WO2006102704A1 - Apparatus and method of controlling access to restricted areas - Google Patents
Apparatus and method of controlling access to restricted areas Download PDFInfo
- Publication number
- WO2006102704A1 WO2006102704A1 PCT/AU2006/000412 AU2006000412W WO2006102704A1 WO 2006102704 A1 WO2006102704 A1 WO 2006102704A1 AU 2006000412 W AU2006000412 W AU 2006000412W WO 2006102704 A1 WO2006102704 A1 WO 2006102704A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- signal
- radio frequency
- alarm
- generator
- motion detector
- Prior art date
Links
Classifications
-
- G—PHYSICS
- G08—SIGNALLING
- G08B—SIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
- G08B13/00—Burglar, theft or intruder alarms
- G08B13/22—Electrical actuation
- G08B13/24—Electrical actuation by interference with electromagnetic field distribution
- G08B13/2402—Electronic Article Surveillance [EAS], i.e. systems using tags for detecting removal of a tagged item from a secure area, e.g. tags for detecting shoplifting
- G08B13/2451—Specific applications combined with EAS
- G08B13/2454—Checking of authorisation of a person accessing tagged items in an EAS system
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07C—TIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
- G07C9/00—Individual registration on entry or exit
- G07C9/20—Individual registration on entry or exit involving the use of a pass
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07C—TIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
- G07C9/00—Individual registration on entry or exit
- G07C9/00174—Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
- G07C9/00944—Details of construction or manufacture
- G07C2009/0096—Electronic keys comprising a non-biometric sensor
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07C—TIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
- G07C9/00—Individual registration on entry or exit
Definitions
- the present invention relates to an apparatus and method for controlling access to restricted areas using a low cost security device.
- Security systems are often employed by organisations to restrict access to particular areas. These can be areas which contain sensitive information such as company mainframes or areas that pose a risk to life such as high voltage switchboards.
- these security systems comprise a motion detector connected to an alarm. When the motion detector is tripped by movement the alarm is activated. The alarm can be fitted with an audible siren and in many cases is also monitored by a security company.
- These types of security devices have limited usefulness and cannot be used to identify between an intruder and authorised personnel.
- RFID radio frequency identification
- Radio frequencies range from very low frequency (VLF), which has a range of 10 to 30 kHz, to extremely high frequency (EHF), which has a range of 30 to 300 GHz.
- VLF very low frequency
- EHF extremely high frequency
- RFID does not require contact or line-of-sight to operate, can function under a variety of environmental conditions, and provides a high level of data integrity.
- the technology is also difficult to counterfeit and therefore RFlD provides a high level of security.
- Radio frequency security systems typically includes a RF tag, a RF transceiver that generates the RF signals, and a reader that receives RF transmissions from a RF tag and passes the data to a host systems for processing.
- the RF tag can be in the form of passive tags that does not actively transmit or a transponder which actively transmit to a reader.
- Radio frequency identification acts in a similar manner to bar coding.
- the RF tag is programmed with data that identifies the person to which the tag is attached. If a RF tag is not present and the receiver does not receive a response then the alarm will be activated. In this way RFID security system can identify between an intruder and authorised personnel.
- RFID security system can identify between an intruder and authorised personnel.
- One of the limitations with this system is that radio waves must be transmitted from the transceiver constantly or at regular interval. This can increase the overall running costs of the security system and may also cause interference with other equipment.
- an apparatus for controlling access to restricted areas including: at least one detector adapted to sense motion; at least one generator that is configured to emit a signal when the motion detector sensors movement; a mobile device adapted to reflect the signal; at least one reader which receives the reflected signal from the mobile device; and at least one processor adapted to control the motion detector, generator and reader.
- the signal is a radio frequency signal.
- the apparatus includes an alarm which is activated in the event that the reader does not receive a reflected signal.
- the mobile device is a radio frequency tag.
- the radio frequency tag is passive and does not require a power source such as a battery.
- the radio frequency tag reflects or backscatters the signal emitted from the generator.
- the generator when activated it is adapted to emit a focused beam of radio waves.
- the detector, generator, reader and alarm are hard wired to the processor.
