WO2012078076A2 - Procédé de signalisation d'alarme basé sur la surveillance de la proximité de dispositifs d'émission et de réception - Google Patents
Procédé de signalisation d'alarme basé sur la surveillance de la proximité de dispositifs d'émission et de réception Download PDFInfo
- Publication number
- WO2012078076A2 WO2012078076A2 PCT/RU2011/000875 RU2011000875W WO2012078076A2 WO 2012078076 A2 WO2012078076 A2 WO 2012078076A2 RU 2011000875 W RU2011000875 W RU 2011000875W WO 2012078076 A2 WO2012078076 A2 WO 2012078076A2
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- alarm
- tag
- tags
- radio
- base
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Ceased
Links
Classifications
-
- G—PHYSICS
- G08—SIGNALLING
- G08B—SIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
- G08B13/00—Burglar, theft or intruder alarms
- G08B13/02—Mechanical actuation
- G08B13/14—Mechanical actuation by lifting or attempted removal of hand-portable articles
- G08B13/1427—Mechanical actuation by lifting or attempted removal of hand-portable articles with transmitter-receiver for distance detection
-
- G—PHYSICS
- G08—SIGNALLING
- G08B—SIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
- G08B21/00—Alarms responsive to a single specified undesired or abnormal condition and not otherwise provided for
- G08B21/02—Alarms for ensuring the safety of persons
- G08B21/0202—Child monitoring systems using a transmitter-receiver system carried by the parent and the child
- G08B21/0227—System arrangements with a plurality of child units
-
- G—PHYSICS
- G08—SIGNALLING
- G08B—SIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
- G08B21/00—Alarms responsive to a single specified undesired or abnormal condition and not otherwise provided for
- G08B21/02—Alarms for ensuring the safety of persons
- G08B21/0202—Child monitoring systems using a transmitter-receiver system carried by the parent and the child
- G08B21/0275—Electronic Article Surveillance [EAS] tag technology used for parent or child unit, e.g. same transmission technology, magnetic tag, RF tag, RFID
-
- G—PHYSICS
- G08—SIGNALLING
- G08B—SIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
- G08B21/00—Alarms responsive to a single specified undesired or abnormal condition and not otherwise provided for
- G08B21/02—Alarms for ensuring the safety of persons
- G08B21/0202—Child monitoring systems using a transmitter-receiver system carried by the parent and the child
- G08B21/0277—Communication between units on a local network, e.g. Bluetooth, piconet, zigbee, Wireless Personal Area Networks [WPAN]
Definitions
- the invention relates to burglar alarm systems that signal the theft or loss of things or objects based on monitoring the proximity of radio devices, one of which is owned by the owner, and the others are installed on protected things or objects.
- An advantageous field of application of the invention is alarm systems using a mobile phone, smartphone, communicator, laptop, laptop, and short-range radio communication devices / technologies (Bluetooth TM, WeeBree TM, ZigBee TM).
- An RFID tag receives a coded electromagnetic signal from an RFID transceiver installed in the telephone, and sends back an encoded signal that is received by the specified transceiver of the telephone and is identified in the information processing device. Due to the small radius of interaction of the passive RFID tag with the receiving and transmitting device (3 10 meters), when the interaction is disturbed, an alarm is triggered in the form of an audio and / or light signal in the signal device with a passive RFID tag and / or in the mobile the phone. To protect other items from theft, a passive RFID tag must be installed on these items.
- the advantage of this method is the alarm about theft almost at the time of its commission.
- the disadvantages of the method are the need to emit a significant electromagnetic field power by a receiving and transmitting RFID device for activating passive RFID tags with interaction radii greater than 1 - ⁇ 2 meters, however _ the capacity of RFID technologies with mobile phones available on the market and the absence of an electromagnetic emitter suitable for activating RFID tags.
- a known system for searching for lost things on the basis of a mobile phone (Utility Model Patent RU 80639, IPC (2006.01) ⁇ 04 ⁇ 1 / 00, filed January 21, 2008), consisting of a mobile phone and a set of signal labels attached to stored wearable items.
- the mobile phone contains means for generating and transmitting encoded radio signals connected to the microprocessor of the mobile phone, and each of the labels contains means for receiving and decoding the radio signals transmitted by the mobile phone, means for comparing information encoded in the received radio signals , with identification information stored in the label, and means for generating sound and / or light signals connected to said means for comparing information and allowing the user detect shortcut.
