WO2020152032A1 - Procédé de détection sans fil - Google Patents

Procédé de détection sans fil Download PDF

Info

Publication number
WO2020152032A1
WO2020152032A1 PCT/EP2020/051070 EP2020051070W WO2020152032A1 WO 2020152032 A1 WO2020152032 A1 WO 2020152032A1 EP 2020051070 W EP2020051070 W EP 2020051070W WO 2020152032 A1 WO2020152032 A1 WO 2020152032A1
Authority
WO
WIPO (PCT)
Prior art keywords
wlan
location
entity
signal
information relating
Prior art date
Application number
PCT/EP2020/051070
Other languages
English (en)
Inventor
Anas AL RAWI
Ian Cooper
Original Assignee
British Telecommunications Public Limited Company
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by British Telecommunications Public Limited Company filed Critical British Telecommunications Public Limited Company
Publication of WO2020152032A1 publication Critical patent/WO2020152032A1/fr

Links

Classifications

    • GPHYSICS
    • G08SIGNALLING
    • G08BSIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
    • G08B13/00Burglar, theft or intruder alarms
    • G08B13/22Electrical actuation
    • G08B13/24Electrical actuation by interference with electromagnetic field distribution
    • G08B13/2491Intrusion detection systems, i.e. where the body of an intruder causes the interference with the electromagnetic field