- the detector, generator, reader and alarm are wirelessly connected to the processor
- a method for controlling access to restricted areas including the steps of: activating a motion detector; when the motion detector senses a moving object within a specified physical space a signal generator is activated; the signal generator is configured to emit a signal; if a mobile device, adapted to reflect the signal, is present on the moving object the signal is reflected back to a reader and a processor recognises the object as authorised; if the mobile device, adapted to reflect the signal, is absent on the moving object the signal is not reflected back to the reader and the processor recognises the object as unauthorised and undertakes a predetermined task.
- the signal is a radio frequency signal.
- the predetermined task of the processor is the activation of an alarm.
- the alarm emits an audible sound.
- the alarm is a monitored alarm.
- the motion detector senses a moving object and the generator is activated
- the motion detector is deactivated.
- the processor recognises the object as authorised the motion detector is reactivated and the generator is deactivated.
- Figure 1 is a stylised flow chart of a security device embodying the present invention
- Figures 2a-2c is a stylised side view of the security device of Figure 1 during operation when an authorised person is present;
- Figures 3a-3c is a stylised side view of the security device of Figure 1 during operation when an intruder is present.
- a security unit 10 for controlling access to restricted areas including a motion detector 12, a radio frequency generator 14, a radio frequency reader 16, and a processor 18.
- the security unit 10 contains an alarm 20 as illustrated in Figure 1.
- the operation of the motion detector 12, radio frequency generator 14, radio frequency reader 16 and the alarm 20 are controlled by the processor 18.
- the components of the security unit 10 may all be contained within a single self contained apparatus the invention is not limited to this configuration. It may be desirable to have each of the components positioned in separate locations or in fact to have multiples of each component. This may be desirable where the area to be monitored in quite large or where it is desirable to protect parts of the security unit 10 from vandalism or tampering by unauthorised persons.
- the different components 12, 14, 16 and 20 may be hardwired or wirelessly connected to the processor 18.
- the alarm 20 is activated if the processor 18 determines that an intruder is present in the area of surveillance 22. It may also be desirable to configure the alarm 20 to be activated if tampering or vandalism of the security unit 10 occurs.
- the alarm 20 can be a monitored alarm or an alarm that emits an audible sound such as a siren. However, the skilled addressee should understand that the invention is not limited to these types of alarms.
- the security unit 10 may also be connected to a pre-exiting alarm system thereby minimising the cost of installation.
- the motion detector 12 is a passive infrared detector. During normal operation the motion detector 12 of the security unit 10 emits an infrared signal 24. If a moving object 26, such as a person, is present within the area of surveillance 22 a return signal 28 will be received by the motion detector 12. As a result the radio frequency generator 14 is activated. This activation can occur directly 30 between the detector 12 and the generator 14 or indirectly 32 via the processor 18.
- the security unit 10 may contain a single processor 18 as illustrated in Figure 1.
- the motion detector 12, the radio frequency generator 14 and the radio frequency reader 16 can each have a separate processor (not shown), in communication with each other, which controls their respective operation.
- the activated radio frequency generator 14 emits a focused radio frequency signal 34. If the individual 26 is authorised to be within the area of surveillance 22 monitored by the security unit 10 they will have been issued with a radio frequency or RF tag 36.
- the RF tag 36 is configured to reflect or backscatter the signal 34 emitted from the radio frequency generator 14 to the radio frequency reader 16.
- the RF tag 36 can be in the form of a passive tag that does not require a power source however it should be understood that the invention is not limited to use of a passive tag. If the radio frequency reader 16 receivers a signal 38 back from the RF tag 36 then the individual 26 is recognised as being authorised to be in that particular area 22. It is envisaged that the security unit 10 is configured so that the motion detector 12 remains inactive whilst the radio frequency generator 14 is operating. The motion detector 12 is then reactivated 40 when the individual 26 is recognised as being authorised.
- an alarm 20 is activated.
- the alarm 20 is activated by the processor 18 when it is determined 44 that the reader 16 has not received a signal 42.
- the radio frequency reader 16 could be configured to directly contact the alarm 20. It is envisaged that the alarm 20 emits an audible sound such as a siren when activated. It may also be desirable to have a monitored alarm which is in communication with a host security system (not shown). This may be important where it is imperative to detained or at least confirm the identity of the intruder or where an unauthorised person may require assistance, for example an Alzheimer patients in a hospital.
