicate whether or not the vestibule is available. For example, tick or cross symbology or words such as "stop" and "go". These are particularly valuable in environments where other forms of traffic lights are present and avoids confusion and so improves safety.
The access control system may include a plurality of access control vestibules. Said plurality of vestibules may be distributed around an access-controlled area to provide multiple access points. This is beneficial in the case of larger access-controlled areas where it will be safer and more efficient for users to enter at the entrance closest to where they will be working, rather than entering further away and then traveling through the access-controlled area.
There may also be a plurality of vestibules arranged side by side to provide multiple entrance and exit channels at a single location. In this case, it is preferable that the access control vestibules are configured with an access tile on the exterior of the vestibule on or proximate to the second door. This will allow for some of the vestibules to be designated as entrances and some as exits. The cloud may refuse any handshake messages from a mobile device that has scanned an access tile on or proximate to the second door if the vestibule is designated as entrance only.
Equally, the cloud may refuse any handshake messages from a mobile device that has scanned an access tile on or proximate to the first door if the vestibule is designated as exit only.
So that the designation is clear to the user, there may be an entrance/exit indicator proximate to the first door and an indicator proximate to the second door that will enable the user to determine if access is possible at that time. This indicator may be in addition to any indication of whether the vestibule is available for use. The entrance/exit indicator may for example be configured to display the word "entrance" when the vestibule is designated as an entrance, and to display the word "exit" when the vestibule is designated as an exit.
It is preferable that this designation can change throughout the day according to the needs of the access-controlled area, for example, in a row of 10 vestibules, at the start of a working day when more people will be entering the site than leaving it, 9 of the vestibules may be designated as entrance only with the remaining vestibule functioning as an exit. Equally at the end of the working day when more people are leaving the access-controlled area than entering it, 9 of the vestibules may be designated as exits with the remaining vestibule designated as an entrance.
When a user enters an access-controlled area through a vestibule, the cloud may store the time that the user entered the access-controlled area. Each user may be designated an allowed work time, this allowed work time may be stored in the database against their IMEI number.
The cloud may use the time that the user entered the access-controlled area and the allowed work time to compute a time by which the user must have exited the access-controlled area. If the user has not exited that access-controlled area by that point, the cloud may send a message to the mobile of the user telling them that they must leave. This message may be delivered to the mobile application. Alternatively, the message may be a text message, in this case, the mobile number of the user's mobile device must be stored in the database against the user's IMEI number.
The access control system may further comprise access tiles distributed throughout the access-controlled area. The user may be instructed to scan the access tile closest to where they are currently working using the access control application. Each of these tiles will be associated with a GPS location. In response to scanning the access control tile proximate to where the user is working, the access control application is configured to send a message to the cloud containing at least the IMEI zo number of the user's mobile device. The cloud will then store the location of the user as being the GPS location of the scanned access tile. The access control application may send the GPS location of the user's mobile device in addition to the IMEI number. The cloud can then verify that the mobile device location and the location of the tile match. If the locations do not correspond, withing a pre-set allowable margin for error, the cloud may alert a relevant person such as a site manager that the tile may have been moved or otherwise compromised. The cloud may use the stored location of the user to determine how long it will take the user to travel to an exit in order to exit the access-controlled area. the cloud may use this information to provide the user, via text message or the access control application, with an advance warning that they must set off now in order to leave the access-controlled area on time.
The cloud may revoke a user's access to the access-controlled area for a rest period once they have worked more than a pre-prescribed number of hours consecutively.
This will have the effect that once a user has finished a shift and left the access-controlled area, they will not be able to return to access-controlled area through any of the access control vestibules until enough rest time has elapsed.
S The access control system may comprise vestibules distributed across multiple access-controlled areas of access control areas.
In this case the cloud may calculate a minimum travel time between the time that the user left one access-controlled area and the time at which they attempt to access another access control area. The cloud may add this minimum travel time to the rest time to create a longer period in which the user will not be allowed access to any of the access-controlled areas served by the system. This prevents accidents that could arise due to tiredness if a user finished a shift at one area and then spent the rest time traveling to a different area to take another shift, arriving without being adequately rested.
The internal area of the one or more access control vestibules may further comprise cleaning means. To clean of the vestibule between users. The cleaning means may be either UV cleaning or a disinfectant spray.
One or more of the access control vestibules may comprise a third door. The third door providing an alternative entrance/exit to the first door, between the internal area and the unregulated area In the case that the access control vestibule comprises a third door, if the second handshake message is not successful and/or if the user fails the at least on additional security checks, the first door will remain closed and instead the processor will initiate opening of the third door to allow the user to exit the internal area. This configuration improves efficiency as if a user has to exit the way that they came they may have to navigate a queue of people waiting to enter the vestibule. The third door allows for a user who has not been allowed access to exit via a different path and not further impede the flow of users through the system. This setup is additionally further preferable in light of the COVID-19 pandemic. For example, if the at least one additional security check is a temperature check and it is determined that the user has an elevated temperature, it is possible that said user is contagious and therefore it is preferable that they exit the vestibule away from any users that may be queueing to enter it to reduce the possibility of transmission.
