WO2015130641A1 - Gestion spécifique de contexte dans un réseau de capteurs sans fil - Google Patents

Gestion spécifique de contexte dans un réseau de capteurs sans fil Download PDF

Info

Publication number
WO2015130641A1
WO2015130641A1 PCT/US2015/017221 US2015017221W WO2015130641A1 WO 2015130641 A1 WO2015130641 A1 WO 2015130641A1 US 2015017221 W US2015017221 W US 2015017221W WO 2015130641 A1 WO2015130641 A1 WO 2015130641A1
Authority
WO
WIPO (PCT)
Prior art keywords
individuals
devices
virtual
networked system
computing devices
Prior art date
Application number
PCT/US2015/017221
Other languages
English (en)
Inventor
Paul B. Rasband
Original Assignee
Rasband Paul B
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Priority claimed from US14/463,733 external-priority patent/US9316720B2/en
Application filed by Rasband Paul B filed Critical Rasband Paul B
Priority to EP15755417.1A priority Critical patent/EP3111587B1/fr
Priority to KR1020167026981A priority patent/KR20170018808A/ko
Priority to JP2016554636A priority patent/JP2017509988A/ja
Publication of WO2015130641A1 publication Critical patent/WO2015130641A1/fr

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/002Countermeasures against attacks on cryptographic mechanisms
    • H04L9/004Countermeasures against attacks on cryptographic mechanisms for fault attacks

