WO2001008116A2 - Improvements relating to security - Google Patents
Improvements relating to security Download PDFInfo
- Publication number
- WO2001008116A2 WO2001008116A2 PCT/GB2000/002880 GB0002880W WO0108116A2 WO 2001008116 A2 WO2001008116 A2 WO 2001008116A2 GB 0002880 W GB0002880 W GB 0002880W WO 0108116 A2 WO0108116 A2 WO 0108116A2
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- units
- unit
- ofthe
- alarm
- signal
- Prior art date
Links
Classifications
-
- G—PHYSICS
- G08—SIGNALLING
- G08B—SIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
- G08B25/00—Alarm systems in which the location of the alarm condition is signalled to a central station, e.g. fire or police telegraphic systems
- G08B25/008—Alarm setting and unsetting, i.e. arming or disarming of the security system
-
- G—PHYSICS
- G08—SIGNALLING
- G08B—SIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
- G08B13/00—Burglar, theft or intruder alarms
- G08B13/02—Mechanical actuation
- G08B13/14—Mechanical actuation by lifting or attempted removal of hand-portable articles
- G08B13/1427—Mechanical actuation by lifting or attempted removal of hand-portable articles with transmitter-receiver for distance detection
-
- G—PHYSICS
- G08—SIGNALLING
- G08B—SIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
- G08B21/00—Alarms responsive to a single specified undesired or abnormal condition and not otherwise provided for
- G08B21/02—Alarms for ensuring the safety of persons
- G08B21/0202—Child monitoring systems using a transmitter-receiver system carried by the parent and the child
- G08B21/0227—System arrangements with a plurality of child units
-
- G—PHYSICS
- G08—SIGNALLING
- G08B—SIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
- G08B21/00—Alarms responsive to a single specified undesired or abnormal condition and not otherwise provided for
- G08B21/02—Alarms for ensuring the safety of persons
- G08B21/0202—Child monitoring systems using a transmitter-receiver system carried by the parent and the child
- G08B21/0241—Data exchange details, e.g. data protocol
- G08B21/0258—System arrangements wherein both parent and child units can emit and receive
Definitions
- This invention relates to a new security system and a method of providing security.
- burglar alarms are well known wherein sensors are provided which are connected to a centralised alarm system.
- sensors are provided which are connected to a centralised alarm system.
- Such systems cannot provide protection for objects which are mobile (for example collections of bags, groups of children).
- centralised alarm systems are vulnerable to an attack on the centralised alarm system.
- a security system comprising at least two units, each unit comprising a power source adapted to power the unit, a processor, a transmitter, a receiver and at least one of the units having an alarm, the units having the ability to communicate with each other via the transmitters and receivers, the processors being adapted to control the units and to cause the alarm to generate an alarm signal when predetermined rules are satisfied.
- Such a system is advantageous because it allows a unit to be applied to an article to be guarded. Because the system relies on communication between the two units there is no central control system open to attack and each unit must be individually disabled to disable the security system as a whole.
- At least one processor is adapted to generate an alarm when communication fails between the two units, providing a simple system.
- the predetermined rules may cover a number of situations, some of which are outlined hereinbelow.
- Each of the units in the system may be adapted to generate an alarm when predetermined rules are met, which may be when communication fails with any one of the units or when the distance from any one of the units exceeds a given value.
- the alarm may be provided by one or more of the following: a sound or vibration generating mechanism (eg a piezo electric sounder or other electric sounder), a light emitting device, a display screen, an electric shock generator, an explosive device, an electromagnetic lock or catch, or by signalling to a connected or remote (e.g. wireless) apparatus.
- a sound or vibration generating mechanism eg a piezo electric sounder or other electric sounder
- a light emitting device e.g. a light emitting device
- a display screen e.g. an electric shock generator, an explosive device, an electromagnetic lock or catch, or by signalling to a connected or remote (e.g. wireless) apparatus.
- the units are provided with an alarm.
- An advantage of this is that it may be cheaper to realise than providing an alarm with each unit.
- the units may also be smaller and more convenient.
- a unit provided with the alarm may be thought of as a master unit.
- the transmitter of at least one of the units may be adapted periodically to transmit a signal, this being advantageous over continuous transmission because it is more power efficient.
- the receiver may be powered periodically and therefore capable of receiving a signal periodically.
- the processor of one of the units may be adapted to control when the transmitter transmits signals and may be adapted to operate the transmitter when the receiver of another unit is activated to receive a signal.