The internal area may be effectively be split into two internal areas by means of an internal door. In this case, the access control tile of the internal area, and any hardware required for the one or more additional security checks is in the internal area closest to the first door. in this case, if the second handshake is successful and if the user passes the at least on additional security check, then the processor will initiate opening of the internal door to allow the user to pass into the second internal 3.0 area.
Once the internal door has closed behind the user, the processor may initiate opening of the second door. Alternatively, there may be an access tile on or proximate to the second door within the internal area, the user may be required to scan said access tile using the access control application. In response to scanning said access tile, the access control application may trigger the mobile device to send a handshake message to the cloud; the handshake message including at least the IMEI number of the mobile device. Upon receiving the handshake message, the cloud checks whether the access details stored against the IMEI number allow for access to the access-controlled area. If access is allowed, the cloud sends a message to the processor to indicate that the handshake was successful. Upon receiving indication that the handshake was successful, the processor initiates opening of the second door second door to allow the user to exit the internal area It is preferable that all doors of the system are opened and without any requirement of physical input from the user. i.e., the processor controls the opening and closing of the doors by mechanical means rather than simply unlocking the doors for the user to open manually. This reduces the potential for contamination by removing the need for the user to touch the doors.
Railway Use In another aspect, an access control system for controlling access to a railway area is provided.
The railway area being proximate to railway tracks, the railway tracks being controlled by a rail signalling system, the rail signalling system in communication with the present invention.
The features of the invention disclosed earlier are also applicable to this aspect.
However, usage on railway networks provides a number of additional problems. In particular, line side staff are required to work in situations where the potential for death is real and imminent, whether it be from rail traffic, electrified railway lines, overhead electric cables or other physical injury. In this situation control of access to specific areas and at specific times is not only desirable but essential.
In this aspect an access control system comprising an access control application configured to be downloaded onto a mobile device of a user, one or more access control vestibules, a cloud server and a database stored in the cloud, as described earlier is provided.
A user's access details are stored against the IMEI number of the user's mobile device in the database.
The one or more access control vestibules each comprise at least a first door and a second door and at least one internal area; wherein the internal area further comprises at least one additional security check.
The access control vestibule is configured to provide access between a first unregulated area and a second, railway area. The first door may therefore provide for access between the first, unregulated area and the internal area of the vestibule with the second door providing access between the internal area of the vestibule and the second, railway area.
The cloud server is in communication with the signalling system of the railway track. This allows for the cloud server to determine whether it is safe to enter the rail area proximate to the access control vestibule, the rai area proximate to the access control vestibule may be an area of rail track that is associated with the access S control vestibule at the time of installation of the vestibule.
The one or more access control vestibules each further comprise a processor configured to communicate with the access control application via the cloud. The one or more access control vestibules each further comprise a plurality of access tiles.
At least one access tile on or proximate to the first door on the exterior of the vestibule and at least one access tile on the internal area.
The access control application is configured to detect access control tiles and; in response to the detecting the access control tile on or proximate to the first door triggering the mobile device to send a first handshake message to the cloud; the first handshake message including at least the!MEI number of the mobile device.
Upon receiving the first handshake message, the cloud checks whether the access details stored against the IMEI number allow for access through access control vestibule and determines from the rail signalling system whether there is a train imminent. If access is allowed and there is no train imminent, the cloud sends a message to the processor to indicate that the first handshake was successful. Upon receiving indication that the first handshake was successful, the processor initiates opening of the first door.
If access is not allowed, or if there is a train imminent the cloud sends a message to the application to indicate that the first handshake was unsuccessful. By removing access if a train is imminent, the safety of the user is ensured.
The access control vestibule is further configured to subject the user to the additional security check once the user has entered the internal area. In response to the detecting the access control tile in the internal area, the access control application further configured to trigger the mobile device to send a second handshake message to the cloud, the second handshake message including at least the IMEI number of the mobile device.
Upon receiving the second handshake message, the cloud checks whether the access details stored against the IMEI number allow for access through access control vestibule and determines from the rail signalling system whether there is a train imminent. If access is allowed and not trains are imminent, the cloud sends a message to the processor to indicate that the second handshake was successful; if the processor receives indication that the second handshake was successful, and the user passed the at least one additional security check, the processor initiates opening of the second door to allow the user to pass through.
If access is not allowed, or if a train is imminent, the cloud sends a message to the processor to indicate that the second handshake was unsuccessful; if the processor receives indication that the second handshake was unsuccessful, or if the user fails the at least one additional security check; the processor initiates opening of the first door to allow the user to exit the access control vestibule.
This system is preferable over other access control systems as it is contactless, so reduces the need for swipes or key entry. This is more hygienic.
Further a user cannot pass on their credentials to another mobile device because the app links their details to the IMEI number of their mobile device. This prevents the equivalent of swapping ID cards.
A further benefit of using the user's mobile device is that many mobile devices have biometric authentication such as facial recognition or fingerprint scanning. This adds an extra layer of security that prevents a user from passing their mobile device to another user.
In response to determining that a train is imminent, the cloud may send a message to the user's mobile device to alert the user or the imminent train. This indicates to the user that access may be prohibited because of imminent rail traffic as opposed to an issue with their access details.