- the system user sends a call signal from a mobile phone, choosing the name or image of the desired item on the display.
- the advantage of the system is the ability to combine with existing models of mobile phones.
- the system does not solve the task of notifying the owner of a thing at the time of its loss, for example, theft.
- the key fob has transmitting means for transmitting an identifying signal of installed power to a mobile phone, and the telephone is programmed to receive and monitor the strength of this signal, and turning on visual, audible, or vibration warning devices installed in the telephone when The distance to the remote control is greater than the specified distance.
- the keyfob has receiving means for monitoring the identifying signal from the protected telephone, and the telephone is programmed to transmit this signal to the keyfob; The key fob is programmed to turn on the warning equipment installed in it. exceeding the specified distance between the key fob and the phone.
- the key fob has receiving and transmitting means, is programmed to receive the first identification signal from the mobile phone, and sends the second signal to the mobile phone in response to the received first signal;
- the mobile phone is programmed to transmit the first signal to the key fob and turn on the warning means installed in the phone when the key fob is at a set distance from the telephone.
- the keyfob has receiving and transmitting means that send a first identifying signal to the telephone and then track the second signal from the telephone;
- the mobile phone is programmed to receive the first signal from the key fob and transmit the second signal to the key fob in response to receiving the first signal;
- the key fob is programmed not to turn on the warning means when the phone is at a specified distance from the key fob.
- the system is designed to prevent loss and minimize theft of mobile phones.
- this system does not solve the problem of security alarm of wearable items using a mobile phone.
- the closest in technical essence to the claimed invention is a method of burglar alarm of wearable things, based on monitoring radio proximity and described in European patent EP2122593 (A1) Radio Proximity Monitoring, published December 25, 2009, IPC: G08B13 / 14, as well as in international application WO2008087409 (A1) and in US patent application US 2010/0156624. IPC (2006.01) G08B1 / 08, ⁇ 04 ⁇ 7 / 00, published on June 24, 2010. According to this method, to prevent loss of things, their proximity to the owner is monitored using radio devices, one of which is located at the owner, and the others are secured by my things.
- proximity monitoring is performed using equipment containing: a transmitting device that transmits electromagnetic signals; a receiver receiving electromagnetic signals in order to establish communication between the devices; and a proximity monitoring module that monitors the proximity of the transmitter and receiver using electromagnetic signals, while the transmitter can be configured to transmit electromagnetic signals with a set of different transmit powers, each of which corresponds to its installed proximity.
- the electromagnetic signals are radio signals and use Bluetooth short-range radio technology, with a tag mounted on wearable devices being used as the transmitting device things or objects and containing a Bluetooth transceiver, and as a receiving device - a mobile phone worn by the owner of the protected things, and also containing a Bluetooth transceiver, while proximity tracking is carried out by measuring the parameters of the signal emitted by the transmitting device and received by the receiving device In the proximity monitoring module located on the mobile phone.
- the Bluetooth devices in the tags and the mobile phone establish radio channels for data exchange by transmitting, receiving and processing encoded radio signals corresponding to the Bluetooth radio protocol, while the Bluetooth devices operate with automatic adjustment of the transmission power for the initial establishment of reliable radio communications (pairing mode - PARING).
- the power control function is disabled by calling the low-level function in the tag containing Bluetooth from the telephone, which does not require access to the low-level Bluetooth functions in the telephone. Such access is usually not allowed for applications running on the phone, as standard high-level applications are used in mobile phones. Disabling the power adjustment in the tag disables the adjustment of the transmit power in the phone due to the pairing of the Bluetooth devices of the tag and the phone. Therefore, in the armed mode, Bluetooth transmitters of tags and telephones transmit radio signals of predetermined fixed powers, each of which corresponds to a certain proximity, when the automatic power adjustment in Bluetooth devices is turned off. Proximity tracking is carried out by the proximity monitoring module located in the telephone.
- the proximity is determined by the measured strength of the received signal (RSSI - Received Signal Strength Indication) from each of the tags, and a decrease in the signal from any tag to the set minimum means that the tag leaves the preset security zone proximity, which turns on the alarm.