- Figures 2a-2c illustrate the situation when an authorised person 46 enters an area of surveillance 22 monitored by the security unit 10.
- the motion detector 12 contained within the security unit 10 emits an infrared signal 24.
- the motion detector 12 sensors the movement.
- the radio frequency generator 14 contained within the security unit 10 is then activated and the motion detector 12 is deactivated.
- the radio frequency generator 14 is configured to emit a focused radio frequency signal 34 as illustrated in Figure 2b.
- the authorised person 46 possesses a RF tag 36 which is configured to reflect or backscatter 38 the radio frequency signal 34 as illustrated in Figure 2c.
- the security unit 10 then recognises the individual 46 as authorised to be within the area of surveillance 22 monitored by the security unit 10. At a predetermined time thereafter the motion detector 12 is reactivated.
- Figures 3a-3c illustrate the situation when an intruder 48 enters an area of surveillance 22 monitored by the security unit 10.
- the motion detector 12 contained within the security unit 10 emits an infrared signal 24.
- the motion detector 12 sensors the movement.
- the radio frequency generator 14 contained within the security unit 10 is then activated and the motion detector 12 is deactivated.
- the radio frequency generator 14 is configured to emit a focused radio frequency signal 34 as illustrated in Figure 3b.
- the intruder 48 does not posses a RF tag 36 and therefore the signal 34 is not reflect.
- the processor 18 determines that the moving object is an intruder 48 and is not authorised to be within the restricted area 22. The processor 18 then activates an alarm 20.
- the alarm 20 is contained within the security unit 10 and when activated emits an audible sound 50 such as a siren. It should however be appreciated that the alarm 20 may be separate from the security unit 10. Furthermore, in particular circumstances it may be desirable to have an alarm that does not emit an audible sound but rather is configured to emit a signal to a monitoring system to covertly identify the presence of an intruder 48.
- the security unit 10 can be configured to utilise a pre-existing alarm system and may be integrated into a monitored alarm system where it is imperative to detained or at least confirm the identity of the unauthorised entry.
- the system would be useful in hospitals where patients such as those suffering from Alzheimer's disease may require assistance.
Landscapes
- Physics & Mathematics (AREA)
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- General Physics & Mathematics (AREA)
- Automation & Control Theory (AREA)
- Electromagnetism (AREA)
- Burglar Alarm Systems (AREA)
- Radar Systems Or Details Thereof (AREA)
Abstract
The present invention relates to an apparatus and method for controlling access to restricted areas (22) using a low cost security unit (10). The invention provides a cost effect and simple method of controlling access to restricted areas (22) by using a motion detector (12), radio frequency signal generator (14), radio frequency (RF) tag (36) adapted to reflect a signal (34) and a radio frequency signal receiver (16). When the motion detector (12) is tripped by movement of an object the radio frequency signal generator (14) is activated. If the object includes an RF tag (36) the system recognises the object as authorised. Alternatively, if no RF tag (36) is present an alarm (20) is activated. The use of a motion detector (12) lowers operation costs the security unit (10). Furthermore, expensive key pads and swipe card technology with associated infrastructure are not required. The security unit (10) can be configured to utilise a pre-existing alarm system and may be integrated into a monitored alarm system where it is imperative to detained or at least confirm the identity of any unauthorised entry.
Description
Apparatus and method of controlling access to restricted areas
The present invention relates to an apparatus and method for controlling access to restricted areas using a low cost security device.
BACKGROUND OF THE INVENTION
Security is an ever present concern in today's international climate. The protection of information, equipment and personnel are an issue that faces private companies and government agencies alike. The theft of equipment alone costs millions of dollars each year. Issues of legal responsible and indemnity also have to be taken into consideration. Therefore, companies and government agencies have to protect themselves from larceny and litigation brought against them by employees and non-employees.