The system may further include one or more access tiles each proximate to a work area of the rail area; each of said access tiles associated with a GPS location. A work area may be a geographical area where users are to undertake work. The entirety of the rail area served by the system may be designated into work areas with each work area having an access control tile associated therewith. Alternatively, the rail area may comprise one or more discrete work areas, with portions of rail area between the work areas being unassigned.
The cloud may store a most recent location of the user, the most recent location being the GPS location of the access tile that the mobile device most recently registered; and wherein the cloud compares this location to data from the rail signalling system to determine if a train is approaching the user's location; In response to the cloud a determination that a train is approaching the user's location the cloud configured to send a message to the user's mobile device to alert them of an imminent train.
Alternatively, the cloud may continuously monitor the GPS location of the user's mobile device whilst the user is in the rail area and compares this location to data from the rail signalling system to determine if a train is approaching the user's location; In response to the cloud a determination that a train is approaching the user's location the cloud is configured to send a message to the user's mobile device to alert the user of an imminent train.
The access tile may comprise a OR code. A OR code may be preferable as it can be read by any mobile device that has a camera. OR code reading is reliable and quick, therefor an access tile comprising a OR code is preferable in a situation where there are a high volume of users needing to move through the access control vestibule The access tile may comprise an NEC tag. NEC tag reading takes longer that OR code scanning but is more secure. Therefore, an access tile comprising an NFC tag is preferable in the situation where security is of the upmost importance.
The cloud may store a list of users who have successfully passed through the access control vestibule and at what time they did so.
The access control system may further be configured such that the first and second handshake messages further includes the GPS location of the mobile device. In this case the GPS location of each access tile may be stored at the cloud and wherein access will only be granted if the GPS location of the mobile device matches the GPS location of the access tile. This adds a further layer of security as the correct mobile device associated with the IMEI number must be in the correct location along with the access tile. If the access tile had been moved, then access would not be granted.
The access control system may be configured such that only one of the first door and second door may be open at any given time. This is preferable as it prevents a user form passing through the internal area without registering the access tile of the internal area and being subject to the at last one additional security check. The first and second doors are preferably normally closed. When they are opened by the processor, they may remain open only for a predetermined amount of time before closing again.
The internal area may comprise a speaker configured to provide audio instruction to the user. The user may be instructed, for example to scan the access tile, face a camera, stand on a certain point on the floor, exit through one of the doors. In this case, the processor will be connected to the speaker and instruct the speaker to output the appropriate instruction to the user. This will ensure that access through the vestibule runs more smoothly. For example, if the user thought that they had scanned the access tile on the internal area but the scan had not been successful, the processor could use the speaker to repeat the instruction to scan the tile. Alternatively, or in addition to the speaker, the access control application may instruct the user as to what steps to take whilst moving through the access control vestibule. The access control application may deliver instruction through the speakers of the mobile device and/or it may display visual instructions on a display of the mobile device.
The internal area may comprise one or more cctv cameras connected to the processor; each of the one or more cctv cameras configured to provide live video of the internal area. This enables the processor to analyse the one or more live video feeds to provide information on what is happening in the internal area.
The processor may be configured to determine from the live video of the internal area how many people are in the internal area; and if there is more than one person in the internal area, preventing the second door from opening. This prevents a user with access from taking a person without access through the vestibule with them.
The processor may open the first door until one of the users has left. If the internal area has a speaker, the processor may use the speaker to instruct the people inside the internal area that only one person is allowed at a time and that all but one must leave. Alternatively, in a high security environment, the processor may prevent either door from opening and send an alert to the relevant persons such as a site manager, security. Alternatively, the processor may be configured to alert the authorities.
Additionally, person counting allows for the processor to determine when a user has entered the internal area, the processor can use this information to determine when to close the first door behind the user. Similarly, after a user has passed the security checks and second handshake in the internal area and the second door has been opened, the processor can use the person counting functionality to determine when the user has left the internal area and therefore when to close the second door.
The processor may be configured to determine from the live video of the internal area whether there is a person down situation in the internal area, i.e., has the user collapsed or showed other signs of being in need of medical assistance. This protects lone workers. If a lone worker were to enter the vestibule and collapse, if there was no one else around, for example waiting for them on the other side or waiting to enter the vestibule after they had passed, it is conceivable that they could remain undetected for some time. By analysing the one or more live video feeds, the processor can detect a person down situation and send an alert to someone to come and provide assistance.
The internal area may comprise a thermal imaging camera and one of the at least one additional security check comprises a temperature check of the user. The thermal imaging camera is in communication with the processor, the processor configured to control the thermal imaging camera to estimate a body temperature of the user. If the temperature of the user outside of a threshold range then the processor will prevent the user from leaving the vestibule through the second door. This will prevent unwell workers who have a temperature and may be contagious from entering the rail area where they may infect other workers.