- the processor may be adapted to control when the receiver receives signals and may be adapted to operate the receiver when the transmitter of another unit is transmitting a signal.
- the processor may be adapted to learn when transmission is expected and only activate the receiver at this time.
- the receiver may be adapted to be powered and capable of receiving a signal for a period either side of when a signal is expected so increasing the likelihood of receiving the signal.
- the transmitter may be adapted to transmit pieces of information, which may include any from the following list: the identity of the unit from which the communication originated (unit identification), the class of unit from which the communication originated, the level of output from the power source of the unit, the status of the unit, when the next transmission will occur.
- unit identification the identity of the unit from which the communication originated
- the class of unit from which the communication originated the level of output from the power source of the unit
- the status of the unit when the next transmission will occur.
- Each of these pieces of information has its own separate advantages. For instance it is advantageous to transmit the unit identification so that the remaining units of the system can tell from where the transmission originates.
- There may be a number of different classes of unit within the security systems which may have one or more units within them. Units within the systems may be adapted to have different responses depending upon what class of unit they are in communication with.
- Transmission of the level of output power from the power source is advantageous in that it helps to prevent false alarms through power source failure.
- the processors of the units may be adapted to suppress the generation of an alarm if a unit stops transmitting after a period of reporting low power source levels.
- the processors may be adapted to warn the user of a low power source before that power source fails.
- the processors of the units of the system may be adapted to generate an alarm if one ofthe units transmits a status signal indicating that an alarm should be generated.
- the transmitters and receivers are respectively adapted to transmit and receive radio signals.
- a medium is advantageous because it is generally omnidirectional, will pass through a number of obstructions (ie does not necessarily require line-of-sight communication) and has a finite range. It is advantageous to have a finite range because for some embodiments of the system to function, communication must eventually be lost if one ofthe units is removed.
- the transmitters and the receivers are adapted to operate at substantially 433MHz.
- a frequency is advantageous because it is an unlicensed frequency (not requiring a licence to use) and will thus be readily available for such use.
- the skilled person will appreciate that the system may operate using any radio frequency and that 433MHz is merely one embodiment.
- the units may communicate with each other using standard frequency-based communications, including frequency modulation and amplitude modulation.
- frequency modulation frequency shift keying (FSK) or amplitude shift keying (ASK) may be appropriate, or frequency-hopping or spread-spectrum.
- FSK frequency shift keying
- ASK amplitude shift keying
- UWB ultra-wide band
- the transmitters and the receivers are adapted to communicate short pulse signals to each other.
- the pulse signals will generally be unmodulated, that is to say, not capable of transmitting information other than an indication of the presence of a unit.
- the processors of the units in this embodiment are preferably adapted to expect to receive pulse signals from predetermined other units at predetermined times or periods of time, thus providing a simple method of determining the presence or otherwise of a given unit within the system.
- the processors may be adapted only to activate the receivers when a pulse is expected, thereby helping to reduce power consumption.
- the units may undergo an initialisation stage in which, say, modulated RF data packets are transmitted and received at predetermined times and intervals, the data packets including information serving to identify the respective transmitting unit to the other units.
- pulse signals say, a few cycles at a given operating frequency, e.g. 433MHz
- full data packets may be transmitted so as to indicate the presence of each unit within the system. This process may be continuously controlled by a slowly-clocked CMOS integrated circuit, thus further helping to reduce power consumption.
- the transmitters and receivers have a range of about lm to 150m, perhaps about 30m to 125m. In one embodiment the transmitters and receivers may have a range of about 100m. In an alternative embodiment, the transmitters and receivers may have a range of 5m, 10m or 20m. It will be apparent that, for embodiments which generate an alarm when communication fails, the range of transmission is a compromise between providing a degree of freedom of movement for each of the units but providing a relatively short distance before communication fails between units and an alarm is generated. If the range is too short alarms will be generated too easily and if the range is too long a low degree of security will be provided since too much freedom will be given to the units.
- the range may be several kilometres (may be substantially 1, 2, 3, 4, 5, 6km or more). Such ranges are advantageous for providing security for items which in general use are separated by distances of these orders. An example of such items would be farm machinery. The skilled person will appreciate that the range must allow the item to perform its usual function without the generation of false alarms.
- the receiver of at least one of the units may comprise a detector adapted to detect communication from another unit.
- the unit In normal operation the unit may be adapted to operate in a low power state and be further adapted to become fully operational when the detector detects a possible communication. It will be appreciated that in the low power state some power may actually be drawn from the power source.