- the proximity zone for each tag is set by setting the corresponding fixed radiation power in it.
- a measurement of the received signal strength (RSSI) and the quality of the Bluetooth connection are used, which is determined by the coefficient of occurrence of error bits in the identification codes (BER - Bit Error Rate) transmitted by the encoded radio signals, supporting the communication channel.
- the delay counter data is also used connections showing the number of attempts spent by devices Bluetooth to establish the correct connection (repeated attempts to restore the connection are provided by the Bluetooth radio protocol). It is also possible to use a correlation between two or more of these measured values to monitor proximity.
- modeling is used to determine the reliability of the interruption of the connection and the alarm when the tag leaves the proximity zone, while the models use data received signal strength measurements (RSSI), bit error rate (BER) Bluetooth connection and connection delay counter.
- An advantage of the prototype is the possibility of using widespread mobile phones with built-in Bluetooth devices, without hardware alterations, and tags using industrially produced miniature Bluetooth devices to create a security alarm system for personal belongings of the owner of a mobile phone.
- the implementation of the security alarm system according to the prototype method has the following disadvantages:
- a stolen item equipped with a tag can be moved, especially in the event of a deliberate theft in a crowded place, to a sufficient distance that precludes the possibility of returning it, but the security alarm system will not detect this in a timely manner.
- the main task solved by the claimed invention is the creation of a security alarm method based on monitoring the proximity of receiving and transmitting radio devices, mainly mobile phones and Bluetooth devices, providing express signaling to the owner of wearable things about their disappearance from the zone of direct proximity to the owner, which is 0.5 + 3 meters, with a time delay of not more than 0.5 2 seconds.
- This will allow the owner to detect the theft at the time of its commission and take emergency measures to identify the kidnapper and return the stolen item even in a crowded place, for example, in the subway, where it is easy for the thief to get lost in the crowd.
- such an alarm reminds the owner of forgotten things, which prevents their loss.
- this method can be used universally for the protection of things and objects in extended security zones, for example, 5 10 or 20 50 meters.
- the claimed invention also solves the problem of increasing the noise immunity of a security alarm.
- Another objective is to simplify the alarm systems that implement the method by eliminating alarm alarms in tags that are inefficient, as they can be easily drowned out or disabled by the thief.
- the security alarm method differs from the prototype in that a mobile phone is used as a “base” or another similar device, wherein the mobile phone and the tag are equipped with Bluetooth transceivers and use Bluetooth radio technology.
- the security alarm method differs from the prototype in that low-level functions are used for the security software of a mobile phone, allowing the security alarm method to be implemented while maintaining the standard mobile phone software using high-level applications.
- the method differs from the prototype in that for express informing the owner of the "base” about the loss of personal items or objects equipped with a "tag", the power the radio signal emitted by the “tag” is set equal to the value at which the violation of the integrity of the security alarm code in the security signal transmitted by the “tag” occurs in the "base” with a distance between the "tag” and the “base” equal to 0.5 3 meters, while the time interval t allocated for the passage of at least one unbroken send and receive radio signals of the security alarm with a repetition period ⁇ , is set to 0 , 5 2 seconds.
- the difference from the prototype is that for signaling to the driver of a motor vehicle about the loss / theft of cargo or airborne attachments, the power of the radio signal emitted by the "tag” is set equal to the value at which - the integrity of the security alarm code in the security alarm transmitted by the "tag” occurs in the "base” with a distance between the "tag” and the "base” of 5 - ⁇ 10 meters, while th interval tm, dedicated to the passage of at least one unbroken sending and receiving radio signals, alarm signaling with a repetition period is set to be r ;, 3 - ⁇ 8 seconds.
- the difference from the prototype is that for signaling to parents and / or kindergarten teachers about the exit of children with “tags” from the security zone, the power of the radio signal emitted by the “tag” when setting up set equal to the value at which a violation of the integrity of the security alarm code in the security signal transmitted by the "tag” occurs in the "base” with a distance between the "tag” and the “base” equal to 20 50 meters, while No gap tm allocated for the passage of at least one undisturbed sending and receiving of radio signals of the security alarm with a repetition period ⁇ , is set equal to 8 - ⁇ 15 seconds.
