WO2006102704A1 - Apparatus and method of controlling access to restricted areas - Google Patents

Apparatus and method of controlling access to restricted areas Download PDF

Info

Publication number
WO2006102704A1
WO2006102704A1 PCT/AU2006/000412 AU2006000412W WO2006102704A1 WO 2006102704 A1 WO2006102704 A1 WO 2006102704A1 AU 2006000412 W AU2006000412 W AU 2006000412W WO 2006102704 A1 WO2006102704 A1 WO 2006102704A1
Authority
WO
WIPO (PCT)
Prior art keywords
signal
radio frequency
alarm
generator
motion detector
Prior art date
Application number
PCT/AU2006/000412
Other languages
French (fr)
Inventor
Jim Hurst
Original Assignee
Water Vending Australia Pty Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Priority claimed from AU2005901499A external-priority patent/AU2005901499A0/en
Application filed by Water Vending Australia Pty Ltd filed Critical Water Vending Australia Pty Ltd
Publication of WO2006102704A1 publication Critical patent/WO2006102704A1/en

Links

Classifications

    • GPHYSICS
    • G08SIGNALLING
    • G08BSIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
    • G08B13/00Burglar, theft or intruder alarms
    • G08B13/22Electrical actuation
    • G08B13/24Electrical actuation by interference with electromagnetic field distribution
    • G08B13/2402Electronic Article Surveillance [EAS], i.e. systems using tags for detecting removal of a tagged item from a secure area, e.g. tags for detecting shoplifting
    • G08B13/2451Specific applications combined with EAS
    • G08B13/2454Checking of authorisation of a person accessing tagged items in an EAS system
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/20Individual registration on entry or exit involving the use of a pass
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/00174Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
    • G07C9/00944Details of construction or manufacture
    • G07C2009/0096Electronic keys comprising a non-biometric sensor
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit

