WO2007088357A1 - Appareil de sécurité - Google Patents
Appareil de sécurité Download PDFInfo
- Publication number
- WO2007088357A1 WO2007088357A1 PCT/GB2007/000327 GB2007000327W WO2007088357A1 WO 2007088357 A1 WO2007088357 A1 WO 2007088357A1 GB 2007000327 W GB2007000327 W GB 2007000327W WO 2007088357 A1 WO2007088357 A1 WO 2007088357A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- security apparatus
- signal
- controller
- dependent
- person
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Ceased
Links
Classifications
-
- E—FIXED CONSTRUCTIONS
- E05—LOCKS; KEYS; WINDOW OR DOOR FITTINGS; SAFES
- E05B—LOCKS; ACCESSORIES THEREFOR; HANDCUFFS
- E05B49/00—Electric permutation locks; Circuits therefor ; Mechanical aspects of electronic locks; Mechanical keys therefor
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07C—TIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
- G07C9/00—Individual registration on entry or exit
- G07C9/20—Individual registration on entry or exit involving the use of a pass
- G07C9/22—Individual registration on entry or exit involving the use of a pass in combination with an identity check of the pass holder
- G07C9/25—Individual registration on entry or exit involving the use of a pass in combination with an identity check of the pass holder using biometric data, e.g. fingerprints, iris scans or voice recognition
- G07C9/257—Individual registration on entry or exit involving the use of a pass in combination with an identity check of the pass holder using biometric data, e.g. fingerprints, iris scans or voice recognition electronically
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07C—TIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
- G07C9/00—Individual registration on entry or exit
- G07C9/20—Individual registration on entry or exit involving the use of a pass
- G07C9/27—Individual registration on entry or exit involving the use of a pass with central registration
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07C—TIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
- G07C9/00—Individual registration on entry or exit
- G07C9/20—Individual registration on entry or exit involving the use of a pass
- G07C9/28—Individual registration on entry or exit involving the use of a pass the pass enabling tracking or indicating presence
-
- G—PHYSICS
- G08—SIGNALLING
- G08B—SIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
- G08B19/00—Alarms responsive to two or more different undesired or abnormal conditions, e.g. burglary and fire, abnormal temperature and abnormal rate of flow
Definitions
- the present invention relates to security apparatus, particularly but not exclusively security apparatus for monitoring or controlling access to locations such as buildings.
- security apparatus for monitoring and/or controlling the access of personnel to a defined location
- the apparatus including detector means which are arranged to provide a first signal to a controller, the first signal being associated with a person being detected at a detection location, and validation means which are arranged to provide a second signal to the controller, the second signal being associated with a person being present at the detection location, the controller including comparison means for comparing the first signal with the second signal and being arranged to provide an output signal which is dependent on the comparison.
- the detection location is different to the defined location, and may be adjacent to or in the vicinity of the defined location.
- the output signal is in either an accept state or a deny state.
- the apparatus includes an alarm, which may be triggered by the output signal in the deny state.
- the apparatus may also include access prevention means which, in response to the state of the output signal, prevent or permit access to the defined location by the detected person.
- the access prevention means prevent access to the defined location when the output signal is in the deny state, and allow access to the defined location when the output signal is in the accept state.
- the detector means are arranged to automatically detect the presence of the person at the detection location.
- the detector means include an identity tag which in use is carried by the person, and may include a plurality of identity tags, each of which may be carried by a different person.
- the or each identity tag includes a first identification code which may be associated with the identity of the or each person.
- the first signal includes the first identification code
- the detector means include a detection input device.
- the detector means include communication means which are arranged to permit automatic communication of the or each first identification code from the or each identity tag to the detection input device when the or each person is present at the detection location.
- The. controller may be a programmable computer, which may be programmable with a set of instructions.
- the communication means include wireless communication means and may more preferably include radio communication means.
- the communication means may include a radio transmitter-responder (transponder).
- the or each identity tag may include one transponder.
- the communication means may include a radio transmitter and receiver.
- the detection input device may include the radio transmitter and receiver.
- the or each transponder may be in the form of a radio frequency identification (RFID) device.
- RFID radio frequency identification
- the detection input device includes an antenna, which may be arranged to create a read field space, which may comprise the detection location.
- the antenna may be arranged to receive the or each first identification code from the respective identity tag when the tag is within the read field space.
- the read field space may be circular or elliptical in plan, and may extend up to 2m from the detection input device.
- the validation means may include an input device, which may be manually operated.
- the manual validation input device may be operable by an operator to send the second signal to the controller, or may be operable by a person present at the detection location to send the second signal to the controller.
