WO2011043732A1 - Record storage within a secure access system - Google Patents

Record storage within a secure access system Download PDF

Info

Publication number
WO2011043732A1
WO2011043732A1 PCT/SG2009/000362 SG2009000362W WO2011043732A1 WO 2011043732 A1 WO2011043732 A1 WO 2011043732A1 SG 2009000362 W SG2009000362 W SG 2009000362W WO 2011043732 A1 WO2011043732 A1 WO 2011043732A1
Authority
WO
WIPO (PCT)
Prior art keywords
security
data
access system
cameras
sensor
Prior art date
Application number
PCT/SG2009/000362
Other languages
French (fr)
Inventor
Welic Chua
Wah Tong Thomas Wan
Original Assignee
Actatek Pte Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Actatek Pte Ltd filed Critical Actatek Pte Ltd
Priority to PCT/SG2009/000362 priority Critical patent/WO2011043732A1/en
Publication of WO2011043732A1 publication Critical patent/WO2011043732A1/en

Links

Classifications

    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/00174Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
    • G07C9/00563Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys using personal physical data of the operator, e.g. finger prints, retinal images, voicepatterns
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/20Individual registration on entry or exit involving the use of a pass
    • G07C9/22Individual registration on entry or exit involving the use of a pass in combination with an identity check of the pass holder
    • G07C9/25Individual registration on entry or exit involving the use of a pass in combination with an identity check of the pass holder using biometric data, e.g. fingerprints, iris scans or voice recognition
    • G07C9/257Individual registration on entry or exit involving the use of a pass in combination with an identity check of the pass holder using biometric data, e.g. fingerprints, iris scans or voice recognition electronically

