WO2004068432A1 - System for detecting intruders in a populated space - Google Patents

System for detecting intruders in a populated space Download PDF

Info

Publication number
WO2004068432A1
WO2004068432A1 PCT/GB2004/000331 GB2004000331W WO2004068432A1 WO 2004068432 A1 WO2004068432 A1 WO 2004068432A1 GB 2004000331 W GB2004000331 W GB 2004000331W WO 2004068432 A1 WO2004068432 A1 WO 2004068432A1
Authority
WO
WIPO (PCT)
Prior art keywords
marker
zone
sensor arrangement
person
sensed
Prior art date
Application number
PCT/GB2004/000331
Other languages
French (fr)
Inventor
Andrew Martin Robert Ward
Paul Michael Webster
Rupert William Meldrum Curwen
Peter Joseph Steggles
Original Assignee
Ubisense Limited
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Ubisense Limited filed Critical Ubisense Limited
Priority to EP04705125A priority Critical patent/EP1593102B1/en
Priority to DE602004004874T priority patent/DE602004004874T8/en
Publication of WO2004068432A1 publication Critical patent/WO2004068432A1/en

Links

Classifications

    • GPHYSICS
    • G08SIGNALLING
    • G08BSIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
    • G08B13/00Burglar, theft or intruder alarms
    • G08B13/22Electrical actuation
    • G08B13/24Electrical actuation by interference with electromagnetic field distribution
    • G08B13/2402Electronic Article Surveillance [EAS], i.e. systems using tags for detecting removal of a tagged item from a secure area, e.g. tags for detecting shoplifting
    • G08B13/2451Specific applications combined with EAS
    • G08B13/2454Checking of authorisation of a person accessing tagged items in an EAS system
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/20Individual registration on entry or exit involving the use of a pass
    • G07C9/28Individual registration on entry or exit involving the use of a pass the pass enabling tracking or indicating presence
    • GPHYSICS
    • G08SIGNALLING
    • G08BSIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
    • G08B13/00Burglar, theft or intruder alarms
    • G08B13/22Electrical actuation
    • G08B13/24Electrical actuation by interference with electromagnetic field distribution
    • G08B13/2402Electronic Article Surveillance [EAS], i.e. systems using tags for detecting removal of a tagged item from a secure area, e.g. tags for detecting shoplifting
    • G08B13/2428Tag details
    • G08B13/2448Tag with at least dual detection means, e.g. combined inductive and ferromagnetic tags, dual frequencies within a single technology, tampering detection or signalling means on the tag
    • GPHYSICS
    • G08SIGNALLING
    • G08BSIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
    • G08B13/00Burglar, theft or intruder alarms
    • G08B13/22Electrical actuation
    • G08B13/24Electrical actuation by interference with electromagnetic field distribution
    • G08B13/2402Electronic Article Surveillance [EAS], i.e. systems using tags for detecting removal of a tagged item from a secure area, e.g. tags for detecting shoplifting
    • G08B13/2465Aspects related to the EAS system, e.g. system components other than tags
    • G08B13/248EAS system combined with another detection technology, e.g. dual EAS and video or other presence detection system
    • GPHYSICS
    • G08SIGNALLING
    • G08BSIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
    • G08B13/00Burglar, theft or intruder alarms
    • G08B13/22Electrical actuation
    • G08B13/24Electrical actuation by interference with electromagnetic field distribution
    • G08B13/2491Intrusion detection systems, i.e. where the body of an intruder causes the interference with the electromagnetic field

Definitions

  • the first predetermined manner may be such that a marker does not correspond in the first predetermined manner to a body if the number of marker(s) identified in the zone at a time exceeds the number of markers sensed in the zone at the time.
  • each marker is remotely detectable by means of radio frequency communication.
  • authorised personnel carry a marker 2, which comprises a small radio frequency identification (RFID) tag.
  • RFID radio frequency identification
  • the preferred type of RFID tag is an ⁇ T1' tag manufactured by Sokymat SA of Zone Industrielle CH 1614 Granges (Veveyse) Switzerland.
  • the processing means 110 In the low-power sleep state, the processing means 110 disables the active identification module 112, and samples (periodically or continuously) the output from the radio receiver 108.
  • the processing means 110 When the marker 106 is brought into range of the radio transmitter 102 (i.e. the marker 106 is in the vicinity of the reader unit 104), the processing means 110 will detect (either immediately, or with a small latency depending on the frequency of sampling of the radio receiver 108) a change in the output of the radio receiver 108, and will enable the active identification module 112 to allow correct operation of the security system.

Abstract

A system for monitoring the presence of persons within a zone, the system comprising: one or more remotely detectable markers, each capable of being carried by a person; a first sensor arrangement capable of identifying the presence of the body of at least one person within the zone; a second sensor arrangement capable of identifying the presence of at least one marker within the zone; and a processing arrangement responsive to the first sensor arrangement and the second sensor arrangement to generate an alarm signal if the first sensor arrangement identifies the presence of a body without the second sensor arrangement identifying a marker corresponding in a first predetermined manner to that body.