Definitions

  • This description relates to operation of security systems in particular intrusion systems.
  • Security systems often include an intrusion detection panel that is electrically or wirelessly connected to a variety of sensors. Those sensors types typically include motion detectors, cameras, and proximity sensors (used to determine whether a door or window has been opened). Typically, such systems receive a very simple signal (electrically open or closed) from one or more of these sensors to indicate that a particular condition being monitored has changed or become unsecure.
  • Wireless sensor networks in examples of applications include area access control (door locks, etc.), intrusion detection (door locks, window locks, proximity- sensing), fire safety (smoke detectors) and so on. Wireless networks could also be used to track the location of people inside a building or at a site using various triangulations and ranging methods. Disclosed are techniques by which inferences of high-level information can be determined from low-level sensor data by providing techniques to derive useful information from raw data sensor outputs and reports from nodes in a wireless sensor network, as the data relates to positions of individuals within a monitored area.
  • detection/alarm monitoring includes one or more computing devices configured to receive sensory inputs from credentials or badges within a monitored premises, determine virtual groups of individuals associated with the received credential data by determining from the received inputs relati ve proximity of individuals to each other over periods of time, store the determined virtual groups of individuals into a list of tag locations, modify over time frames of configurable duration the virtual groupings by changing the list of tag locations for each virtual group as virtual group membership changes, and apply rules set to the grouping information to track and detect individuals within the virtual group.
  • a method of detection of physical intrusion within a monitored area includes receiving by one or more computing devices, sensory- inputs from credentials or badges within a monitored premises, determining by the one or more computing devices, virtual groups of individuals associated with the recei ved credential data by determining from the received inputs relative proximity of individuals to each other over periods of time, storing by the one or more computing devices, the determined virtual groups of individuals into a list of tag locations, modify by the one or more computing devices over time frames of configurable duration the virtual groupings by changing the list of tag locations for each virtual group as virtual group membership changes, and applying by the one or more computing devices, rules set to the grouping information to track and detect individuals within the virtual group.
  • the approach groups individuals into virtual groups over relatively short time frames of configurable duration. With the use of that grouping information the techniques functionality determine status of individuals in the groups.
  • the groupings are dynamic in that the groupings form, dissolve, and otherwise change in real-time as new information is made available regarding the current location of individuals.
  • the groups are "fuzzy" in that a given individual may be assigned to a group with a certain degree of certainty / uncertainty derived from past experience. This management of groups of individuals provides value to low level applications.
  • the approach uses rules or sets of rules (composite rules) residing in either a single device or distributed over many devices (i.e., in the application layer software of a set of end-nodes, or other combinations of network nodes and hosts) to define just what comprises a test for virtual group membership.
  • rules can be implemented using application code modules loaded into the various devices and changed over time, using real-time code relocation and execution (dynamic programming).
  • FIG. 1 is a schematic diagram of an exemplary networked security system.
  • FIG. 2 is a flow chart depicting context specific management processing.
  • FIG. 3 is a flow chart depicting a particular use of context specific management processing.
  • FIG. 4 is a flow chart depicting receiving data for context specific management processing.
  • FIG. 5 is a block diagram of a device that executes context specific management processing.
  • FIG. 6 is a block diagram of components of an example networked security system. DETAILED DESCRIPTION
  • Example security systems may include an intrusion detection panel that is electrically or wirelessly connected to a variety of sensors.
  • Those sensors types may include motion detectors, cameras, and proximity sensors (used, e.g., to determine whether a door or window has been opened).
  • proximity sensors used, e.g., to determine whether a door or window has been opened.
  • Such systems receive a relatively simple signal (electrically open or closed) from one or more of these sensors to indicate that a particular condition being monitored has changed or become unsecure.
  • typical intrusion systems can be set-up to monitor entry doors in a building.
  • a proximity sensor senses a magnetic contact and produces an electrically closed circuit.
  • the proximity sensor opens the circuit, and sends a signal to the panel indicating that an alarm condition has occurred (e.g., an opened entry door).
  • Data collection systems are becoming more common in some applications, such as home safety monitoring.
  • Data collection systems employ wireless sensor networks and wireless devices, and may include remote server-based momtormg and report generation.
  • wireless sensor networks generally use a combination of wired and wireless links between computing devi ces, with wireless links usually used for the lowest level connections (e.g., end-node device to
  • the edge (wirelessly-connected) tier of the network is comprised of resource-constrained devices with specific functions. These devices may have a small-to-moderate amount of processing power and memory, and may be batter ⁇ 7 powered, thus requiring that they conserve energy by spending much of their time in sleep mode.
  • a typical model is one where the edge devices generally form a single wireless network in which each end-node communicates directly with its parent node in a hub-and-spoke-style architecture.
  • the parent node may be, e.g., an access point on a gateway or a sub-coordinator which is, in turn, connected to the access point or another sub-coordinator.
  • FIG. 1 an exemplary (global) distributed network 10 topology for a Wireless Sensor Network (WSN) is shown.
  • the distributed network 10 is logically divided into a set of tiers or hierarchical levels 12a- 12c.
  • an upper tier or hierarchical level 12a of the network are disposed servers and/or virtual servers 14 running a "cloud computing" paradigm that are networked together using well- established networking technology such as Internet protocols or which can be private networks that use none or part of the Internet.
  • Applications that run on those servers 14 communicate using various protocols such as for Web Internet networks XML/SOAP, RESTful web service, and other application layer technologies such as HTTP and ATOM.
  • the distributed network 10 has direct links between devices (nodes) as shown and discussed below.