Definitions

  • the present invention relates to a secure access system which maintains records of individuals who have attempted to access location protected by the secure access system.
  • the security device may, for example, be a keypad for receiving a secret passcode.
  • the passcode is compared with a list of one or more passcodes stored in a memory (either located within the security device, or at a remote server which is in communication with the security device) and in case of a match, the security device controls the lock mechanism to enable the door to be opened.
  • a biometric sensor such as a finger- or hand-print sensor, or a camera, which may be a still camera or video-camera, for capturing imaging from which a user's identity can be automatically identified.
  • an RFID contact or contact-less smart card, or other wireless token to be carried by the user.
  • Data captured by the biometric sensor and/or camera and/or from the wireless token is compared with a library (again stored in the security device itself of the remote server), and in case of a match, the security device controls the lock mechanism to permit the door to be opened.
  • the security device or remote server to maintain records of "access events ' " in which users interact with the security device to attempt to gain access to the secure facility, for example a record of which individuals did so and at what times.
  • the door and security device are in a location which is also under view by a surveillance system, such as a video camera.
  • the present invention aims to provide a new and useful secure, authentication access system.
  • a secure authentication access system includes one or more security devices which selectively permit opening of one or more door(s), and one or more cameras, preferably video cameras. Each security device is associated with one or more of the cameras.
  • an access event (as defined below) occurs which is synchronized with at least one image taken by at least one of the cameras, such as the real time video stream.
  • a record (e.g. at a central server) of the access attempt is created, which is uniquely associated with at least one image (e.g. a synchronized real time video stream) at or near the time of the authentication event, together with index data characterizing the access attempt.
  • the records can be associated with the images by actually including the images, or by including data which indicates the location of the images within one or more . databases of images captured by the cameras. Thus, in either case the record is usable to access the corresponding image(s).
  • a first type of access event is an event in which an individual interacts with one of the security devices to try to gain access to the facility.
  • the portion of video footage may be stored in association with index data such as the time of the access event, data registered by the security device (e.g. the data received from the user to try to gain access) and/or an identity of the individual who triggered the access event (which may be derived from the data registered by the security device).
  • a second type of access event is an event in which the presence of an individual is detected in a location which is expected to be within the field of view of one of the video cameras, irrespective of whether the individual interacts with the associated secunty device.
  • the presence of the individual may be detected using a form of a sensor capable of detecting human presence (motion sensor, infra-red, laser, etc), or a wireless device associated with the security device for detecting the presence of a wireless token.
  • the video camera(s) may be used as motion detector(s) by detecting motion from the output of the video camera(s).
  • the index data in this case may just be the time of the access event.
  • the access event is associated with one or more of the video cameras: either because it involves the security device associated with one of the video cameras, or/and one of the wireless devices for wirelessly detecting a token, or because it is expected to be due to the presence of an individual within the field of view of one of the cameras.
  • certain embodiments of the invention may be reactive to only one of the two types of access event.
  • a database is built up including sections of video footage associated with the respective access events, and the associated index data.
  • This database can be searched using the index data, so as to find the associated video footage. This makes it possible to avoid a problem of some currently known systems, that large amounts of video footage are shot (typically by a security camera which is not a portion of the secure access system), and it is time-consuming to find the footage corresponding to a given access event.
  • the portion of video footage may include a period before the access event (e.g. 30 seconds before), the period in which the access event occurs and/or a period (e.g. one minute) after the access event.
  • the video camera and secure device are both connected to a remote server which includes the data storage device which the portions of video footage and the index data are collected.
  • the video camera may collect video footage continually, or it may be triggered by the access event.
  • the remote server may receive the video footage continuously, or at times depending on the times of corresponding access events.
  • the remote server may either store all the video footage, while labeling portions of the footage which are associated with access events with any index data describing those access events.
  • the only portions of the video footage stored by the server may be the portions of the video footage associated with corresponding access events. In the latter case, each portion of the video footage is labeled with any index data describing the corresponding access event.
  • the secure access system includes not just one security device, but a plurality of them, each associated with at least one corresponding video camera for recording video footage of a location in which the security device is located.
  • the field of view of the video camera includes a location in which an individual stands when interacting with the security device, but it may alternatively or additionally show a location including or proximate the door to which the security device grants access and/or a portion of the secure facility to which an individual gains access via the door.
  • the security device may comprise any one or more of the following data input devices: a biometric sensor (which may be a finger- or hand-print, or vein- or sub-veinous, or iris or facial (or other anatomical) sensor; or indeed any other form of biometric sensor); a camera (which may be the same camera which records the footage, or a different camera; in the latter case, it may be either a video camera or a still camera); or a reader for communicating a security token, such as a smartcard or a RFID keycard or other wireless devices carried by an individual.
  • the security device registers this data. The process by which access is selectively granted based on this registered data may be performed at the security device or at the server.
  • the registered data may be included in the index data, or data derived from the registered data may be included in the index data.
  • the index data may include data indicating the identity of the individual whose face or other anatomical feature has been recognized.
  • the secure access system may employ a people counting algorithm, which produces a measure of the number of individuals passing through the door(s) during the access event. This data can be stored as part of the index data.
  • the security device may optionally contain other sensor devices which are used by the security device in determining whether an access event has occurred and/or whether to permit opening of at least one of the door(s) . These devices may include any an audio sensor, a heat sensor, a humidity sensor, a vibration sensor, a shock sensor, and a smoke sensor, or indeed any other suitable sensor.
  • the security device includes a heat sensor for making a measurement of the body temperature of a user. This possibility would permit the security device to determine if the user has a raised body temperature, and in this case to deny opening of the door. This possibility may be of particular interest, for example, during an epidemic of a dangerous disease, in which there is a significant risk that a raised body temperature is associated with the dangerous disease (rather than a less dangerous disease, such as a common cold) .
  • the "door" of the system is a portal through which the individual may pass when permitted by the security device.
  • the door is the door of a safe in which items may be stored.
  • the present security system may also be used to selectively grant access to equipment, such as a computer system.
  • Fig. 1 shows a schematic view of a secure access system which is an embodiment of the invention
  • Fig. 2 shows a graphical user interface of a server which is an element of the embodiment of Fig. 1 ;
  • Fig. 3 shows a flow-chart for the operation of a unit of the secure access system of
  • the embodiment includes a server 1 for recording data concerning access to a plurality of doors 3.
  • the server 1 is connected over a communication network (which may included tangible communication channels such as wires and/or wireless communication channels) with a plurality of secunty stations 2 associated with the respective doors 3.
  • the security stations 2 may have identical construction.
  • the internal structure of one of the security stations 2 is shown.
  • the security station 2 includes a security device 21 for controlling a lock device 23.
  • the security station 2 further includes a video camera 22. arranged so that its field of view includes a location proximate or including the corresponding security device 21 and/or the corresponding door 3. Conceivably a single video camera 22 might be shared by multiple ones of the security stations 2. if those security stations 2 happen to be close to each other.
  • the security device 21 may be of a known form. It includes a camera 211 (which may be a still or video camera) for taking a picture of an individual (a "user") interacting with the security device 21.
  • the camera 21 1 is shown as internal to the security device but it may alternatively be external. Particularly if it is external, it may include a data storage device.
  • the security device 21 further includes a biometric sensor 212, such as a finger- or handprint, or vein- or sub-veinous. or iris or facial or other forms of biometrics sensor. It further includes a reader 213 for communicating with a security token (not shown) carried by the user.
  • the security token may be a security card, such as a contact or contactless smartcard or RFID security card (some RFID cards count as smartcards), and the reader 213 may be an RFID reader for receiving an ID code from the security card.
  • the reader 213 may be a reader for a security token of a sort which requires physical contact with the device 213.
  • the security device 21 further includes a keypad 214 for registering key-presses made by a user.
  • the keypad may have any number of keys, for example 10 keys corresponding to the digits 0 to 9, or even be a full QUERTY keyboard.
  • control device 215 which is in two- way communication with the server 1.
  • Other sensors such as smoke, or audio or heat, or humidity, or pressure or vibration sensors when detecting such signal can also trigger the beginning of the recording, or open or close the door and audio alarm.
  • the security device 215 is arranged to control the corresponding lock device 23, so as to grant access to the corresponding door 3.