Description

SYSTEM FOR DETECTING INTRUDERS IN A POPULATED SPACE
This invention relates to a security system for detecting intruders in a populated space.
There are many instances in which it is desirable to monitor a sensitive area of a building, installation or other indoor or outdoor space for the presence of unauthorised intruders. Some known arrangements for this purpose will now be discussed.
GE Interlogix Sensors and Detectors, of 12345 SW Leveton Dr., Tualatin, OR 97062, U.S.A. manufactures a break-glass sensor known as the '5150 Shock Sensor' designed to raise an alarm when an intruder attempts to gain entry to a sensitive area by breaking a window on its perimeter. Any attempt to break the window bends a piezoelectric element in the sensor, and the electric current generated by the element in response is detected by a monitoring circuit which triggers an alarm circuit. However, this device only monitors certain points around the perimeter of the restricted space (the windows). If an intruder gains access to the space by, for example, following an authorised person through a security door without being challenged, this device can provide no indication that a security breach has occurred.
Alarm Lock, of 345 Bayview Avenue, Amityville, NY 11701 , U.S.A., manufactures a door alarm device known as the 'SirenLock PG21 '. This device is a lock containing a magnetic reed switch, which is affixed to the door to be monitored, coupled with a magnet that is attached to the frame of the door to be monitored. When the door is opened, the switch is moved away from the magnet, and the switch opens - if the person opening the door has not disabled the lock using a key, this action activates an alarm circuit to indicate an unauthorised entry. Again, this device only monitors certain areas around the perimeter of the restricted space (the doors), and cannot bring the presence of unauthorised people within the space to the attention of security personnel via an alarm.
Texecom Limited, of Texecom House, 559 Wilbraham Road, Manchester M21 OAE, Great Britain, manufactures a passive infra-red detection device known as the 'Reflex'. The device comprises an infra-red sensitive element placed behind a lens with a certain field-of-view. A monitoring circuit samples the electrical properties of the element, which change when infra-red light of the correct wavelength (that of the infra-red light emitted by the human body) falls on to it. When a person walks into the field-of-view of the device, the infra-red energy emitted by their body is picked up by the sensor, and the monitoring circuit detects the resulting change in the sensor's electrical properties, triggering an alarm. Because the sensor reacts to all people entering the sensor's field-of-view, it can only be used during periods when no authorised personnel will be present in the area covered. Therefore, these sensors are typically used to monitor areas within a sensitive space outside of normal operating or working hours.
Kalatel Inc., of 4575 Research Way, STE 250, Corvallis, Oregon 97333, U.S.A. manufactures a video surveillance system known as the 'Digiplex' system that allows operators to view images captured by a set of cameras placed around a sensitive space. An operator may be able to use the system to spot an intruder in a camera image amongst the authorised users of that space, but for the system to be effective during periods when authorised users are likely to be present in the sensitive area (for example, during the day) the operators must be able to identify all authorised users on sight. Furthermore, the use of human operators (rather than an automated monitor) will result in relatively high running costs for the system.
Whilst these security sensors can monitor either the perimeter of a sensitive space at all times, or regions within that space at certain times when no authorised personnel are present, they are unable to effectively monitor regions within a space populated by authorised personnel for the presence of intruders. The invention seeks to overcome at least some of the disadvantages of the prior art.
According to an aspect of the present invention there is provided a system for monitoring the presence of persons within a zone, the system comprising: one or more remotely detectable markers, each capable of being carried by a person; a first sensor arrangement capable of identifying the presence of the body of at least one person within the zone; a second sensor arrangement capable of identifying the presence of at least one marker within the zone; and a processing arrangement responsive to the first sensor arrangement and the second sensor arrangement to generate an alarm signal if the first sensor arrangement identifies the presence of a body without the second sensor arrangement identifying a marker corresponding in a first predetermined manner to that body.
According to an aspect of the present invention there is provided a method for monitoring the presence of persons within a zone by means of one or more remotely detectable markers, the method comprising: identifying the presence of the body of at least one person within the zone; identifying the presence of at least one marker within the zone; and generating an alarm signal if the first sensor arrangement identifies the presence of a body without the second sensor arrangement identifying a marker corresponding in a first predetermined manner to that body.
The alarm signal may cause an alarm to be sounded, or may be used to trigger another state in other equipment, for example to cause a camera that views the zone to be actuated.
Preferably each marker has a unique identity. Suitably the unique identity can be sensed remotely. Thus, preferably the presence and/or the identity of each marker can be sensed from a range greater than 20cm, 50cm, 1 m, or preferably
2m. Preferably the presence and/or identity of each marker can be sensed without line of sight contact between the marker and the reader: for example though clothing or the material of a handbag. Preferably each marker is adapted to be carried on a person, for example by being equipped with a clip or other pinching and/or gripping means.
The second sensor arrangement is preferably capable of sensing the identity of a marker that is located within the zone.
The processing arrangement preferably has access to a data store storing the identities of markers permitted in the zone. The data store may be co-located with the processing arrangement or remotely located and accessible to the processing arrangement via a data network. The processing arrangement is preferably arranged to generate an alarm signal if the identity of a marker sensed in the zone by the second sensor arrangement is not that of a marker that is permitted in the zone.
The system may comprises a third sensor arrangement for sensing an attribute of the or each person within the zone. In that instance the processing arrangement preferably has access to a data store storing for each marker one or more characteristics associated with that marker and is arranged to generate an alarm signal if the sensed attribute(s) do not correspond in a second predetermined manner to the characteristic(s) stored for the marker(s) sensed in the zone.
The attribute may be weight. The characteristic is suitably an indication of the weight of a person associated with the respective marker. That person has preferably been pre-registered as the user or carrier of that marker. Instead of or in addition to weight, one or more other attributes may be used. The or each such attribute is conveniently one that permits identification of a particular person to a reasonable level of probability. Thus the attribute is preferably automatically detectable, preferably permits differentiation between people, and is preferably resistant to simulation or concealment by an individual who might want to defeat the security system. Examples of such attributes include height, hair or skin colour, gait, fingerprints, iris pattern or body odour. These could be detected by suitable detection systems such as a series of vertically offset optical beams and associated detectors, digital cameras connected to image analysis apparatus, floor-mounted force transducers connected to time-based analysis equipment, electronic fingerprint detectors or electrochemical sensors.
The characteristic is an indication of the type of a person associated with the respective marker, and the processing arrangement may be arranged to estimate the weight of the person based on that indication. Such a characteristic may, for instance be the sex of the person.
The second predetermined manner may be such that if the weight sensed by the third sensing means differs by more than a predetermined threshold from the weight of the person as derived from the characteristic associated with the or each marker sensed in the zone then the sensed attribute does not correspond to the characteristic.
The first predetermined manner may be such that a marker does not correspond in the first predetermined manner to a body if the number of marker(s) identified in the zone at a time exceeds the number of markers sensed in the zone at the time.
The zone may be such that only one person can be present in the zone at a time. This may be achieved by restricting the size of the zone using walls, doors etc., or by preventing entry to the zone if there is a person in it by means of an air-lock- type arrangement.
The first sensor arrangement may be capable of determining the number of bodies of people within the zone. It may be an infra-red people counter.