- the polling periods T t and time intervals twt have practically no restrictions on the side of small time values and are set such that the possible removal of the “tag” outside the security zone at time intervals twt is acceptable for urgent measures to detect and return protected things or objects.
- the absence of this limitation is also achieved due to the fact that the security software of the mobile phone in the claimed invention is constructed using low-level functions, which eliminates the software delay of the “tags” poll existing in the prototype invention due to the use of high-level software (for example, Java ) This is especially important in the near security zone of 0.5–3 meters, used to protect things in the hands and body of the owner of the telephone.
- the specified time intervals t Wi- polling in the middle and large security zones give confidence to the owner of the security system in receiving the results of the “Birok” survey with a constant predetermined frequency “limiting the possible exit distance” tags ”outside the security zone, which improves their assessment of the situation in the protected zone.
- the proposed method allows to increase the noise immunity of the burglar alarm, since in order to confirm the presence of a “tag” in the burglar zone, receiving at least one return radio signal with an unbroken alarm code during the polling of the “tag” with a series of polling pulses.
- the proposed method allows to simplify the system by eliminating the alarm devices in the “tags”, which are ineffective, as they can be easily suppressed or disabled by the thief.
- the proposed method enables the owner of the mobile phone to use all the functions of the telephone simultaneously with the security alarm by building security software for the mobile phone using low-level functions that allow the security alarm method to be maintained while maintaining the normal operation of the standard mobile phone software using high-level applications.
- FIG. 1 is a structural diagram of a burglar alarm system that implements the proposed method of burglar alarm in the general form of its implementation, corresponding to paragraph 1 of the claims;
- FIG. 2 shows a block diagram of a burglar alarm system using a mobile phone and a “tag” with Bluetooth transceivers in accordance with paragraph 3 of the claims.
- the proposed security alarm method in a general implementation form uses a “base” 1 transmitting and receiving device worn by the owner of the protected things or objects, and one or more “tag” 2 receiving and transmitting devices fixed on the protected things or objects .
- “Base” 1 transmits / receives using the transmit-receive unit 3 and processes encoded radio signals 5 in the processor 4 that support the communication channel, creating radio channels 6 for exchanging with “tags” 2, and also forms an individual record in the identification database 7 information about the "tags” 2 and the alarms for each of the "tags” 2.
- the "base” 1 using block 8 includes an alarm when there is a radio communication failure with at least one of the "tags” 2, identifying the "tag” with activated alarm.
- the difference of the proposed method from the prototype is that for burglar alarm use coded radio signals of the security alarm 12 transmitted by the "base” 1 and "tags" 2 through the common communication channels 6 created and supported by coded radio signals 5, intended to maintain the communication channel.
- the “base” 1 generates and stores in its database 7 alarm codes for each of the “tags” 2, periodically produces in the processor 4 the generation of a series of polling radio signals of the security alarm with periods T specified for each of the “tags” t following the series and periods ⁇ , following the burglar alarm signals inside the series, their transmission, reverse reception by the receiving-transmitting unit 3, and decoding in the processor 4.
- the processor 4 comparing the result of decoding the response radio signals of the security alarm from the “tag” with the security code stored in the database 7 -. difficileAlarm for this tag, it will detect the absence of a signal or a mismatch of the alarm code, and after the time tw set in timer 13 for this tag, it will turn on the alarm via alarm trigger unit 8 and visualize the“ tag ”with the activated alarm on the display 14 .
- Setting periods G following the series of interrogation radio signals of the security tags “tags” 2, as well as periods ⁇ , following the radio signals of the security alarm inside the series is performed in processor 4; these periods are set different for the near, medium and large security zone. Setting the waiting time for response radio signals "tags" 2 with the intact alarm code tm is made in timer 13.
- the security alarm mode is activated using the keypad 14, which can also be used to select identification images of tags.
- the “tags” are the constantly included power supply element 16.
- a mobile phone 17 or other similar device is used as a “base”, moreover, a mobile phone and a “tag” »18 are equipped with Blu-etooth 19, 20 transceivers and use Bluetooth radio technology (Website: http://www.bluetooth.com/Bluetooth/SIG/: Institute of Electrical Engineers Standard ke and electronics IEEEStd 802.15.1-2005, Website: http://ieeexplote.ieee.org/; Website: http://ru.wikipedia.org/wiki/Bluetooth).