Security systems are often employed by organisations to restrict access to particular areas. These can be areas which contain sensitive information such as company mainframes or areas that pose a risk to life such as high voltage switchboards. One of the simplest forms these security systems comprise a motion detector connected to an alarm. When the motion detector is tripped by movement the alarm is activated. The alarm can be fitted with an audible siren and in many cases is also monitored by a security company. These types of security devices have limited usefulness and cannot be used to identify between an intruder and authorised personnel.
Some security systems employ key pads or swipe cards to allow authorised personnel into a restricted area. Other more advanced security systems utilise radio frequency (RF) technology. RF technology is used in a variety of applications including television, radar, and automatic identification systems. The term RFID (radio frequency identification) has been coined to describe the use of radio frequency signals to provide automatic identification of items. RFID technology is used in applications such as the electronic collection of road tolls and access control.
Radio frequencies range from very low frequency (VLF), which has a range of 10 to 30 kHz, to extremely high frequency (EHF), which has a range of 30 to 300 GHz. The use of radio frequencies in security system has proved to be convenient, easy to use, and well suited for automatic operation. RFID does not require contact
or line-of-sight to operate, can function under a variety of environmental conditions, and provides a high level of data integrity. The technology is also difficult to counterfeit and therefore RFlD provides a high level of security.
Radio frequency security systems typically includes a RF tag, a RF transceiver that generates the RF signals, and a reader that receives RF transmissions from a RF tag and passes the data to a host systems for processing. The RF tag can be in the form of passive tags that does not actively transmit or a transponder which actively transmit to a reader.
Radio frequency identification acts in a similar manner to bar coding. The RF tag is programmed with data that identifies the person to which the tag is attached. If a RF tag is not present and the receiver does not receive a response then the alarm will be activated. In this way RFID security system can identify between an intruder and authorised personnel. One of the limitations with this system is that radio waves must be transmitted from the transceiver constantly or at regular interval. This can increase the overall running costs of the security system and may also cause interference with other equipment.
It is an object of the present invention to provide for a security device that overcomes at least some of the aforementioned problems or provides the public with a useful alternative.
It is yet a further object of the present invention to provide for a security device that is simple to use and has low operational costs.
SUMMARY OF THE INVENTION
Therefore in one form of the invention there is proposed an apparatus for controlling access to restricted areas including: at least one detector adapted to sense motion; at least one generator that is configured to emit a signal when the motion detector sensors movement; a mobile device adapted to reflect the signal; at least one reader which receives the reflected signal from the mobile device; and at least one processor adapted to control the motion detector, generator and reader.
Preferably, the signal is a radio frequency signal.
Preferably, the apparatus includes an alarm which is activated in the event that the reader does not receive a reflected signal.
Preferably, the mobile device is a radio frequency tag.
Preferably, the radio frequency tag is passive and does not require a power source such as a battery.
Preferably, the radio frequency tag reflects or backscatters the signal emitted from the generator.
Preferably, when the generator is activated it is adapted to emit a focused beam of radio waves.
Preferably, the detector, generator, reader and alarm are hard wired to the processor.
Preferably, the detector, generator, reader and alarm are wirelessly connected to the processor
In a further form of the invention there is proposed a method for controlling access to restricted areas including the steps of: activating a motion detector; when the motion detector senses a moving object within a specified physical space a signal generator is activated; the signal generator is configured to emit a signal; if a mobile device, adapted to reflect the signal, is present on the moving object the signal is reflected back to a reader and a processor recognises the object as authorised; if the mobile device, adapted to reflect the signal, is absent on the moving object the signal is not reflected back to the reader and the processor recognises the object as unauthorised and undertakes a predetermined task.
Preferably, the signal is a radio frequency signal.
Preferably, the predetermined task of the processor is the activation of an alarm.
Preferably, the alarm emits an audible sound.
Preferably, the alarm is a monitored alarm.
Preferably, in the event that the motion detector senses a moving object and the generator is activated, the motion detector is deactivated.
Preferably, at a predetermined time after the processor recognises the object as authorised the motion detector is reactivated and the generator is deactivated.