Preferably the first sensor arrangement is capable of characterising the location of the body of at least one person within the zone, the second sensor arrangement is capable of characterising the location of at least one marker within the zone; and the first predetermined manner is such that a marker does not correspond in the first predetermined manner to a body if no marker is identified having the characterised location at which the body is identified.
A location may be characterised as a bearing from a respective sensor arrangement or a distance from a respective sensor arrangement. In this case the sensor arrangements are preferably located at points adjacent to each other. A location may be fully characterised within the zone, for example by means of both range and direction from a sensor arrangement.
The zone may be located at the periphery of a space. In that case the first sensor arrangement may be capable of identifying whether a body is moving towards or away from the space, and the first predetermined manner is such that an alarm signal is generated if the body to which a marker does not correspond is moving towards the space. Preferably an alarm signal is not generated otherwise.
The first sensor arrangement may be capable of sensing weight, suitably the weight bearing on the floor of the zone. The first predetermined manner may then be such that an alarm signal is generated if the sensed weight does not correspond to that associated with any detected marker(s) in the zone. The weight associated with a marker may be determined in one of the ways described above in relation to the third sensor arrangement.
Each marker may have an active state and a low power state in which it uses less power than in the active state. The system may comprise means for causing a marker to enter the active state on entry into the zone. Preferably each marker has a portable supply of electrical power, for example a battery, attached thereto.
Preferably each marker is remotely detectable by means of radio frequency communication.
Each tag may be a radio frequency transponder. Each sensor arrangement may comprise one or more sensor devices, which most preferably cooperate to collectively provide coverage over the whole of the zone.
It is preferred that each sensor arrangement has coverage of the whole of the zone, and that its coverage is substantially coterminous with the zone. Thus preferably it can detect substantially throughout the zone but no further.
According to an aspect of the invention, there is provided a system for detecting the presence of unauthorised people within an area populated by authorised people, the system comprising of: a plurality of markers, which may or may not have a unique identifier, and which are carried, at least one-per-person, by authorised people; a reader capable of sensing the presence, and identity if it has one, of a marker carried by an authorised person within some area; a detector capable of sensing the presence of people within the field-of-coverage of that sensor; and a processing unit; wherein the effective field-of-coverage of the detector is completely contained within the effective field-of-coverage of the reader, and both the detector and reader are connected to the processing means, and the processing means is capable of raising an alarm should the detector sense the presence of a person but the reader not sense the presence of a marker.
It will be appreciated that when an authorised person enters the zone (or field-of- coverage) of the first sensing arrangement (or detector), their presence can be sensed by both the detector - which preferably senses all people within the zone - and the second sensing arrangement (or reader) - which will detect the presence of the marker, or markers, carried by the individual). However, when an unauthorised person enters the field-of-coverage of the detector, their presence will be sensed only by the detector, because they do not carry a marker. Therefore, an alarm can be raised by the processing unit if the detector senses the presence of a person, but the reader does not sense the presence of a marker associated with them. In a further preferred feature of the invention, if the reader is capable of sensing not only the presence of a marker within the zone, but also the number of such markers, and the detector is capable of sensing not only the presence of people within its field-of-view, but also the number of such people (or that number can be estimated from the detector output), then a more stringent security test can be carried out by the system. An alarm can be raised by the processing unit if the detector senses the presence of more people than there are markers identified by the reader, because at least one person who is not carrying a marker must be present within the area covered by both the detector and the reader.
In a further preferred feature of the invention, if the reader is capable of sensing not only the presence of markers within some area, but also the location (either the three-dimensional location or a less precise characterisation thereof such as its range or bearing from a known point) of those markers, and the detector is capable of sensing not only the presence of people within its field-of-view, but also the locations (or ranges, or bearings) of those people relative to the same point or another point the offset of which from the first point is known (and preferably zero), then a still more stringent security test can be carried out by the system. An alarm can be raised by the processing unit if the detector senses the presence of one or more people at a particular location (or range, or bearing) where the reader does not detect the presence of a marker, because at least one person who is not carrying a marker must be present at that location (or at that range, or on that bearing).
In a further preferred feature of the invention, a signal may be transmitted by the system to battery-powered markers carried by authorised personnel to wake them from a low- power state when they are in the vicinity of the field-of-coverage of the reader, allowing them to conserve battery power whilst they are not in the space covered by the security system. In a further preferred feature of the invention, if the reader is capable of sensing not only the presence and the number, but also the identities of markers within its area of coverage, then a still more stringent security test can be carried out by the system. The processing unit can disregard, for the purposes of counting the number of authorised people present (either in the space covered by the security system, or at a location, or at a range, or on a bearing), any marker with an identifier not contained in a list of marker identities, stored by the reader, which corresponds to those markers carried by people authorised to be present in that area of the building, installation or other space at that time.
In a further preferred feature of the invention, if the reader is capable of sensing not only the presence and the number, but also the identities of markers within its area of coverage, and the processing unit stores the expected weight of the person associated with each marker, and the detector is a weight sensor, then a heuristic can be used by the processing unit to help determine whether or not an alarm condition should be signalled. If the total of the expected weights of the authorised people sensed by the reader differs from the weight signal output by the detector by more than some pre-set limit, an alarm is signalled by the processing unit.
Embodiments of the invention will now be more particulariy described, by way of example only, with reference to the accompanying figures, which show schematic overviews of embodiments of the invention.
In the figures:
Figure 1 shows a first embodiment of an intruder detection system;
Figure 2 shows a second embodiment of an intruder detection system;
Figure 3 shows a third embodiment of an intruder detection system;
Figure 4 shows a fourth embodiment of an intruder detection system; Figure 5 shows a fifth embodiment of an intruder detection system;
Figure 6 shows a sixth embodiment of an intruder detection system;
Figure 7 shows a seventh embodiment of an intruder detection system; and Figure 8 illustrates a means for activating a marker from a low power state.
In a first embodiment (shown in Figure 1), authorised personnel carry a marker 2, which comprises a small radio frequency identification (RFID) tag. The preferred type of RFID tag is an ΗT1' tag manufactured by Sokymat SA of Zone Industrielle CH 1614 Granges (Veveyse) Switzerland.
A reader unit 4, and a detector unit 6, are connected to an IBM-compatible PC 8, which, in turn, is connected to an alarm system 10. The preferred type of reader unit 4 is a HT CM800 with long-range antenna, supplied by ACG AG, Dantestrasse 4-6, D-65189, Wiesbaden, Germany. The preferred type of detector unit 6 is a 'Reflex' passive infra-red detector, manufactured by Texecom Limited, of Texecom House, 559 Wilbraham Road, Manchester M21 0AE, and mounted so as to cover the same area as the reader unit. The coverage areas of each may also be limited by the physical environment set up around the sensor: for example by means of walls, doors etc. that result in the zones of coverage of the two sensors being substantially coterminous.