Definitions

  • the present invention relates to the field of wireless monitoring and in particular, to the use of existing networks for the purpose of sensing the local environment.
  • Existing wireless monitoring systems have multiple applications in health, security, and commerce and control automation (loT).
  • security they may include burglar alarms for detecting intruders into a domestic residence or commercial property and sending the appropriate alerts as a consequence.
  • health applications they include systems for monitoring, for example, the activity level of an elderly person in that person’s residence or in a care home. If the monitoring determines that the elderly person has not moved in some time, assistance can be given.
  • the monitoring system works by transmitting a wireless signal into a room and detecting that signal after it has been scattered by entities present in the room.
  • the signals are of a particular frequency range, and the alerts are sent via the internet (using telephone line, fibre optic or wireless channel).
  • These monitoring systems require specific skills to be installed and are provided by specific service providers. It would be advantageous if a monitoring system could be provided without the need for specific providers or specifically trained installers. Furthermore, an intruder may attempt to disable such a system by cutting its power supply and/or network connection. It would be desirable to provide a system which mitigated the risk of this.
  • a method of wireless monitoring comprising:
  • a transmitter transmitting a wireless monitoring signal from a first location, through a partition, to a second location, the partition separating the first location from the second location;
  • the transmitter is a component device of a WLAN.
  • the receiver may be located in the first location.
  • the received wireless signal may have scattered from the entity in the second location before being received by the receiver.
  • the scattered signal may pass through the partition before being received.
  • the receiver may be a component device of the WLAN. Some or all of the component devices of the WLAN may be located in the first location, separated by a partition from the second location.
  • the transmitter and receiver may be the same component device of the WLAN or may be different component devices of the WLAN.
  • the WLAN may comprise multiple receivers and the step of receiving the wireless monitoring signal may be performed by the multiple receivers.
  • the partition may be a wall and may be an interior wall or an exterior wall.
  • the first and/or second locations may be enclosed spaces.
  • the first and/or second locations may be flats in a block of flats or offices within an office block.
  • the first and/or second locations may be rooms within a residential home, such as a care home for the elderly.
  • the wireless monitoring signal may be a Wi-Fi signal.
  • the wireless monitoring signal may be any other type of wireless signal, such as LTE or Li-Fi.
  • the first and second WLANs may be domestic WLANs and the devices of the WLAN may be devices commonly found in domestic settings, such as PCs, tablets, laptops, telephones etc.
  • the first and second WLANs may be commercial WLANs and the devices of the WLAN may be devices commonly found in offices and other commercial settings, such as PCs, tablets, laptops, telephones etc.
  • the method may further include sending information relating to the received wireless monitoring signal to a processing device, which may be a component device of the WLAN. If there are multiple receivers, each of the multiple receivers may send information relating to the received wireless signal to a processing device.
  • the processing device may be an access point in the WLAN and/or may be the transmitter.
  • the step of determining information relating to an entity located in the second location using the received wireless monitoring signal may be performed at the processing device.
  • the entity may be a person.
  • the person may be an intruder or may be a resident of the flat.
  • the transmitted monitoring signal may be scattered by the entity or plurality of entities and the step of receiving the transmitted monitoring signal may comprise receiving the scattered signal.
  • the scattered monitoring signal may contain information relating to the entity, such as its posture, location or speed.
  • the step of determining information relating to an entity or a plurality of entities present in the vicinity of the WLAN may comprise determining if the entity or a plurality of entities includes a person.
  • the information relating to an entity or a plurality of entities present in the vicinity of the WLAN may comprise the location of the entity.
  • the step of determining the location of the entity may comprise using the time of arrival of the signal at the receiver, and may further comprise using the time of transmission of the signal from the transmitter.
  • the step of determining the location of the entity may further comprise using the locations of the transmitter and/or receiver, which may be obtained from GPS measurements of the locations of the transmitter and/or receiver.
  • the step of determining the location of the entity may further comprise using the angle of arrival of the signal at the receiver.
  • the information relating to an entity or a plurality of entities present in the vicinity of the WLAN may comprise the speed of travel of the entity and may further comprise the direction of travel of the entity.
  • the method may be repeated iteratively so as to determine the location of the entity repeatedly over a period of time to produce multiple location measurements.
  • the method may further comprise using the multiple location measurements to determine the speed of travel and/or direction of travel of the entity.
  • the method may further comprise sending an alert containing the information determined in relation to an entity.
  • the alert may be in the form of an SMS or email.
  • the alert may indicate the presence of an entity, such as an intruder.