- the mobile phone 17 does not have hardware alterations and is equipped with a display 21, a keyboard 22 and standard software 23 using high-level applications, as well as an integrated Bluetooth device 19 and a battery 24 to ensure regular operation of the phone.
- additional security alarm and security software 25 with the Bluetooth device 19 is introduced into the telephone 17.
- the Bluetooth devices 19 and 20 in the telephone 17 and the "tag" 18 have radio transmitting and receiving units 26, 27 phone and tags, and processors 28 and 29.
- Processor 28 is designed for the Bluetooth protocol for radio communication of the mobile phone with the tags
- processor 29 is for the Bluetooth protocol for the radio communication of the tag with the mobile phone 17.
- Bluetooth device 20 at tag “18 also has hardware for setting the radiation power 30 and disabling automatic adjustment of the radiation power in the guard mode, with which, when setting, the radius of the security zone of the" tag "is determined, which is determined by the power of the radio signal emitted by the" tag "18.
- security alarm software 31 has been installed, which decodes the security alarm radio signals received by the tag, compares them with the security alarm code stored in the“ tag ”, and if they match, they form transmitting and transmitting a security alarm signal to the telephone 17 through the processor 29 and the transmitting and receiving unit 27 of the Bluetooth device 20.
- This software can be installed in the processor 29 of the Bluetooth device 20, if its volume allows, or is installed in additional processor.
- the "tag” 18 is continuously powered by the power supply 32 during its service life, which for the "tags" operating in the near security zone can be 1 + 2 years.
- the difference from the prototype invention is that for security software 25 of the mobile phone, low level (native software), allowing to implement a method of burglar alarm with preserving the intact operation of standard software
- a mobile phone using high-level applications such as JAVA.
- Low-level applications for burglar alarms differ only in those for which operating system they are written, and will be protected by certificates for registering a computer program.
- the security alarm software 25 performs the following functions:
- identification information about the "tags” identification information about the "tags”; alarm information for each of the tags; burglar alarm codes for each of the tags;
- the security alarm method according to the invention in the form of implementation using a mobile phone 17 and a “tag” 18 containing Bluetooth devices 19, 20 (Fig. 2) is carried out as follows.
- Bluetooth radio communications are available in the 2.4–2.4835 GHz free license range.
- Bluetooth uses a spread spectrum method with frequency hopping FHSS (Frequency Hopping Spread Spectrum).
- the FHSS method is simple to implement, provides resistance to broadband interference, and equipment is inexpensive.
- the carrier frequency of the signal changes stepwise 1600 times per second (a total of 79 working channels with a width of 1 MHz are allocated).
- the frequency switching sequence for each connection is pseudo-random and is known only to the transmitter and receiver, which every 625 ⁇ s (one time slot) are synchronously tuned from one carrier frequency to another. Thus, if several pairs of transmitter and receiver work nearby, then they do not interfere with each other.
- This algorithm is also an integral part of the system for protecting the confidentiality of transmitted information: the transition occurs according to the pseudo-random algorithm and is determined separately for each connection.
- various coding schemes are used, and digital data in case of loss of the information packet will be retransmitted. Without noise-resistant coding, this ensures data transfer at 433.9 kbit / s in both directions.
- the Bluetooth protocol supports not only a point-to-point connection (from point to point), but also a point-to-multipoint connection (from point to many points).
- the code packets used for modulating carrier frequencies and generating coded radio signals via the Bluetooth radio communication protocol contain code blocks supporting a communication channel and code blocks for transmitting user information, i.e. alarm codes.
- Blocks of codes that support the communication channel contain information about the addresses of tags, about the set transmit power, about the beginning and end of the transmission of alarm codes, about the set synchronous carrier frequency in the next communication session, about the integrity verification codes of the information transmitted by the packet , and other information to maintain the communication channel.
- After modulating the carrier frequency they create Bluetooth coded radio signals of the radio communication protocol 33, supporting the communication channel (Fig. 2).
- the blocks of alarm codes after modulation of the carrier frequency generate coded radio signals of the alarm 34, paired with the Bluetooth radio protocol.
- the coded radio signals 33 supporting the communication channel and the coded radio signals of the security alarm 34 are transmitted over the air in a single stream.