The internal area may comprise a camera. The camera may be configured to take one or more images of the user's face. In this case, one of the at least one additional security check may facial recognition. The camera is in communication with the processor, the processor may use facial recognition software to determine if the user in the internal area is the ser associated with the IMEI number of the mobile device. In this case, the database may include facial data of the user stored against the IMEI number of the user's mobile device. After the user's mobile device has registered the access tile in the internal area and the second handshake message has been sent to the cloud, if the handshake is successful, the cloud may send the user's facial data to the processor for the processor to check the camera image against. In the case that there are one or more cctv cameras present in the internal area, the camera may be in addition to any CCTV cameras. Alternatively, one of the one or more CCTV cameras may provide the processor with an image of the user's face. The facial data may include on or more photos of a user's face.
The internal area may comprise a microphone. In this case one of the at least one additional security checks is voice recognition. The microphone will be in communication with the processor. The user may be prompted to speak, either by the app or via a speaker in communication with the processor. In this case, the database may include voice data of the user stored against the IMEI number of the user's mobile device. After the user's mobile device has registered the access tile in the internal area and the second handshake message has been sent to the cloud, if the handshake is successful, the cloud may send the user's voice data to the processor for the processor to check the voice recorded by the microphone against.
The access control system of any preceding claim wherein a user's access details include at least a staff number, the access control vestibules they have access through and at what dates and times. The users access details may further include, as detailed above, any data required for the processor to undertake the at least one addition security check such as facial data or voice data.
Any combination of additional security checks is possible within the scope of the invention. For example, the at least one security check may include both facial recognition and a temperature check.
The access control vestibule may be configured with an access tile on the exterior of the vestibule on or proximate to the second door. This allows the vestibule to be run in reverse as a means of both entering and exiting a railway area. If a user is exiting an access control area, it may be assumed that they had clearance to be in the area, i.e., that they entered the area through one of the one or more vestibules. The user may user their mobile device to register the access tile proximate to the second door.
Upon registering the access tile, the access control application may send a message to the cloud indicating that a user is exiting the rail area. In response, the cloud sends a message to the processor to open the second door. In response, the processor will open the second door to allow the user to enter the internal area, once the door has closed behind the user, the processor will open the first door to allow the user to exit the vestibule. This is preferable in that it allows for users to exit a rail area quickly, reducing queues at the exit which could be a safety concern.
Alternatively, in the case where security is of greater concern and to eliminate the possibility of a person gaining access to the railway area without passing through the vestibule but leaving through a vestibule, the system may require that in response to the detecting the access control tile on or proximate to the second door, the access control application may trigger the mobile device to send a third handshake message to the cloud; the third handshake message including at least the IMEI number of the mobile device. Upon receiving the third handshake message, the cloud checks whether the access details stored against the IMEI number allow for access to the railway area. If access is allowed, the cloud sends a message to the processor to indicate that the third handshake was successful. Upon receiving indication that the third handshake was successful, the processor initiates opening of the second door second door to allow the user to enter the internal area, once the door has closed behind the user, the processor will open the first door to allow the user to exit the vestibule.
It is preferable that, upon exiting the access control area through an access control vestibule, the cloud saves the time that the user left the railway area. this can be used to ensure that the user does not re-enter before they have had adequate time for rest.
On the exterior of the access control vestibule, proximate to the first door there may be an indication of whether the vestibule is available for use. The indication of whether the vestibule is available for use is preferably provided in black and white so as to comply with regulations that prohibit the use of coloured lights for anything other than signalling close to a rail track. To improve visibility/readability, it is preferable that illuminated symbols or words are used to provide the indication, the illumination being provided with white light. If there is a train imminent in a railway area served by the access control vestibule, it is preferable that the indication proximate to the first door will indicate that the vestibule is not available for use to prevent a user from accessing the railway area when a train is imminent, thereby reducing risk to the user.
If the access control vestibule may also function as an exit the access control vestibule may comprise, proximate to the second door, an indication of whether the vestibule is available for use. The indication of whether the vestibule is available for use is preferably provided in black and white so as to comply with standards that prohibit the use of coloured lights for anything other than signalling close to a rail track. To improve visibility/readability, it is preferable that illuminated symbols or words are used to provide the indication, the illumination being provided with white light. For example, tick or cross symbology or words such as "stop" and "go".
The access control system may include a plurality of access control vestibules. Said plurality of vestibules may be distributed about a rail network to provide multiple access points to the rail area. This is beneficial as rail networks span over a large area and it is safer and more efficient for users to enter the rail area at the entrance closest to where they will be working, rather than entering further away and then traveling close to the track.
There may also be a plurality of vestibules arranged side by side to provide multiple entrance and exit channels at a single location. In this case, it is preferable that the access control vestibules are configured with an access tile on the exterior of the vestibule on or proximate to the second door. This will allow for some of the vestibules to be designated as entrances and some as exits. The cloud may refuse any handshake messages from a mobile device that has scanned an access tile on or proximate to the second door if the vestibule is designated as entrance only.
Equally, the cloud may refuse any handshake messages from a mobile device that has scanned an access tile on or proximate to the first door if the vestibule is designated as exit only.