When the detector 6 signals the software running on the PC 8 that a person is present in its field-of-coverage, the PC software checks the output of the reader unit 4 to determine whether one or more markers 2 are present in the field-of- coverage of the reader unit 4. If no markers are present, an unauthorised person has entered the space covered by the reader unit 4 and the detector 6, and so the software running on the PC 8 triggers the alarm system 10.
A data store 150 may be provided in any of the embodiments described herein for storing data that can be used by the PC for its operations.
Other technologies may be substituted for the marker 2 and reader unit 4, for example the 'Copytag LR' active tag and 'CTCR1' reader unit supplied by
Copytag Limited of 1A Upper Hook Harlow Essex CM18 6PX United Kingdom.
Other technologies may be substituted for the detector unit 6, for example, a weight-sensitive pressure mat such as the '902R' mat manufactured by United Security Products Inc. of 11025 Sorrento Valley Court, San Diego, CA 92121 , U.S.A., a light-beam-break detector such as the 'PR10-B' manufactured by Pulnix Europe Ltd of Pulnix House, Aviary Court, Wade Road, Basingstoke, Hampshire, RG24 8PE, United Kingdom, an infra-red people counter such as the 'IRC1004/0' manufactured by IRISYS of Towcester Mill, Towcester, Northants, NN12 6AD, United Kingdom, or a radar unit such as the short-range 24GHz radar developed by smart microwave sensors GmbH of Mittelweg 7, Braunschweig, Niedersachsen D-38106, Germany.
The PC suitably comprises a data processor. The PC could be replaced by a dedicated processing means.
In a second embodiment of the invention (shown in Figure 2), the system is capable of determining the number of markers and unauthorised people within the area it covers. Authorised personnel carry a marker 12, which comprises a small radio frequency identification (RFID) tag. The preferred type of RFID tag is an ΗT1' tag manufactured by Sokymat SA of Zone Industrielle CH 1614 Granges (Veveyse) Switzerland.
A reader unit 14, and a detector unit 16, are connected to an IBM-compatible PC 18, which, in turn, is connected to an alarm system 20. The preferred type of reader unit 14 is an 'HT CM800' with long-range antenna, supplied by ACG AG, Dantestrasse 4-6, D-65189, Wiesbaden, Germany. The preferred type of detector unit 16 is a radar unit such as the short-range 24GHz radar developed by smart microwave sensors GmbH of Mittelweg 7, Braunschweig, Niedersachsen D- 38106, Germany.
When the detector 16 signals the software running on the PC 18 that one or more people are present in its field-of-coverage, the PC software checks the output of the reader unit 14 to determine whether one or more markers 12 are present in the field-of-coverage of the reader unit 14. If the number of markers present is less than the number of people sensed by the detector, an unauthorised person has entered the space covered by the reader unit 14 and the detector 16, and so the software running on the PC 18 triggers the alarm system 20.
Other technologies may be substituted for the marker 12 and reader unit 14, for example the 'Copytag LR' active tag and 'CTCR1 ' reader unit supplied by Copytag Limited of 1A Upper Hook Harlow Essex CM18 6PX United Kingdom.
In a third embodiment of the invention (shown in Figure 3), the system is again capable of determining the number of markers and unauthorised people within the area it covers. Authorised personnel carry a marker 22, which comprises a small radio frequency identification (RFID) tag. The preferred type of RFID tag is an ΗT1' tag manufactured by Sokymat SA of Zone Industrielle CH 1614 Granges (Veveyse) Switzerland.
A reader unit 24, and a detector 26 comprising a number of infra-red people counters, 28, 30, 32 and 34, are connected to an IBM-compatible PC 36, which, in turn, is connected to an alarm system 38. The preferred type of reader unit 24 is an 'HT CM800' with long-range antenna, supplied by ACG AG, Dantestrasse 4-6, D-65189, Wiesbaden, Germany. The preferred type of people counters 28, 30, 32 and 34 are the RC1004/0' manufactured by IRISYS of Towcester Mill, Towcester, Northants, NN12 6AD, United Kingdom.
Each person counter 28, 30, 32 and 34 in the detector 26 generates an 'in' signal when a person passes in one direction across its field-of-view, and a 'out' signal when a person passes in the other direction across its field-of-view. Software running on the PC 36 takes in readings from the people counters 28, 30, 32 and 34 to maintain a count of the number of people within the area bounded by the people counters - each time an 'in' signal is received the count is increased, and each time an 'out' signal is received the count is decreased. (It is assumed that no people will, initially, be in the monitored area, and the initial count is set to zero). When the software running on the PC 36 notes that the count of people in the monitored area is greater than zero, it checks the output of the reader unit 24 to determine whether one or more markers 22 are present in the field-of-coverage of the reader unit 24. If the number of markers present is less than the number of people counted to be in the monitored area, an unauthorised person has entered the space covered by the reader unit 24 and bounded by the infra-red people counters 28, 30, 32, and 34 and so the software running on the PC 36 triggers the alarm system 38.
In some circumstances, a greater or lesser number of people counters may be required to bound the area covered by the reader unit. For example (shown in Figure 4), if a reader unit 40 is set up to cover an area of a corridor, only two people counters, 42 and 44, will be required, one on each open side of the region covered by the reader unit 40.
Other technologies may be substituted for the marker 22 and reader unit 24, for example the 'Copytag LR' active tag and 'CTCR1' reader unit supplied by Copytag Limited of 1A Upper Hook Harlow Essex CM 18 6PX United Kingdom.
In a fourth embodiment of the invention (shown in Figure 5), the system is again capable of determining the number of markers and unauthorised people within the area it covers. Authorised personnel carry a marker 52, which comprises a small radio frequency identification (RFID) tag. The preferred type of RFID tag is an ΗT1' tag manufactured by Sokymat SA of Zone Industrielle CH 1614 Granges (Veveyse) Switzerland.
A reader unit 54, and a detector unit 56, are connected to an IBM-compatible PC 58, which, in turn, is connected to an alarm system 60. The preferred type of reader unit 54 is an ΗT CM800' with long-range antenna, supplied by ACG AG,
Dantestrasse 4-6, D-65189, Wiesbaden, Germany. The preferred type of detector unit 56 is a '9253' force plate manufactured by Kistler Instruments Ltd., Alresford House, Mill Lane, Alton, Hampshire GU34 2QJ, which is placed in the floor within the area of coverage of the reader unit 54.
When one or more people step on the detector 56, it signals the software running on the PC 58 that one or more people are present in the sensitive area, and the PC software checks the output of the reader unit 54 to determine whether one or more markers 52 are present in the field-of-coverage of the reader unit 54.
The PC software then determines the weight that would be expected to press down on the floor if the only people present were those associated with the markers 52 detected in the field-of-coverage of the reader unit 54. The software can do this in a number of ways. Firstly, it can multiply the number of markers detected by an average weight for people authorised to be in that area. Alternatively, if the reader unit 54 can determine the identifies of the markers 52 that it senses (as is the case for the preferred reader unit 54), it can use those identities, together with a stored list of the sexes or the known weights of the authorised individuals associated with each marker, to obtain a more accurate weight estimate - the software can multiply the number of markers known to be carried by men by an average weight for a male, and sum this with the number of markers known to be carried by females multiplied by an average weight for a female, or (if the information is available) it can sum the expected weights of the people associated with each marker.
The software running on the PC 58 then checks the estimated weight signature with the measured weight signature reported by the detector 56. If the weight signature reported by the detector 56 is greater than the expected weight signature by more than some pre-set error limit, an unauthorised person is likely to have entered the space covered by the reader unit 54 and the detector 56, and so the software running on the PC 58 triggers the alarm system 60. Other technologies may be substituted for the marker 52 and reader unit 54, for example the 'Copytag LR' active tag and 'CTCR1' reader unit supplied by Copytag Limited of 1A Upper Hook Harlow Essex CM18 6PX United Kingdom.
In a fifth embodiment of the invention (shown in Figure 6), the system is capable of determining the number and locations of markers and unauthorised people within the area it covers. Authorised personnel carry a marker with a unique identifier 62, which comprises a location sensor transmitter 64 and a 9V battery and power supply regulator (not shown). A number of location sensor receivers 66, 68, 70 and 72 are placed in the environment, and are connected with a detector unit 74 to an IBM-compatible PC 76, which, in turn, is connected to an alarm system 78. The preferred type of location sensor 64, 66, 68, 70 and 72 is an ultra-wideband radio location sensor. One example of an ultra-wideband radio location sensor is that developed by the applicant hereof. Another example of such a sensor is that developed by Multispectral Solutions of 20300 Century Boulevard, Germantown, MD 20874, U.S.A. The preferred type of detector unit 74 is a radar unit such as the short-range 24GHz radar developed by smart microwave sensors GmbH of Mittelweg 7, Braunschweig, Niedersachsen D- 38106, Germany.