- a detector which allows the units to operate in a low power state is advantageous because it increases the life of the power source.
- the at least one unit may be adapted to become fully operational for a predetermined period of time upon detection of a possible communication. Alternatively or in addition, the at least one unit may be adapted to return to the low power state upon detection of a "sleep" communication directed either generally to all ofthe units or to that particular unit.
- the power source may be a battery which provides a convenient source of power.
- the battery may or may not be rechargeable.
- a solar cell or a Peltier junction may provide the source of power.
- a capacitor may be provided in association with the solar cell, allowing power fluctuations in the output ofthe cell to be smoothed.
- power may be derived from an external power supply, which may or may not be permanently wired to the unit.
- power may be derived via electromagnetic coupling or induction from a nearby coil or antenna, which may be provided on a nearby anchor unit. Power may also be provided from motion via an electric generator or piezo generator.
- each unit of the system may be provided with an identification mechanism adapted to provide unit identity.
- the processor of at least one of the units may be adapted to interact with the identification mechanism and transmit the unit identity via the transmitter.
- the identification mechanism may be a part of the processor. As discussed hereinbefore this is advantageous so that each unit can identify itself to the other units of the system, and units receiving transmissions will know from where the transmission originated.
- the identification mechanism may provide a unique identification for a particular unit or may identify a unit as belonging to a particular class. Indeed, in some embodiments the identification mechanism may provide both a unique identification and also a class of membership. Providing a class membership is advantageous because it allows the units ofthe system to behave differently when communicating with units of different classes. Further, because a class of membership is not unique to a particular unit, the communications could not be used to invade privacy as could communications involving a unique identification.
- the units may further comprise an arming mechanism adapted to cause the unit to become operational.
- the arming mechanism may comprise a key-receiving mechanism adapted to receive a key.
- the key-receiving mechanism may be adapted to receive any one of the following: an electronic key (for example a smart card or similar), a mechanical key, an arming code transmitted to the unit and received by the receiver.
- One or more units of the system may comprise an arming unit adapted to arm the system.
- the arming unit may be adapted to transmit an arming code which arms and/or disarms the remaining units of the system.
- the master unit and the arming unit may be the same unit.
- the master unit and the arming unit may comprise separate units.
- the master and/or arming unit may be adapted to transmit a suppression signal adapted to prevent the units of the system from arming.
- the units of the system may be adapted to arm if they do not receive the suppression signal for a predetermined period. It will be appreciated that in a different embodiment the suppression signal may prevent the units of the system from disarming and keep them armed when they are receiving the signal.
- the system may become armed when the power source of each unit is connected.
- an arming unit may be adapted periodically to change the arming code.
- An advantage of this is that it prevents the arming code being copied and fraudulently used by a third party to arm or disarm the system.
- algorithms for securely changing a code are well known. Further, it will be appreciated that if the code is to be changed, the units receiving the arming code must alter the code they are expecting to receive in the same manner as the unit transmitting the arming code. An example of such an algorithm is the KeyloqTM protocol.
- the units may be adapted to encrypt communications.
- An advantage of encryption is that system security is increased. Encryption algorithms will be well known to the person skilled in the art but may include public-key or challenge response algorithms. When the units are encrypting the communications a single communication may become several transmissions, encoded for each recipient unit.
- the unit may be provided with a memory.
- the processor may be adapted to store within the memory the identities of the units with which it is in communication. Knowing the identities in this manner allows the system to track the units within the system. In embodiments where an alarm is generated when communication fails, tracking the units of the system will allow the unit to know when one of the units is no longer in communication, indicating that an alarm should be raised.
- the processor may be adapted to store a log of events within the memory.
- An event may be any action of which the unit becomes aware for example: a reading from a sensor, the contents of communications received from other units, the time at which the event occurs, etc.
- the processor may be capable of causing the transmitter to transmit all or some ofthe contents of the log and/or memory.
- the processor may be adapted to cause such a transmission when a predetermined communication is received, or at predetermined times, or after a predetermined sensor input, etc.
- the processor of a particular unit may be adapted to store in the memory only the identity of those units which are in communication with the particular unit at a certain time or during a certain period. The period may be within a predetermined period of the system becoming armed. This is advantageous because it prevents the units, including units which are not part of the desired security system, from being included in the security system.
- the system is designed to guard articles to which the units are attached using communications between the individual units.