So that the designation is clear to the user, there may be an entrance/exit indicator proximate to the first door and an indicator proximate to the second door that will enable the user to determine if access is possible at that time. This indicator may be in addition to any indication of whether the vestibule is available for use. The entrance/exit indicator may for example be configured to display the word "entrance" when the vestibule is designated as an entrance, and to display the word "exit" when the vestibule is designated as an exit. Again, to comply with regulations the indication is preferably provided in black and white and further preferably provided by illuminated symbols or words, the illumination being provided with white light.
It is preferable that this designation can change throughout the day according to the needs of the site, for example, in a row of 10 vestibules, at the start of a working day when more people will be entering the railway area than leaving it, 9 of the vestibules may be designated as entrance only with the remaining vestibule functioning as an exit. Equally at the end of the working day when more people are leaving the railway area than entering it, 9 of the vestibules may be designated as exits with the remaining vestibule designated as an entrance.
When a user enters a railway area through a vestibule, the cloud may store the time that the user entered the railway area. Each user may be designated an allowed work time, this allowed work time may be stored in the database against their IMEI number.
The cloud may use the time that the user entered the railway area and the allowed work time to compute a time by which the user must have exited the railway area. If the user has not exited that railway area by that point, the cloud may send a message to the mobile of the user telling them that they must leave. This message may be delivered to the mobile application. Alternatively, the message may be a text message, in this case, the mobile number of the user's mobile device must be stored in the database against the user's IMEI number.
The access control system may further comprise access tiles distributed throughout the railway area. The user may be instructed to scan the access tile closest to where they are currently working using the access control application. Each of these tiles will be associated with a GPS location. In response to scanning the access control tile proximate to where the user is working, the access control application is configured to send a message to the cloud containing at least the IMEI number of the user's mobile device. The cloud will then store the location of the user as being the GPS location of the scanned access tile. The access control application may zo send the GPS location of the user's mobile device in addition to the IMEI number.
The cloud can then verify that the mobile device location and the location of the tile match. If the locations do not correspond, withing a pre-set allowable margin for error, the cloud may alert a relevant person such as a site manager that the tile may have been moved or otherwise compromised. The cloud may use the stored zs location of the user to determine how long it will take the user to travel to an exit in order to exit the railway area. the cloud may use this information to provide the user, via text message or the access control application, with an advance warning that they must set off now in order to leave the railway area on time.
The cloud may store a list of access tiles associated with the work to be carried out by a user against the IMEI number of the user's mobile device. Id the access control application of the user's mobile detects a tile, and sends a message to the clous as a result, if the tile is not associated with the work to be carried out by the user, the cloud may return a message to the application indicating to the user that they may be in the wrong location. This prevents a user from traveling within the rail area to somewhere that they shouldn't or do not need to be. The could may also send a message to the application comprising an indication of where the access tiles associated with the work to be carried out by the user are located.
The cloud may revoke a user's access to the railway area for a rest period once they have worked more than a pre-prescribed number of hours consecutively. This will have the effect that once a user has finished a shift and left the railway area, they will not be able to return to railway area through any of the access control vestibules until enough rest time has elapsed.
The access control system may comprise vestibules distributed across multiple railway areas of access control areas.
In this case the cloud may calculate a minimum travel time between the time that the user left one railway area and the time at which they attempt to access another access control area. The cloud may add this minimum travel time to the rest time to create a longer period in which the user will not be allowed access to any of the railway areas served by the system. This prevents accidents that could arris due to tiredness if a user finished a shift at one area and then spent the rest time traveling to a different area to take another shift, arriving without being adequately rested.
The internal area of the one or more access control vestibules may further comprise cleaning means. To clean of the vestibule between users. The cleaning means may be either UV cleaning or a disinfectant spray.
One or more of the access control vestibules may comprise a third door. The third door providing an alternative entrance/exit to the first door, between the internal area and the unregulated area.
In the case that the access control vestibule comprises a third door, if the second handshake message is not successful and/or if the user fails the at least on additional security checks, the first door will remain closed and instead the processor will initiate opening of the third door to allow the user to exit the internal area. This configuration improves efficiency as if a user has to exit the way that they came they may have to navigate a queue of people waiting to enter the vestibule. The third door allows for a user who has not been allowed access to exit via a different path and not further impede the flow of users through the system. This setup is additionally further preferable in light of the COVID-19 pandemic. For example, if the at least one additional security check is a temperature check and it is determined that the user has an elevated temperature, it is possible that said user is contagious and therefore it is preferable that they exit the vestibule away from any users that may be queueing to enter it to reduce the possibility of transmission.
The internal area may be effectively be split into two internal areas by means of an internal door. In this case, the access control tile of the internal area, and any hardware required for the one or more additional security checks is in the internal area closest to the first door. in this case, if the second handshake is successful and if the user passes the at least on additional security check, then the processor will initiate opening of the internal door to allow the user to pass into the second internal area.