The marker 62 continuously transmits signals containing its unique identifier via the location sensor transmitter 64. These signals are picked up by the fixed location sensor receivers 66, 68, 70 and 72, which pass details regarding those signals (such as the signal times-of-arrival and the marker identity encoded within each signal) to software running on the PC 76. The software running on the PC 76 uses these signal details to calculate the location of each marker tag within range of the location sensor receiver 66, 68, 70 and 72.
When the detector 74 signals the software running on the PC 76 to indicate that one or more people are present within its field-of-coverage, and passes the locations of those people to the PC software, the software checks the locations of the known authorised people against the locations of the people sensed by the detector 74. If the locations of one or more people sensed by the detector 74 are not matched by a corresponding marker location reported via the radio receiver 72, then an unauthorised person has entered the sensitive space, and so the software running on the PC 76 triggers the alarm system 78.
In some circumstances, a greater or lesser number of fixed location sensor receivers 66, 68, 70, 72 will be required to cover the sensitive area monitored by the security system. Furthermore, depending on the architecture of the location sensor subsystem 64, 66, 68, 70 and 72, it may not be possible or desirable for the software running on the PC 76 to calculate a full 2D or 3D location solution for the marker 62 and the software may only calculate a range or bearing of the marker from some point in space. It may also not be possible or desirable for the detector 74 to report the full 2D or 3D locations of people present within its field- of-coverage and the detector may only report the ranges or bearings of those people relative to some point in space. In such situations, a less stringent security check can still be made by the software running on the PC 76. The data generated by the software running on the PC 76 from the information sensed by the location sensor receivers 66, 68, 70 and 72, and the output from the detector 74, are transformed by the software (via standard geometrical procedures) into ranges or bearings from the same point. Then, when the detector 74 signals the software running on the PC 76 to indicate that one or more people are present within its field-of-coverage, the software checks the ranges or bearings of the known authorised people from some point against the ranges or bearings of the people sensed by the detector 74 from the same point. If the ranges or bearings of one or more people sensed by the detector 74 are not matched by a corresponding marker range or bearing determined using the information reported by the location sensor receivers 66, 68, 70 and 72, then an unauthorised person has entered the sensitive space, and so the software running on the PC 76 triggers the alarm system 78. In a sixth embodiment of the invention (shown in Figure 7), the system is again capable of determining the number and locations of markers and unauthorised people within the area it covers. Authorised personnel carry a marker with a unique identifier 82, which comprises a location sensor 84 and a radio transmitter 86 and a 9V battery and power supply regulator (not shown). The location sensor 84 detects signals from a one or more location sensor transmitters 88, 90 placed in the environment, and a radio receiver 92 detects signals from the radio transmitter 86. The radio receiver 92 and a detector unit 94 are connected to an IBM-compatible PC 96, which, in turn, is connected to an alarm system 98. The preferred type of location sensor 84 and associated location sensor transmitters 88, 90 is an electromagnetic sensor and base stations such as the 'MiniBird 800' system manufactured by Ascension Technology Corporation of 107 Catamount Drive, Milton, VT 05468 U.S.A. The preferred type of radio transmitter 86 and radio receiver 92 is a 'SPM2-433-28' transceiver manufactured by Radiometrix Limited of Hartcran House, Gibbs Couch, Carpenders Park, Hertfordshire, WD19 5EZ, United Kingdom. The preferred type of detector unit 94 is a radar unit such as the short-range 24GHz radar developed by smart microwave sensors GmbH of Mittelweg 7, Braunschweig, Niedersachsen D-38106, Germany.
When a marker 82 carried by an authorised person lies within range of the location sensor transmitters 88, 90, the marker determines its location and transmits it, together with the marker's unique identifier, via the radio transmitter 86. The software running on the PC 96 continuously monitors the output of the radio receiver 92 to determine the locations of markers carried by authorised personnel lying within range of the radio receiver 92. When the detector 94 signals the software running on the PC 96 to indicate that one or more people are present within its field-of-coverage, and passes the locations of those people to the PC software, the software checks the locations of the known authorised people against the locations of the people sensed by the detector 94. If the locations of one or more people sensed by the detector 94 are not matched by a corresponding marker location reported via the radio receiver 92, then an unauthorised person has entered the sensitive space, and so the software running on the PC 96 triggers the alarm system 98.
In some circumstances, a greater or lesser number of fixed transmitters 88, 90 will be required to cover the sensitive area monitored by the security system.
Other technologies may be substituted for the location sensor 84 and the fixed transmitters 88, 90, for example an ultra-wideband radio location sensor as developed by the applicant hereof or by Multispectral Solutions of 20300 Century Boulevard, Germantown, MD 20874, U.S.A.
In all embodiments involving an active marker carried by authorised personnel, it may be advantageous to provide a mechanism to wake those markers from a low- power sleep state when they are in the vicinity of a sensitive space. In this way, the battery lifetimes of the markers are extended - each marker only consumes significant power whilst communicating information to the reader, and using this mechanism the marker only performs that action when it is likely to be able to communicate information to the reader.
The accompanying Figure 8 shows one way in which this mechanism may be implemented. A radio transmitter 102 is placed near the reader unit 104, and its power is adjusted so that the effective field-of-coverage of the reader unit 104 is contained within the effective field-of-coverage of the radio transmitter 102. Each marker 106 carried by an authorised person comprises a radio receiver 108, a processing means 110, an active identification module 112 (which may include location-determination functionality, as described in previous embodiments) and a power source (not shown).
In the low-power sleep state, the processing means 110 disables the active identification module 112, and samples (periodically or continuously) the output from the radio receiver 108. When the marker 106 is brought into range of the radio transmitter 102 (i.e. the marker 106 is in the vicinity of the reader unit 104), the processing means 110 will detect (either immediately, or with a small latency depending on the frequency of sampling of the radio receiver 108) a change in the output of the radio receiver 108, and will enable the active identification module 112 to allow correct operation of the security system. When the marker 106 leaves the vicinity of the reader unit, communications between the radio transmitter 102 and the marker's radio receiver 108 will no longer be possible, and the processing means 110 will detect the resulting change in the output of the radio receiver 108, and will disable the active identification module 112.
In all of the above embodiments of the system, a variety of alarm systems may be used to indicate that a security breach has occurred. The alarm system may, for example, be an audible or visible alarm, a door lock, a system which takes a picture of the area likely to contain the intruder and shows it to security staff or stores it for later examination, or, in circumstances where the detector unit can provide the alarm system with locations of unidentified and unauthorised targets, a system that slews a camera to point at that location so as to obtain a detailed image of the potential intruder. It is not necessary that an alarm be sounded in response to the alarm signal generated by the system.
The applicant hereby discloses in isolation each individual feature described herein and any combination of two or more such features, to the extent that such features or combinations are capable of being carried out based on the present specification as a whole in the light of the common general knowledge of a person skilled in the art, irrespective of whether such features or combinations of features solve any problems disclosed herein, and without limitation to the scope of the claims. The applicant indicates that aspects of the present invention may consist of any such individual feature or combination of features. In view of the foregoing description it will be evident to a person skilled in the art that various modifications may be made within the scope of the invention.