Definitions

  • the present invention relates to an apparatus and method for controlling access to restricted areas using a low cost security device.
  • Security systems are often employed by organisations to restrict access to particular areas. These can be areas which contain sensitive information such as company mainframes or areas that pose a risk to life such as high voltage switchboards.
  • these security systems comprise a motion detector connected to an alarm. When the motion detector is tripped by movement the alarm is activated. The alarm can be fitted with an audible siren and in many cases is also monitored by a security company.
  • These types of security devices have limited usefulness and cannot be used to identify between an intruder and authorised personnel.
  • RFID radio frequency identification
  • Radio frequencies range from very low frequency (VLF), which has a range of 10 to 30 kHz, to extremely high frequency (EHF), which has a range of 30 to 300 GHz.
  • VLF very low frequency
  • EHF extremely high frequency
  • RFID does not require contact or line-of-sight to operate, can function under a variety of environmental conditions, and provides a high level of data integrity.
  • the technology is also difficult to counterfeit and therefore RFlD provides a high level of security.
  • Radio frequency security systems typically includes a RF tag, a RF transceiver that generates the RF signals, and a reader that receives RF transmissions from a RF tag and passes the data to a host systems for processing.
  • the RF tag can be in the form of passive tags that does not actively transmit or a transponder which actively transmit to a reader.
  • Radio frequency identification acts in a similar manner to bar coding.
  • the RF tag is programmed with data that identifies the person to which the tag is attached. If a RF tag is not present and the receiver does not receive a response then the alarm will be activated. In this way RFID security system can identify between an intruder and authorised personnel.
  • RFID security system can identify between an intruder and authorised personnel.
  • One of the limitations with this system is that radio waves must be transmitted from the transceiver constantly or at regular interval. This can increase the overall running costs of the security system and may also cause interference with other equipment.
  • an apparatus for controlling access to restricted areas including: at least one detector adapted to sense motion; at least one generator that is configured to emit a signal when the motion detector sensors movement; a mobile device adapted to reflect the signal; at least one reader which receives the reflected signal from the mobile device; and at least one processor adapted to control the motion detector, generator and reader.
  • the signal is a radio frequency signal.
  • the apparatus includes an alarm which is activated in the event that the reader does not receive a reflected signal.
  • the mobile device is a radio frequency tag.
  • the radio frequency tag is passive and does not require a power source such as a battery.
  • the radio frequency tag reflects or backscatters the signal emitted from the generator.
  • the generator when activated it is adapted to emit a focused beam of radio waves.
  • the detector, generator, reader and alarm are hard wired to the processor.
  • the detector, generator, reader and alarm are wirelessly connected to the processor
  • a method for controlling access to restricted areas including the steps of: activating a motion detector; when the motion detector senses a moving object within a specified physical space a signal generator is activated; the signal generator is configured to emit a signal; if a mobile device, adapted to reflect the signal, is present on the moving object the signal is reflected back to a reader and a processor recognises the object as authorised; if the mobile device, adapted to reflect the signal, is absent on the moving object the signal is not reflected back to the reader and the processor recognises the object as unauthorised and undertakes a predetermined task.
  • the signal is a radio frequency signal.
  • the predetermined task of the processor is the activation of an alarm.
  • the alarm emits an audible sound.
  • the alarm is a monitored alarm.
  • the motion detector senses a moving object and the generator is activated
  • the motion detector is deactivated.
  • the processor recognises the object as authorised the motion detector is reactivated and the generator is deactivated.
  • Figure 1 is a stylised flow chart of a security device embodying the present invention
  • Figures 2a-2c is a stylised side view of the security device of Figure 1 during operation when an authorised person is present;
  • Figures 3a-3c is a stylised side view of the security device of Figure 1 during operation when an intruder is present.
  • a security unit 10 for controlling access to restricted areas including a motion detector 12, a radio frequency generator 14, a radio frequency reader 16, and a processor 18.
  • the security unit 10 contains an alarm 20 as illustrated in Figure 1.
  • the operation of the motion detector 12, radio frequency generator 14, radio frequency reader 16 and the alarm 20 are controlled by the processor 18.
  • the components of the security unit 10 may all be contained within a single self contained apparatus the invention is not limited to this configuration. It may be desirable to have each of the components positioned in separate locations or in fact to have multiples of each component. This may be desirable where the area to be monitored in quite large or where it is desirable to protect parts of the security unit 10 from vandalism or tampering by unauthorised persons.