- any unit of substantially the same design is capable of communicating with the units of the system. If units are simply included into the system as and when they come into communication then the system could guard articles which it is not intended to guard (that is articles fitted with units which can communicate with units of the system). Only remembering the identity of some units has the advantage that units which should not be included into the system will not be included into the system.
- the units may be adapted to generate an alarm if a communication is received from a unit having a particular identification or from a unit belonging to a particular class.
- a party may be provided with a unit having a known identification and other units situated in an excluded area may be programmed so that if they detect the known identification an alarm is generated.
- a lift may be provided with a unit and passengers may be provided with units belonging to a class defined as passengers. The unit provided on the lift may count passengers into the lift and generate an alarm once the number of passengers exceeds a predetermined limit.
- a further example would be to exclude visitors from restricted areas of a premises. An alarm may be generated should the presence of a unit belonging to a visitor be detected.
- the predetermined rules may be arbitrarily complex and may be based upon a number of parameters which may include any of the following: state of external sensors, the presence/absence of particular unit identities, presence/absence of units belonging to a particular class, contents of communications from other units, data held within the processor and/or memory.
- the processor may be provided with an input device adapted to program the processor with the identity of units which are part ofthe system. As discussed in the previous paragraph this is advantageous because it will prevent units which it is not desired to guard entering the system.
- the identities of units which are in communication with a particular unit are stored in the memory whilst the input device is activated.
- the input device may be a button, switch, a keyboard, a collection of keys, etc. In use, a user may activate the input device for a period, during which time the processor stores the identities of units with which it is communicating.
- the predetermined rules which define when the processor is adapted to generate an alarm may be alterable by a user.
- the input device may be further adapted to allow the rules to be changed. Clearly, this is advantageous because it will allow the functionality of the system to be altered to suit the current requirement.
- the processor may be adapted to alter the predetermined rules upon receipt of a predetermined communication from another unit.
- the processor may be adapted to change the predetermined rules on the basis of events.
- At least one of the units may be provided with other sensors whose outputs are connected to the processor.
- the processor may be adapted to monitor the outputs from these sensors and may be further adapted to transmit information relating to the sensor output to the transmitter.
- the sensor may be adapted to generate a signal within an allowable range and the processor may be adapted to cause the transmitter to transmit a signal if the signal from the sensor falls outside this allowable range.
- the sensor may be adapted to generate a signal only on the occurrence of a certain circumstance and the processor may be adapted to cause a signal to be transmitted by the transmitter only when a signal is produced by the sensor.
- sensors which may be provided are: moisture sensors, motion/tilt sensors, tamper switches, continuity-loop sensor wires from external alarm systems, signals sent from a computer program running on an attached computer, signals sent from a co-located "RFID" chip, co-ordinates from a Global Positioning sensor, signals from a mobile phone, a magnetic field sensor such as a compass, a biometric sensor and a physiological sensor. Of course any other type of sensor could be provided.
- At least one of the units may be provided with a connector to connect the unit with apparatus remote from the security system.
- the connector may be adapted to allow communication with any one of the following: a video display, a web site, a telephone system, a computer network, a portable computing device, a mobile phone network, a door lock, a turnstile, another security system (which may be as defined herein). This list is not intended to be exhaustive and the skilled person will appreciate it may be desirable to allow the unit to the connected to a variety of other apparatus.
- the connector may be adapted to make available the status of the security system.
- the connector may be adapted to transmit the contents of the memory and/or log to the device to which the unit is connected.
- the units are provided with an attachment device adapted to attach the unit to an article to be guarded.
- the unit may be built into the article to be guarded.
- security will be increased if the units can be securely attached to the unit to be guarded.
- the unit is provided as one of the following: a tag, strap, necklace, belt, wristwatch, bracelet.
- the unit may be adapted to be worn by a user.
- Such embodiments are useful for guarding a collection of people, which may be children. A party of people could then be guarded and an alarm would be raised should one of the party move out of communication range, perhaps by becoming disorientated and lost or perhaps due to abduction, etc.
- the system may comprise an anchor unit.
- the anchor unit may have the functionality of a unit of the security system.
- the anchor unit may be attached to a substantially permanent structure.
- Such an anchor unit is advantageous because it may allow units to be attached to and guard highly portable articles. It will be realised that the alarm will only be raised if the predetermined rules are met, perhaps a unit of the system loses communication with the remaining units of the system. Therefore, should all of the units in the system be attached to highly portable articles which are all removed at once no alarm might be raised.
- Providing an anchor unit is advantageous because it should prevent all of the units from being removed at once.
- a plurality of anchor units may be provided.