- the validation input device may be arranged to permit the person present to input a second identification code which may be in the form of a number such as a PIN (Personal Identification Number).
- the validation input device may include a keypad or keyboard.
- the validation input device may comprise a reader or scanner.
- the reader or scanner may read or scan a biometric feature associated with the person present, such as an iris, a finger or thumb print, a palm print or a speech pattern to generate the second identification code.
- the reader or scanner may read or scan a code such as a bar code, a magnetic code or a code provided by any suitable means to generate the second identification code.
- the validation input device may include a detector, which may automatically send the second signal to the controller when a person is present at the detection location.
- the detector may be in the form of a passive infra-red detector.
- the comparison means are arranged to perform a first comparison test.
- the first signal and the second signal are compared.
- both of the first and second signals must indicate the presence of a person at the detection location, otherwise the output signal is set to the deny state.
- the comparison means include an identity/authorisation database.
- the identity/authorisation database includes information relating the or each first identification code to an access permission for the defined location.
- the comparison means are arranged to perform a second comparison test.
- the first identification code is compared to the access permission for the defined location held in the identity/authorisation database.
- the access permission must be appropriate for the defined location, otherwise the output signal is set to the deny state.
- the second signal includes the second identification code.
- the comparison means include an identity/validation database, which may include information relating the first identification code to the second identification code.
- the comparison means are arranged to perform a third comparison test.
- the first identification code is compared to the second identification code held in the identity/validation database.
- the output signal is only set to the accept state if the first identification code is appropriate to the second identification code.
- the apparatus may include an allocation input device, which may be in signal communication with the controller, and may permit input of information such as codes and access permissions etc. to the controller.
- the controller is arranged to record the signals communicated.
- the controller includes memory storage for the recorded signals.
- the controller includes retrieval means for retrieving the recorded signals from the memory storage.
- the apparatus may include a back up controller, which may be in signal communication with the controller.
- the back up controller may be sited at a remote location from the controller.
- the identity tags, input devices and/or controller may be suitable for use in hazardous areas.
- the controller may include interface means for interfacing with other systems, which may include tracking, logistics and/or personnel systems.
- a method of monitoring and/or controlling the access of personnel to a defined location including the steps of detecting a person at a detection location and providing an associated first signal to a controller, providing a second signal to the controller, the second signal being associated with a person being present at the detection location, comparing the first signal with the second signal and providing an output signal which is dependent on the comparison.
- the method includes the use of security apparatus as described in the preceding paragraphs.
- Fig. 1 is a simplified schematic block diagram of a security apparatus according to the invention
- Fig. 2 is a schematic diagram of the , security apparatus according to the invention.
- Fig. 3 is a more detailed schematic block diagram of the apparatus.
- Fig. 1 is a simplified block diagram of security apparatus 10 according to the invention.
- the security apparatus 10 includes detector means in the form of a detection input device 16, validation means in the form of a validation input device 17, and a controller in the form of a computer 22.
- the detection input device 16 is arranged to provide a first signal 34 to the computer 22 and the validation input device is arranged to provide a second signal 36 to the computer 22.
- the computer 22 is programmed with a set of instructions 70, which include comparison means in the form of comparison routines 80, which compare the first signal 34 with the second signal 36.
- the computer 22 includes output means for providing an output signal 38, the output signal 38 being dependent on the results of the comparison between the first signal 34 and the second signal 36.
- the output signal 34 can either be in an accept state as indicated schematically in ' Fig. 1 by box 38A or a deny state as indicated schematically in Fig. 1 by box 38B.
- Fig. 2 shows in schematic form the security apparatus 10 including detector means 11.
- the detector means 11 include a plurality of identity tags
- Each identity tag 12 includes a radio transmitter-responder (transponder) in the form of a radio frequency identification (RFID) device 14.
- RFID radio frequency identification
- the detector means 11 include the detection input device 16, the detection input device 16 including an antenna 18 which is arranged to create a read field space 20.
- the read field space 20 in the example shown in Fig. 2 is generally circular in plan, and could extend up to two metres from the antenna 18.
- the apparatus 10 includes a controller in the form of a programmable computer 22.
- the apparatus 10 includes output means for communicating information from the computer 22 to an operator, the output means including display means in the form of a display screen 26.
- the apparatus 10 includes a user input device in the form of a keyboard 28.
- the security apparatus 10 includes a back-up computer 66 which could be located 1 remotely from the computer 22.
- the security apparatus 10 includes an alarm 60 which could be a visual and/or audible alarm.
- the security apparatus 10 includes validation means in the form of the validation input device 17.