  • the different components 12, 14, 16 and 20 may be hardwired or wirelessly connected to the processor 18.
  • the alarm 20 is activated if the processor 18 determines that an intruder is present in the area of surveillance 22. It may also be desirable to configure the alarm 20 to be activated if tampering or vandalism of the security unit 10 occurs.
  • the alarm 20 can be a monitored alarm or an alarm that emits an audible sound such as a siren. However, the skilled addressee should understand that the invention is not limited to these types of alarms.
  • the security unit 10 may also be connected to a pre-exiting alarm system thereby minimising the cost of installation.
  • the motion detector 12 is a passive infrared detector. During normal operation the motion detector 12 of the security unit 10 emits an infrared signal 24. If a moving object 26, such as a person, is present within the area of surveillance 22 a return signal 28 will be received by the motion detector 12. As a result the radio frequency generator 14 is activated. This activation can occur directly 30 between the detector 12 and the generator 14 or indirectly 32 via the processor 18.
  • the security unit 10 may contain a single processor 18 as illustrated in Figure 1.
  • the motion detector 12, the radio frequency generator 14 and the radio frequency reader 16 can each have a separate processor (not shown), in communication with each other, which controls their respective operation.
  • the activated radio frequency generator 14 emits a focused radio frequency signal 34. If the individual 26 is authorised to be within the area of surveillance 22 monitored by the security unit 10 they will have been issued with a radio frequency or RF tag 36.
  • the RF tag 36 is configured to reflect or backscatter the signal 34 emitted from the radio frequency generator 14 to the radio frequency reader 16.
  • the RF tag 36 can be in the form of a passive tag that does not require a power source however it should be understood that the invention is not limited to use of a passive tag. If the radio frequency reader 16 receivers a signal 38 back from the RF tag 36 then the individual 26 is recognised as being authorised to be in that particular area 22. It is envisaged that the security unit 10 is configured so that the motion detector 12 remains inactive whilst the radio frequency generator 14 is operating. The motion detector 12 is then reactivated 40 when the individual 26 is recognised as being authorised.
  • an alarm 20 is activated.
  • the alarm 20 is activated by the processor 18 when it is determined 44 that the reader 16 has not received a signal 42.
  • the radio frequency reader 16 could be configured to directly contact the alarm 20. It is envisaged that the alarm 20 emits an audible sound such as a siren when activated. It may also be desirable to have a monitored alarm which is in communication with a host security system (not shown). This may be important where it is imperative to detained or at least confirm the identity of the intruder or where an unauthorised person may require assistance, for example an Alzheimer patients in a hospital.
  • Figures 2a-2c illustrate the situation when an authorised person 46 enters an area of surveillance 22 monitored by the security unit 10.
  • the motion detector 12 contained within the security unit 10 emits an infrared signal 24.
  • the motion detector 12 sensors the movement.
  • the radio frequency generator 14 contained within the security unit 10 is then activated and the motion detector 12 is deactivated.
  • the radio frequency generator 14 is configured to emit a focused radio frequency signal 34 as illustrated in Figure 2b.
  • the authorised person 46 possesses a RF tag 36 which is configured to reflect or backscatter 38 the radio frequency signal 34 as illustrated in Figure 2c.
  • the security unit 10 then recognises the individual 46 as authorised to be within the area of surveillance 22 monitored by the security unit 10. At a predetermined time thereafter the motion detector 12 is reactivated.
  • Figures 3a-3c illustrate the situation when an intruder 48 enters an area of surveillance 22 monitored by the security unit 10.
  • the motion detector 12 contained within the security unit 10 emits an infrared signal 24.
  • the motion detector 12 sensors the movement.
  • the radio frequency generator 14 contained within the security unit 10 is then activated and the motion detector 12 is deactivated.
  • the radio frequency generator 14 is configured to emit a focused radio frequency signal 34 as illustrated in Figure 3b.
  • the intruder 48 does not posses a RF tag 36 and therefore the signal 34 is not reflect.
  • the processor 18 determines that the moving object is an intruder 48 and is not authorised to be within the restricted area 22. The processor 18 then activates an alarm 20.
  • the alarm 20 is contained within the security unit 10 and when activated emits an audible sound 50 such as a siren. It should however be appreciated that the alarm 20 may be separate from the security unit 10. Furthermore, in particular circumstances it may be desirable to have an alarm that does not emit an audible sound but rather is configured to emit a signal to a monitoring system to covertly identify the presence of an intruder 48.
  • the security unit 10 can be configured to utilise a pre-existing alarm system and may be integrated into a monitored alarm system where it is imperative to detained or at least confirm the identity of the unauthorised entry.
  • the system would be useful in hospitals where patients such as those suffering from Alzheimer's disease may require assistance.