Claims

1. A system for monitoring the presence of persons within a zone, the system comprising: one or more remotely detectable markers, each capable of being carried by a person; a first sensor arrangement capable of identifying the presence of the body of at least one person within the zone; a second sensor arrangement capable of identifying the presence of at least one marker within the zone; and a processing arrangement responsive to the first sensor arrangement and the second sensor arrangement to generate an alarm signal if the first sensor arrangement identifies the presence of a body without the second sensor arrangement identifying a marker corresponding in a first predetermined manner to that body.
2. A system as claimed in claim 1 , wherein: each marker has a unique identity; the second sensor arrangement is capable of sensing the identity of a marker that is located within the zone.
3. A system as claimed in claim 2, wherein the processing arrangement has access to a data store storing the identities of markers permitted in the zone and is arranged to generate an alarm signal if the identity of a marker sensed in the zone by the second sensor arrangement is not that of a marker that is permitted in the zone.
4. A system as claimed in claim 2 or 3, wherein: the system comprises a third sensor arrangement for sensing an attribute of the or each person within the zone; and the processing arrangement has access to a data store storing for each marker one or more characteristics associated with that marker and is arranged to generate an alarm signal if the sensed attribute(s) do not correspond in a second predetermined manner to the characteristic(s) stored for the marker(s) sensed in the zone.
5. A system as claimed in claim 4, wherein the attribute is weight.
6. A system as claimed in claim 5, wherein the characteristic is an indication of the weight of a person associated with the respective marker.
7. A system as claimed in claim 5, wherein the characteristic is an indication of the type of a person associated with the respective marker, and the processing arrangement is arranged to estimate the weight of the person based on that indication.
8. A system as claimed in any of claims 5 to 7, wherein the second predetermined manner is such that if the weight sensed by the third sensing means differs by more than a predetermined threshold from the weight of the person as derived from the characteristic associated with the or each marker sensed in the zone then the sensed attribute does not correspond to the characteristic.
9. A system as claimed in any preceding claim, wherein the first predetermined manner is such that a marker does not correspond in the first predetermined manner to a body if the number of marker(s) identified in the zone at a time exceeds the number of markers sensed in the zone at the time.
10. A system as claimed in claim 9, wherein the zone is such that only one person can be present in the zone at a time.
11. A system as claimed in claim 9, wherein the first sensor arrangement is capable of determining the number of bodies of people within the zone.
12. A system as claimed in any of claims 1 to 8, wherein the first sensor arrangement is capable of characterising the location of the body of at least one person within the zone, the second sensor arrangement is capable of characterising the location of at least one marker within the zone; and the first predetermined manner is such that a marker does not correspond in the first predetermined manner to a body if no marker is identified having the characterised location at which the body is identified.
13. A system as claimed in claim 12, wherein a location is characterised as a bearing from a respective sensor arrangement.
14. A system as claimed in claim 12 or 13, wherein a location is characterised as a distance from a respective sensor arrangement.
15. A system as claimed in any preceding claim, wherein the zone is located at the periphery of a space, the first sensor arrangement is capable of identifying whether a body is moving towards or away from the space, and the first predetermined manner is such that an alarm is generated if the body to which a marker does not correspond is moving towards the space.
16. A system as claimed in any preceding claim, wherein each marker has an active state and a low power state in which it uses less power than in the active state, and the system comprises means for causing a marker to enter the active state on entry into the zone.
17. A system as claimed in any preceding claim, wherein each marker is remotely detectable by means of radio frequency communication.
18. A system as claimed in claim 17, wherein each marker is a radio frequency transponder.
19. A method for monitoring the presence of persons within a zone by means of one or more remotely detectable markers, the method comprising: identifying the presence of the body of at least one person within the zone; identifying the presence of at least one marker within the zone; and 5 generating an alarm signal if the first sensor arrangement identifies the presence of a body without the second sensor arrangement identifying a marker corresponding in a first predetermined manner to that body.
20. A system for monitoring the presence of persons within a zone, the system I0 being substantially as herein described with reference to the accompanying drawings.
PCT/GB2004/000331 2003-01-25 2004-01-26 System for detecting intruders in a populated space WO2004068432A1 (en)

Priority Applications (2)

Application Number Priority Date Filing Date Title
EP04705125A EP1593102B1 (en) 2003-01-25 2004-01-26 System for detecting intruders in a populated space
DE602004004874T DE602004004874T8 (en) 2003-01-25 2004-01-26 SYSTEM FOR DETECTING IMPORTS IN A POPULAR ROOM

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
GBGB0301790.2A GB0301790D0 (en) 2003-01-25 2003-01-25 System for detecting intruders in a populated space
GB0301790.2 2003-01-25

Publications (1)

Publication Number Publication Date
WO2004068432A1 true WO2004068432A1 (en) 2004-08-12

Family

ID=9951842

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/GB2004/000331 WO2004068432A1 (en) 2003-01-25 2004-01-26 System for detecting intruders in a populated space

Country Status (6)

Country Link
US (1) US7466224B2 (en)
EP (1) EP1593102B1 (en)
AT (1) ATE354844T1 (en)
DE (1) DE602004004874T8 (en)
GB (1) GB0301790D0 (en)
WO (1) WO2004068432A1 (en)

Cited By (15)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
ES2255886A1 (en) * 2006-03-15 2006-07-01 Evaristo Segura Ruiz Alarm system for buildings has microcontroller that disables alarm when presence of identification card is detected
FR2881859A1 (en) * 2005-02-08 2006-08-11 Yvan Peyrot Confined space e.g. laboratory, securing device, has comparator modules, each including output which is activated if one input of modules is activated and another input is not activated at end of adjustable delay
EP1752701A1 (en) * 2005-07-20 2007-02-14 Ecoassistenza Safety device for a feeding belt and a waste material press
WO2007029279A1 (en) * 2005-09-09 2007-03-15 Gelfusa, Claudio Improved identification system
WO2008020893A1 (en) * 2006-08-15 2008-02-21 Lawrence Kates System and method for intruder detection
GB2443848A (en) * 2006-11-20 2008-05-21 Clarion Technologies A surveillance system with identification detection
FR2911987A1 (en) * 2007-01-29 2008-08-01 Airbus France Sa Video-monitoring method for authorized and unauthorized persons near aircraft, involves detecting person entering into danger area, and controlling tag of identification system with transmitter/receiver on detected person
US7504956B2 (en) 2005-03-22 2009-03-17 Lawrence Kates System and method for pest detection
WO2012024303A1 (en) * 2010-08-16 2012-02-23 Comtrol Corporation Theft prevention system and method
EP2565857A1 (en) * 2011-09-01 2013-03-06 Siemens Aktiengesellschaft Method and system for evaluating the security situation in a building with living areas with access authorisation
ITMI20121159A1 (en) * 2012-07-02 2014-01-03 Ct Studi S R L METHOD FOR MONITORING USERS FLOW IN A DELIMITED AREA
GB2520099A (en) * 2014-06-26 2015-05-13 Cocoon Alarm Ltd Intruder detection method and system
FR3020704A1 (en) * 2014-05-02 2015-11-06 Airbus PREVENTING RISKS DURING INTERVENTION ON AN AIRCRAFT
WO2016207350A1 (en) * 2015-06-26 2016-12-29 Myfox Home automation device, method for controlling a home automation device and computer program
EP3413274A1 (en) * 2017-06-07 2018-12-12 Gemalto Sa A method for provisioning a device with an information element allowing to identify unauthorized users in a restricted area