  • the security device may include any one or more additional sensors such as: an audio sensor, a heat sensor, a humidity sensor, a vibration sensor, a shock sensor, a smoke sensor, etc. Of these, only a heat sensor 216 is shown in Fig. 1. Its operation is explained below.
  • a user accesses a secure region via the door 3 by interacting with the security device 21 in a first type of access event.
  • the control device 215 registers data transmitted by the user to the control device 215 using one or more of the camera 211, biometrics sensor 212, reader 213 or keypad 214.
  • the control device 215 is enabled to compare the registered data with a library of data of security
  • control device 215 transmits the registered data to the server 3 where the comparison is made, and in the event of a match the server 1 signals the control device 215 to operate the lock device 23 to unlock the door 3.
  • the control device can be merely an interface which transmits signals from the various devices 211, 212, 213, 214 and the server 1, and controls the lock device 23 by relaying control signals generated in the server 1.
  • the index data in this case comprises the time of the access event.
  • the sensor may be a motion sensor, and it may employ the output of the video camera. This could for example by implemented by software running in the security device 21 , the server 1 or a further processor (not shown) associated with the camera.
  • the server 1 receives video data from the camera 22, and stores at least a portion of the video data corresponding to each access event. Each portion of the video data is stored with the index data characterizing the access event.
  • the server may store all this video data, and additionally builds a separate list of records. Each records is associated with a respective access event, and includes data indicating the location within the stored video footage of the portion of the video footage corresponding to the access event, so that (as described below) for any given access event the corresponding portion of the video footage may be extracted.
  • the server 1 may store only portions of the video footage associated with corresponding access events; this reduces the total volume of data the server 1 is required to store, and therefore the reduces the required size of the server's data storage device.
  • the camera 22 transmits video footage to the server 1 continuously, but the server 1 stores only portions of the video footage corresponding to respective access events.
  • Each portion of the video footage may include data captured during the corresponding access event, and typically also video footage captured dunng a predetermined time after the corresponding access event.
  • the portion may also include video footage captured during a time period (e.g. a predetermined period) prior to the access event.
  • the server 1 may discard video footage it has received if, within that time period not access event occurs.
  • the camera 22 is controlled only to transmit video data to the server 1 at times following an access event. For example, when it is determined by the server 1 (or the control device 215) that an access event is occurring, the server 1 (or control device 215) may signal to the camera 22 that a portion of video footage is to be transmitted to the server 1, and the camera 22 then begins transmitting this video footage.
  • the video footage may be transmitted for a time period (e.g. a predetermined duration) following the access event (for example, including at least the time that the corresponding door 3 is open).
  • the camera 22 may be associated with a video data cache (not shown) for caching video data, so that upon an access event, video footage captured during a time period (e.g. of predetermined length) before the access event can be transmitted from the cache to the server 1 for storage, as part of the portion of video footage associated with the access event.
  • the index data includes a data specifying the time at which the access event occurred. However, it typically includes also either some or all of the registered data received by the control device 215 from the user via the camera 211. biometrics sensor 212, reader 213 and/or keypad 214. and/or further data obtained from the registered data and or further data received by the one of the optional additional sensors.
  • the registered data may include a codeword entered by a user using the keypad 214, and the index data may include that codeword, and/or the codeword may be used (by the control device 215 or the server 1) to look up an identify of the user using a look-up table, and then information specifying the user' s identity made by included in the index data.
  • the biometrics sensor may be a facial recognition sensor, and an image of the face (received data) can be used to determine the identity of the user using pre-stored facial data. Data indicating that identity can then be included as part of the index data.
  • the secure access system may include a people counting algorithm, for discerning the number of users (people) that cross a door/portal threshold as a consequence of a valid access authentication.
  • the algorithm would be operative to confirm that only one user crossed the door/portal threshold for one authentication event.
  • a virtual line is set on the camera image (along the door/threshold) and a real time video analysis (DSP algorithms) is used to track movement of figures/people within the range of the camera (the camera position is fixed so that a static reference is achieved for the threshold position).
  • DSP algorithms real time video analysis
  • the "people-counting" function is interrogated to ensure that for the period the door is open, only one person crosses the threshold. If more than one person crossed the threshold (tail-gating for an entrance or avoidance of a secure exit) an alarm can be set and/or door disabled.
  • the access event can be labeled with the number of people counted.
  • one or more of the security stations may be associated with a plurality of doors 3 (wtiich happen to be close to each other) and/or a plurality of video cameras 22 (for example, a respective camera for each of multiple doors, or a plurality of cameras per door such as video cameras viewing a location proximate the door from different respective directions).
  • the index data is stored in the same database as the corresponding video data, but it would also be possible to store the index data and video data in different databases.
  • the portions of video footage may be stored at the security stations 2 where they were captured, in a data storage device provided there.
  • GUI graphical user interface
  • Fig. 2 may be displayed on a screen controlled by the server 1 and/or the screen of a terminal (not shown) accessing the data stored in the sever, e.g. over the communication network.
  • the GUI includes an area 101 for selecting one of the security stations 2 (or, especially in cases in which there is no one-to-one correspondence between security stations 2 and doors 3, the area 101 may alternatively be used to select one of the doors 3) and an area 102 for selecting one of the users.
  • the user may be presented respectively with a list of the security stations 2, or of the users who are authorized to access secure area(s) protected by the secure access system.
  • the supervisor may then select one or more of the displayed security stations 2 and/or one or more of the users.
  • area 102 of the GUI may be replaced, or supplemented, by a plurality of icons corresponding to the security stations 2, such that a supervisor can select one or more of the security stations 2 by clicking on the corresponding lcon(s).
  • a portion 103 of the GUI permits the supervisor to enter a time range.
  • the server Upon the supervisor selecting one or more of the security stations and/or user(s) and/or a time range, the server performs a search, and presents the supervisor with a list in area 104 of access event(s) for which the index data matches these search criteria. Each item in the list may be presented together with at least a part of the index data, such as the time when it occurred.
  • Fig. 2 shows a case in which the supervisor has selected to display a list of the video portions associated with security station number 3, between times 9:20 and 9.45. There were three access events during this period. Two were by access events of the first type in which individuals (with initials ARB and PAL) passed through the
  • the third access event was of the second type, so the identity of the individual who triggered it is not known.
  • the supervisor can select one of the access events listed in area 104, e.g. by clicking on it. and cause the
  • the supervisor is able to gain access to portions of video footage and/or event logs corresponding to access events rapidly and without reviewing video footage extending over the whole of the time range of interest.
  • the index data for an access event may include the number of people who passed through the corresponding door or other portal.
  • the search criteria may be to search for access events for which this number is plural, since these access events are more likely to be associated with security violations.
  • the access events of the first type may only comprise successful interactions with the secunty devices 21, i.e. interactions which lead to the security devices 21 opening the corresponding door(s) 3.
  • a portion of video footage may be stored whenever a finger is pressed against biometric device 212, irrespective of whether the registered fingerprint is such as to permit unlocking of the door 3.
  • This heat sensor 216 is of a type suitable for detecting the body temperature of a user who interacts with the security device.
  • the control device 215 uses the output of the heat sensor 216 in determining whether to operate the lock device 23 to unlock the door 3. For example, the control device 215 may determine whether the body temperature of the user is above a predetermined temperature threshold. In the case that the detected bod)' temperature of the user is above the predetermined threshold, the control device 215 may decline to operate the lock device 23 to unlock the door 3 even if the data transmitted by the user to the control device 215 using one or more of the camera 211, biometrics sensor 212, reader 213 or keypad 214 matches the security information in the library.
  • Fig. 3 shows a possible flow diagram for the operation of the control device.
  • the control device 215 determines whether the data transmitted b3' the user to the control device matches the security information. If so, in a step 42, the control device 215 determines whether the body temperature of the user is below the threshold. Only if the determination is positive in both steps 41 and 42 is the door unlocked in step 43. In other embodiments, the order of steps 41 and 42 may be reversed. Note that in other embodiments either or both of these determinations may be carried out by the server 1.
  • the predetermined temperature threshold may optionally be controllable, e.g. at the server 1.
  • the control device 215 may include an override system which causes the control device 215 to operate the lock device 23 to unlock the door 3 even if a user has an elevated temperature, provided that some additional security test is met, for example that the user is determined to be a supervisor.
  • the feature of using the output of the heat sensor 216 to control the control device 215 may be disabled selectively, e.g. by commands input to the server 1. For example, in periods when there is an epidemic of a disease (e.g. a potentially fatal disease) associated with increased temperatures in patients, it may be sensible to implement this feature of the control device 215, whereas at other times (e.g. when an increased body temperature is more likely to be due to some other cause), it may be preferable not to implement the feature.
  • a disease e.g. a potentially fatal disease