- the processor may be a microprocessor or may be a micro-controller.
- the micro-controller may be from the PIC series from the Micro-Chip Corporation.
- the processor may be provided by an ASIC, possibly providing lower power consumption than may be obtained from a microprocessor or micro-controller.
- the transmitter may be an LQ-TX433A-S manufactured by LPRS Ltd.
- the transmitter may be provided by transistor oscillator or other electronic circuit which may be stabilised using a SAW (Surface Acoustic Wave) device or crystal.
- SAW Surface Acoustic Wave
- the transmitter may be adapted to provide one of the following modulation formats which may be advantageous due to increased range and reliability of the system: on- off keying, amplitude shift keying, frequency shift keying, frequency modulation, amplitude modulation, frequency hopping, spread spectrum and time-modulated ultra- wide band.
- the receiver is preferably a circuit providing the function "radio in, data out".
- An example of such a circuit is the MICRF-OOx series from the Micrel Corporation.
- the transmitter and the receiver may be provided in a single transceiver.
- an ASH transceiver from RF Monolithics Inc. may be provided.
- the transmitter, the receiver and the processor could all be provided on the same circuit, for example the BlueCore Single Chip Bluetooth Modem designed by Cambridge Silicon Radio Ltd.
- An antenna may be provided to transmit radio signals.
- the antenna may take any one of the following designs: whip (wire, PCB stub, or PCB spiral), wire helix (or combined whip and helix), loop (wire, or PCB, open or closed), dipole, slot, patch, dielectric resonator antenna or metal part of the attached object.
- the antenna is a X A wavelength in length.
- the antenna is tuned to resonate at the operating radio frequency. The skilled person will appreciate that the preferred embodiment will depend on the operating frequency and space constraints of the application.
- the same antenna may be used by both the receiver and transmitter, or alternatively separate antennas may be provided for the transmitter and the receiver.
- two antennas are provided in a unit increasing the reliability of the signal transmission.
- signals transmitted from an antenna do not radiate equally in all directions.
- the orientation of a unit will be unknown and therefore other units may lie in areas which do not receive a substantial signal from a particular antenna (ie there is no or little signal transmitted in that direction).
- two antennas may be positioned at substantially 90° to one another, or may be positioned at some distance from one another.
- the antennas may be used alternatively for transmission and reception.
- the antenna system may comprise an array of antennas in one of various "beam-forming" or “radio direction finding” RDF configurations well known to those skilled in the art. This allows the unit to monitor the positions of other units from which it receives communications.
- the processor may be adapted to use this information to generate an alarm in certain circumstances. For instance an alarm may be generated if the direction of one of the units with which the unit is in communication with moves beyond predetermined limits.
- the array of antennas may be used to beam communications substantially only in the direction ofthe intended unit.
- a method of providing security comprising providing at least two units capable of communicating with each other using transmitters and receivers, the method comprising sending communication signals between the two units and raising an alarm when predetermined rules are satisfied.
- Such a method is advantageous because it provides decentralised security in which each ofthe units must be disarmed in order to disable the security.
- the method may generate an alarm when communication fails between two units.
- the units are attached to articles which it is desired to guard.
- the method includes providing a plurality of units, preferably one for each article which it is desired to guard.
- the method may comprise providing an arming mechanism to arm and/or disarm the system which is advantageous because it provides controllability over the method.
- the method may comprise providing a master unit (or aiming unit) which transmits a suppression signal which prevents the units of the system from arming.
- the units/system may automatically arm in the absence of the suppression signal. This is advantageous because it may allow the system to automatically arm if the master unit were moved outside the transmission range of the remaining units; for example if a person carrying the master unit moves away from units to be guarded by the security system. The system may not require guarding if the person with the master unit is in the vicinity of the remaining units.
- the method may comprise providing more than one master and/or arming unit.
- the system may perform a communication check. Such a check may be initiated by a unit, which may be the master unit.
- the communication check may cause each ofthe units to communicate. Such a check is advantageous since it gives the user knowledge that the system is working.
- a communication check is especially advantageous in situations where there is likely to be poor communication, perhaps in the vicinity of large radio or radar transmitters, or may be used to detect if j amming is occurring.
- the method comprises causing each unit to remember the identity of all of the units with which it is in communication when the system is armed or may be within a predetermined period of the system being armed.
- a different method may be provided for determining which units form part of the security system.
- An input device may be provided which may be used to input the identity of units which form part of the security system.