- software 25 initializes Bluetooth connections, including pairing (PAIRING - pairing) Bluetooth devices, the task of which is to create secret communication keys that ensure radio communication only between Bluetooth devices included in the security system, as well as mutual authentication of these devices.
- pairing PAIRING - pairing
- the Bluetooth device 19 in the telephone is the master (MASTER)
- the Bluetooth device 20 in the “tags” 18 is the slave device (SLAVE).
- PIN codes Personal Identification Number
- PIN codes are selected by the user of the system and from the keyboard 22 are entered into the processors 28, 29 Bluetooth devices and to the software database 25, to the tag identification information section.
- the processors 28, 29 of the Bluetooth devices begin pairing according to the E22, E21 algorithms of the Bluetooth radio protocol, operating with the BD ADDR address of the device’s Bluetooth (a hardware 48-bit device address assigned by the manufacturer and allowing it to be uniquely identified ) and the entered device PIN.
- the Bluetooth device communication key is created using the E21 algorithm of the Bluetooth radio protocol, which requires a BD ADDR address of the device, a 128-bit randomly generated number (LK RAND) used for exchange with other Bluetooth devices, as well as the value of the number (LK RAND) of another device (s) with which the device in question is connected. These values are stored in the memory of each Bluetooth device.
- the Bluetooth devices After pairing the Bluetooth devices, they are mutually authenticated, i.e. communication check in two directions on the created communication channels. It is carried out by the processors 28, 29 of the Bluetooth devices 19, 20 according to the “request-response” scheme using the E1 algorithm of the Bluetooth radio protocol operating with BD ADDR addresses, communication keys and randomly generated 128-bit words transmitted from one Bluetooth device to the other in two directions (33 in FIG. 2).
- the algorithm includes checking the correctness of the transmission of generated words.
- the security alarm software 25 enters the identification information about the “tags” into the database of the mobile phone 17: PIN codes, BD ADDR addresses (registration).
- Software 25 also allows you to give a BD ADDR address semantic textual, illustrative and audio identification.
- Typical Bluetooth software has a standard set of identifiers, but allows the user to use their own names, graphics, and audio identifiers if desired.
- the software 25 enters into the database information about alarms for each of the “tags” and alarm codes for each of the “tags”;
- the security alarm program 25 puts the Bluetooth device 19 in the phone 17 into constant power mode and activates the connection of this Bluetooth device with the Bluetooth devices 20 located in the “tags” 18, setting in them a mode of operation with predetermined constant radiation powers.
- the software 25 of the mobile phone 17 periodically generates a series of interrogating radio signals of the security alarm 34 with preset for each of the rock ”with periods of G, following the series and periods of t, following the radio signals of the burglar alarm inside the series, their transmission through the receiving and transmitting unit 26 of the Bluetooth device 19 of the telephone, the reverse reception of these radio signals from the receiving and transmitting units 27 of the Bluetooth devices 20“ tags ”and their decoding.
- the security alarm software 25 sequentially polls the “tags” taking into account the periods T ( following the series of interrogating radio signals of the security alarm and the periods t, following the radio signals of the security alarm within the series for each of the tags, forming coded radio signals of the security signal in this way to prevent overlapping of these signals.
- the radius of the security zone i.e. the distance at which the "tag” - “base” connection is disrupted is determined by the radiation power and the sensitivity of the "tag” receiving-transmitting device.
- the radius of action is determined by the class of the device, which is uniquely associated with the maximum radiation power of ⁇
- devices of class 3 Rmlks 1 mW and a radius of 1 m. Adjustment of the radius of action can be done by circuit means for setting a fixed radiation power (30 in Fig. 2).
- the power of the radio signal emitted by the “tag” is set equal to the value at which violation of the integrity of the security alarm code in the security alarm transmitted by the “tag” occurs in the “base” with a distance between the “tag” and the “base” of 5 ⁇ - 10 meters, while the daily tm allocated for the passage of at least one undisturbed sending and receiving of radio signals of the security alarm with a repetition period trichis set equal to 3 - ⁇ 8 seconds.
- the "tag” it is advisable to use a class 2 Bluetooth device.
- the power of the radio signal emitted by the “tag”, the setting is set to a value at which a violation of the integrity of the security alarm code in the security alarm signal transmitted by the “tag” occurs in the “base” with a distance between the “tag” and the “base” of 20 50 meters, while mezhutok tm, dedicated to the passage of at least one unbroken sending and receiving radio signals, alarm signaling with a repetition period T 'is set at 8 for 15 seconds.