BRIEF DESCRIPTION OF THE DRAWINGS
The accompanying drawings, which are incorporated in and constitute a part of this specification, illustrate several implementations of the invention and, together with the description, serve to explain the advantages and principles of the invention. In the drawings,
Figure 1 is a stylised flow chart of a security device embodying the present invention;
Figures 2a-2c is a stylised side view of the security device of Figure 1 during operation when an authorised person is present; and
Figures 3a-3c is a stylised side view of the security device of Figure 1 during operation when an intruder is present.
DESCRIPTION OF THE PREFERRED EMBODIMENTS
The following detailed description of the invention refers to the accompanying drawings. Although the description includes exemplary embodiments, other embodiments are possible, and changes may be made to the embodiments described without departing from the spirit and scope of the invention. Wherever possible, the same reference numbers will be used throughout the drawings and the following description to refer to the same and like parts.
Illustrated in the figures is a security unit 10 for controlling access to restricted areas including a motion detector 12, a radio frequency generator 14, a radio frequency reader 16, and a processor 18. The security unit 10 contains an alarm 20 as illustrated in Figure 1. The operation of the motion detector 12, radio frequency generator 14, radio frequency reader 16 and the alarm 20 are controlled by the processor 18. It should be understood that although the components of the security
unit 10 may all be contained within a single self contained apparatus the invention is not limited to this configuration. It may be desirable to have each of the components positioned in separate locations or in fact to have multiples of each component. This may be desirable where the area to be monitored in quite large or where it is desirable to protect parts of the security unit 10 from vandalism or tampering by unauthorised persons. In such system the different components 12, 14, 16 and 20, may be hardwired or wirelessly connected to the processor 18. The alarm 20 is activated if the processor 18 determines that an intruder is present in the area of surveillance 22. It may also be desirable to configure the alarm 20 to be activated if tampering or vandalism of the security unit 10 occurs. The alarm 20 can be a monitored alarm or an alarm that emits an audible sound such as a siren. However, the skilled addressee should understand that the invention is not limited to these types of alarms. The security unit 10 may also be connected to a pre-exiting alarm system thereby minimising the cost of installation.
In a preferred embodiment, as illustrated in Figure 1 , the motion detector 12 is a passive infrared detector. During normal operation the motion detector 12 of the security unit 10 emits an infrared signal 24. If a moving object 26, such as a person, is present within the area of surveillance 22 a return signal 28 will be received by the motion detector 12. As a result the radio frequency generator 14 is activated. This activation can occur directly 30 between the detector 12 and the generator 14 or indirectly 32 via the processor 18. The security unit 10 may contain a single processor 18 as illustrated in Figure 1. Alternatively, the motion detector 12, the radio frequency generator 14 and the radio frequency reader 16 can each have a separate processor (not shown), in communication with each other, which controls their respective operation.
The activated radio frequency generator 14 emits a focused radio frequency signal 34. If the individual 26 is authorised to be within the area of surveillance 22 monitored by the security unit 10 they will have been issued with a radio frequency or RF tag 36. The RF tag 36 is configured to reflect or backscatter the signal 34 emitted from the radio frequency generator 14 to the radio frequency reader 16. The RF tag 36 can be in the form of a passive tag that does not require a power source however it should be understood that the invention is not limited to use of a passive tag. If the radio frequency reader 16 receivers a signal 38 back from the RF tag 36 then the individual 26 is recognised as being authorised to be in that particular area 22. It is
envisaged that the security unit 10 is configured so that the motion detector 12 remains inactive whilst the radio frequency generator 14 is operating. The motion detector 12 is then reactivated 40 when the individual 26 is recognised as being authorised.
If a signal is not received 42 by the RF reader 16 then an alarm 20 is activated. The alarm 20 is activated by the processor 18 when it is determined 44 that the reader 16 has not received a signal 42. The skilled addressee should however understand that the radio frequency reader 16 could be configured to directly contact the alarm 20. It is envisaged that the alarm 20 emits an audible sound such as a siren when activated. It may also be desirable to have a monitored alarm which is in communication with a host security system (not shown). This may be important where it is imperative to detained or at least confirm the identity of the intruder or where an unauthorised person may require assistance, for example an Alzheimer patients in a hospital.