Families Citing this family (55)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7557433B2 (en) * 2004-10-25 2009-07-07 Mccain Joseph H Microelectronic device with integrated energy source
US7619533B2 (en) * 2006-01-07 2009-11-17 Streetime Technologies Llc Method and apparatus for monitoring persons
US7844081B2 (en) * 2006-05-15 2010-11-30 Battelle Memorial Institute Imaging systems and methods for obtaining and using biometric information
US20080291011A1 (en) * 2007-05-23 2008-11-27 Knight Joann Frank Offender alert system
US7688212B2 (en) * 2007-07-26 2010-03-30 Simplexgrinnell Lp Method and apparatus for providing occupancy information in a fire alarm system
US8693737B1 (en) * 2008-02-05 2014-04-08 Bank Of America Corporation Authentication systems, operations, processing, and interactions
US8102238B2 (en) * 2008-05-30 2012-01-24 International Business Machines Corporation Using an RFID device to enhance security by determining whether a person in a secure area is accompanied by an authorized person
US8791817B2 (en) * 2008-10-22 2014-07-29 Centurylink Intellectual Property Llc System and method for monitoring a location
US8983488B2 (en) 2008-12-11 2015-03-17 Centurylink Intellectual Property Llc System and method for providing location based services at a shopping facility
JP5424676B2 (en) * 2009-03-13 2014-02-26 キヤノン株式会社 Image processing device
US9307037B2 (en) * 2009-04-15 2016-04-05 Centurylink Intellectual Property Llc System and method for utilizing attendee location information with an event planner
US8428620B2 (en) * 2009-04-22 2013-04-23 Centurylink Intellectual Property Llc Mass transportation service delivery platform
US8655693B2 (en) * 2009-07-08 2014-02-18 Centurylink Intellectual Property Llc System and method for automating travel related features
WO2011035302A1 (en) 2009-09-21 2011-03-24 Checkpoint Systems, Inc. Retail product tracking system, method, and apparatus
US8508367B2 (en) 2009-09-21 2013-08-13 Checkpoint Systems, Inc. Configurable monitoring device
US9711034B2 (en) * 2010-01-11 2017-07-18 Isaac S. Daniel Security system and method
US8970369B2 (en) * 2010-09-13 2015-03-03 Fasteners For Retail, Inc. “Invisi wall” anti-theft system
EP2518709B1 (en) * 2011-04-28 2013-06-12 Sick Ag Anti-theft device and method for detecting unauthorised access and entry
US20120286929A1 (en) * 2011-05-13 2012-11-15 International Business Machines Corporation Authenticated security system
GB2498568B (en) * 2012-01-20 2014-09-24 Cp Electronics Ltd Sensing device and method of calibration
CN103247116B (en) * 2012-02-14 2016-09-07 薛涛 The safety-protection system combined based on video analysis, space orientation, RF identification
US9325949B2 (en) 2012-11-19 2016-04-26 Qualcomm Incorporated Intrusion detection
ES2534702B1 (en) 2013-09-24 2016-02-09 Ontech Security, Sl ELECTROSTATIC FIELD SENSOR AND SECURITY SYSTEM IN INTERIOR SPACES
US9860687B2 (en) * 2014-03-31 2018-01-02 Loop Labs, Inc. Building sensor array
US9721445B2 (en) * 2014-06-06 2017-08-01 Vivint, Inc. Child monitoring bracelet/anklet
US10074130B2 (en) 2014-07-10 2018-09-11 Bank Of America Corporation Generating customer alerts based on indoor positioning system detection of physical customer presence
US10028081B2 (en) 2014-07-10 2018-07-17 Bank Of America Corporation User authentication
US10108952B2 (en) 2014-07-10 2018-10-23 Bank Of America Corporation Customer identification
US9734643B2 (en) * 2014-07-10 2017-08-15 Bank Of America Corporation Accessing secure areas based on identification via personal device
US10332050B2 (en) 2014-07-10 2019-06-25 Bank Of America Corporation Identifying personnel-staffing adjustments based on indoor positioning system detection of physical customer presence
CN105261137A (en) * 2014-07-17 2016-01-20 天津博众益科技有限公司 Radio-frequency-identification home security system
US10482759B2 (en) 2015-05-13 2019-11-19 Tyco Safety Products Canada Ltd. Identified presence detection in and around premises
EP3171350B1 (en) * 2015-11-23 2019-06-12 Essence Smartcare Ltd Identifying a person detected in a monitored location
IT201600110558A1 (en) * 2016-11-03 2018-05-03 Texa Spa ANTI-THEFT SYSTEM
US10733861B2 (en) * 2016-11-22 2020-08-04 Avigilon Corporation Location control system and method
US10586432B2 (en) 2017-12-29 2020-03-10 Ademco Inc. Systems and methods for intrusion detection using selective masking
US10977886B2 (en) 2018-02-13 2021-04-13 Gojo Industries, Inc. Modular people counters
DE102018109160A1 (en) * 2018-04-17 2019-10-17 Elten GmbH Shoe for access control and corresponding system
CA3054216C (en) 2018-09-05 2023-08-01 Honeywell International Inc. Methods and systems for improving infection control in a facility
US10978199B2 (en) 2019-01-11 2021-04-13 Honeywell International Inc. Methods and systems for improving infection control in a building
US11620594B2 (en) 2020-06-12 2023-04-04 Honeywell International Inc. Space utilization patterns for building optimization
US11783652B2 (en) 2020-06-15 2023-10-10 Honeywell International Inc. Occupant health monitoring for buildings
US11914336B2 (en) 2020-06-15 2024-02-27 Honeywell International Inc. Platform agnostic systems and methods for building management systems
US11783658B2 (en) 2020-06-15 2023-10-10 Honeywell International Inc. Methods and systems for maintaining a healthy building
US11823295B2 (en) 2020-06-19 2023-11-21 Honeywell International, Inc. Systems and methods for reducing risk of pathogen exposure within a space
US11184739B1 (en) 2020-06-19 2021-11-23 Honeywel International Inc. Using smart occupancy detection and control in buildings to reduce disease transmission
US11662449B2 (en) * 2020-06-22 2023-05-30 Honeywell International Inc. Methods and systems for improving target detection performance of an indoor radar sensor
US11619414B2 (en) 2020-07-07 2023-04-04 Honeywell International Inc. System to profile, measure, enable and monitor building air quality
CN113963471A (en) * 2020-07-20 2022-01-21 安徽徽昂光电科技有限公司 RFID tag and operation method thereof
US11402113B2 (en) 2020-08-04 2022-08-02 Honeywell International Inc. Methods and systems for evaluating energy conservation and guest satisfaction in hotels
US11894145B2 (en) 2020-09-30 2024-02-06 Honeywell International Inc. Dashboard for tracking healthy building performance
US11662115B2 (en) 2021-02-26 2023-05-30 Honeywell International Inc. Hierarchy model builder for building a hierarchical model of control assets
US11372383B1 (en) 2021-02-26 2022-06-28 Honeywell International Inc. Healthy building dashboard facilitated by hierarchical model of building control assets
US11620867B2 (en) * 2021-03-22 2023-04-04 Toyota Motor Engineering & Manufacturing North America, Inc. Door actuation system using contactless brainwave monitoring and gait recognition
US11474489B1 (en) 2021-03-29 2022-10-18 Honeywell International Inc. Methods and systems for improving building performance

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
FR2571419A1 (en) * 1984-10-05 1986-04-11 Ollagnier Robert Safety door with access control sensitive to the weight of a person
EP0622761A2 (en) * 1993-04-26 1994-11-02 Autec Automations-Technik Beeler Werner Method for separating articles
WO2002023498A1 (en) * 2000-09-15 2002-03-21 Technopuce Surveillance method and device for triggering a warning during an intrusion in the monitored zone

Family Cites Families (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5541585A (en) * 1994-10-11 1996-07-30 Stanley Home Automation Security system for controlling building access
FR2761181B1 (en) * 1997-03-19 1999-06-11 Alcea SYSTEM AND METHOD FOR SURVEILLANCE OF PREMISES
US6720874B2 (en) * 2000-09-29 2004-04-13 Ids Systems, Inc. Portal intrusion detection apparatus and method
US20020158761A1 (en) * 2001-04-27 2002-10-31 Larry Runyon Radio frequency personnel alerting security system and method
US7123126B2 (en) * 2002-03-26 2006-10-17 Kabushiki Kaisha Toshiba Method of and computer program product for monitoring person's movements

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
FR2571419A1 (en) * 1984-10-05 1986-04-11 Ollagnier Robert Safety door with access control sensitive to the weight of a person
EP0622761A2 (en) * 1993-04-26 1994-11-02 Autec Automations-Technik Beeler Werner Method for separating articles
WO2002023498A1 (en) * 2000-09-15 2002-03-21 Technopuce Surveillance method and device for triggering a warning during an intrusion in the monitored zone

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
ADDLESEE M D ET AL: "THE ORL ACTIVE FLOOR", IEEE PERSONAL COMMUNICATIONS, IEEE COMMUNICATIONS SOCIETY, US, vol. 4, no. 5, 1 October 1997 (1997-10-01), pages 35 - 41, XP000721304, ISSN: 1070-9916 *