Landscapes

  • Physics & Mathematics (AREA)
  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • General Physics & Mathematics (AREA)
  • Automation & Control Theory (AREA)
  • Electromagnetism (AREA)
  • Burglar Alarm Systems (AREA)
  • Radar Systems Or Details Thereof (AREA)

Abstract

The present invention relates to an apparatus and method for controlling access to restricted areas (22) using a low cost security unit (10). The invention provides a cost effect and simple method of controlling access to restricted areas (22) by using a motion detector (12), radio frequency signal generator (14), radio frequency (RF) tag (36) adapted to reflect a signal (34) and a radio frequency signal receiver (16). When the motion detector (12) is tripped by movement of an object the radio frequency signal generator (14) is activated. If the object includes an RF tag (36) the system recognises the object as authorised. Alternatively, if no RF tag (36) is present an alarm (20) is activated. The use of a motion detector (12) lowers operation costs the security unit (10). Furthermore, expensive key pads and swipe card technology with associated infrastructure are not required. The security unit (10) can be configured to utilise a pre-existing alarm system and may be integrated into a monitored alarm system where it is imperative to detained or at least confirm the identity of any unauthorised entry.

Description

Apparatus and method of controlling access to restricted areas
The present invention relates to an apparatus and method for controlling access to restricted areas using a low cost security device.
BACKGROUND OF THE INVENTION
Security is an ever present concern in today's international climate. The protection of information, equipment and personnel are an issue that faces private companies and government agencies alike. The theft of equipment alone costs millions of dollars each year. Issues of legal responsible and indemnity also have to be taken into consideration. Therefore, companies and government agencies have to protect themselves from larceny and litigation brought against them by employees and non-employees.
Security systems are often employed by organisations to restrict access to particular areas. These can be areas which contain sensitive information such as company mainframes or areas that pose a risk to life such as high voltage switchboards. One of the simplest forms these security systems comprise a motion detector connected to an alarm. When the motion detector is tripped by movement the alarm is activated. The alarm can be fitted with an audible siren and in many cases is also monitored by a security company. These types of security devices have limited usefulness and cannot be used to identify between an intruder and authorised personnel.
Some security systems employ key pads or swipe cards to allow authorised personnel into a restricted area. Other more advanced security systems utilise radio frequency (RF) technology. RF technology is used in a variety of applications including television, radar, and automatic identification systems. The term RFID (radio frequency identification) has been coined to describe the use of radio frequency signals to provide automatic identification of items. RFID technology is used in applications such as the electronic collection of road tolls and access control.
Radio frequencies range from very low frequency (VLF), which has a range of 10 to 30 kHz, to extremely high frequency (EHF), which has a range of 30 to 300 GHz. The use of radio frequencies in security system has proved to be convenient, easy to use, and well suited for automatic operation. RFID does not require contact or line-of-sight to operate, can function under a variety of environmental conditions, and provides a high level of data integrity. The technology is also difficult to counterfeit and therefore RFlD provides a high level of security.
Radio frequency security systems typically includes a RF tag, a RF transceiver that generates the RF signals, and a reader that receives RF transmissions from a RF tag and passes the data to a host systems for processing. The RF tag can be in the form of passive tags that does not actively transmit or a transponder which actively transmit to a reader.
Radio frequency identification acts in a similar manner to bar coding. The RF tag is programmed with data that identifies the person to which the tag is attached. If a RF tag is not present and the receiver does not receive a response then the alarm will be activated. In this way RFID security system can identify between an intruder and authorised personnel. One of the limitations with this system is that radio waves must be transmitted from the transceiver constantly or at regular interval. This can increase the overall running costs of the security system and may also cause interference with other equipment.
It is an object of the present invention to provide for a security device that overcomes at least some of the aforementioned problems or provides the public with a useful alternative.
It is yet a further object of the present invention to provide for a security device that is simple to use and has low operational costs.
SUMMARY OF THE INVENTION
Therefore in one form of the invention there is proposed an apparatus for controlling access to restricted areas including: at least one detector adapted to sense motion; at least one generator that is configured to emit a signal when the motion detector sensors movement; a mobile device adapted to reflect the signal; at least one reader which receives the reflected signal from the mobile device; and at least one processor adapted to control the motion detector, generator and reader.
Preferably, the signal is a radio frequency signal. Preferably, the apparatus includes an alarm which is activated in the event that the reader does not receive a reflected signal.
Preferably, the mobile device is a radio frequency tag.