- T ' dedicated to the passage of at least one unbroken sending and receiving radio signals
- the proposed method of burglar alarm can be implemented using other, similar to Bluetooth, devices / technologies of short-range radio communications, such as WeeBree TM, ZigBee TM, using their accepted radio communication protocols.
Landscapes
- Health & Medical Sciences (AREA)
- Child & Adolescent Psychology (AREA)
- General Health & Medical Sciences (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Business, Economics & Management (AREA)
- Emergency Management (AREA)
- Mobile Radio Communication Systems (AREA)
- Emergency Alarm Devices (AREA)
- Alarm Systems (AREA)
- Burglar Alarm Systems (AREA)
Abstract
Le procédé de l'invention vise à avertir le propriétaire d'articles à protéger de la sortie de ces articles d'une zone de proximité déterminée. Il est réalisé sous la forme d'un dispositif d'émission et de réception porté par le propriétaire (de préférence, un téléphone mobile avec un dispositif Bluetooth ® à faible portée) et de dispositifs d'émission et de réception d'articles à protéger fixés sur ces articles (de préférence, sous la forme d'étiquettes avec des dispositifs Bluetooth). La signalisation d'alarme est mise en oeuvre de façon suivante : le téléphone transmet périodiquement, par l'intermédiaire de canaux de communication établis par les dispositifs Bluetooth du téléphone et des étiquettes, des codes de signalisation d'alarme uniques à chaque étiquette et se présentant comme des séries de signaux radio d'alarme d'interrogation comprenant un ensemble de séries d'intervalles de répétition pour chaque étiquette « Ti » et des intervalles de répétition de signal d'alarme radio « ti », « i » correspondant au numéro de l'étiquette; le dispositif reçoit les signaux de retour et les décode. En outre, le téléphone active des signaux d'alarme qui identifient les étiquettes à alarme activée après l'expiration de périodes prédéterminés « t(wi) » de transmission et de réception en retour par le téléphone des signaux d'alarme radio codés, ces périodes étant comptées à partir du moment que le téléphone envoie les premiers signaux d'alarme dans la série égales à t(wi) = (0,7 – 1)T(i) si, pendant ces périodes, le téléphone n'a pas reçu au moins un signal radio de retour avec un code de signalisation d'alarme non affecté à partir de chacune des étiquettes. Le résultat technique permet une meilleure protection des articles dans une zone de protection à courte portée de 1 à 3 mètres et une meilleure résistance de l'alarme aux interférences.
Applications Claiming Priority (2)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| RU2010151879 | 2010-12-08 | ||
| RU2010151879/08A RU2470372C2 (ru) | 2010-12-08 | 2010-12-08 | Способ охранной сигнализации на основе мониторинга близости приемно-передающих радиоустройств |
Publications (2)
| Publication Number | Publication Date |
|---|---|
| WO2012078076A2 true WO2012078076A2 (fr) | 2012-06-14 |
| WO2012078076A3 WO2012078076A3 (fr) | 2012-09-13 |
Family
ID=46207633
Family Applications (1)
| Application Number | Title | Priority Date | Filing Date |
|---|---|---|---|
| PCT/RU2011/000875 Ceased WO2012078076A2 (fr) | 2010-12-08 | 2011-11-08 | Procédé de signalisation d'alarme basé sur la surveillance de la proximité de dispositifs d'émission et de réception |
Country Status (2)
| Country | Link |
|---|---|
| RU (1) | RU2470372C2 (fr) |
| WO (1) | WO2012078076A2 (fr) |
Cited By (1)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| RU2621179C1 (ru) * | 2016-06-10 | 2017-05-31 | Федеральное государственное казенное образовательное учреждение высшего образования "Калининградский пограничный институт Федеральной службы безопасности Российской Федерации" | Способ охранного мониторинга |
Families Citing this family (3)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| GB2518234B (en) * | 2013-09-17 | 2017-06-21 | Ford Global Tech Llc | Reminder apparatus for items left in a vehicle |