  • the distributed network 10 includes a second logically divided tier or hierarchical level 12b, referred to here as a middle tier that involves gateways 16 located at central, convenient places inside individual buildings and structures. These gateways 16 communicate with servers 14 in the upper tier whether the servers are stand-alone dedicated servers and/or cloud based servers running cloud applications using web programming techniques.
  • the middle tier gateways 16 are also shown with both local area network 17a (e.g., Ethernet or 802.1 1 ) and cellular network interfaces 17b.
  • the distributed network topology also includes a lower tier (edge layer) 12c set of devices that involve fully-functional sensor nodes 18 (e.g., sensor nodes that include wireless devices, e.g., transceivers or at least transmitters, which in FIG. 1 are marked in with an "F") as well as constrained wireless sensor nodes or sensor end-nodes 20 (marked in the FIG. 1 with "C").
  • fully-functional sensor nodes 18 e.g., sensor nodes that include wireless devices, e.g., transceivers or at least transmitters, which in FIG. 1 are marked in with an "F"
  • constrained wireless sensor nodes or sensor end-nodes 20 marked in the FIG. 1 with "C”
  • wired sensors can be included in aspects of the distributed network 10.
  • Constrained computing devices 20 as used herein are devices with substantially less persistent and volatile memory other computing devices, sensors in a detection system. Cun-ently examples of constrained devices would be those with less than about a megabyte of flash/persistent memory, and less than 10-20 kbytes of RAM/volatile memory). These constrained devices 20 are configured in this manner; generally due to cost/physical configuration considerations.
  • the edge (wirelessly-connected) tier of the network is comprised of highly resource-constrained devices with specific functions. These devices have a small-to-moderate amount of processing power and memory, and often are battery powered, thus requiring that they conserve energy by spending much of their time in sleep mode,
  • a typical model is one where the edge devices generally form a single wireless network in which each end-node communicates directly with its parent node in a hub-and-spoke-style architecture.
  • the parent node may be, e.g., an access point on a gateway or a sub-coordinator which is, in turn, connected to the access point or another sub-coordinator.
  • Each gateway is equipped with an access point (fully functional node or "F" node) that is physically attached to that access point and that provides a wireless connection point to other nodes in the wireless network.
  • the links (illustrated by lines not numbered) shown in FIG. 1 represent direct (single-hop network layer) connections between devices.
  • a formal networking layer (that functions in each of the three tiers shown in FIG. 1) uses a series of these direct links together with routing devices to send messages (fragmented or non- fragmented) from one device to another over the network.
  • the WSN 10 implements a state machine approach to an application layer that runs on the lower tier devices 18 and 20. Discussed below is an example of a particular implementation of such an approach. States in the state machine are comprised of sets of functions that execute in coordination, and these functions can be individually deleted or substituted or added, by a manager program to in order to alter the states in the state machine of a particular lower tier device.
  • the WSN state function based application layer uses an edge device operating system (not shown, but such as disclosed in the above mentioned provisional application) that allows for loading and execution of individual functions (after the booting of the device) without rebooting the device (so-called "dynamic
  • edge devices could use other operating systems provided such systems allow for loading and execution of individual functions (after the booting of the device) preferable without rebooting of the edge devices.
  • context specific management involves grouping of individuals into virtual groups over relatively short time frames of configurable duration, and the use of grouping information to track and detect individuals, e.g., non- credentialed individuals or credentialed individuals in unauthorized areas, etc.
  • the context specific management can use the information obtained from sensors as discussed above. Duration of groupings can be fixed, preselected or user-selectable. Context specific management processing can be executed on any of the systems mentioned in FIG. 1 or equivalent systems.
  • Context specific management can be explained as follows. Three individuals are walking down a hallway in a building, each of whom is wearing a name tag or badge containing a wireless network node that when read by a tag reading sensor produces a message with data that identifies the individual to whom the badge or tag was assigned. This read data is received 32 by a server or gateway from one or more tag reading sensors as each individual wearing the badge (WSN end-node) moves down the hallway and throughout the building. As the badge is read by sensor nodes in the network (FIG. 1), the precise badge locations can be determined 34 by various techniques such as triangulation, TX power level sweeping, and/or combinations of other methods to pinpoint with some defined precision, the location of the badge in the building hallway. (The degree of precision is principally related to the number, spacing, accuracy, etc . of individual sensor nodes, as well as the range and coverage of such nodes and thus is implementation specific.)
  • Messages are produced by the mobile nodes (name badge nodes) and passed to other sensor network nodes in the wireless network discussed above.
  • nodes in the network process these messages without continual involvement of systems at the higher tiers, e.g., the first and second tiers.
  • tiers e.g., the first and second tiers.
  • the server executes a group identifier application.
  • the group identifier application 36 running in the server computes and re-computes 38 the location of each of the three individuals a number of times.
  • This groiip identifier application continually scans 40 a list of tag locations "tag location list" built from the messages passed among the nodes and between the nodes and the gateway, and determines a correlation related to the three badge nodes - namely that they are all within or nearly within the limits of location resolution of the overall system (i.e., in the same general area) for a series of different locations and/or times, and according to its current threshold values and logic the group identifier app produces a virtual group 42 comprised of the three individuals.
  • This virtual grouping is a record or other structure (shown below as a table) stored on computer storage, e.g., in a database etc. that includes the Tags associated with the group, the location where each tag was read, "Tag location” and the time of reading the tag "Time” and enters this into the tag location list that the group identifier application maintains over time.
  • the tag location list can take many different forms.
  • a tag location list can comprise a list such as below:
  • Tags wil l have associated information that includes the assigned user or possessor of the tag, e.g., dept. information and so forth.
  • the groupings are dynamic in that they form, dissolve, and otherwise change in real-time as new information is made available regarding the current location of the various individuals involved.
  • the groupings are also "fuzzy" (borrowing a term from applied artificial intelligence) in that a given individual may be assigned to a group with a certain degree of certainty / uncertainty derived from past experience.