To further illustrate the present invention Figures 2a-2c illustrate the situation when an authorised person 46 enters an area of surveillance 22 monitored by the security unit 10. The motion detector 12 contained within the security unit 10 emits an infrared signal 24. When the authorised person 46 enters the area of surveillance 22 monitored by the security unit 10 the motion detector 12 sensors the movement. The radio frequency generator 14 contained within the security unit 10 is then activated and the motion detector 12 is deactivated. The radio frequency generator 14 is configured to emit a focused radio frequency signal 34 as illustrated in Figure 2b. The authorised person 46 possesses a RF tag 36 which is configured to reflect or backscatter 38 the radio frequency signal 34 as illustrated in Figure 2c. The security unit 10 then recognises the individual 46 as authorised to be within the area of surveillance 22 monitored by the security unit 10. At a predetermined time thereafter the motion detector 12 is reactivated.
Figures 3a-3c illustrate the situation when an intruder 48 enters an area of surveillance 22 monitored by the security unit 10. The motion detector 12 contained within the security unit 10 emits an infrared signal 24. When the intruder 48 enters the area of surveillance 22 monitored by the security unit 10 the motion detector 12 sensors the movement. The radio frequency generator 14 contained within the security unit 10 is then activated and the motion detector 12 is deactivated. The radio frequency generator 14 is configured to emit a focused radio frequency signal
34 as illustrated in Figure 3b. The intruder 48 does not posses a RF tag 36 and therefore the signal 34 is not reflect. When the reader 16 does not receive a return signal 42 within a set time the processor 18 determines that the moving object is an intruder 48 and is not authorised to be within the restricted area 22. The processor 18 then activates an alarm 20. The alarm 20 is contained within the security unit 10 and when activated emits an audible sound 50 such as a siren. It should however be appreciated that the alarm 20 may be separate from the security unit 10. Furthermore, in particular circumstances it may be desirable to have an alarm that does not emit an audible sound but rather is configured to emit a signal to a monitoring system to covertly identify the presence of an intruder 48.
The skilled addressee will now appreciate the many advantages of the present invention for controlling access to restricted areas. The use of both a motion detector 12 and radio frequency technology provides a cost effect and simple method of controlling access to restricted areas. Motion detectors have lower operation costs than RF apparatus and therefore because the motion detector is used most of the time the overall operational cost of the security unit 10 is reduced. Furthermore, expensive key pads and swipe card technology with associated infrastructure are not required. Radio frequency security technology is automatic and does not require an interface such as a key pad for an authorised person to use. It is therefore a simple system to use and does not require constant input from authorised personnel. It should however be appreciated that the invention is not limited to the use of RF technology, any type of signal could be used without deviating from the scope of the invention. As the skilled addressee will now appreciate the invention would be very useful in situations where authorised personnel are passing through restricted areas on regular occasions or where they are unable to enter details into a key pad either because of physical impairment or because they are carrying a load. The security unit 10 can be configured to utilise a pre-existing alarm system and may be integrated into a monitored alarm system where it is imperative to detained or at least confirm the identity of the unauthorised entry. The system, for example, would be useful in hospitals where patients such as those suffering from Alzheimer's disease may require assistance.
Further advantages and improvements may very well be made to the present invention without deviating from its scope. Although the invention has been shown and described in what is conceived to be the most practical and preferred
embodiment, it is recognized that departures may be made therefrom within the scope and spirit of the invention, which is not to be limited to the details disclosed herein but is to be accorded the full scope of the claims so as to embrace any and all equivalent devices and apparatus.
In any claims that follow and in the summary of the invention, except where the context requires otherwise due to express language or necessary implication, the word "comprising" is used in the sense of "including", i.e. the features specified may be associated with further features in various embodiments of the invention.
Claims
1. An apparatus for controlling access to restricted areas including: at least one detector adapted to sense motion; at least one generator that is configured to emit a signal when the motion detector sensors movement; a mobile device adapted to reflect the signal; at least one reader which receives the reflected signal from the mobile device; and at least one processor adapted to control the motion detector, generator and reader.
2. An apparatus as in claim 1 , wherein the signal is a radio frequency signal.
3. An apparatus as in any one of the above claims, wherein the apparatus includes an alarm which is activated in the event that the reader does not receive a reflected signal.