| CN105243799B (zh) | 2015-09-30 | 2018-07-27 | 小米科技有限责任公司 | 安全提醒处理方法和装置 |
| RU2741380C1 (ru) * | 2020-06-26 | 2021-01-25 | Александр Николаевич Смирнов | Система контроля поставленного на охрану объекта |
Family Cites Families (5)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US8315563B2 (en) * | 2000-12-22 | 2012-11-20 | Google Inc. | Wireless reader tags (WRTs) with sensor components in asset monitoring and tracking systems |
| US20070129113A1 (en) * | 2005-12-01 | 2007-06-07 | Klicpera Michael E | Cell phone alerting system |
| RU67306U1 (ru) * | 2006-02-26 | 2007-10-10 | Евгений Алексеевич Куликов | Способ защиты мобильного телефона и других предметов от краж |
| GB0700875D0 (en) * | 2007-01-17 | 2007-02-21 | Zeroed In Ltd | Radio proximity monitoring |
| RU86063U1 (ru) * | 2008-07-24 | 2009-08-20 | Михаил Юрьевич Щербаков | Брелок-сигнализация |
-
2010
- 2010-12-08 RU RU2010151879/08A patent/RU2470372C2/ru not_active IP Right Cessation
-
2011
- 2011-11-08 WO PCT/RU2011/000875 patent/WO2012078076A2/fr not_active Ceased
Cited By (1)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| RU2621179C1 (ru) * | 2016-06-10 | 2017-05-31 | Федеральное государственное казенное образовательное учреждение высшего образования "Калининградский пограничный институт Федеральной службы безопасности Российской Федерации" | Способ охранного мониторинга |
Also Published As
| Publication number | Publication date |
|---|---|
| WO2012078076A3 (fr) | 2012-09-13 |
| RU2470372C2 (ru) | 2012-12-20 |
| RU2010151879A (ru) | 2012-06-20 |
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| US7187287B2 (en) | Systems and methods for zone security | |
| US5448221A (en) | Dual alarm apparatus for monitoring of persons under house arrest | |
| US7466219B2 (en) | Communication device and distance calculation system | |
| ES2688215T3 (es) | Detección de manipulación de placa de matrícula | |
| US7301467B2 (en) | Position detection system, position detection method therefor, position detection communication device, and communication device | |
| US5640144A (en) | RF/ultrasonic separation distance alarm | |
| ES2691035T3 (es) | Sistema de protección antirrobo silencioso para mercancías expuestas al público | |
| US8354925B1 (en) | Monitoring using RF communication technology | |
| KR101764650B1 (ko) | 스마트 기기의 도난 방지 장치 | |
| US20060009238A1 (en) | Personal communication devices | |
| GB2355565A (en) | Security system for multiple units | |
| CN1498393A (zh) | 个人财产警报系统 | |
| JPH1188499A (ja) | 機器の使用制限装置 | |
| JP2006118886A (ja) | 距離算出システム、距離算出システムの距離算出方法 | |
| RU2470372C2 (ru) | Способ охранной сигнализации на основе мониторинга близости приемно-передающих радиоустройств | |
| US20160147988A1 (en) | Device and method for controlling access to at least one machine | |
| US7271718B2 (en) | Protection against loss or theft of identification badges and other items | |
| JP4750061B2 (ja) | 携帯端末装置およびキー、並びに無線認証システム | |
| ES2985185T3 (es) | Sistema de vigilancia de seguridad | |
| US20210350686A1 (en) | Proximity tracking system for monitoring social distancing | |
| CN103118906A (zh) | 用于检测交通工具失窃的装置和方法 | |
| JP4788583B2 (ja) | 認証装置及び通信方法 | |
| RU2297670C1 (ru) | Портативная охранная система на основе беспроводной радиосвязи и способ ее функционирования | |
| AU2012258380A1 (en) | Locking apparatus | |
| US20250029476A1 (en) | Accellfx proximity detection system |
Legal Events
| Date | Code | Title | Description |
|---|---|---|---|
| 121 | Ep: the epo has been informed by wipo that ep was designated in this application |
Ref document number: 11847312 Country of ref document: EP Kind code of ref document: A2 |
|
| NENP | Non-entry into the national phase |
Ref country code: DE |
|
| 122 | Ep: pct application non-entry in european phase |
Ref document number: 11847312 Country of ref document: EP Kind code of ref document: A2 |