Landscapes

  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Engineering & Computer Science (AREA)
  • Human Computer Interaction (AREA)
  • Alarm Systems (AREA)
  • Lock And Its Accessories (AREA)

Abstract

A secure access system includes a server (1 ) for recording data concerning access to a plurality of doors (3). The server (1 ) is connected over a communication network with a plurality of security stations (2) associated with the doors (3). The security station (2) includes a security device (21 ) for controlling a lock device (23) and a video camera (22) for taking a picture of a user interacting with the security device (21 ). The security device (21 ) further includes a biometric sensor (212), a reader (213) for communicating with a security token carried by the user, a keypad (214) for registering key-presses made by the user. The camera (211 ), the biometric sensor (212), the reader (213) and the keypad transmit data to a control device (215) which is in two-way communication with the server (1 ). The security device (21 ) may also include a heat sensor (216) for detecting the body temperature of the user.

Description

Record storage within a secure access system
Field of the invention
The present invention relates to a secure access system which maintains records of individuals who have attempted to access location protected by the secure access system.
Background of the invention
It is well known to provide access to a secure facility using a door equipped with a lock mechanism under the control of a security device. The security device may, for example, be a keypad for receiving a secret passcode. The passcode is compared with a list of one or more passcodes stored in a memory (either located within the security device, or at a remote server which is in communication with the security device) and in case of a match, the security device controls the lock mechanism to enable the door to be opened. Instead of a keypad, it is known to provide a biometric sensor, such as a finger- or hand-print sensor, or a camera, which may be a still camera or video-camera, for capturing imaging from which a user's identity can be automatically identified. Alternatively, it is known to provide an RFID contact or contact-less smart card, or other wireless token to be carried by the user. Data captured by the biometric sensor and/or camera and/or from the wireless token is compared with a library (again stored in the security device itself of the remote server), and in case of a match, the security device controls the lock mechanism to permit the door to be opened. In such systems it is known for the security device or remote server to maintain records of "access events'" in which users interact with the security device to attempt to gain access to the secure facility, for example a record of which individuals did so and at what times. Frequently, the door and security device are in a location which is also under view by a surveillance system, such as a video camera.
Summary of the invention The present invention aims to provide a new and useful secure, authentication access system.
In general terms, a first aspect of the invention proposes that a secure authentication access system includes one or more security devices which selectively permit opening of one or more door(s), and one or more cameras, preferably video cameras. Each security device is associated with one or more of the cameras. Upon an access attempt (whether successful or not), an access event (as defined below) occurs which is synchronized with at least one image taken by at least one of the cameras, such as the real time video stream. A record (e.g. at a central server) of the access attempt is created, which is uniquely associated with at least one image (e.g. a synchronized real time video stream) at or near the time of the authentication event, together with index data characterizing the access attempt. The records can be associated with the images by actually including the images, or by including data which indicates the location of the images within one or more . databases of images captured by the cameras. Thus, in either case the record is usable to access the corresponding image(s).
A first type of access event is an event in which an individual interacts with one of the security devices to try to gain access to the facility. In this case, the portion of video footage may be stored in association with index data such as the time of the access event, data registered by the security device (e.g. the data received from the user to try to gain access) and/or an identity of the individual who triggered the access event (which may be derived from the data registered by the security device).
A second type of access event is an event in which the presence of an individual is detected in a location which is expected to be within the field of view of one of the video cameras, irrespective of whether the individual interacts with the associated secunty device. The presence of the individual may be detected using a form of a sensor capable of detecting human presence (motion sensor, infra-red, laser, etc), or a wireless device associated with the security device for detecting the presence of a wireless token. In fact, the video camera(s) may be used as motion detector(s) by detecting motion from the output of the video camera(s). The index data in this case may just be the time of the access event.
Thus, in either case, the access event is associated with one or more of the video cameras: either because it involves the security device associated with one of the video cameras, or/and one of the wireless devices for wirelessly detecting a token, or because it is expected to be due to the presence of an individual within the field of view of one of the cameras. Note that certain embodiments of the invention may be reactive to only one of the two types of access event.
Thus, as multiple access events occur, a database is built up including sections of video footage associated with the respective access events, and the associated index data. This database can be searched using the index data, so as to find the associated video footage. This makes it possible to avoid a problem of some currently known systems, that large amounts of video footage are shot (typically by a security camera which is not a portion of the secure access system), and it is time-consuming to find the footage corresponding to a given access event.
The portion of video footage may include a period before the access event (e.g. 30 seconds before), the period in which the access event occurs and/or a period (e.g. one minute) after the access event.
Optionally, the video camera and secure device are both connected to a remote server which includes the data storage device which the portions of video footage and the index data are collected. The video camera may collect video footage continually, or it may be triggered by the access event. Similarly, the remote server may receive the video footage continuously, or at times depending on the times of corresponding access events.
In cases in which the remote server receives the video footage continuously, it may either store all the video footage, while labeling portions of the footage which are associated with access events with any index data describing those access events. Alternatively, the only portions of the video footage stored by the server may be the portions of the video footage associated with corresponding access events. In the latter case, each portion of the video footage is labeled with any index data describing the corresponding access event.
Typically, the secure access system includes not just one security device, but a plurality of them, each associated with at least one corresponding video camera for recording video footage of a location in which the security device is located. Typically, the field of view of the video camera includes a location in which an individual stands when interacting with the security device, but it may alternatively or additionally show a location including or proximate the door to which the security device grants access and/or a portion of the secure facility to which an individual gains access via the door.
The security device may comprise any one or more of the following data input devices: a biometric sensor (which may be a finger- or hand-print, or vein- or sub-veinous, or iris or facial (or other anatomical) sensor; or indeed any other form of biometric sensor); a camera (which may be the same camera which records the footage, or a different camera; in the latter case, it may be either a video camera or a still camera); or a reader for communicating a security token, such as a smartcard or a RFID keycard or other wireless devices carried by an individual. In all these cases, the security device registers this data. The process by which access is selectively granted based on this registered data may be performed at the security device or at the server. As noted above, the registered data may be included in the index data, or data derived from the registered data may be included in the index data. For example, in the case that the biometric sensor is a facial (or other anatomical) recognition sensor, the index data may include data indicating the identity of the individual whose face or other anatomical feature has been recognized.
The secure access system may employ a people counting algorithm, which produces a measure of the number of individuals passing through the door(s) during the access event. This data can be stored as part of the index data. The security device may optionally contain other sensor devices which are used by the security device in determining whether an access event has occurred and/or whether to permit opening of at least one of the door(s) . These devices may include any an audio sensor, a heat sensor, a humidity sensor, a vibration sensor, a shock sensor, and a smoke sensor, or indeed any other suitable sensor.
A particularly interesting possibility is that the security device includes a heat sensor for making a measurement of the body temperature of a user. This possibility would permit the security device to determine if the user has a raised body temperature, and in this case to deny opening of the door. This possibility may be of particular interest, for example, during an epidemic of a dangerous disease, in which there is a significant risk that a raised body temperature is associated with the dangerous disease (rather than a less dangerous disease, such as a common cold) .
The concept of a secure access S3'stem which permits or denies access using an algorithm which employs (among other factors) the body temperature of a user provides a second, independent aspect of the invention which is freely combinable with the first aspect.
In many embodiments, the "door" of the system is a portal through which the individual may pass when permitted by the security device. However, embodiments of the invention are also possible in which the door is the door of a safe in which items may be stored. The present security system may also be used to selectively grant access to equipment, such as a computer system.
Brief description of the figures
Embodiments of the invention will now be described for the sake of example only with reference to the accompanying drawings, in which:
Fig. 1 shows a schematic view of a secure access system which is an embodiment of the invention; Fig. 2 shows a graphical user interface of a server which is an element of the embodiment of Fig. 1 ; and
Fig. 3 shows a flow-chart for the operation of a unit of the secure access system of
Fig. 1.
Detailed description of the embodiments
Referring to Fig. 1, an embodiment of the invention is illustrated. The embodiment includes a server 1 for recording data concerning access to a plurality of doors 3. The server 1 is connected over a communication network (which may included tangible communication channels such as wires and/or wireless communication channels) with a plurality of secunty stations 2 associated with the respective doors 3. The security stations 2 may have identical construction.
The internal structure of one of the security stations 2 is shown. The security station 2 includes a security device 21 for controlling a lock device 23. The security station 2 further includes a video camera 22. arranged so that its field of view includes a location proximate or including the corresponding security device 21 and/or the corresponding door 3. Conceivably a single video camera 22 might be shared by multiple ones of the security stations 2. if those security stations 2 happen to be close to each other.
The security device 21 may be of a known form. It includes a camera 211 (which may be a still or video camera) for taking a picture of an individual (a "user") interacting with the security device 21. The camera 21 1 is shown as internal to the security device but it may alternatively be external. Particularly if it is external, it may include a data storage device. The security device 21 further includes a biometric sensor 212, such as a finger- or handprint, or vein- or sub-veinous. or iris or facial or other forms of biometrics sensor. It further includes a reader 213 for communicating with a security token (not shown) carried by the user. For example, the security token may be a security card, such as a contact or contactless smartcard or RFID security card (some RFID cards count as smartcards), and the reader 213 may be an RFID reader for receiving an ID code from the security card. Alternatively, the reader 213 may be a reader for a security token of a sort which requires physical contact with the device 213. The security device 21 further includes a keypad 214 for registering key-presses made by a user. The keypad may have any number of keys, for example 10 keys corresponding to the digits 0 to 9, or even be a full QUERTY keyboard. The camera 211, biometrics sensor 212, reader 213 and keypad