4. An apparatus as in any one of the above claims, wherein the mobile device is a radio frequency tag.
5. An apparatus as in claim 4, wherein the radio frequency tag is passive and does not require a power source such as a battery.
6. An apparatus as in claims 4 and 5, wherein the radio frequency tag reflects or backscatters the signal emitted from the generator.
7. An apparatus as in any one of the above claims, wherein when the generator is activated it is adapted to emit a focused beam of radio waves.
8. An apparatus as in any one of the above claims, wherein the detector, generator, reader and alarm are hard wired to the processor.
9. An apparatus as in any one of the above claims, wherein the detector, generator, reader and alarm are wirelessly connected to the processor.
10. A method for controlling access to restricted areas including the steps of: activating a motion detector; when the motion detector senses a moving object within a specified physical space a signal generator is activated; the signal generator is configured to emit a signal; if a mobile device, adapted to reflect the signal, is present on the moving object the signal is reflected back to a reader and a processor recognises the object as authorised; if the mobile device, adapted to reflect the signal, is absent on the moving object the signal is not reflected back to the reader and the processor recognises the object as unauthorised and undertakes a predetermined task.
11. A method as in claim 10, wherein the signal is a radio frequency signal.
12. A method as in claim 10, wherein the predetermined task of the processor is the activation of an alarm.
13. A method as in any one of claims 10-12, wherein the alarm emits an audible sound.
14. A method as in any one of claims 10-13, wherein the alarm is a monitored alarm.
15. A method as in any one of claims 10-14, wherein in the event that the motion detector senses a moving object and the signal generator is activated, the motion detector is deactivated.
16. A method as in any one of claims 10-15, wherein at a predetermined time after the processor recognises the object as authorised the motion detector is reactivated and the signal generator is deactivated.
17. An apparatus for controlling access to restricted areas substantially as hereinbefore described with reference to the drawings.
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
AU2005901499 | 2005-03-29 | ||
AU2005901499A AU2005901499A0 (en) | 2005-03-29 | Apparatus and method of controlling access to restricted areas |
Publications (1)
Publication Number | Publication Date |
---|---|
WO2006102704A1 true WO2006102704A1 (en) | 2006-10-05 |
Family
ID=37052867
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/AU2006/000412 WO2006102704A1 (en) | 2005-03-29 | 2006-03-29 | Apparatus and method of controlling access to restricted areas |
Country Status (1)
Country | Link |
---|---|
WO (1) | WO2006102704A1 (en) |
Cited By (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
EP2232389A1 (en) * | 2007-12-04 | 2010-09-29 | Phoenix Ink Corporation | System and method for foot traffic analysis and management |
CN103310573A (en) * | 2013-05-24 | 2013-09-18 | 国家电网公司 | High-voltage test area alarming device |
WO2013153481A1 (en) * | 2012-04-12 | 2013-10-17 | Koninklijke Philips N.V. | Identification sensor for gate identification of a person |
US9367976B2 (en) | 2014-08-29 | 2016-06-14 | Twin Harbor Labs, LLC | Methods, software, and systems for providing policy-based access |
US9847007B2 (en) | 2014-08-29 | 2017-12-19 | Twin Harbor Labs Llc | Method and apparatus for providing policy-based access using an accelerometer |
CN109979138A (en) * | 2018-10-24 | 2019-07-05 | 大连永航科技有限公司 | Ship security system based on grating protection |
CN111907471A (en) * | 2020-07-07 | 2020-11-10 | 广州小鹏汽车制造有限公司 | Key prompting method, key prompting device, vehicle and storage medium |
Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US5992096A (en) * | 1998-10-19 | 1999-11-30 | Pooch Pass, Inc. | Controllable pet access system |
US6297739B1 (en) * | 2000-03-20 | 2001-10-02 | David K. Small | System and method for providing access to selected animals to a secured enclosure |
US20020104013A1 (en) * | 2001-02-01 | 2002-08-01 | Ohanes Ghazarian | Electronic vehicle product and personal monitoring |
-
2006