  • the alert may also indicate the precise location of the entity within the residence.
  • the alert may be sent to a device or devices belonging to the residents, such as a mobile phone. Alternatively or in addition, the alert may be sent to the authorities, such as the police. Alternatively or in addition, the alert may be sent to the devices of residents of neighbouring residences.
  • the term“residents” herein is intended to include any person that spends time in the vicinity of the WLAN.
  • the term“residents” is intended to include office workers where the WLAN is located in an office building.
  • the partition is an outside wall of a building.
  • the method may further comprise sending an alert it has been determined that a person has remained in the vicinity of the outside wall of the building for longer than a threshold period of time. Such a person may be loitering with malicious intent.
  • the method may further comprise, performing a method of wireless monitoring at a second WLAN located in the second location.
  • the method may comprise transmitting a wireless monitoring signal from a transmitter and may comprise receiving the transmitted wireless monitoring signal at a receiver.
  • the method may further comprise determining information relating to an entity located in the second location, using the received transmitted wireless signal.
  • the second WLAN may perform some or all of the steps of the method that may be performed by the first WLAN, as defined above.
  • the wireless monitoring signal transmitted at the second WLAN may be a Wi-Fi signal.
  • the wireless monitoring signal may be any other type of wireless signal, such as LTE or Li-Fi.
  • the second WLAN may be a domestic WLAN and the devices of the WLAN may be devices commonly found in domestic settings, such as PCs, tablets, laptops, telephones etc.
  • the second WLAN may be a commercial WLAN and the devices of the WLAN may be devices commonly found in offices and other commercial settings, such as PCs, tablets, laptops, telephones etc.
  • the method may further include sending information relating to the received wireless monitoring signal to a processing device of the second WLAN, which may be a component device of the WLAN.
  • the second WLAN may comprise multiple receivers. Each of the multiple receivers may send information relating to the received wireless signal to the processing device.
  • the processing device may be an access point in the WLAN and/or may be the transmitter.
  • the processing device may use the information relating to the received wireless signal in the step of determining information relating to an entity located in the second location.
  • the determined information relating to an entity located in the second location may be the location and/or the speed and/or the direction of movement of the entity.
  • the step of, at the second WLAN, determining information relating to an entity located in the second location may take into account the information relating to an entity located in the second location that has been determined at the first WLAN. This may involve performing a triangulation technique which takes into account the information relating to an entity located in the second location that has been determined at the first WLAN.
  • the information relating to an entity located in the second location that has been determined at the first WLAN may include the location of the entity.
  • the method may further comprise performing a monitoring method according to the invention at one or more additional WLANs located in neighbouring locations, such as neighbouring flats in a block of flats.
  • the method may further comprise, sending the determined information relating to an entity located in the second location from the one or more additional WLAN to the second WLAN.
  • the second WLAN may take this sent information into account when performing the step of determining information relating to an entity located in the second location. This may improve the accuracy of the resulting determined information.
  • the method may further comprise, at the first WLAN, determining whether an activation condition has been met.
  • the method may further comprise performing the method of the invention only if the activation condition has been met.
  • the method may further comprise increasing the intensity of the transmitted signal if the activation condition has been met.
  • the method may further comprise increasing the proportion of the transmitted signal that is directed towards the first location, if the activation condition has been met. This may comprise changing the direction in which the signal is transmitted.
  • the activation condition being met may indicate that the assistance of the second WLAN is desired.
  • the activation condition may be that the second WLAN is not transmitting a monitoring signal at a time when it is expected to be doing so.
  • the method may further comprise monitoring, at the first WLAN, whether or not the second WLAN is transmitting a monitoring signal. If the first WLAN cannot detect that the second WLAN is transmitting a monitoring signal at a time when the second WLAN is expected to be doing so, the activation condition may be met.
  • the method may further comprise receiving, at the first WLAN, an indication of whether the monitoring system of the second WLAN is expected to be inactive at a given time or from a given time onward. The indication may be sent by the second WLAN as part of the shut-down procedure when a user switches off one or more devices of the first WLAN. The indication may be sent by wireless means or by wired means.
  • the activation condition may be that the second WLAN has indicated that assistance from the first WLAN is required. This may be because the second WLAN has detected an intruder in the second location.
  • the method may indicate that assistance from the first WLAN is required by sending a message from the second WLAN to the first WLAN.
  • the message may be sent by wired or wireless means and may be an email or SMS.