214 are arranged to transmit the data they register to a control device 215 which is in two- way communication with the server 1. Other sensors such as smoke, or audio or heat, or humidity, or pressure or vibration sensors when detecting such signal can also trigger the beginning of the recording, or open or close the door and audio alarm. The control device
215 is arranged to control the corresponding lock device 23, so as to grant access to the corresponding door 3. Optionally, the security device may include any one or more additional sensors such as: an audio sensor, a heat sensor, a humidity sensor, a vibration sensor, a shock sensor, a smoke sensor, etc. Of these, only a heat sensor 216 is shown in Fig. 1. Its operation is explained below.
A user accesses a secure region via the door 3 by interacting with the security device 21 in a first type of access event. During this process the control device 215 registers data transmitted by the user to the control device 215 using one or more of the camera 211, biometrics sensor 212, reader 213 or keypad 214. In one possibility, the control device 215 is enabled to compare the registered data with a library of data of security
information relating to multiple authorized users, and upon detecting a match, to operate the lock device 23 to unlock the door 3. In an alternative possibility, the control device 215 transmits the registered data to the server 3 where the comparison is made, and in the event of a match the server 1 signals the control device 215 to operate the lock device 23 to unlock the door 3. Indeed, in one form the control device can be merely an interface which transmits signals from the various devices 211, 212, 213, 214 and the server 1, and controls the lock device 23 by relaying control signals generated in the server 1.
In some forms of the embodiment, there may be a sensor for registering the presence of an individual, and an access event of a second type occurs when such presence is detected. The index data in this case comprises the time of the access event. The sensor may be a motion sensor, and it may employ the output of the video camera. This could for example by implemented by software running in the security device 21 , the server 1 or a further processor (not shown) associated with the camera.
In either type of access event, the server 1 receives video data from the camera 22, and stores at least a portion of the video data corresponding to each access event. Each portion of the video data is stored with the index data characterizing the access event.
If the camera 22 continuously transmits video footage to the server 1. the server may store all this video data, and additionally builds a separate list of records. Each records is associated with a respective access event, and includes data indicating the location within the stored video footage of the portion of the video footage corresponding to the access event, so that (as described below) for any given access event the corresponding portion of the video footage may be extracted. Alternatively, the server 1 may store only portions of the video footage associated with corresponding access events; this reduces the total volume of data the server 1 is required to store, and therefore the reduces the required size of the server's data storage device. In some embodiments, the camera 22 transmits video footage to the server 1 continuously, but the server 1 stores only portions of the video footage corresponding to respective access events. Each portion of the video footage may include data captured during the corresponding access event, and typically also video footage captured dunng a predetermined time after the corresponding access event. The portion may also include video footage captured during a time period (e.g. a predetermined period) prior to the access event. Thus, the server 1 may discard video footage it has received if, within that time period not access event occurs.
In other embodiments, the camera 22 is controlled only to transmit video data to the server 1 at times following an access event. For example, when it is determined by the server 1 (or the control device 215) that an access event is occurring, the server 1 (or control device 215) may signal to the camera 22 that a portion of video footage is to be transmitted to the server 1, and the camera 22 then begins transmitting this video footage. The video footage may be transmitted for a time period (e.g. a predetermined duration) following the access event (for example, including at least the time that the corresponding door 3 is open). Furthermore, the camera 22 may be associated with a video data cache (not shown) for caching video data, so that upon an access event, video footage captured during a time period (e.g. of predetermined length) before the access event can be transmitted from the cache to the server 1 for storage, as part of the portion of video footage associated with the access event.
For access events of the first type, the index data includes a data specifying the time at which the access event occurred. However, it typically includes also either some or all of the registered data received by the control device 215 from the user via the camera 211. biometrics sensor 212, reader 213 and/or keypad 214. and/or further data obtained from the registered data and or further data received by the one of the optional additional sensors. For example, the registered data may include a codeword entered by a user using the keypad 214, and the index data may include that codeword, and/or the codeword may be used (by the control device 215 or the server 1) to look up an identify of the user using a look-up table, and then information specifying the user' s identity made by included in the index data. In another example, the biometrics sensor may be a facial recognition sensor, and an image of the face (received data) can be used to determine the identity of the user using pre-stored facial data. Data indicating that identity can then be included as part of the index data.
The secure access system may include a people counting algorithm, for discerning the number of users (people) that cross a door/portal threshold as a consequence of a valid access authentication. The algorithm would be operative to confirm that only one user crossed the door/portal threshold for one authentication event. In one implementation, a virtual line is set on the camera image (along the door/threshold) and a real time video analysis (DSP algorithms) is used to track movement of figures/people within the range of the camera (the camera position is fixed so that a static reference is achieved for the threshold position). When an access event is initiated, the "people-counting" function is interrogated to ensure that for the period the door is open, only one person crosses the threshold. If more than one person crossed the threshold (tail-gating for an entrance or avoidance of a secure exit) an alarm can be set and/or door disabled. Alternatively or additionally, the access event can be labeled with the number of people counted.
A number of variations to the above scheme are possible within the scope of the invention. For example, in some embodiments one or more of the security stations may be associated with a plurality of doors 3 (wtiich happen to be close to each other) and/or a plurality of video cameras 22 (for example, a respective camera for each of multiple doors, or a plurality of cameras per door such as video cameras viewing a location proximate the door from different respective directions).
Typically, the index data is stored in the same database as the corresponding video data, but it would also be possible to store the index data and video data in different databases. In a further variation of the embodiment, the portions of video footage may be stored at the security stations 2 where they were captured, in a data storage device provided there.
We now turn to methods for employing the database generated by the server 1. A supervisor typically does this using a graphical user interface (GUI) as shown in Fig. 2, which may be displayed on a screen controlled by the server 1 and/or the screen of a terminal (not shown) accessing the data stored in the sever, e.g. over the communication network. The GUI includes an area 101 for selecting one of the security stations 2 (or, especially in cases in which there is no one-to-one correspondence between security stations 2 and doors 3, the area 101 may alternatively be used to select one of the doors 3) and an area 102 for selecting one of the users. Upon indicating one of the areas 101 , 102, the user may be presented respectively with a list of the security stations 2, or of the users who are authorized to access secure area(s) protected by the secure access system. The supervisor may then select one or more of the displayed security stations 2 and/or one or more of the users. Note that area 102 of the GUI may be replaced, or supplemented, by a plurality of icons corresponding to the security stations 2, such that a supervisor can select one or more of the security stations 2 by clicking on the corresponding lcon(s). A portion 103 of the GUI permits the supervisor to enter a time range.
Upon the supervisor selecting one or more of the security stations and/or user(s) and/or a time range, the server performs a search, and presents the supervisor with a list in area 104 of access event(s) for which the index data matches these search criteria. Each item in the list may be presented together with at least a part of the index data, such as the time when it occurred. Fig. 2 shows a case in which the supervisor has selected to display a list of the video portions associated with security station number 3, between times 9:20 and 9.45. There were three access events during this period. Two were by access events of the first type in which individuals (with initials ARB and PAL) passed through the
corresponding door during that time range. The third access event was of the second type, so the identity of the individual who triggered it is not known. The supervisor can select one of the access events listed in area 104, e.g. by clicking on it. and cause the
corresponding portion of video footage to be played in a region 105. The above operation may be repeated multiple times using different successive search criteria. It will be appreciated that the supervisor is able to gain access to portions of video footage and/or event logs corresponding to access events rapidly and without reviewing video footage extending over the whole of the time range of interest. As noted above, the index data for an access event may include the number of people who passed through the corresponding door or other portal. In this case, the search criteria may be to search for access events for which this number is plural, since these access events are more likely to be associated with security violations. Note that the access events of the first type may only comprise successful interactions with the secunty devices 21, i.e. interactions which lead to the security devices 21 opening the corresponding door(s) 3. Alternatively, they may include also unsuccessful attempts by a user to interact with the security devices 21 to open corresponding door(s) 3. For example, a portion of video footage may be stored whenever a finger is pressed against biometric device 212, irrespective of whether the registered fingerprint is such as to permit unlocking of the door 3.
Reverting to Fig. 1, the operation of the heat sensor 2 6 will now be described. This heat sensor 216 is of a type suitable for detecting the body temperature of a user who interacts with the security device. The control device 215 uses the output of the heat sensor 216 in determining whether to operate the lock device 23 to unlock the door 3. For example, the control device 215 may determine whether the body temperature of the user is above a predetermined temperature threshold. In the case that the detected bod)' temperature of the user is above the predetermined threshold, the control device 215 may decline to operate the lock device 23 to unlock the door 3 even if the data transmitted by the user to the control device 215 using one or more of the camera 211, biometrics sensor 212, reader 213 or keypad 214 matches the security information in the library.
Fig. 3 shows a possible flow diagram for the operation of the control device. In a step 41 the control device 215 determines whether the data transmitted b3' the user to the control device matches the security information. If so, in a step 42, the control device 215 determines whether the body temperature of the user is below the threshold. Only if the determination is positive in both steps 41 and 42 is the door unlocked in step 43. In other embodiments, the order of steps 41 and 42 may be reversed. Note that in other embodiments either or both of these determinations may be carried out by the server 1.
The predetermined temperature threshold may optionally be controllable, e.g. at the server 1.
The control device 215 may include an override system which causes the control device 215 to operate the lock device 23 to unlock the door 3 even if a user has an elevated temperature, provided that some additional security test is met, for example that the user is determined to be a supervisor. Optionally, the feature of using the output of the heat sensor 216 to control the control device 215 may be disabled selectively, e.g. by commands input to the server 1. For example, in periods when there is an epidemic of a disease (e.g. a potentially fatal disease) associated with increased temperatures in patients, it may be sensible to implement this feature of the control device 215, whereas at other times (e.g. when an increased body temperature is more likely to be due to some other cause), it may be preferable not to implement the feature.