- 2006-03-29 WO PCT/AU2006/000412 patent/WO2006102704A1/en not_active Application Discontinuation
Patent Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US5992096A (en) * | 1998-10-19 | 1999-11-30 | Pooch Pass, Inc. | Controllable pet access system |
US6297739B1 (en) * | 2000-03-20 | 2001-10-02 | David K. Small | System and method for providing access to selected animals to a secured enclosure |
US20020104013A1 (en) * | 2001-02-01 | 2002-08-01 | Ohanes Ghazarian | Electronic vehicle product and personal monitoring |
Cited By (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
EP2232389A1 (en) * | 2007-12-04 | 2010-09-29 | Phoenix Ink Corporation | System and method for foot traffic analysis and management |
EP2232389A4 (en) * | 2007-12-04 | 2011-01-05 | Phoenix Ink Corp | System and method for foot traffic analysis and management |
WO2013153481A1 (en) * | 2012-04-12 | 2013-10-17 | Koninklijke Philips N.V. | Identification sensor for gate identification of a person |
CN103310573A (en) * | 2013-05-24 | 2013-09-18 | 国家电网公司 | High-voltage test area alarming device |
US9367976B2 (en) | 2014-08-29 | 2016-06-14 | Twin Harbor Labs, LLC | Methods, software, and systems for providing policy-based access |
US9847007B2 (en) | 2014-08-29 | 2017-12-19 | Twin Harbor Labs Llc | Method and apparatus for providing policy-based access using an accelerometer |
CN109979138A (en) * | 2018-10-24 | 2019-07-05 | 大连永航科技有限公司 | Ship security system based on grating protection |
CN111907471A (en) * | 2020-07-07 | 2020-11-10 | 广州小鹏汽车制造有限公司 | Key prompting method, key prompting device, vehicle and storage medium |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US11126803B2 (en) | Method, system and apparatus for NFC security | |
EP2377076B1 (en) | Method and system for item level uhf rfid tag with low frequency power assist | |
US5898370A (en) | Security monitoring system and method | |
WO2006102704A1 (en) | Apparatus and method of controlling access to restricted areas | |
US20060187029A1 (en) | Security zones for casino gaming | |
EP2259240B1 (en) | Method and apparatus for detection and tracking of objects within a defined area | |
CA2662175C (en) | Radio frequency id doppler motion detector | |
EP2377066A2 (en) | Rogue rfid detector | |
EP0522095A1 (en) | Intelligent security system | |
US8917179B2 (en) | System and method for detecting presence of an object | |
WO2006026365A2 (en) | Object monitoring, locating, and tracking method, system, and rfid device | |
JP2011528192A (en) | Combined antenna for electronic article surveillance / radio frequency identification | |
GB2246492A (en) | Tag identification system having different resonant frequencies | |
US9275530B1 (en) | Secure area and sensitive material tracking and state monitoring | |
GB2277850A (en) | Intelligent radio frequency transponder system | |
GB2332547A (en) | Radio tagging security systems | |
US20050287986A1 (en) | System and method for securing mobile equipment | |
Zhang et al. | Smart container security: the E-seal with RFID technology | |
US20080246611A1 (en) | Method and apparatus for detecting the presence of rfid devices and modifying the same | |
KR101099153B1 (en) | Location tracking system using mobile network, and method thereof | |
KR20140047882A (en) | Method for actuating locking apparatus in offshore plant by means of rfid recognition | |
GB2382959A (en) | Asset protection system | |
KR200287592Y1 (en) | Apparatus for Managing Patrol Record Using fingerprint and Blood Flows of Security Guard | |
Vyas et al. | State of the art literature survey 2015 on RFID | |
JP2007226331A (en) | Reader/writer antitheft system |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
121 | Ep: the epo has been informed by wipo that ep was designated in this application | ||
NENP | Non-entry into the national phase |
Ref country code: DE |
|
WWW | Wipo information: withdrawn in national office |
Country of ref document: DE |
|
NENP | Non-entry into the national phase |
Ref country code: RU |
|
WWW | Wipo information: withdrawn in national office |
Country of ref document: RU |
|
122 | Ep: pct application non-entry in european phase |
Ref document number: 06721294 Country of ref document: EP Kind code of ref document: A1 |
|
WWW | Wipo information: withdrawn in national office |
Ref document number: 6721294 Country of ref document: EP |