- the detection input device 16, the validation input device 17, the display screen 26, the keyboard 28, the back-up computer 66 and the alarm 60 are each in signal communication with the computer 22 by means of cable connections 32.
- the cable connections 32 could be replaced by any suitable form of connection providing signal communication, such as wireless connections.
- the detection input device 16 and the validation input device 17 are located in the vicinity of an entrance 50 to a building 40, the building 40 defining an interior 41.
- the building 40 includes means 53 for preventing or permitting access through the entrance 50 to the interior 41 in the form of a door 54.
- the access access prevention means 53 in the example shown in Fig. 1 includes a lock 56 which is in signal communication with the computer 22 by means of cable connections 32.
- Each RFID device 14 includes a first identification code, which in this example is unique to the person carrying the respective identity tag 12, and is associated with the identity of that person. As the person carrying the identity tag 12 comes into the read field space 20 generated by the antenna 18, the
- the RFID device 14 gains power from the signal generated by the antenna 18 within the read field space 20, and in response to the signal generated by the antenna 18, the RFID device transmits the first identification code to the input device 16.
- the first identification code is transmitted automatically when the identity tag 12 is brought within the read field space 20 of the input device
- the read field space 20 is adjacent to the entrance
- the validation input device 17 comprises a biometric scanner in the form of a palm scanner.
- the door 54 is closed within the entrance 50, preventing access to the interior 41 , the lock 56 securing the door 54 in the closed position.
- a person wishing to enter the building 40 and carrying an identity tag 12 approaches the entrance 50, coming within the read field space 20 of the detection input device 16.
- the first identification code is transmitted as described previously from the RFID device 14 to the detection input device 16 and from thence as the first signal 34 via the connections 32 to the computer 22.
- the person operates the palm scanner 17 so that the scanner 17 provides a second signal including a second identification code to the computer 22.
- the computer 22 is programmed with a set of instructions 70 which is shown in block diagram form in Fig. 2.
- the set of instructions 70 includes an identity/authorisation database 74, an identity/validation database 76 and comparison routines 80.
- the comparison routines 80 include a first comparison test 8OA, a second comparison test 8OB, and a third comparison test 8OC.
- the computer 22 includes a clock 68 and memory storage 84.
- An allocation input 30 allows initial input of information to the databases 74, 76.
- the first signal 34 from the detection input device 16 and the second signal 36 from the validation input device 17 are received by the computer 22 and subjected to the first comparison test 8OA.
- this comparison test 8OA the first signal 34 and the second signal 36 are compared.
- both of the first and ' second signals 34, 36 must indicate the presence of a person at the detection location, which is the read field space 20. If only one of the signals indicates that a person is at the detection location, then the output signal 38 remains in the deny state, and the door 54 remains secured in the closed position.
- both of the first and second signals 34, 36 indicate the presence of a person in the detection location, then the outcome of the first comparison test 8OA is deemed to be positive, and the second comparison test 8OB is performed.
- the second comparison test 8OB the first identification code transmitted from the identity tag 12 is compared with an access permission held in relation to that first identification code in the identity/authorisation database 74. If the access permission is appropriate for the first identification code transmitted, then the result of the second comparison test is deemed to be positive. If this is not the case, then the output signal 38 is set to the deny ' state and the door 54 remains secured in the closed position.
- the access permissions could be time-limited, and by reference to a calendar (not shown), the access permissions could be date limited.
- the third comparison test 8OC is performed.
- the first identification code transmitted from the identity tag 12 is compared to the second identification code transmitted from the palm scanner validation input device 17 by reference to the identity /validation database 76, which includes information relating the first and second identification codes. If the second identification code is appropriate to the first identification code, the outcome of the third comparison test is deemed to be positive, and the output signal 38 is set to the accept state. In this state, the door 54 can be opened. For example, the lock 56 may operate to release the door 54 in response to the output signal 38 in the accept state.
- the result of the third comparison test is deemed to be negative, the output signal 38 remains in the deny state, and the door 54 remains closed.
- the security apparatus 10 thus provides three checks. It firstly ensures that any person passing through the entrance is carrying an identity tag 12. Secondly, it ensures that the person has appropriate authorisation to enter the defined location. Thirdly, it provides a check that the person carrying the identity tag 12 is actually the person who is supposed to carry the identity tag 12, by reference to a validation check.
- the door 54 could be of any suitable size or shape, and could be in the form of any suitable means for preventing or permitting access. Additionally or alternatively, the output signal 38 could be arranged to trigger the alarm 60 in the deny state. 5
- the validation input device 17 could be of a different form, and correspondingly the number and type of comparison tests could be different.
- the validation input device 17 could be of a different form, and correspondingly the number and type of comparison tests could be different.