- the units may remember with which units they are in communication when an input is made to an input device. Each of these methods provides a convenient way of restricting the units which are protected by the method.
- the method may comprise causing the units to transmit signals at predetermined periods. This is advantageous because it reduces the power consumption ofthe units.
- the method may comprise causing the units to receive signals periodically. Again this is advantageous because it means that power consumption is reduced.
- the units receive signals when a signal is being transmitted and the method may comprise techniques to ensure that transmission and reception occur at substantially concurrent times to ensure that transmissions are not lost.
- the units transmit their status, which may include the status of a power source.
- This is advantageous because it allows the failure of power sources to be taken into account and thus, possibly reduce the generation of false alarms.
- the method may include the step of suppressing an alarm signal if a unit stops transmitting after a period of reporting a low power source.
- the method also includes noting the signal strength of transmissions received form units. This again may help to reduce the number of false alarms. If it is clear that one of the units is on the fringes of a receivable signal range, it may not be surprising if it drifts in and out of communication. Therefore the method may include the step of suppressing an alarm if communication is broken to a unit which has been experiencing a weak signal strength. The skilled person will appreciate that such a step is a compromise between reducing the security offered and reducing the number of false alarms. Clearly, if the method is made too tolerant of weak signals it would become possible slowly to remove a unit so that it begins to experience reception problems and finally to remove the unit completely thus fooling the system.
- each ofthe units may estimate the range of the other units in the system with which it is communicating. This estimation may be performed by measuring the signal strength of the signal received from other units or by measuring the time-of- flight.
- the method may comprise causing a particular unit to ignore units which are greater than a predetermined range from the particular unit. As discussed in the previous paragraph this is advantageous because it helps to reduce the likelihood of false alarms. The skilled person will appreciate that as the range increases the received signal strength will fall and that ignoring units above a threshold distance effectively ignores those with a less than acceptable signal strength.
- the method may provide a warning to a user that one of the units is experiencing a weak signal strength, or may be that one of the units is greater than the predetermined distance. This is advantageous because it allows the user to alter the position of the units such that all of them are within good communication range of each other.
- the method may include providing tolerance to missed transmissions.
- the alarm may be activated if more than a certain number of transmissions are missed. This is advantageous because it may reduce the number of false alarms.
- Examples where the method may be used include guarding pictures within a gallery. Each picture may be fitted with a unit communicating with the other units of the system. If one of the pictures were to be stolen, the alarm may activate as disclosed herein.
- Another possible use of the method would be to guard skis, golf clubs, etc. which could be left outside lodges, or to guard farm equipment.
- a security unit comprising: a transmitter for transmitting a signal; a receiver for receiving such a signal when transmitted by a second, substantially identical, unit; an alarm generator; a processor adapted to activate the alarm generator according to a predetermined condition relating to the receipt or otherwise of a said signal.
- FIGURE 1 is a schematic of a security system according to the invention.
- FIGURE 2 is a circuit diagram for realising a unit ofthe security system of Figure 1;
- FIGURES 3 AND 4 are schematics of further examples of security systems realising the invention.
- FIGURE 5 shows a block diagram of a unit ofthe security system.
- a security system comprising a number of units 2, 4, 6 is shown.
- Each of the units comprises a transmitter 8 (in this case a LQ-TX433A-S from LPRS) capable of transmitting radio waves of substantially 433MHz with a power of lmW and a receiver 10 (in this case a MICRF-001 capable of receiving radio waves of substantially the same frequency.
- the operation of the transmitter and receiver 8, 10 is controlled by a processor 12 (in this case a PIC12C508 micro-controller) which is provided with a memory 14.
- the processor 12 is also connected to an alarm 16, in this case a piezo-ceramic element.
- the components ofthe unit 2, 4, 6 are powered by a power source 18, in this case two lithium coin cells in parallel generating substantially 6 volts.
- the processor 12 receives binary data from the receiver 10 and also receives an output from a Received Signal Strength Indication (RSSI) output of the receiver 10.
- RSSI Received Signal Strength Indication
- the processor 12 sends binary data to the transmitter 8.
- the skilled person will appreciate that the rate of transmission need not be high and will be dependent upon the components used. In this particular embodiment rates of substantially 1kbps were used.
- An antenna (not shown) comprising a printed circuit whip tuned via capacitance to a ground plane on the opposite side of the circuit board is provided for signal transmission/reception.
- the receiver comprises a detector which is permanently operational whilst the remainder ofthe electronics within the unit is in a substantially zero power state.