Cited By (27)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
FR2881859A1 (en) * 2005-02-08 2006-08-11 Yvan Peyrot Confined space e.g. laboratory, securing device, has comparator modules, each including output which is activated if one input of modules is activated and another input is not activated at end of adjustable delay
US7504956B2 (en) 2005-03-22 2009-03-17 Lawrence Kates System and method for pest detection
EP1752701A1 (en) * 2005-07-20 2007-02-14 Ecoassistenza Safety device for a feeding belt and a waste material press
WO2007029279A1 (en) * 2005-09-09 2007-03-15 Gelfusa, Claudio Improved identification system
ES2255886A1 (en) * 2006-03-15 2006-07-01 Evaristo Segura Ruiz Alarm system for buildings has microcontroller that disables alarm when presence of identification card is detected
WO2008020893A1 (en) * 2006-08-15 2008-02-21 Lawrence Kates System and method for intruder detection
US7411497B2 (en) 2006-08-15 2008-08-12 Lawrence Kates System and method for intruder detection
US20120105229A1 (en) * 2006-08-15 2012-05-03 Lawrence Kates System and method for intruder detection
GB2443848A (en) * 2006-11-20 2008-05-21 Clarion Technologies A surveillance system with identification detection
FR2911987A1 (en) * 2007-01-29 2008-08-01 Airbus France Sa Video-monitoring method for authorized and unauthorized persons near aircraft, involves detecting person entering into danger area, and controlling tag of identification system with transmitter/receiver on detected person
WO2008110683A1 (en) * 2007-01-29 2008-09-18 Airbus France Method for surveying authorised and non authorised persons in a security perimeter about an apparatus
US8742927B2 (en) 2007-01-29 2014-06-03 Airbus Operations Sas Method for monitoring authorized and unauthorized persons within a security perimeter around an apparatus
WO2012024303A1 (en) * 2010-08-16 2012-02-23 Comtrol Corporation Theft prevention system and method
US8830060B2 (en) 2010-08-16 2014-09-09 Comtrol Corporation Theft prevention system and method
EP2565857A1 (en) * 2011-09-01 2013-03-06 Siemens Aktiengesellschaft Method and system for evaluating the security situation in a building with living areas with access authorisation
WO2013029693A1 (en) * 2011-09-01 2013-03-07 Siemens Aktiengesellschaft Evaluation of the security situation in a building by means of a radio tomographic location and detection method and by means of rfid read devices
WO2013029694A1 (en) * 2011-09-01 2013-03-07 Siemens Aktiengesellschaft Evaluation of the security situation of location areas in buildings with access authorisation by means of cameras and rfid reading devices
US9503620B2 (en) 2011-09-01 2016-11-22 Siemens Aktiengesellschaft Evaluation of the security situation in a building by means of a radio tomographic location and detection method and by means of RFID reading devices
ITMI20121159A1 (en) * 2012-07-02 2014-01-03 Ct Studi S R L METHOD FOR MONITORING USERS FLOW IN A DELIMITED AREA
FR3020704A1 (en) * 2014-05-02 2015-11-06 Airbus PREVENTING RISKS DURING INTERVENTION ON AN AIRCRAFT
US9569947B2 (en) 2014-05-02 2017-02-14 Airbus Sas Forewarning of risks when working on an aircraft
GB2520099A (en) * 2014-06-26 2015-05-13 Cocoon Alarm Ltd Intruder detection method and system
GB2520099B (en) * 2014-06-26 2015-11-04 Cocoon Alarm Ltd Intruder detection method and system
WO2015198007A1 (en) * 2014-06-26 2015-12-30 Cocoon Alarm Ltd Intruder detection method and system
WO2016207350A1 (en) * 2015-06-26 2016-12-29 Myfox Home automation device, method for controlling a home automation device and computer program
FR3038112A1 (en) * 2015-06-26 2016-12-30 Myfox DOMOTIC DEVICE, METHOD FOR CONTROLLING DOMOTIC DEVICE, AND COMPUTER PROGRAM
EP3413274A1 (en) * 2017-06-07 2018-12-12 Gemalto Sa A method for provisioning a device with an information element allowing to identify unauthorized users in a restricted area

Also Published As

Publication number Publication date
EP1593102A1 (en) 2005-11-09
DE602004004874T2 (en) 2007-11-15
DE602004004874D1 (en) 2007-04-05
ATE354844T1 (en) 2007-03-15
GB0301790D0 (en) 2003-02-26
DE602004004874T8 (en) 2008-02-21
EP1593102B1 (en) 2007-02-21
US20070001835A1 (en) 2007-01-04
US7466224B2 (en) 2008-12-16

Similar Documents

Publication Publication Date Title
EP1593102B1 (en) System for detecting intruders in a populated space
US9330287B2 (en) Real-time asset tracking and event association
US7671718B2 (en) Method and apparatus for detection and tracking of objects within a defined area
US6720874B2 (en) Portal intrusion detection apparatus and method
US7411497B2 (en) System and method for intruder detection
US20150379795A1 (en) Active Detection Type Radio Frequency Identification Smart Door Lock Controller
US6750765B1 (en) Tracing of transponder-tagged objects
KR102396075B1 (en) Systems and methods for supervising people
CN108830974A (en) Identify inlet/outlet electronics end system
US20050262751A1 (en) Method and apparatus for detecting and identifying firearms
US20080007407A1 (en) Zone supervision system
CN112509184A (en) Method and system for monitoring house entrance and exit of specific crowd and storage medium
US20240077603A1 (en) Sensor and system for monitoring
GB2277850A (en) Intelligent radio frequency transponder system
WO1989004031A1 (en) Access alert monitoring system
KR20130122306A (en) Smart security system based on estimating a critical condition
JP5363234B2 (en) Security system
JP2002150456A (en) Detection system for individual's behavior
CA1294027C (en) Security systems for controlling passage between restricted and unrestricted area
KR20210002945U (en) Remote system of managing access permit and disinfection in a way of non-face-to-face detection
Wong et al. Hybrid tracking technology
JPH0470467B2 (en)

Legal Events

Date Code Title Description
AK Designated states

Kind code of ref document: A1

Designated state(s): AE AG AL AM AT AU AZ BA BB BG BR BW BY BZ CA CH CN CO CR CU CZ DE DK DM DZ EC EE EG ES FI GB GD GE GH GM HR HU ID IL IN IS JP KE KG KP KR KZ LC LK LR LS LT LU LV MA MD MG MK MN MW MX MZ NA NI NO NZ OM PG PH PL PT RO RU SC SD SE SG SK SL SY TJ TM TN TR TT TZ UA UG US UZ VC VN YU ZA ZM ZW

AL Designated countries for regional patents

Kind code of ref document: A1

Designated state(s): BW GH GM KE LS MW MZ SD SL SZ TZ UG ZM ZW AM AZ BY KG KZ MD RU TJ TM AT BE BG CH CY CZ DE DK EE ES FI FR GB GR HU IE IT LU MC NL PT RO SE SI SK TR BF BJ CF CG CI CM GA GN GQ GW ML MR NE SN TD TG

121 Ep: the epo has been informed by wipo that ep was designated in this application
WWE Wipo information: entry into national phase

Ref document number: 2004705125

Country of ref document: EP

WWP Wipo information: published in national office

Ref document number: 2004705125

Country of ref document: EP

WWG Wipo information: grant in national office

Ref document number: 2004705125

Country of ref document: EP