  • Fig 1 shows a schematic overhead view of a monitoring system containing a single WLAN in a flat
  • Fig 2 shows a schematic overhead view of three neighbouring flats, each containing a WLAN, the WLANs being arranged to perform the method of the invention
  • Fig 3 shows a schematic overhead view of a three neighbouring flats, each containing a access point, the access points being arranged to perform the method of the invention.
  • Fig 1 shows a wireless local area network 1 (WLAN) located in a flat 5 which is part of a block of flats.
  • the WLAN comprises a wireless access point 2 and two peripheral devices 3, 4.
  • the peripheral devices are a laptop computer 3 and a tablet 4.
  • the WLAN is capable of functioning as a conventional WLAN.
  • the access point 2 receives a signal transmitted by a DSLAM or OLT.
  • the access point 2 contains a modem which demodulates the signal and converts the demodulated signal into a data stream.
  • the data stream is then re-modulated onto Wi-Fi at the access point 2 for transmission to one of the peripheral devices 3, 4.
  • the peripheral devices receive the Wi-Fi signal, demodulate it to a data stream and consume the data stream.
  • the Wi-Fi signals transmitted by the access point 2 emanate outwardly from the access point 2 in all directions.
  • the transmitted signals therefore impinge upon nearby objects, such as object 6 of Fig. 1 .
  • the signals are scattered from object 6 in various directions. Some of the scattered signals are received by the access point 2 itself and some may be received by the peripheral devices 3, 4.
  • the peripheral devices 3, 4 send the access point 2 information about the scattered signal they have received. This information includes the time the signal was received and the intensity of the signal. In addition, the access point 2 is aware of the locations of the peripheral devices 3, 4 from GPS measurements. Using this information, the access point 2 performs a triangulation calculation to determine the location of the object 6. Furthermore, this process is iteratively repeated and the determined position of the objects 6 is compared after each iteration of the process. In this way the access point determines whether or not the object 6 is moving. From this the access point 2 also determines the direction in which the object 6 is moving and its speed. Computational techniques for achieving this are known and will not be described here. The peripheral devices 3, 4 also measure the intensity distribution of the signal that has been scattered from the object 6. This information is sent to the access point 2 which uses it to determine the size of the object.
  • the WLAN can be used as a burglar alarm.
  • the resident of the flat leaves the flat 5
  • he may place the access point 2 into a monitoring condition such that it continuously transmits Wi-Fi signals, and, in the manner described above, determines the information concerning objects in the flat including their position, size and speed and monitors that information over time for unexpected activity, i.e. it performs the function of a burglar alarm.
  • the access point 2 detects the presence of a possible intruder in the flat, the access point 2 sends a message to the police and/or the resident indicating that an intruder 2 has been detected.
  • These messages are represented in Fig. 1 by a dotted arrow 1 1 .
  • Each of the peripheral devices 3, 4 of the WLAN have the same monitoring functionality as the access point 2, i.e. they are each able to transmit Wi-Fi signals which are scattered by objects in the flat. Those scattered signals are detected by the access point 2 and the other one of the peripheral devices 3, 4. After transmitting the signal, the peripheral device 3, 4 sends the access point 2 information regarding the transmitted signal including its intensity, direction of transmission and time of transmission. As before, the access point 2 uses the information on the transmitted and scattered signals to perform triangulation calculations to determine the location and velocity of the object. Again, if the access point 2 determines that an intruder is present in the flat, the access point sends a signal to the police and/or the resident indicating that an intruder has been detected.
  • the monitoring signals can pass through the walls of the flat 5. Therefore, the monitoring techniques described above can be used to monitor an object located in a different room in the flat 5 to the devices 2, 3, 4.
  • the WLANs can detect objects and movement outside the block of flats, e.g. a person walking past along the pavement. If, say, the person stops walking and remains close to the building for longer than a threshold period of time, one or more WLANs located in flats within the building detect this and classify it as suspicious activity. In such a situation no-one has yet made an unauthorised entry into the building and so the WLAN does not alert the police. Instead, the WLAN sends an SMS to the residents of its own flat containing a message indicating that it has detected a person loitering outside the front door of the building. The WLAN also alerts the WLANs of neighbouring flats to the presence of the loiterer, which pass on that message to their respective residents.
  • objects and movement outside the block of flats e.g. a person walking past along the pavement. If, say, the person stops walking and remains close to the building for longer than a threshold period of time, one or more WLANs located in flats within the building detect this and classify it as suspicious activity. In such a situation no-one
  • Fig 2 shows an overhead view of three neighbouring flats 17, 18, 19 in a block of flats.
  • Each flat has a WLAN.
  • the WLANs are arranged to perform the method of the invention.
  • the WLANs in the three flats 17, 18, 19 are labelled 7, 8 and 9 respectively.
  • Each WLAN is able to monitor its respective flat and so function as a burglar alarm in the manner described above.
  • a difference between this embodiment and the embodiment of Fig 1 is that in this embodiment the WLANs are able to communicate with each other by Wi-Fi so as to co-operate in the monitoring of the flats.