- the detector monitors for possible communications from other units and if such a communication is received fully powers the remainder of the electronics such that if the communication is a genuine communication it can be received by the receiver and processed by the processor.
- each of a collection of articles to be guarded is provided with a unit 2, 4, 6 according to the invention, the units being securely attached to the articles.
- a collection of articles which may be guarded using the system is a collection of suitcases.
- the processor 12 causes the transmitter 8 periodically to transmit a signal.
- the signal contains the identity of the unit making the transmission (which is held within an identification mechanism (not shown) of the unit).
- the status of the battery 18 is also transmitted. Periodic transmission is beneficial because it will increase the life ofthe battery 18.
- Each unit has a fixed transmission period, eg once every 30 seconds. Initially the receiver of a particular unit is powered continuously until a transmission has been received from each other unit. Then the receivers simply turn-on shortly before each subsequent communication is expected from other units. In order for systems comprising more than 2 units to function properly, each unit must have a different transmission period to avoid the danger of transmissions repeatedly colliding. One way of achieving this is to make each transmission-period "relatively-prime" to all the others, so that there is a low chance of two communications occurring at the same time.
- Another way of achieving this is to "dither" the transmission time of each unit according to some complex, perhaps pseudo-random, algorithm, between limits (eg between 6 seconds and 30 seconds).
- limits eg between 6 seconds and 30 seconds.
- Many such algorithms are possible, for example sets of linear-feedback shift-registers, with the feedback taps chosen uniquely for each unit to minimise the number of successive collisions that are possible in the system as a whole.
- the transmission period changes on each transmission.
- the receiver can either have a duplicate algorithm to allow it to predict the next transmission time from each remote unit, or the "time to next transmission" can be encoded in the transmission itself.
- the unit may attempt to re-establish communications by occasionally reverting to the initial state of "receiver always on” for the maximum allowable transmission period, during which it should hear from all other units at least once.
- each bit of the packet is bi-phase encoded, meaning that each bit-period starts with a transition (low-to-high or high-to-low) and "one" bits have an additional transition in the centre of the period.
- the data packets may include any ofthe following parts:
- AGC Address Control
- the packet may comprise a break, or silence, which may be longer than an allowable bit period. This allows the receiver 10 to recognise the following bit as the start of valid data.
- the first byte contains an identification code and the second byte contains the status ofthe unit.
- the communications between the units are encrypted thereby further increasing the security of the communication.
- public-key or challenge-response algorithms may be applied to the communications.
- each of the units 2, 4, 6 transmits such a signal 3.
- the transmissions from each of the units 2, 4, 6 are received by the receiver 10 and the received signal is processed by the processor 12.
- the units 2, 4, 6 have a relatively low power and therefore the transmitted signal has a range only in the order of tens of meters. Consequently units separated by more than this distance will not be able to communicate with one another. Of course, in other applications the units may have a range ofthe order of kilometres.
- Each unit will know how many other units there are in the security system from data stored in the memory 14 and will expect to receive a signal from each of the other units. If, unexpectedly, a signal is not received from one ofthe units 2, 4, 6, each of the processors 12 within the security system causes the alarm 16 to be activated. Also, if one particular unit does not receive any signals from the remaining units (eg it is the unit that has been removed/stolen) it will sound its alarm 16. Therefore, if, as in this example, a unit 2, 4, 6 is attached to a number of suitcases the alarm will sound on each of the suitcases. To improve tolerance to false alarms there may be more than one missed communication before the processor causes an alarm to be generated.
- Such a system may be beneficial if a user were travelling with a number of suitcases.
- the cases By providing a unit according to the invention on each of the cases, the cases would effectively guard one another. If one of the cases were stolen, and moved out of the transmitting range of the other units, then the alarm 16 would sound on each of the cases; on the stolen case and on the ones which were not stolen.
- the battery 18 If the system is left active for a long period it is possible for the battery 18 to fail. Clearly, should the battery fail within a particular unit then that unit will no longer be capable of transmitting a signal. This situation would be analogous to the unit being stolen and being moved out of transmission range. Therefore, in this particular embodiment the battery 18 status is transmitted within the signal. If a particular unit has been reporting a low battery 18 status for a period of time then the remaining units of the system do not activate the alarm 16 if that particular unit suddenly stops transmitting. The remaining units effectively realise that the battery 18 of the particular unit has failed.
- the units may estimate the range of other units based upon the received signal strength. If the estimated range is above a threshold limit that particular unit may be discounted. Of course, other units may still be in range of that particular unit and continue to guard that unit. A user of the system may be provided with a warning that a unit is "out of range" allowing the user to move that particular unit.