  • Rules can be established for determining virtual groupings. For example, one individual observed to be in close proximity to another individual for a very brief moment in time (during one location computation period if the locations are recomputed for all people in the building every 15 seconds for example) has a relatively small chance of being in a real group (i.e., there is a small chance that the same two mdividuals will be at the same location in the next location computation period). If two individuals are identified at the same location for two consecutive computation periods there is a somewhat greater chance that they will be observed together in the third computation period (that is, 2 periods together infers a 3rd with greater success than I period together infers a 2nd period together).
  • the relative chances or N to N+l correlation can be computed using historical data and regression techniques by the group identifier app or other computation modules.
  • a user could supply a threshold value during application configuration, e.g., if there is a 90% chance that two individuals will be observed together in the next location computation period then they are by definition members of a common virtual group.
  • the Context specific management also includes the use of rules or sets of rules (composite rules) residing in either a single device or distributed over many devices (i.e., in the application layer software of a set of end-nodes, or other combinations of network nodes and hosts) to define just what comprises a test for virtual group membership.
  • rules can be implemented using application code modules loaded into the various devices and changed over time, using real-time code relocation and execution (dynamic programming).
  • one fixed infrastructure node identifies two mobile nodes together at time 1
  • a second fixed infrastructure node identifies the same two mobile nodes together at time 2
  • the data is pooled or compared before it is possible for the group identifier application to recognize that the same two mobile nodes have been observed together during two consecutive location computation periods.
  • This can be done in fixed node 1 after a message sent to it by fixed node 2, or it can be done in fixed node 2 after a message sent to it by fixed node 1 , or it can be done in some other node (e.g., a parent node such as a common sub-coordinator) after messages are sent to it by both fixed node 1 and fixed node 2.
  • the process of defining virtual groups can be done in analogous but more complex ways by each fixed node in a network reporting in broadcast mode whenever a mobile node makes a significant change in location.
  • the collection of broadcast messages can be moni tored by the set of all nodes, and each node can maintain i ts own list of virtual groups based on processing performed by that node of which mobile tags have sent messages to that node and which nodes in the set have informed that node and which nodes in the set observed the mobile tags for a certain number of consecutive location computation periods by that node set.
  • Another way is for a central application to monitor all published reports of individual mobile node location through time, and use matrix calculations to determine correlations of locations of two or more mobile nodes.
  • the application logic for context specific management performs associations based on an associative expectation, meaning that if person I travels with person 2 for a period of time, and person 2 travels with person 3 for a period of time (not necessarily the same time), then person 1 can be associated with person 3. It can further be inferred that person 1 knows person 3 if person 1 is frequently observed with person 2, and person 2 with person 3 (though not necessarily person 1 with person 3 directly).
  • an emergency condition e.g., a building fire and evacuation order (any condition can exist, this one is merely explanatory).
  • an application running on a computer tablet used by the fire fighters accesses 52 the tag location list to determine what badges were active inside the building at the time of the fire, (and to the extent possible what badges are still active inside the building.
  • the application running on the tablet can consult the group identifier app and determine which virtual groups 56 were in existence at the time of the alarm, and consult individuals to determine whether all of the members of each virtual group was observed leaving the building or seen subsequently outside (or perhaps just as importantly, their last known location inside the building as
  • one fixed infrastructure node may have data on the location of some people (mobile end-nodes) 62 while other fixed infrastructure nodes 64 may have data on other mobile nodes at one time, or the same mobile nodes at some different time.
  • the group identifier application may use messages from these and other fixed infrastructure nodes to share information 66 on virtual groups and prospective groups in order to determine whether a group exists within the confidence threshold specified.
  • the video information captured by cameras can be used along with the tag list information to correlate and further manage the context specifi c locations of individuals.
  • the nodes may be implemented using any appropriate type of computing device, such as a mainframe work station, a personal computer, a server, a portable computing device, or any other type of intelligent device capable of executing instructions, connecting to a network, and forwarding data packets through the network.
  • the nodes can execute any appropriate computer programs to generate, receive, and transmit data packets for use on the network.
  • the device 70 includes a processor 74, memory 76, and storage 78 along with a network interface 80 and other interfaces 82 connected via a bus 73 or similar interconnect.
  • the device 70 can be representative of any of the foregoing nodes for execution of the context specific management processing.
  • a device to access the group identifier application and tag list for use of data produced by context specific processing will have similar circuitry, but will be configured with the processing corresponding to that discussed in FIGS. 3 and 4.
  • FIG. 6 shows an example of a security system having features of the WSN described with respect to FIGS. 1 to 5 and having the various functionalities described herein.
  • correlation processing receives inputs from certain constrained nodes (although these can also be fully functional nodes). These inputs may include credential information and video information, and the correlation processing may produce correlated results that are sent over the network.
  • Context management processing receives inputs from certain constrained nodes (although these can also be fully functional nodes) e.g., credential information and video and grouping information, and performs context processing with results sent over the network.
  • the network supports operation of emergency exit indicators; emergency cameras as well as distributed rule processing and rule engine/messaging processing.
  • Range extenders are used with e.g., gateways, and a real time location system receives inputs from various sensors (e.g., constrained type) as shown.
  • Servers interface to the WSN via a cloud computing configuration and parts of some networks can be run as sub-nets.
  • the sensors provide in addition to an indication that something is detected in an area within the range of the sensors, detailed additional information that can be used to evaluate what that indication may be without the intrusion detection panel being required to perform extensive analysis of inputs to the particular sensor.