Once the internal door has closed behind the user, the processor may initiate opening of the second door. Alternatively, there may be an access tile on or proximate to the second door within the internal area, the user may be required to scan said access tile using the access control application. In response to scanning said access tile, the access control application may trigger the mobile device to send a handshake message to the cloud; the handshake message including at least the IMEI number of the mobile device. Upon receiving the handshake message, the cloud checks whether the access details stored against the IMEI number allow for access to the railway area and determines from the rail signalling system whether there is a train imminent. If access is allowed and no train is imminent, the cloud sends a message to the processor to indicate that the handshake was successful. Upon receiving indication that the handshake was successful, the processor initiates opening of the second door second door to allow the user to exit the internal area It is preferable that all doors of the system are opened and without any requirement of physical input from the user. i.e., the processor controls the opening and closing of the doors by mechanical means rather than simply unlocking the doors for the user to open manually. This reduces the potential for contamination by removing the need for the user to touch the doors.
In a preferred embodiment the access control system is linked to a signal control S network of the rail system. Modes of operation are as follows: In a first mode the location of the device possessing the IMEI number permitting access is monitored by means of its GPS or other training related signal location. When that signal indicates a geographic area in proximity to a rail movement, for example the movement of a railway train, the system is configured to alert the user of the device. The alert is preferably by means of a text message and/or automated telephone call. The message or the call may comprise information as to the time when the risk will be realised, for example an estimated time when a train will be passing the location of the device. This greatly improves safety. In particular the association between a specific user, a specific device in a specific threat enables high level of safety to be achieved.
In a second mode, particularly directed to accessing locations where a mobile phone signal or other signal is not available, for example in a railway tunnel, the application of the present invention on the device (the device being the aforementioned mobile phone) on detecting that a valid external signal is not available starts a timer to alert the user against a forecast event. Relevant forecast events may be one or more of, a train passing through the tunnel, a length of working time permitted within the tunnel and a length of time for a user to exit the tunnel in conjunction with the forecast event such that the system is configured to alert the user of the device respectively such that they can have sufficient time to take relevant evasive action. The alert is preferably by means of a text message and/or automated telephone call.
In a third mode, further directed to accessing locations where mobile phone signal or other signal is not available, but also (but less critically) with such a signal is available the application on the device is configured to measure the number of steps, as in footsteps, of the user so as to determine a distance moved by the user. This is particularly critical where a GPS signal and other location signals not available and a user may have travelled, for example into a tunnel, or over a narrow bridge, I need to retrace their steps ahead of a forecast event. The system is therefore configured in this instance to determine a distance of movement and an estimated time for the user to retrace their set steps to a safe area and include this in the calculation of a time for a prospective alert of a forecast event.
In a fourth mode, particularly relevant to railway level crossings were a member of the public, a user may download and implement the application on their mobile phone so as to permit access to the crossing, for example a locking mechanism of the crossing is released so as to permit the user movement. By linking with the mobile phone, the GPS, or similar locating system, position may be tracked such that failure of a user to clear the crossing ahead of a forecast event, such as the movement of a train pass the crossing, may trigger an alert to the user against a forecast event. Similarly in this mode on accessing the level crossing gate, the user may be advised as to the time window for undertaking the crossing ahead of the forecast event. This improves safety as the user then knows their margin of safety and can judge whether they are likely to be able to make the crossing in due time based upon the circumstances. Access to the crossing is preferably in the form of a vestibule and preferably by axing at another vestibule on the other side of the crossing.
The various modes of the invention may be used in combination, for example a device may be equipped to operate all modes or some modes.
Figures The present invention will now be illustrated by use of the following figures: Figure 1: a plan view of an example access control vestibule Figure 2: a plan view of an example access control vestibule Figure 3: a plan view of an example access control vestibule Figure 4: a plan view of a plurality of access control vestibules The present invention will be described in terms of the following features: 100-Access control vestibule 110-internal area 115-Access tile in internal area 120-first door 125-Access tile proximate to the first door 130-second door 135-Access tile proximate to the second door 140-third door 150-first internal area 160-second internal area 170-internal door 200-unrestricted area 250-Access controlled area Figure 1 illustrates an access control vestibule 100 that provides controlled access between an unrestricted area 200 and an access-controlled area 250. The access control vestibule 100 comprises a first door 120 and a second door 130. The first door 120 provides access between an internal area 110 of the vestibule 100 and unrestricted area 200. The second door130 provides access between the internal area 110 and the access-controlled area 250. The access control vestibule further comprises and access tile proximate to the first door, 125, an access tile proximate zo to the second door 135 and an access tile 115 in the internal area 110.
Figure 2 illustrates an access control vestibule 100 that provides controlled access between an unrestricted area 200 and an access-controlled area 250. The access control vestibule 100 comprises a first door 120, a second door 130 and internal door 170. The first door 120 provides access between a first internal area 150 of the vestibule 100 and unrestricted area 200. The second door130 provides access between a second internal area 160 and the access-controlled area 250. The internal door 170 provides access between the first internal area 150 and the second internal area 160. The access control vestibule further comprises and access tile proximate to the first door, 125, an access tile proximate to the second door 135 and an access tile 115 in the first internal area 150.
Figure 3 illustrates an access control vestibule 100 that provides controlled access between an unrestricted area 200 and an access-controlled area 250. The access control vestibule 100 comprises a first door 120, a second door 130, a third door 14o and internal door 170. The first door 120 and third door 120 provide access between a first internal area 150 of the vestibule 100 and unrestricted area 200. The second door130 provides access between a second internal area 160 and the access-controlled area 250. The internal door 170 provides access between the first internal area 150 and the second internal area 160. The access control vestibule further comprises and access tile proximate to the first door, 125, an access tile proximate to the second door 135 and an access tile 115 in the first internal area 150.
Figure 4 illustrates an array of access control vestibules 100. The array is pictured provided as part of a single continuous unit.