- the validation input could be of a different form, and correspondingly the number and type of comparison tests could be different.
- I O device 17 could be in the form of a passive infra-red detector, which simply detects the presence of a person in the vicinity of the entrance 50.
- the comparison means 80 could comprise only the first comparison test 8OA, or only the first and second comparison tests 8OA, 8OB. This embodiment could be utilised, for example, where the entrance 50 is in a
- a guard could be positioned to view personnel passing through the entrance 50 either 0 directly or by, for example, closed circuit camera, and the second signal provided via a push button input device to confirm the presence of a person at the entrance 50.
- the validation input device 17 could comprise a 5 keypad or keyboard, in which a person inputs a code such as a PIN (Personal Identification Number).
- the comparison means 80 could again comprise three comparison tests, 8OA, 8OB and 8OC, the PIN being held on the identity/validation database 76, the PIN thus providing a validation check to the identity of the person carrying the identity tag 12.
- the validation input device 17 could thus be of any suitable form, and could include a biometric reader or scanner for reading or scanning an iris, a palm print, a finger or thumb print or a speech pattern. Alternatively or additionally, the validation input device 17 could include a reader or scanner for a bar code, magnetic code or a code provided by any other suitable means. 5
- the security apparatus 10 could include a plurality of detection and validation input devices 16, 17 located at a plurality of locations around a building.
- the input devices 16, 17 could be linked to the same computer 22.
- the apparatus 10 as described above could form part of a larger personnel tracking system, and could form a validation station of a personnel tracking system.
- the movements of personnel could be tracked by a plurality of detection input devices 16 linked to the computer 22, the entrances 50 associated with each
- detection input device 16 being generally in the open condition.
- the security apparatus 10 as described could be positioned at one of the entrances 50 so that, for instance, on entering the building 40 the identity of the bearer of the identity tag 12 is validated, thus preventing fraud in which identity tags are carried by unauthorised personnel.
- a validation 0 input device 17 such as a keypad or keyboard provides only a partial validation since a PIN could be stolen or transferred to an unauthorised person.
- the use of a biometric identification device substantially prevents such circumvention since it is difficult to falsify biometric information.
Landscapes
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Engineering & Computer Science (AREA)
- Human Computer Interaction (AREA)
- Alarm Systems (AREA)
Abstract
L'invention porte sur un appareil de sécurité (10) servant à surveiller et/ou contrôler l'accès de personnel à un lieu donné. L'appareil (10) comporte des moyens de détection (11) fournissant à un contrôleur (22) un premier signal (34) associé à la personne détectée au lieu de détection, et des moyens de validation (17) fournissant au contrôleur (22) un deuxième signal (36) associé à la personne présente au lieu de détection. Le contrôleur (22) comporte des moyens de comparaison (80) du premier signal (34) au deuxième signal (36), et il est conçu pour émettre un signal (38) en fonction de la comparaison.
Applications Claiming Priority (2)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| GB0601835A GB2434677A (en) | 2006-01-31 | 2006-01-31 | A security aparatus having a detection and validation means |
| GB0601835.2 | 2006-01-31 |
Publications (1)
| Publication Number | Publication Date |
|---|---|
| WO2007088357A1 true WO2007088357A1 (fr) | 2007-08-09 |
Family
ID=36061119
Family Applications (1)
| Application Number | Title | Priority Date | Filing Date |
|---|---|---|---|
| PCT/GB2007/000327 Ceased WO2007088357A1 (fr) | 2006-01-31 | 2007-01-31 | Appareil de sécurité |
Country Status (2)
| Country | Link |
|---|---|
| GB (1) | GB2434677A (fr) |
| WO (1) | WO2007088357A1 (fr) |