  • WLAN 7 detects an intruder 10 in its flat 17
  • WLAN 7 sends a message both to the police and to the resident of the flat 17 that there is in intruder in the flat 17.
  • WLAN 7 also sends a signal via Wi-Fi through the walls of the flat 17 to the access point 28 of WLAN 18 and to the access point 29 of WLAN 19 indicating that an intruder is present in flat 17. These signals are represented by dotted arrows in Fig. 2.
  • WLAN 8 and WLAN 9 then send a message to their respective residents that there is an intruder in flat 17. In this way the residents of neighbouring flats can be warned of the presence of an intruder 10 in a neighbouring flat and can, for example, stay away from the building until the situation has been resolved.
  • the WLANs are able to monitor each other’s operational status via Wi-Fi.
  • the monitoring signals transmitted by WLAN 7 travel through the walls of flat 17 and are detected by WLANs 8 and 9. If WLANs 8 and 9 detect such signals this indicates to WLANs 8 and 9 that WLAN 7 is in a monitoring condition. If the monitoring signals from WLAN 7 stop, WLANs 8 and 9 detect this absence of signals and determine that WLAN 7 is no longer in a monitoring condition. If this change in condition results from an authorised action (e.g. the resident of flat 17 turning off the monitoring function), then before the monitoring signals stop, a confirmation message is sent to WLANs 8 and 9 informing them that the monitoring function of WLAN 7 has ended by an authorised action.
  • an authorised action e.g. the resident of flat 17 turning off the monitoring function
  • the monitoring signals are able to travel through walls. It is therefore possible for a device in a WLAN to detect activity happening in a neighbouring flat.
  • the access point 29 of WLAN 9 transmits a monitoring signal through the wall and into flat 17 where it is scattered by object 10. The scattered signal travels through the wall into flat 19 and may be detected by the peripheral devices in WLAN 9. Access point 29 then performs a locating process in the manner described above to determine information regarding the object 10.
  • WLANs 8 and 9 If WLAN 7 alerts WLANs 8 and 9 that there is an intruder in flat 7, or WLANs 8 and 9 determine that WLAN 7 has been disabled by unauthorised action as described above, the WLANs 8 and 9 increase the proportion of their own monitoring signals that are directed into flat 17 through the dividing wall. This is to better enable WLANs 8 and 9 to track the movements of the intruder in flat 17. If the intruder changes location, e.g. moves from one room to another in flat 17, this may be detected by WLANs 8 and 9 which will then update the police and the residents accordingly. It is possible for WLANs in neighbouring flats to co-operate to determine the location of an intruder in one of the flats. Consider an example in which WLANs 7, 8 and 9 each only contain an access point and one peripheral device.
  • the three access points 27, 28, 29 can co-operate to determine the location of an intruder 10 to a greater accuracy than is achievable by each working alone.
  • the access points 27 transmits a monitoring signal (represented by a radio symbol in Fig. 3).
  • This monitoring signal is scattered from the intruder 10 and the scattered signal is detected by peripheral device 37.
  • the peripheral device 37 sends access point 27 information by Wi-Fi regarding the signal it has detected - such as the time, intensity and direction of the detected signal.
  • Access point 27 is aware of the time, intensity and direction of the signal it transmitted, and is also aware of the location of peripheral device 37 relative to its own position. From this information, access point 27 performs a triangulation calculation to determine the position of the intruder 10. This process is repeated iteratively and the results are used to determine the velocity of the intruder.
  • access point 28 transmits a monitoring signal (represented by a radio symbol in Fig. 3) through the wall and into flat 27.
  • This monitoring signal is scattered from the intruder 10 and the scattered signal passes through the wall and into flat 28 where it is detected by peripheral device 38.
  • the peripheral device 38 sends access point 28 information by Wi-Fi regarding the signal it has detected - such as the time, intensity and direction of the detected signal.
  • Access point 28 is aware of the time, intensity and direction of the signal it transmitted, and is also aware of the location of peripheral device 38 relative to its own position. From this it performs a triangulation calculation to determine the position of the intruder. This process is repeated iteratively and the results are used to determine the velocity of the intruder.
  • access point 29 and peripheral device 39 A similar procedure is performed by access point 29 and peripheral device 39.
  • All three access points 27, 28 and 29 calculate values for the position and velocity for the intruder.
  • Access points 28 and 29 send these values to access point 27 by Wi-Fi.
  • Access point 27 uses these values along with the position and velocity values that it itself has calculated to produce improved values for the position and velocity of the intruder.
  • the invention is used, not to determine the presence of an intruder, but to detect the absence of movement.
  • the invention could be used in a residence for the elderly (not shown in the figures).
  • each flat in the residence is provided with a WLAN, the WLANs of neighbouring flats being able to communicate with each other using Wi-Fi.
  • the WLAN in the flat will detect that absence of movement using the monitoring technique described above.
  • the WLAN then sends an alert either to the central office or to neighbouring WLANs via Wi-Fi, which can raise the alarm.
  • the WLANs can also detect this lack of movement and can raise the alarm themselves, or co-operate with the first WLAN to determine the position of the resident accurately, in a similar manner to the one described above in relation to Fig. 3.