Claims (15)

  1. Claims 1. An access control system comprising an access control application configured to be downloaded onto a mobile device of a user, one or more access control vestibules, a cloud server and a database stored in the cloud; a user's access details are stored against the IMEI number of the user's mobile device in the database; the one or more access control vestibules each comprise: at least a first door and a second door and at least one internal area; the internal area further comprising at least one additional security check; wherein the first door and second door are normally closed; a processor configured to communicate with the access control application via the cloud; and a plurality of access tiles, at least one access tile on or proximate to the first door on the exterior of the vestibule and at least one access the on the internal area; the access control application configured to detect access control tiles and; in response to the detecting the access control tile on or proximate to the first door triggering the mobile device to send a first handshake message to the cloud; the first handshake message including at least the IMEI number of the mobile device; upon receiving the first handshake message, the cloud checks whether the access details stored against the IMEI number allow for access through access control vestibule; if access is allowed, the cloud sends a message to the processor to indicate that the first handshake was successful; upon receiving indication that the first handshake was successful, the processor initiates opening of the first door; if access is not allowed, the cloud sends a message to the application to indicate that the first handshake was unsuccessful; the access control vestibule further configured to subject the user to the additional security check once the user has entered the internal area; in response to the detecting the access control tile in the internal area, the access control application further configured to trigger the mobile device to send a second handshake message to the cloud; the second handshake message including at least the IMEI number of the mobile device; upon receiving the second handshake message, the cloud checks whether the access details stored against the IMEI number allow for access through access control vestibule; if access is allowed, the cloud sends a message to the processor to indicate that the second handshake was successful; if the processor receives indication that the second handshake was successful, and the user passed the at least one additional security check, the processor initiates opening of the second door to allow the user to pass through; if access is not allowed, the cloud sends a message to the processor to indicate that the second handshake was unsuccessful; if the processor receives indication that the second handshake was unsuccessful, or if the user fails the at least one additional security check; the processor initiates opening of the first door to allow the user to exit the access control vestibule.
  2. 2. The access control system of claim 1 wherein the access tile comprises a OR code.
  3. 3. The access control system of claim 1 wherein the access tile comprises an NEC tag.
  4. 4. The access control system of any preceding claim wherein the cloud stores a list of users who have successfully passed through the access control vestibule and at what time they did so.
  5. 5.
  6. 6.
  7. 7.
  8. 8.
  9. 9.The access control system of any preceding claim wherein the first and second handshake messages further include the GPS location of the mobile device.The access control system of claim 5 wherein each the GPS location of each access tile is stored at the cloud and wherein access will only be granted if the GPS location of the mobile device matches the GPS location of the access tile.The access control system of any preceding claim wherein only one of the first door and second door may be open at any given time The access control area of any preceding claim wherein the internal area comprises a speaker configured to provide audio instruction to the user.The access control system of any preceding claim wherein the internal area comprises one or more cctv cameras connected to the processor; each of the one or more cctv cameras configured to provide live video of the internal area
  10. 10. The access control system of claim 9 wherein the processor is configured to determine from the live video of the internal area how many people are in the internal area; and if there is more than one person in the internal area, preventing the second door from opening.
  11. 11. The access control system of claim 9 or 10 wherein the processor is configured to determine from the live video of the internal area whether there is a man down situation in the internal area.
  12. 12. The access control system of any preceding claim wherein the internal area further comprises a thermal imaging camera and the at least one additional security check comprises a temperature check of the user.
  13. 13. The access control system of any preceding claim wherein the internal area further comprises a camera, and the at least one additional security check is facial recognition.
  14. 14. The access control system of any preceding claim wherein the internal area further comprises a microphone and the additional security check is voice recognition
  15. 15. The access control system of any preceding claim wherein a user's access details include at least a staff number, the access control vestibules they have access through and at what dates and times.
GB2105469.7A 2020-06-18 2021-04-16 Access control system Pending GB2596187A (en)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
GB2009308.4A GB2597052A (en) 2020-06-18 2020-06-18 Temperature sensor and assembly
GBGB2101313.1A GB202101313D0 (en) 2020-06-18 2021-01-29 An access control system and vestibule