Claims

Claims
1. A seciire access system comprising:
one or more lock devices;
one or more security devices associated with corresponding ones of the lock devices, the one or more security devices being arranged to receive data from an individual and to control the associated lock devices;
one or more cameras, each security device being associated with one or more of the cameras, and
at least one data storage device for storing images captured by the one or more cameras;
the system being arranged, upon an access event, to perform a recording step in which the at least one data storage device creates a record associated with one or more images captured by at least one of the one or more cameras, and index data
characterizing the access event.
2. A secure access system according to claim 1 in which the one or more cameras are video cameras, the images captured by the one or more cameras are video footage, and for each access event the corresponding record is associated with a corresponding portion of the video footage captured by at least one of the video cameras.
3. A secure access system according to claim 1 which is arranged to perform said recording step in the case of an access event in which an individual interacts with one of the security devices to transmit data to the security device.
4. A secure access system according to claim 3 in which the index data includes one or more of:
the time of the access event,
data registered by the security device during the corresponding access event; or data specifying the identity of the individual who triggered the access event.
5. A secure access system according to claim 1 which is arranged to perform said recording step in the case of an access event in which the presence of an mdividual is detected by a motion sensor, and the index data includes the time of the access event.
6. A secure access system according to claim 5 in which the motion sensor comprises a processor for receiving the output of the one or more cameras, and for determining that an individual has moved using said output of the one or more cameras.
7. A secure access system according to claim 1 in which the or each security device comprises one or more of:
a biometric sensor;
a camera; or
a reader for communicating with a security token, such as a wireless readenan audio sensor,
a heat sensor,
a humidity sensor,
a vibration sensor,
a shock sensor, and
a smoke sensor.
8. A secure access system according to claim 1 in which the security device includes a heat sensor for detecting the body temperature of a user, the secure access system being arranged measure the body temperature of a user interacting with the security device, determine whether the measured body temperature is below a threshold, and only to unlock the associated lock devices if the determination is positive.
9. A secure access system according to claim 1 further comprising a server remote from the one or more security devices and the one or more cameras, and arranged to communicate with the one or more security devices and the one or more cameras over a communication network.
10. A secure access system according to claim 8 in which the security devices are arranged, upon an access event in which an individual interacts with one of the security devices, to transmit to the server data registered by that one of the security devices. the server being arranged to perform a comparison is of data registered by that one of the security devices with a database of data associated with authorized users, and upon a match being found, to instruct that one of the security devices the operate the corresponding lock device, whereby access to a secure location is permitted.
11 . A secure access system according to claim 2 in which the data storage device is arranged to store video footage from the one or more video cameras continuously, each of the portions of video footage being a section of the continuous stored video footage, the data storage device further storing for each access event corresponding data indicating the location within the stored continuous video footage of the portion of video data.
12. A secure access system according to claim 2 in which the data storage device is arranged to commence or cease storing video footage from the video cameras with a timing caused by the access events.
13. A secure access system according to claim 2 in which each portion of video footage comprises video footage captured both before and after the corresponding access event.
14. A secure access system according to claim 1 further comprising a database interrogation system for receiving search criteria, for performing a search for portions of the images stored by the data storage device, and for displaying said images which are identified in the search.
15. A secure access system comprising:
one or more lock devices; one or more security devices associated with corresponding ones of the lock devices, the one or more security devices being arranged to receive data from an individual and to control the associated lock devices;
each of the one or more security device including a heat sensor for detecting a human body temperature, the secure access system being arranged to:
(i) use the heat sensor to measure the body temperature of an individual interacting with the security device, and determine whether the measured body temperature is below a threshold;
(ii) determine whether data received from the individual matches a library of security data; and
(iii) to unlock the associated lock devices if both the determinations are positive.
PCT/SG2009/000362 2009-10-05 2009-10-05 Record storage within a secure access system WO2011043732A1 (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
PCT/SG2009/000362 WO2011043732A1 (en) 2009-10-05 2009-10-05 Record storage within a secure access system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
PCT/SG2009/000362 WO2011043732A1 (en) 2009-10-05 2009-10-05 Record storage within a secure access system

Publications (1)

Publication Number Publication Date
WO2011043732A1 true WO2011043732A1 (en) 2011-04-14

Family

ID=43857011

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/SG2009/000362 WO2011043732A1 (en) 2009-10-05 2009-10-05 Record storage within a secure access system

Country Status (1)

Country Link
WO (1) WO2011043732A1 (en)