  • a motion detector could be configured to analyze the heat signature of a warm body moving in a room to determine if the body is that of a human or a pet. Results of that analysis would be a message or data that conveys information about the body detected.
  • Various sensors thus are used to sense sound, motion, vibration, pressure, heat, images, and so forth, in an appropriate combination to detect a true or verified alarm condition at the intrusion detection panel.
  • Recognition software can be used to discriminate between objects that are a human and objects that are an animal; further facial recognition software can be built into video cameras and used to verify that the perimeter intrusion was the result of a recognized, authorized individual.
  • Such video cameras would comprise a processor and memory and the recognition software to process inputs (captured images) by the camera and produce the metadata to convey information regarding recognition or lack of recognition of an individual captured by the video camera.
  • the processing could also alternatively or in addition include information regarding characteristic of the individual in the area captured/monitored by the video camera.
  • the information would be either metadata received from enhanced motion detectors and video cameras that performed enhanced analysis on inputs to the sensor that gives characteristics of the perimeter intrusion or a metadata resulting from very complex processing that seeks to establish recognition of the object.
  • Sensor devices can integrate multiple sensors to generate more complex outputs so that the intrusion detection panel can utilize its processing capabilities to execute algorithms that analyze the environment by building virtual images or signatures of the environment to make an intelligent decision about the validity of a breach.
  • Memory stores program instructions and data used by the processor of the intrusion detection panel.
  • the memory may be a suitable combination of random access memory and read-only memory, and may host suitable program instructions (e.g.
  • the stored program instruction may include one or more authentication processes for authenticating one or more users.
  • the program instructions stored in the memory of the panel may further store software components allowing network communications and establishment of connections to the data network.
  • the software components may, for example, include an internet protocol (IP) stack, as well as driver components for the various interfaces, including the interfaces and the keypad .
  • IP internet protocol
  • Other software components suitable for establishing a connection and communicating across network will be apparent to those of ordinary skill.
  • the monitoring server includes one or more processing devices (e.g., microprocessors), a network interface and a memory (all not illustrated).
  • the monitoring server may physically take the form of a rack mounted card and may be in communication with one or more operator terminals (not shown).
  • An example monitoring server is a SURGARDTM SG-System III Virtual, or similar system.
  • each monitoring server acts as a control ler for each monitoring server , and is in communication with, and controls overall operation, of each server.
  • the processor may include, or be in communication with, the memory that stores processor executable instructions controlling the overall operation of the monitoring server.
  • Suitable software enable each monitoring server to receive alarms and cause appropriate actions to occur.
  • Software may include a suitable Internet protocol (IP) stack and applications/clients.
  • IP Internet protocol
  • Each monitoring serv er of the central monitoring station may be associ ated wit h an IP address and port(s) by which it communicates with the control panels and/or the user devices to handle alarm events, etc.
  • the monitoring server address may be static, and thus always identify a particular one of monitoring server to the intrusion detection panels.
  • dynamic addresses could be used, and associated with static domain names, resolved through a domain name service.
  • the network interface card interfaces with the network to receive incoming signals, and may for example take the form of an Ethernet network interface card
  • the servers may be computers, thin-clients, or the like, to which received data representati ve of an alarm event is passed for handling by human operators.
  • the monitoring station may further include, or have access to, a subscriber database that includes a database under control of a database engine.
  • the database may contain entries corresponding to the various subscriber devices/processes to panels like the panel that are serviced, by the monitoring station.
  • a computer program product i.e., a computer program tangibly embodied in one or more tangible, physical hardware storage devices that are computer and/or machine-readable storage devices for execution by, or to control the operation of, data processing apparatus, e.g., a programmable processor, a computer, or multiple computers.
  • a computer program can be written in any form of programming language, including compiled or interpreted languages, and it can be deployed in any form, including as a stand-alone program or as a module, component, subroutine, or other unit suitable for use in a computing environment.
  • a computer program can be deployed to be executed on one computer or on multiple computers at one site or distributed across multiple sites and interconnected by a network.
  • Actions associated with implementing the processes can be performed by one or more programmable processors executing one or more computer programs to perform the functions of the calibration process.
  • Al l or part of the processes can be
  • FPGA field programmable gate array
  • ASIC application-specific integrated circuit
  • processors suitable for the execution of a computer program include, by way of example, both general and special purpose microprocessors, and any one or more processors of any kind of digital computer.
  • a processor will receive instructions and data fro a read-only storage area or a random access storage area or both.
  • Elements of a computer include one or more processors for executing instructions and one or more storage area devices for storing instructions and data.
  • a computer will also include, or be operatively coupled to receive data from, or transfer data to, or both, one or more machine -read able storage media, such as mass storage devices for storing data, e.g., magnetic, magneto-optical disks, or optical disks.
  • Tangible, physical hardware storage devices that are suitable for embodying computer program instructions and data include all forms of non- volatile storage, including by way of example, semiconductor storage area devices, e.g., EPR.OM, EEPROM, and flash storage area devices; magnetic disks, e.g., internal hard disks or removable disks; magneto-optical disks; and CD-ROM and DVD-ROM disks and volatile computer memory, e.g., RAM such as static and dynamic RAM, as well as erasable memory, e.g., flash memory.
  • semiconductor storage area devices e.g., EPR.OM, EEPROM, and flash storage area devices
  • magnetic disks e.g., internal hard disks or removable disks
  • magneto-optical disks e.g., magneto-optical disks
  • CD-ROM and DVD-ROM disks e.g., RAM such as static and dynamic RAM, as well as erasable memory, e.g., flash memory.