Publications (2)

Publication Number Publication Date
GB202105469D0 GB202105469D0 (en) 2021-06-02
GB2596187A true GB2596187A (en) 2021-12-22

Family

ID=71838352

Family Applications (5)

Application Number Title Priority Date Filing Date
GB2009308.4A Pending GB2597052A (en) 2020-06-18 2020-06-18 Temperature sensor and assembly
GBGB2101313.1A Ceased GB202101313D0 (en) 2020-06-18 2021-01-29 An access control system and vestibule
GB2105471.3A Pending GB2596189A (en) 2020-06-18 2021-04-16 Access control system for controlling access to a railway area
GB2105469.7A Pending GB2596187A (en) 2020-06-18 2021-04-16 Access control system
GB2105470.5A Pending GB2596188A (en) 2020-06-18 2021-04-16 An access control system and vestibule

Family Applications Before (3)

Application Number Title Priority Date Filing Date
GB2009308.4A Pending GB2597052A (en) 2020-06-18 2020-06-18 Temperature sensor and assembly
GBGB2101313.1A Ceased GB202101313D0 (en) 2020-06-18 2021-01-29 An access control system and vestibule
GB2105471.3A Pending GB2596189A (en) 2020-06-18 2021-04-16 Access control system for controlling access to a railway area

Family Applications After (1)

Application Number Title Priority Date Filing Date
GB2105470.5A Pending GB2596188A (en) 2020-06-18 2021-04-16 An access control system and vestibule

Country Status (1)

Country Link
GB (5) GB2597052A (en)

Family Cites Families (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20130116591A1 (en) * 2011-11-04 2013-05-09 Alan C. Heller Systems and devices for real time health status credentialing
CN110160670A (en) * 2019-05-05 2019-08-23 深圳中集智能科技有限公司 Body temperature detection device
CN111289110A (en) * 2020-02-14 2020-06-16 北京都是科技有限公司 Human body temperature detection method, system and device and thermal infrared image processor
CN111289117A (en) * 2020-03-24 2020-06-16 快住智能科技(苏州)有限公司 Equipment for measuring temperature based on face recognition and thermal imaging

Non-Patent Citations (2)

* Cited by examiner, † Cited by third party
Title
Red CCTV, 18 January 2021, "Halo Access A-Pod by Red CCTV", youtube.com, [online], Available from: https://www.youtube.com/watch?v=7gyHYQgkHf4, [Accessed 14 September 2021] *
Red CCTV, 19 January 2021, "Halo Access A-Pod Contactless Site Access Solution", youtube.com, [online], Available from: https://www.youtube.com/watch?v=CEZTnQ7ctdk, [Accessed 14 September 2021] *

Also Published As

Publication number Publication date
GB2596188A (en) 2021-12-22
GB202105470D0 (en) 2021-06-02
GB2597052A (en) 2022-01-19
GB202009308D0 (en) 2020-08-05
GB2596189A (en) 2021-12-22
GB202105469D0 (en) 2021-06-02
GB202105471D0 (en) 2021-06-02
GB202101313D0 (en) 2021-03-17

Similar Documents

Publication Publication Date Title
JP6565083B2 (en) Control and monitoring system and method for restricted area access
KR101549599B1 (en) Entrance Warning System of Restricted Areas Capable of Verification and Tracking Using Face Image Recognition and Tag Recognition
RU2404110C2 (en) Lift installation for lift users transportation around building territory
JP2017536587A5 (en)
US11749043B2 (en) Passive multi-factor access control with biometric and wireless capability
MX2012015034A (en) Elevator access control system.
JP2008065763A (en) Access management system in combination of biometrics authentication and robot apparatus, access management robot apparatus, and program for the same apparatus
CN113053012A (en) Wisdom community visitor management system
KR101521947B1 (en) Access and management system
ES2587027T3 (en) Access control device with at least one video unit
CN112203052A (en) Security protection monitoring platform
GB2596187A (en) Access control system
KR20150012904A (en) Access and management system
JP2007022776A (en) Security system for elevator
KR102220921B1 (en) Illegal ride detection system and method using irreversible function to protect privacy
JP4902141B2 (en) Monitoring system in a specific monitoring area
KR20210002827U (en) Open Smart Sorting Aisle System
KR102593555B1 (en) Track Access Control Server and System using the same
EP3179452B1 (en) System and method for controlling and monitoring access to restricted areas
US20120262269A1 (en) Method for monitoring a space accessible through a control door and control door
KR102634527B1 (en) Information and communication network protection system for apartment complexes
KR102580367B1 (en) Control method for the access control system for visitors to apartment house
KR102611113B1 (en) System and method for interlocking doors in a double door system
CN114863637B (en) Hotel security management system and method
CN114170717A (en) Door opening and closing monitoring terminal for isolation