Cited By (36)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103337104A (en) * 2013-07-08 2013-10-02 曹国基 Identification signal detecting method and equipment thereof
CN103729956A (en) * 2013-12-30 2014-04-16 国家电网公司 Wireless numerical control security and protection system of power distribution room
DE102013112730A1 (en) * 2013-11-19 2015-05-21 Martin Schwab Locking system and method for operating a locking system
CN105242811A (en) * 2015-11-10 2016-01-13 佛山市汇泰龙智能科技有限公司 Sensing module, sensing system and sensing method for receiving touch signal and sensing card signal
US9934633B2 (en) 2013-10-24 2018-04-03 Palantir Technologies Inc. Tactical security system
US20180101735A1 (en) * 2015-12-21 2018-04-12 Ring Inc. Sharing video footage from audio/video recording and communication devices
WO2019017440A1 (en) * 2017-07-21 2019-01-24 株式会社村田製作所 Entrance/exit management system and entrance/exit management method
JP2019124012A (en) * 2018-01-12 2019-07-25 ナブテスコ株式会社 Automatic door
CN111210556A (en) * 2020-03-03 2020-05-29 江苏中数智慧信息科技有限公司 Video entrance guard security protection linked system
US10685060B2 (en) 2016-02-26 2020-06-16 Amazon Technologies, Inc. Searching shared video footage from audio/video recording and communication devices
US10733456B2 (en) 2015-12-21 2020-08-04 A9.Com, Inc. Sharing video footage from audio/video recording and communication devices
GB2581575A (en) * 2018-12-18 2020-08-26 Richard Howe Anthony Access system for an opening and method of use thereof
US10762646B2 (en) 2016-02-26 2020-09-01 A9.Com, Inc. Neighborhood alert mode for triggering multi-device recording, multi-camera locating, and multi-camera event stitching for audio/video recording and communication devices
US10841542B2 (en) 2016-02-26 2020-11-17 A9.Com, Inc. Locating a person of interest using shared video footage from audio/video recording and communication devices
US10917618B2 (en) 2016-02-26 2021-02-09 Amazon Technologies, Inc. Providing status information for secondary devices with video footage from audio/video recording and communication devices
WO2021024681A1 (en) * 2019-08-06 2021-02-11 日本碍子株式会社 Alkaline secondary battery and alkaline secondary battery module
US10978199B2 (en) 2019-01-11 2021-04-13 Honeywell International Inc. Methods and systems for improving infection control in a building
DE102020110695A1 (en) 2020-04-20 2021-10-21 Wanzl GmbH & Co. KGaA Through system
US11165987B2 (en) 2015-12-21 2021-11-02 Amazon Technologies, Inc. Sharing video footage from audio/video recording and communication devices
US11184739B1 (en) 2020-06-19 2021-11-23 Honeywel International Inc. Using smart occupancy detection and control in buildings to reduce disease transmission
DE102020119264A1 (en) 2020-07-21 2022-01-27 Mühlbauer Gmbh & Co. Kg Method and device for personal access control depending on a temperature measurement
US11288945B2 (en) 2018-09-05 2022-03-29 Honeywell International Inc. Methods and systems for improving infection control in a facility
US11335172B1 (en) 2016-02-26 2022-05-17 Amazon Technologies, Inc. Sharing video footage from audio/video recording and communication devices for parcel theft deterrence
US11372383B1 (en) 2021-02-26 2022-06-28 Honeywell International Inc. Healthy building dashboard facilitated by hierarchical model of building control assets
US11393108B1 (en) 2016-02-26 2022-07-19 Amazon Technologies, Inc. Neighborhood alert mode for triggering multi-device recording, multi-camera locating, and multi-camera event stitching for audio/video recording and communication devices
US11399157B2 (en) 2016-02-26 2022-07-26 Amazon Technologies, Inc. Augmenting and sharing data from audio/video recording and communication devices
US11402113B2 (en) 2020-08-04 2022-08-02 Honeywell International Inc. Methods and systems for evaluating energy conservation and guest satisfaction in hotels
US11474489B1 (en) 2021-03-29 2022-10-18 Honeywell International Inc. Methods and systems for improving building performance
US11620594B2 (en) 2020-06-12 2023-04-04 Honeywell International Inc. Space utilization patterns for building optimization
US11619414B2 (en) 2020-07-07 2023-04-04 Honeywell International Inc. System to profile, measure, enable and monitor building air quality
US11662115B2 (en) 2021-02-26 2023-05-30 Honeywell International Inc. Hierarchy model builder for building a hierarchical model of control assets
US11783652B2 (en) 2020-06-15 2023-10-10 Honeywell International Inc. Occupant health monitoring for buildings
US11783658B2 (en) 2020-06-15 2023-10-10 Honeywell International Inc. Methods and systems for maintaining a healthy building
US11823295B2 (en) 2020-06-19 2023-11-21 Honeywell International, Inc. Systems and methods for reducing risk of pathogen exposure within a space
US11894145B2 (en) 2020-09-30 2024-02-06 Honeywell International Inc. Dashboard for tracking healthy building performance
US11914336B2 (en) 2020-06-15 2024-02-27 Honeywell International Inc. Platform agnostic systems and methods for building management systems

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20020067259A1 (en) * 2000-09-29 2002-06-06 Fufidio Michael Vincent Portal intrusion detection apparatus and method
DE10357411A1 (en) * 2002-12-04 2004-11-25 Jana Angelow Access control system for closed room includes data processing unit with integrated permanent storage for image data that is secured against unauthorized access
US20050057649A1 (en) * 2003-09-12 2005-03-17 Marks George R. Surveillance system responsive to lockset operation
WO2007106945A1 (en) * 2006-03-22 2007-09-27 Tupalek Pty Ltd An identification system
DE102006036108A1 (en) * 2006-05-19 2007-11-22 Siemens Ag Controlling device for persons, has primary investigation unit for executing multiple investigation process to determine identity of person, secondary investigation unit for determining identity of objects and evaluating processor unit
US20080204559A1 (en) * 2006-01-05 2008-08-28 Shary Nassimi Gate Access System with Visitor Imaging and Memory

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20020067259A1 (en) * 2000-09-29 2002-06-06 Fufidio Michael Vincent Portal intrusion detection apparatus and method
DE10357411A1 (en) * 2002-12-04 2004-11-25 Jana Angelow Access control system for closed room includes data processing unit with integrated permanent storage for image data that is secured against unauthorized access
US20050057649A1 (en) * 2003-09-12 2005-03-17 Marks George R. Surveillance system responsive to lockset operation
US20080204559A1 (en) * 2006-01-05 2008-08-28 Shary Nassimi Gate Access System with Visitor Imaging and Memory
WO2007106945A1 (en) * 2006-03-22 2007-09-27 Tupalek Pty Ltd An identification system
DE102006036108A1 (en) * 2006-05-19 2007-11-22 Siemens Ag Controlling device for persons, has primary investigation unit for executing multiple investigation process to determine identity of person, secondary investigation unit for determining identity of objects and evaluating processor unit