Preferably, the radio frequency tag is passive and does not require a power source such as a battery.
Preferably, the radio frequency tag reflects or backscatters the signal emitted from the generator.
Preferably, when the generator is activated it is adapted to emit a focused beam of radio waves.
Preferably, the detector, generator, reader and alarm are hard wired to the processor.
Preferably, the detector, generator, reader and alarm are wirelessly connected to the processor
In a further form of the invention there is proposed a method for controlling access to restricted areas including the steps of: activating a motion detector; when the motion detector senses a moving object within a specified physical space a signal generator is activated; the signal generator is configured to emit a signal; if a mobile device, adapted to reflect the signal, is present on the moving object the signal is reflected back to a reader and a processor recognises the object as authorised; if the mobile device, adapted to reflect the signal, is absent on the moving object the signal is not reflected back to the reader and the processor recognises the object as unauthorised and undertakes a predetermined task.
Preferably, the signal is a radio frequency signal.
Preferably, the predetermined task of the processor is the activation of an alarm.
Preferably, the alarm emits an audible sound. Preferably, the alarm is a monitored alarm.
Preferably, in the event that the motion detector senses a moving object and the generator is activated, the motion detector is deactivated.
Preferably, at a predetermined time after the processor recognises the object as authorised the motion detector is reactivated and the generator is deactivated.
BRIEF DESCRIPTION OF THE DRAWINGS
The accompanying drawings, which are incorporated in and constitute a part of this specification, illustrate several implementations of the invention and, together with the description, serve to explain the advantages and principles of the invention. In the drawings,
Figure 1 is a stylised flow chart of a security device embodying the present invention;
Figures 2a-2c is a stylised side view of the security device of Figure 1 during operation when an authorised person is present; and
Figures 3a-3c is a stylised side view of the security device of Figure 1 during operation when an intruder is present.
DESCRIPTION OF THE PREFERRED EMBODIMENTS
The following detailed description of the invention refers to the accompanying drawings. Although the description includes exemplary embodiments, other embodiments are possible, and changes may be made to the embodiments described without departing from the spirit and scope of the invention. Wherever possible, the same reference numbers will be used throughout the drawings and the following description to refer to the same and like parts.
Illustrated in the figures is a security unit 10 for controlling access to restricted areas including a motion detector 12, a radio frequency generator 14, a radio frequency reader 16, and a processor 18. The security unit 10 contains an alarm 20 as illustrated in Figure 1. The operation of the motion detector 12, radio frequency generator 14, radio frequency reader 16 and the alarm 20 are controlled by the processor 18. It should be understood that although the components of the security unit 10 may all be contained within a single self contained apparatus the invention is not limited to this configuration. It may be desirable to have each of the components positioned in separate locations or in fact to have multiples of each component. This may be desirable where the area to be monitored in quite large or where it is desirable to protect parts of the security unit 10 from vandalism or tampering by unauthorised persons. In such system the different components 12, 14, 16 and 20, may be hardwired or wirelessly connected to the processor 18. The alarm 20 is activated if the processor 18 determines that an intruder is present in the area of surveillance 22. It may also be desirable to configure the alarm 20 to be activated if tampering or vandalism of the security unit 10 occurs. The alarm 20 can be a monitored alarm or an alarm that emits an audible sound such as a siren. However, the skilled addressee should understand that the invention is not limited to these types of alarms. The security unit 10 may also be connected to a pre-exiting alarm system thereby minimising the cost of installation.
In a preferred embodiment, as illustrated in Figure 1 , the motion detector 12 is a passive infrared detector. During normal operation the motion detector 12 of the security unit 10 emits an infrared signal 24. If a moving object 26, such as a person, is present within the area of surveillance 22 a return signal 28 will be received by the motion detector 12. As a result the radio frequency generator 14 is activated. This activation can occur directly 30 between the detector 12 and the generator 14 or indirectly 32 via the processor 18. The security unit 10 may contain a single processor 18 as illustrated in Figure 1. Alternatively, the motion detector 12, the radio frequency generator 14 and the radio frequency reader 16 can each have a separate processor (not shown), in communication with each other, which controls their respective operation.
The activated radio frequency generator 14 emits a focused radio frequency signal 34. If the individual 26 is authorised to be within the area of surveillance 22 monitored by the security unit 10 they will have been issued with a radio frequency or RF tag 36. The RF tag 36 is configured to reflect or backscatter the signal 34 emitted from the radio frequency generator 14 to the radio frequency reader 16. The RF tag 36 can be in the form of a passive tag that does not require a power source however it should be understood that the invention is not limited to use of a passive tag. If the radio frequency reader 16 receivers a signal 38 back from the RF tag 36 then the individual 26 is recognised as being authorised to be in that particular area 22. It is envisaged that the security unit 10 is configured so that the motion detector 12 remains inactive whilst the radio frequency generator 14 is operating. The motion detector 12 is then reactivated 40 when the individual 26 is recognised as being authorised.