Landscapes

  • Physics & Mathematics (AREA)
  • Electromagnetism (AREA)
  • General Physics & Mathematics (AREA)
  • Alarm Systems (AREA)

Abstract

L'invention concerne un procédé de surveillance sans fil comprenant : au niveau d'un émetteur, la transmission d'un signal de surveillance sans fil depuis un premier emplacement, à travers une cloison, vers un second emplacement, la cloison séparant le premier emplacement du second emplacement ; la réception du signal de surveillance sans fil transmis au niveau d'un récepteur ; la détermination d'informations relatives à une entité située dans le second emplacement, à l'aide du signal sans fil transmis reçu ; l'émetteur étant un dispositif constitutif d'un WLAN.
PCT/EP2020/051070 2019-01-21 2020-01-16 Procédé de détection sans fil WO2020152032A1 (fr)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
EP19152846.2 2019-01-21
EP19152846 2019-01-21

Publications (1)

Publication Number Publication Date
WO2020152032A1 true WO2020152032A1 (fr) 2020-07-30

Family

ID=65138916

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/EP2020/051070 WO2020152032A1 (fr) 2019-01-21 2020-01-16 Procédé de détection sans fil

Country Status (1)

Country Link
WO (1) WO2020152032A1 (fr)

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20040080415A1 (en) * 2002-06-26 2004-04-29 Sorensen John Erik Aasted Method of and a system for surveillance of an environment utilising electromagnetic waves
US20120146788A1 (en) * 2010-12-13 2012-06-14 Xandem Technology Llc Systems and methods of device-free motion detection and presence detection
US20170359804A1 (en) * 2016-06-08 2017-12-14 Cognitive Systems Corp. Operating a Motion Detection Channel in a Wireless Communication Network
US10109168B1 (en) * 2017-11-16 2018-10-23 Cognitive Systems Corp. Motion localization based on channel response characteristics

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20040080415A1 (en) * 2002-06-26 2004-04-29 Sorensen John Erik Aasted Method of and a system for surveillance of an environment utilising electromagnetic waves
US20120146788A1 (en) * 2010-12-13 2012-06-14 Xandem Technology Llc Systems and methods of device-free motion detection and presence detection
US20170359804A1 (en) * 2016-06-08 2017-12-14 Cognitive Systems Corp. Operating a Motion Detection Channel in a Wireless Communication Network
US10109168B1 (en) * 2017-11-16 2018-10-23 Cognitive Systems Corp. Motion localization based on channel response characteristics

Similar Documents

Publication Publication Date Title
KR101980580B1 (ko) 무선 통신 네트워크 내 모션 탐지 채널 작동
JP5105100B2 (ja) 侵入検知システム、警報端末、侵入者検知方法、そのプログラムおよび記録媒体
JP2007514134A (ja) 位置特定システム
WO2013025512A1 (fr) Dispositif de mesure de distance autonome de technologie wi-fi
JP4528946B2 (ja) 屋内侵入検知システムおよび屋内侵入検知情報発信システム
WO2020152031A1 (fr) Procédé de détection sans fil
KR102457510B1 (ko) 디지털 트윈을 통한 모니터링이 가능한 일산화탄소 감지기 및 이를 포함하는 소방 관제 시스템
WO2020152032A1 (fr) Procédé de détection sans fil
Alkandari et al. A Wi-Fi based passive technique for speed estimation in indoor environments
TW201336287A (zh) 手機監控警報方法及系統
JP2010272065A (ja) センサ端末、センサ端末の異常判断情報送信方法、コントローラおよびコントローラのセンサ異常判断方法
GB2580657A (en) Wireless sensing method
GB2580654A (en) Wireless sensing method
KR101722712B1 (ko) 비콘을 이용한 가상의 울타리 제공 시스템 및 방법
EP3543976B1 (fr) Procédé permettant d'augmenter la spécificité de la détection de brouillage dans un système d'alarme domestique
CN114202880B (zh) 一种火灾检测方法、系统、智能终端及存储介质
KR102600837B1 (ko) 딥러닝을 이용한 사고 예방 시스템
KR20170030677A (ko) 레이더 센서를 이용한 창문 감시장치
CN117795372A (zh) 基于用户输入和从无线信号导出的运动感测数据来确定空间地图
KR20220065112A (ko) 위험 상황 예경보 시스템 및 방법
EP3151210B1 (fr) Systeme et procede de fourniture de notifications de defaut de systeme intelligent par localisation
RU2791598C1 (ru) Способ контроля несанкционированного доступа на объект с использованием инфракрасного датчика в энергоэффективных беспроводных сетях
US12108360B2 (en) Dual-band real-time location tracking
EP4068825A1 (fr) Système de détection d'usage illégal d'appareil de communication sans fil
RU2460143C1 (ru) Способ оповещения мобильных коммуникационных устройств о чрезвычайной ситуации и устройство его реализующее

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 20700606

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 20700606

Country of ref document: EP

Kind code of ref document: A1