Cited By (49)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103337104A (en) * 2013-07-08 2013-10-02 曹国基 Identification signal detecting method and equipment thereof
US9934633B2 (en) 2013-10-24 2018-04-03 Palantir Technologies Inc. Tactical security system
DE102013112730A1 (en) * 2013-11-19 2015-05-21 Martin Schwab Locking system and method for operating a locking system
DE102013112730B4 (en) * 2013-11-19 2020-03-19 Martin Schwab Computer center and method for operating a computer center
CN103729956A (en) * 2013-12-30 2014-04-16 国家电网公司 Wireless numerical control security and protection system of power distribution room
CN105242811A (en) * 2015-11-10 2016-01-13 佛山市汇泰龙智能科技有限公司 Sensing module, sensing system and sensing method for receiving touch signal and sensing card signal
US10733456B2 (en) 2015-12-21 2020-08-04 A9.Com, Inc. Sharing video footage from audio/video recording and communication devices
US20180101735A1 (en) * 2015-12-21 2018-04-12 Ring Inc. Sharing video footage from audio/video recording and communication devices
US11335097B1 (en) 2015-12-21 2022-05-17 Amazon Technologies, Inc. Sharing video footage from audio/video recording and communication devices
US10650247B2 (en) * 2015-12-21 2020-05-12 A9.Com, Inc. Sharing video footage from audio/video recording and communication devices
US11165987B2 (en) 2015-12-21 2021-11-02 Amazon Technologies, Inc. Sharing video footage from audio/video recording and communication devices
US11240431B1 (en) 2016-02-26 2022-02-01 Amazon Technologies, Inc. Sharing video footage from audio/video recording and communication devices
US10685060B2 (en) 2016-02-26 2020-06-16 Amazon Technologies, Inc. Searching shared video footage from audio/video recording and communication devices
US11399157B2 (en) 2016-02-26 2022-07-26 Amazon Technologies, Inc. Augmenting and sharing data from audio/video recording and communication devices
US10762646B2 (en) 2016-02-26 2020-09-01 A9.Com, Inc. Neighborhood alert mode for triggering multi-device recording, multi-camera locating, and multi-camera event stitching for audio/video recording and communication devices
US10796440B2 (en) 2016-02-26 2020-10-06 Amazon Technologies, Inc. Sharing video footage from audio/video recording and communication devices
US10841542B2 (en) 2016-02-26 2020-11-17 A9.Com, Inc. Locating a person of interest using shared video footage from audio/video recording and communication devices
US10917618B2 (en) 2016-02-26 2021-02-09 Amazon Technologies, Inc. Providing status information for secondary devices with video footage from audio/video recording and communication devices
US11393108B1 (en) 2016-02-26 2022-07-19 Amazon Technologies, Inc. Neighborhood alert mode for triggering multi-device recording, multi-camera locating, and multi-camera event stitching for audio/video recording and communication devices
US10979636B2 (en) 2016-02-26 2021-04-13 Amazon Technologies, Inc. Triggering actions based on shared video footage from audio/video recording and communication devices
US11335172B1 (en) 2016-02-26 2022-05-17 Amazon Technologies, Inc. Sharing video footage from audio/video recording and communication devices for parcel theft deterrence
US11158067B1 (en) 2016-02-26 2021-10-26 Amazon Technologies, Inc. Neighborhood alert mode for triggering multi-device recording, multi-camera locating, and multi-camera event stitching for audio/video recording and communication devices
WO2019017440A1 (en) * 2017-07-21 2019-01-24 株式会社村田製作所 Entrance/exit management system and entrance/exit management method
JP2019124012A (en) * 2018-01-12 2019-07-25 ナブテスコ株式会社 Automatic door
JP6990114B2 (en) 2018-01-12 2022-01-12 ナブテスコ株式会社 Automatic door
US11288945B2 (en) 2018-09-05 2022-03-29 Honeywell International Inc. Methods and systems for improving infection control in a facility
US11626004B2 (en) 2018-09-05 2023-04-11 Honeywell International, Inc. Methods and systems for improving infection control in a facility
GB2581575A (en) * 2018-12-18 2020-08-26 Richard Howe Anthony Access system for an opening and method of use thereof
US10978199B2 (en) 2019-01-11 2021-04-13 Honeywell International Inc. Methods and systems for improving infection control in a building
US11887722B2 (en) 2019-01-11 2024-01-30 Honeywell International Inc. Methods and systems for improving infection control in a building
WO2021024681A1 (en) * 2019-08-06 2021-02-11 日本碍子株式会社 Alkaline secondary battery and alkaline secondary battery module
CN111210556A (en) * 2020-03-03 2020-05-29 江苏中数智慧信息科技有限公司 Video entrance guard security protection linked system
DE102020110695A1 (en) 2020-04-20 2021-10-21 Wanzl GmbH & Co. KGaA Through system
US11620594B2 (en) 2020-06-12 2023-04-04 Honeywell International Inc. Space utilization patterns for building optimization
US11783658B2 (en) 2020-06-15 2023-10-10 Honeywell International Inc. Methods and systems for maintaining a healthy building
US11783652B2 (en) 2020-06-15 2023-10-10 Honeywell International Inc. Occupant health monitoring for buildings
US11914336B2 (en) 2020-06-15 2024-02-27 Honeywell International Inc. Platform agnostic systems and methods for building management systems
US11184739B1 (en) 2020-06-19 2021-11-23 Honeywel International Inc. Using smart occupancy detection and control in buildings to reduce disease transmission
US11778423B2 (en) 2020-06-19 2023-10-03 Honeywell International Inc. Using smart occupancy detection and control in buildings to reduce disease transmission
US11823295B2 (en) 2020-06-19 2023-11-21 Honeywell International, Inc. Systems and methods for reducing risk of pathogen exposure within a space
US11619414B2 (en) 2020-07-07 2023-04-04 Honeywell International Inc. System to profile, measure, enable and monitor building air quality
DE102020119264A1 (en) 2020-07-21 2022-01-27 Mühlbauer Gmbh & Co. Kg Method and device for personal access control depending on a temperature measurement
US11402113B2 (en) 2020-08-04 2022-08-02 Honeywell International Inc. Methods and systems for evaluating energy conservation and guest satisfaction in hotels
US11894145B2 (en) 2020-09-30 2024-02-06 Honeywell International Inc. Dashboard for tracking healthy building performance
US11599075B2 (en) 2021-02-26 2023-03-07 Honeywell International Inc. Healthy building dashboard facilitated by hierarchical model of building control assets
US11662115B2 (en) 2021-02-26 2023-05-30 Honeywell International Inc. Hierarchy model builder for building a hierarchical model of control assets
US11815865B2 (en) 2021-02-26 2023-11-14 Honeywell International, Inc. Healthy building dashboard facilitated by hierarchical model of building control assets
US11372383B1 (en) 2021-02-26 2022-06-28 Honeywell International Inc. Healthy building dashboard facilitated by hierarchical model of building control assets
US11474489B1 (en) 2021-03-29 2022-10-18 Honeywell International Inc. Methods and systems for improving building performance

Similar Documents

Publication Publication Date Title
WO2011043732A1 (en) Record storage within a secure access system
US20130076482A1 (en) Secure access system employing biometric identification
US11205312B2 (en) Applying image analytics and machine learning to lock systems in hotels
US6794986B2 (en) Access control method and apparatus for members and guests
US7907753B2 (en) Access control system with symbol recognition
US7948357B2 (en) Free-space gesture recognition for transaction security and command processing
JP4751442B2 (en) Video surveillance system
KR101838858B1 (en) Access control System based on biometric and Controlling method thereof
EP3486876B1 (en) Method, device and system for controlling opening of ab doors
US20050219360A1 (en) Method and apparatus for biometric access control with fully integrated digital video storage and retrieval
KR20040105846A (en) Vision-based operating method and system
US20120169880A1 (en) Method and system for video-based gesture recognition to assist in access control
EP2131321B1 (en) Imaging device, imaging method, and imaging program
WO2008066130A1 (en) Access control device, access control system and access control method
US11847876B2 (en) Systems and methods of secure pin code entry
JP2008040828A (en) Entering/leaving management system
US20190108697A1 (en) Method for the checking of access authorizations by means of an access control system
JP5023527B2 (en) Admission management system, data processing apparatus, admission management method, and admission management program
KR20220010218A (en) Visiter Monitering System for Infectious Disease and Method Thereof
KR102124164B1 (en) Inner door system with visitor monitoring function
KR20090041619A (en) Entrance and exit control system
JP2018111920A (en) Door control program, door control method and door control device
US20190236920A1 (en) Office building security system using fiber sensing
KR100384949B1 (en) Door opening-shutting and entry person identification method using door opening-shutting system and fingerprint recognition electronic card key
Dhir et al. Biometric recognition: A modern era for security

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 09850294

Country of ref document: EP

Kind code of ref document: A1

DPE1 Request for preliminary examination filed after expiration of 19th month from priority date (pct application filed from 20040101)
NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 09850294

Country of ref document: EP

Kind code of ref document: A1