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Alarm Systems (AREA)

Abstract

L'invention concerne un système en réseau destiné à la gestion d'une détection/alarme d'intrusion physique, ce système comprenant un niveau supérieur de serveurs constitué de processeurs et d'une mémoire communiquant avec ces derniers, un niveau intermédiaire de passerelles qui sont en communication avec des serveurs de niveau supérieur, et un niveau inférieur de dispositifs qui comprennent des noeuds totalement fonctionnels et des noeuds contraints. Le système en réseau comprend un dispositif conçu pour recevoir des entrées sensorielles provenant de justificatifs d'identité ou de badges et déterminer des groupes virtuels d'individus associés à des données de justificatif d'identité reçues, et appliquer des règles à des informations de regroupement pour suivre et détecter des individus à l'intérieur de groupes virtuels.
PCT/US2015/017221 2014-02-28 2015-02-24 Gestion spécifique de contexte dans un réseau de capteurs sans fil WO2015130641A1 (fr)

Priority Applications (3)

Application Number Priority Date Filing Date Title
EP15755417.1A EP3111587B1 (fr) 2014-02-28 2015-02-24 Gestion spécifique de contexte dans un réseau de capteurs sans fil
KR1020167026981A KR20170018808A (ko) 2014-02-28 2015-02-24 무선 센서 네트워크에서의 컨텍스트 특정 관리
JP2016554636A JP2017509988A (ja) 2014-02-28 2015-02-24 無線センサ・ネットワークにおけるコンテクスト特定管理

Applications Claiming Priority (6)