If a signal is not received 42 by the RF reader 16 then an alarm 20 is activated. The alarm 20 is activated by the processor 18 when it is determined 44 that the reader 16 has not received a signal 42. The skilled addressee should however understand that the radio frequency reader 16 could be configured to directly contact the alarm 20. It is envisaged that the alarm 20 emits an audible sound such as a siren when activated. It may also be desirable to have a monitored alarm which is in communication with a host security system (not shown). This may be important where it is imperative to detained or at least confirm the identity of the intruder or where an unauthorised person may require assistance, for example an Alzheimer patients in a hospital.
To further illustrate the present invention Figures 2a-2c illustrate the situation when an authorised person 46 enters an area of surveillance 22 monitored by the security unit 10. The motion detector 12 contained within the security unit 10 emits an infrared signal 24. When the authorised person 46 enters the area of surveillance 22 monitored by the security unit 10 the motion detector 12 sensors the movement. The radio frequency generator 14 contained within the security unit 10 is then activated and the motion detector 12 is deactivated. The radio frequency generator 14 is configured to emit a focused radio frequency signal 34 as illustrated in Figure 2b. The authorised person 46 possesses a RF tag 36 which is configured to reflect or backscatter 38 the radio frequency signal 34 as illustrated in Figure 2c. The security unit 10 then recognises the individual 46 as authorised to be within the area of surveillance 22 monitored by the security unit 10. At a predetermined time thereafter the motion detector 12 is reactivated.
Figures 3a-3c illustrate the situation when an intruder 48 enters an area of surveillance 22 monitored by the security unit 10. The motion detector 12 contained within the security unit 10 emits an infrared signal 24. When the intruder 48 enters the area of surveillance 22 monitored by the security unit 10 the motion detector 12 sensors the movement. The radio frequency generator 14 contained within the security unit 10 is then activated and the motion detector 12 is deactivated. The radio frequency generator 14 is configured to emit a focused radio frequency signal 34 as illustrated in Figure 3b. The intruder 48 does not posses a RF tag 36 and therefore the signal 34 is not reflect. When the reader 16 does not receive a return signal 42 within a set time the processor 18 determines that the moving object is an intruder 48 and is not authorised to be within the restricted area 22. The processor 18 then activates an alarm 20. The alarm 20 is contained within the security unit 10 and when activated emits an audible sound 50 such as a siren. It should however be appreciated that the alarm 20 may be separate from the security unit 10. Furthermore, in particular circumstances it may be desirable to have an alarm that does not emit an audible sound but rather is configured to emit a signal to a monitoring system to covertly identify the presence of an intruder 48.
The skilled addressee will now appreciate the many advantages of the present invention for controlling access to restricted areas. The use of both a motion detector 12 and radio frequency technology provides a cost effect and simple method of controlling access to restricted areas. Motion detectors have lower operation costs than RF apparatus and therefore because the motion detector is used most of the time the overall operational cost of the security unit 10 is reduced. Furthermore, expensive key pads and swipe card technology with associated infrastructure are not required. Radio frequency security technology is automatic and does not require an interface such as a key pad for an authorised person to use. It is therefore a simple system to use and does not require constant input from authorised personnel. It should however be appreciated that the invention is not limited to the use of RF technology, any type of signal could be used without deviating from the scope of the invention. As the skilled addressee will now appreciate the invention would be very useful in situations where authorised personnel are passing through restricted areas on regular occasions or where they are unable to enter details into a key pad either because of physical impairment or because they are carrying a load. The security unit 10 can be configured to utilise a pre-existing alarm system and may be integrated into a monitored alarm system where it is imperative to detained or at least confirm the identity of the unauthorised entry. The system, for example, would be useful in hospitals where patients such as those suffering from Alzheimer's disease may require assistance.
Further advantages and improvements may very well be made to the present invention without deviating from its scope. Although the invention has been shown and described in what is conceived to be the most practical and preferred embodiment, it is recognized that departures may be made therefrom within the scope and spirit of the invention, which is not to be limited to the details disclosed herein but is to be accorded the full scope of the claims so as to embrace any and all equivalent devices and apparatus.
In any claims that follow and in the summary of the invention, except where the context requires otherwise due to express language or necessary implication, the word "comprising" is used in the sense of "including", i.e. the features specified may be associated with further features in various embodiments of the invention.