Citations (4)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| WO2001072224A1 (fr) * | 2000-03-24 | 2001-10-04 | Wolf Fernlund | Systeme et procede de verification de l'identite d'une personne |
| US20020024429A1 (en) * | 2000-08-25 | 2002-02-28 | Siegfried Kamlah | Anti-theft system for a motor vehicle and method for operating the anti-theft system |
| WO2003075227A1 (fr) * | 2002-03-05 | 2003-09-12 | Eros Masi | Procede de detection de la position d'un individu et de confirmation de son identite |
| WO2006004640A1 (fr) * | 2004-06-29 | 2006-01-12 | Hewlett-Packard Development Company, L. P. | Surveillance d'un objet a l'aide de donnees d'identification et de donnees de poursuite |
Family Cites Families (5)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| DE69815272T3 (de) * | 1997-12-22 | 2007-12-27 | Northrop Grumman Corp. (N.D.Ges.D.Staates Delaware), Los Angeles | Durch Fingerabdruckvergleich kontrollierter Zugang zu Türen und Maschinen |
| IT1309717B1 (it) * | 1999-03-04 | 2002-01-30 | Alessandro Manneschi | Procedimento di riconoscimento e cabina a porte interbloccate congestione automatizzata |
| KR100505187B1 (ko) * | 2001-08-08 | 2005-08-04 | 오므론 가부시키가이샤 | 인증장치, 인증방법 및 인물 등록방법 |
| KR20050010546A (ko) * | 2003-07-21 | 2005-01-28 | 예지시스템주식회사 | 보안모드 설정 기능을 가진 무선 아이디 인식 디지털도어록 장치 및 그 제어방법 |
| US7183895B2 (en) * | 2003-09-05 | 2007-02-27 | Honeywell International Inc. | System and method for dynamic stand-off biometric verification |
-
2006
- 2006-01-31 GB GB0601835A patent/GB2434677A/en not_active Withdrawn
-
2007
- 2007-01-31 WO PCT/GB2007/000327 patent/WO2007088357A1/fr not_active Ceased
Patent Citations (4)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| WO2001072224A1 (fr) * | 2000-03-24 | 2001-10-04 | Wolf Fernlund | Systeme et procede de verification de l'identite d'une personne |
| US20020024429A1 (en) * | 2000-08-25 | 2002-02-28 | Siegfried Kamlah | Anti-theft system for a motor vehicle and method for operating the anti-theft system |
| WO2003075227A1 (fr) * | 2002-03-05 | 2003-09-12 | Eros Masi | Procede de detection de la position d'un individu et de confirmation de son identite |
| WO2006004640A1 (fr) * | 2004-06-29 | 2006-01-12 | Hewlett-Packard Development Company, L. P. | Surveillance d'un objet a l'aide de donnees d'identification et de donnees de poursuite |
Also Published As
| Publication number | Publication date |
|---|---|
| GB2434677A (en) | 2007-08-01 |
| GB0601835D0 (en) | 2006-03-08 |
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| EP2770482B1 (fr) | Systèmes et procédé de commande d'accès au moyen d'un smartphone | |
| EP2192560A1 (fr) | Contrôle d'accès | |
| US8169313B2 (en) | Method and apparatus for asset management in an open environment | |
| US20150379795A1 (en) | Active Detection Type Radio Frequency Identification Smart Door Lock Controller | |
| US20090072029A1 (en) | Inventory control system | |
| KR101022789B1 (ko) | 대여금고 관리장치 및 방법 | |
| US20080223927A1 (en) | Entry and exit control apparatus | |
| KR101617872B1 (ko) | 지문인식장치의 경보방법 및 시스템 | |
| EP1898362B1 (fr) | Système de gestion de documents | |
| KR20060101405A (ko) | 전자태그를 이용한 사용자의 안전모와 안전장비의 이중검사를 통한 출입 통제 시스템 | |
| JP2009035994A (ja) | 物品管理システム、物品管理方法、車両管理システム、および車両管理方法 | |
| KR101843712B1 (ko) | 출입 통제 시스템 | |
| US20090031397A1 (en) | Use management system | |
| KR100823204B1 (ko) | 보관함 관리 시스템과 그 방법 | |
| US11842588B2 (en) | System for controlling access to an enclosure | |
| WO2007088357A1 (fr) | Appareil de sécurité | |
| KR100774029B1 (ko) | 보안구역의 출입 통제 장치 | |
| JP6839503B2 (ja) | 鍵管理装置、鍵管理方法および鍵管理システム | |
| WO1996030876A1 (fr) | Verrous de securite ameliores | |
| JP4132418B2 (ja) | 出入管理システム、カード管理装置および鍵管理装置 | |
| JP2006221255A (ja) | 操作権限管理方法及びそのシステム | |
| EP4495717A1 (fr) | Procédé de vérification d'un équipement technique de construction et/ou d'une porte d'accès d'un bâtiment et système de mise en oeuvre du procédé | |
| JP2871043B2 (ja) | 通過管理システム | |
| CN106846571A (zh) | 一种电话开启的自动上锁防盗门系统 | |
| JP2002092766A (ja) | ホテル内セキュリティ監視システム |
Legal Events
| Date | Code | Title | Description |
|---|---|---|---|
| 121 | Ep: the epo has been informed by wipo that ep was designated in this application | ||
| NENP | Non-entry into the national phase |
Ref country code: DE |
|
| 122 | Ep: pct application non-entry in european phase |
Ref document number: 07705090 Country of ref document: EP Kind code of ref document: A1 |