Application Number Priority Date Filing Date Title
US201461946054P 2014-02-28 2014-02-28
US61/946,054 2014-02-28
US201461973962P 2014-04-02 2014-04-02
US61/973,962 2014-04-02
US14/463,733 2014-08-20
US14/463,733 US9316720B2 (en) 2014-02-28 2014-08-20 Context specific management in wireless sensor network

Publications (1)

Publication Number Publication Date
WO2015130641A1 true WO2015130641A1 (fr) 2015-09-03

Family

ID=54009538

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/US2015/017221 WO2015130641A1 (fr) 2014-02-28 2015-02-24 Gestion spécifique de contexte dans un réseau de capteurs sans fil

Country Status (1)

Country Link
WO (1) WO2015130641A1 (fr)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105672777A (zh) * 2015-12-31 2016-06-15 青岛歌尔声学科技有限公司 一种智能锁系统和一种自动开锁的方法
CN106604267A (zh) * 2017-02-21 2017-04-26 重庆邮电大学 一种动态自适应的无线传感器网络入侵检测智能算法

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20030216144A1 (en) * 2002-03-01 2003-11-20 Roese John J. Using signal characteristics to locate devices in a data network
US20060059557A1 (en) * 2003-12-18 2006-03-16 Honeywell International Inc. Physical security management system
US20070106775A1 (en) * 2005-03-01 2007-05-10 Wong Chon M System and method for creating a proximity map of plurality of living beings and objects
US20070186106A1 (en) * 2006-01-26 2007-08-09 Ting David M Systems and methods for multi-factor authentication
US20120159579A1 (en) * 2010-12-02 2012-06-21 Stephen Pineau System, method and database for managing permissions to use physical devices and logical assets
US20120197986A1 (en) * 2011-01-28 2012-08-02 Yahoo! Inc. User-customizable social grouping techniques

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20030216144A1 (en) * 2002-03-01 2003-11-20 Roese John J. Using signal characteristics to locate devices in a data network
US20060059557A1 (en) * 2003-12-18 2006-03-16 Honeywell International Inc. Physical security management system
US20070106775A1 (en) * 2005-03-01 2007-05-10 Wong Chon M System and method for creating a proximity map of plurality of living beings and objects
US20070186106A1 (en) * 2006-01-26 2007-08-09 Ting David M Systems and methods for multi-factor authentication
US20120159579A1 (en) * 2010-12-02 2012-06-21 Stephen Pineau System, method and database for managing permissions to use physical devices and logical assets
US20120197986A1 (en) * 2011-01-28 2012-08-02 Yahoo! Inc. User-customizable social grouping techniques

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
See also references of EP3111587A4 *

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105672777A (zh) * 2015-12-31 2016-06-15 青岛歌尔声学科技有限公司 一种智能锁系统和一种自动开锁的方法
CN105672777B (zh) * 2015-12-31 2018-12-25 青岛歌尔声学科技有限公司 一种智能锁系统和一种自动开锁的方法
CN106604267A (zh) * 2017-02-21 2017-04-26 重庆邮电大学 一种动态自适应的无线传感器网络入侵检测智能算法
CN106604267B (zh) * 2017-02-21 2019-10-25 重庆邮电大学 一种动态自适应的无线传感器网络入侵检测智能方法

Similar Documents

Publication Publication Date Title
EP3111587B1 (fr) Gestion spécifique de contexte dans un réseau de capteurs sans fil
US9316720B2 (en) Context specific management in wireless sensor network
CN106464665B (zh) 与消息路由结合的规则引擎
JP2017519378A (ja) ルーティング情報の保持
WO2015130744A1 (fr) Corrélation d'entrées sensorielles pour identifier des individus non autorisés
WO2015130641A1 (fr) Gestion spécifique de contexte dans un réseau de capteurs sans fil

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 15755417

Country of ref document: EP

Kind code of ref document: A1

ENP Entry into the national phase

Ref document number: 2016554636

Country of ref document: JP

Kind code of ref document: A

NENP Non-entry into the national phase

Ref country code: DE

ENP Entry into the national phase

Ref document number: 20167026981

Country of ref document: KR

Kind code of ref document: A

REEP Request for entry into the european phase

Ref document number: 2015755417

Country of ref document: EP

WWE Wipo information: entry into national phase

Ref document number: 2015755417

Country of ref document: EP