Claims

1. An apparatus for controlling access to restricted areas including: at least one detector adapted to sense motion; at least one generator that is configured to emit a signal when the motion detector sensors movement; a mobile device adapted to reflect the signal; at least one reader which receives the reflected signal from the mobile device; and at least one processor adapted to control the motion detector, generator and reader.
2. An apparatus as in claim 1 , wherein the signal is a radio frequency signal.
3. An apparatus as in any one of the above claims, wherein the apparatus includes an alarm which is activated in the event that the reader does not receive a reflected signal.
4. An apparatus as in any one of the above claims, wherein the mobile device is a radio frequency tag.
5. An apparatus as in claim 4, wherein the radio frequency tag is passive and does not require a power source such as a battery.
6. An apparatus as in claims 4 and 5, wherein the radio frequency tag reflects or backscatters the signal emitted from the generator.
7. An apparatus as in any one of the above claims, wherein when the generator is activated it is adapted to emit a focused beam of radio waves.
8. An apparatus as in any one of the above claims, wherein the detector, generator, reader and alarm are hard wired to the processor.
9. An apparatus as in any one of the above claims, wherein the detector, generator, reader and alarm are wirelessly connected to the processor.
10. A method for controlling access to restricted areas including the steps of: activating a motion detector; when the motion detector senses a moving object within a specified physical space a signal generator is activated; the signal generator is configured to emit a signal; if a mobile device, adapted to reflect the signal, is present on the moving object the signal is reflected back to a reader and a processor recognises the object as authorised; if the mobile device, adapted to reflect the signal, is absent on the moving object the signal is not reflected back to the reader and the processor recognises the object as unauthorised and undertakes a predetermined task.
11. A method as in claim 10, wherein the signal is a radio frequency signal.
12. A method as in claim 10, wherein the predetermined task of the processor is the activation of an alarm.
13. A method as in any one of claims 10-12, wherein the alarm emits an audible sound.
14. A method as in any one of claims 10-13, wherein the alarm is a monitored alarm.
15. A method as in any one of claims 10-14, wherein in the event that the motion detector senses a moving object and the signal generator is activated, the motion detector is deactivated.
16. A method as in any one of claims 10-15, wherein at a predetermined time after the processor recognises the object as authorised the motion detector is reactivated and the signal generator is deactivated.
17. An apparatus for controlling access to restricted areas substantially as hereinbefore described with reference to the drawings.
PCT/AU2006/000412 2005-03-29 2006-03-29 Apparatus and method of controlling access to restricted areas WO2006102704A1 (en)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
AU2005901499 2005-03-29
AU2005901499A AU2005901499A0 (en) 2005-03-29 Apparatus and method of controlling access to restricted areas

Publications (1)

Publication Number Publication Date
WO2006102704A1 true WO2006102704A1 (en) 2006-10-05

Family

ID=37052867

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/AU2006/000412 WO2006102704A1 (en) 2005-03-29 2006-03-29 Apparatus and method of controlling access to restricted areas

Country Status (1)

Country Link
WO (1) WO2006102704A1 (en)

Cited By (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP2232389A1 (en) * 2007-12-04 2010-09-29 Phoenix Ink Corporation System and method for foot traffic analysis and management
CN103310573A (en) * 2013-05-24 2013-09-18 国家电网公司 High-voltage test area alarming device
WO2013153481A1 (en) * 2012-04-12 2013-10-17 Koninklijke Philips N.V. Identification sensor for gate identification of a person
US9367976B2 (en) 2014-08-29 2016-06-14 Twin Harbor Labs, LLC Methods, software, and systems for providing policy-based access
US9847007B2 (en) 2014-08-29 2017-12-19 Twin Harbor Labs Llc Method and apparatus for providing policy-based access using an accelerometer
CN109979138A (en) * 2018-10-24 2019-07-05 大连永航科技有限公司 Ship security system based on grating protection
CN111907471A (en) * 2020-07-07 2020-11-10 广州小鹏汽车制造有限公司 Key prompting method, key prompting device, vehicle and storage medium

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5992096A (en) * 1998-10-19 1999-11-30 Pooch Pass, Inc. Controllable pet access system
US6297739B1 (en) * 2000-03-20 2001-10-02 David K. Small System and method for providing access to selected animals to a secured enclosure
US20020104013A1 (en) * 2001-02-01 2002-08-01 Ohanes Ghazarian Electronic vehicle product and personal monitoring

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5992096A (en) * 1998-10-19 1999-11-30 Pooch Pass, Inc. Controllable pet access system
US6297739B1 (en) * 2000-03-20 2001-10-02 David K. Small System and method for providing access to selected animals to a secured enclosure
US20020104013A1 (en) * 2001-02-01 2002-08-01 Ohanes Ghazarian Electronic vehicle product and personal monitoring

Cited By (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP2232389A1 (en) * 2007-12-04 2010-09-29 Phoenix Ink Corporation System and method for foot traffic analysis and management
EP2232389A4 (en) * 2007-12-04 2011-01-05 Phoenix Ink Corp System and method for foot traffic analysis and management
WO2013153481A1 (en) * 2012-04-12 2013-10-17 Koninklijke Philips N.V. Identification sensor for gate identification of a person
CN103310573A (en) * 2013-05-24 2013-09-18 国家电网公司 High-voltage test area alarming device
US9367976B2 (en) 2014-08-29 2016-06-14 Twin Harbor Labs, LLC Methods, software, and systems for providing policy-based access
US9847007B2 (en) 2014-08-29 2017-12-19 Twin Harbor Labs Llc Method and apparatus for providing policy-based access using an accelerometer
CN109979138A (en) * 2018-10-24 2019-07-05 大连永航科技有限公司 Ship security system based on grating protection
CN111907471A (en) * 2020-07-07 2020-11-10 广州小鹏汽车制造有限公司 Key prompting method, key prompting device, vehicle and storage medium

Similar Documents

Publication Publication Date Title
US11126803B2 (en) Method, system and apparatus for NFC security
EP2377076B1 (en) Method and system for item level uhf rfid tag with low frequency power assist
US5898370A (en) Security monitoring system and method
WO2006102704A1 (en) Apparatus and method of controlling access to restricted areas
US20060187029A1 (en) Security zones for casino gaming
EP2259240B1 (en) Method and apparatus for detection and tracking of objects within a defined area
CA2662175C (en) Radio frequency id doppler motion detector
EP2377066A2 (en) Rogue rfid detector
EP0522095A1 (en) Intelligent security system
US8917179B2 (en) System and method for detecting presence of an object
WO2006026365A2 (en) Object monitoring, locating, and tracking method, system, and rfid device
JP2011528192A (en) Combined antenna for electronic article surveillance / radio frequency identification
GB2246492A (en) Tag identification system having different resonant frequencies
US9275530B1 (en) Secure area and sensitive material tracking and state monitoring
GB2277850A (en) Intelligent radio frequency transponder system
GB2332547A (en) Radio tagging security systems
US20050287986A1 (en) System and method for securing mobile equipment
Zhang et al. Smart container security: the E-seal with RFID technology
US20080246611A1 (en) Method and apparatus for detecting the presence of rfid devices and modifying the same
KR101099153B1 (en) Location tracking system using mobile network, and method thereof
KR20140047882A (en) Method for actuating locking apparatus in offshore plant by means of rfid recognition
GB2382959A (en) Asset protection system
KR200287592Y1 (en) Apparatus for Managing Patrol Record Using fingerprint and Blood Flows of Security Guard
Vyas et al. State of the art literature survey 2015 on RFID
JP2007226331A (en) Reader/writer antitheft system

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application
NENP Non-entry into the national phase

Ref country code: DE

WWW Wipo information: withdrawn in national office

Country of ref document: DE

NENP Non-entry into the national phase

Ref country code: RU

WWW Wipo information: withdrawn in national office

Country of ref document: RU

122 Ep: pct application non-entry in european phase

Ref document number: 06721294

Country of ref document: EP

Kind code of ref document: A1

WWW Wipo information: withdrawn in national office

Ref document number: 6721294

Country of ref document: EP