- an anchor unit 20 (or base station) is provided on a substantially permanent structure 22, in this case a pillar.
- a substantially permanent structure 22 in this case a pillar.
- the provision of the anchor unit 20 on the pillar 22 ensures that not all of the units of the system can be stolen, and removed, at the same instance. Should all of the suitcases 24, 26, 28 be stolen together, the units 30, 32, 34 would still each remain in communication, but each of those units (30, 32, 34) would lose communication with the anchor unit 20. Because communication with one of the units has been lost then all of the alarm means 16 would be activated.
- Fixed units such as anchor unit 20 may be provided in public areas so that users of the security system can guard articles fitted with the security system. Of course, more than one anchor 20 could be provided.
- FIG. 4 Yet another embodiment of the invention is shown in Figure 4 wherein a master unit 36 is provided.
- the master unit 36 can be used to control the security system and is provided with a display 44 and an alarm 46.
- the remaining units 38, 40, 42 are not provided with alarms (although of course they could be) but are provided with key-receiving mechanisms.
- An arming mechanism 48 is also provided on the master unit. (The master unit may be thought of as an arming unit).
- the display is adapted in this embodiment to display the status of units within the security system and in this embodiment comprises an LCD display.
- the display 44 may function in conjunction with an input device (not shown) so that the user can manipulate the display so that the desired information is displayed on the display 44.
- the whole system can be armed by the use of the arming mechanism 48.
- the master unit 36 transmits an arming code or key to the remaining units 38, 40, 42 which is received by the receiver and the key-receiving mechanism.
- the units start periodically to transmit signals as described in relation to Figures 1 and 3.
- a signal propagates back to the master unit that the alarm 46 is activated.
- the master unit 36 and other units change the arming code after each use according to a predetermined sequence so that the code cannot be fraudulently copied.
- Providing a master unit 36 in this manner allows the remaining units 38, 40, 42 to be made simpler and cheaper, whilst maintaining the functionality ofthe system.
- the master unit 36 is not provided with a physical arming mechanism 48 which must be activated, neither is the master unit 36 the only unit provided with an alarm (each unit being provided with its own alarm).
- the master unit 36 periodically transmits a suppression signal which is received by the remaining units 38, 40, 42. As long as the remaining units 38, 40, 42 receive the suppression signal the system remains unarmed. As soon as reception of the suppression signal by the remaining units 38, 40, 42 is lost or the distance exceeds a given value, the system becomes armed, this reception acting as the arming mechanism. Once armed, should communication be lost between any of the remaining units 38, 40, 42, then the alarm of each of the remaining units 38, 40, 42 is activated.
- Such an embodiment is useful because it provides for automatic arming of the system.
- the master unit 36 would be carried by the person in charge ofthe cases. Whilst that person is carrying the cases there is no need for the system to be armed, and indeed in this embodiment the system would not be armed because each of the units on the cases would be in communication with the master unit and receive the suppression signal.
- the system would automatically arm when the cases are left by the person looking after them and would guard one another.
- each of the units of the system is provided with an arming mechanism.
- a user activates the arming mechanism on each ofthe units ofthe system in order to activate the security system.
- the units of the system will only remember the identities of units which start communication within a predetermined period of the system being activated. This will prevent the units from guarding units which are not part of that particular security system. For instance, if two groups of suitcases were each fitted with units according to the invention, then each suitcase within each group would guard each of the others. If, however, the two groups were brought into close proximity and the units simply guarded any unit with which they were in communication, then the units of the two groups would start guarding each other. Therefore, when the two groups were again separated the alarms of the units would be activated. Programming the units to guard only those units which are in communication with each other within a predetermined arming period would overcome this problem.
- the basic algorithm of the security system may be thought of as "when armed, detect all other units and then generate an alarm if predetermined circumstances occur (or predetermined rules are satisfied)". Thus, as discussed in the preceding paragraph, this may cause the system to guard units which it should not be guarding. Causing the units to remember the units which they should guard may be likened to a teaching phase.
- the predetermined rules may require that an alarm be generated if communication is lost with any unit of the systems. Such rules are useful as described in the embodiment described above.
- the rules may require that an alarm is generated if communication is received from a unit or too many units. Generation of an alarm by too many units may be useful for preventing overcrowding, perhaps in lifts or other confined spaces.
- an alarm may be generated if a unit becomes present. Such a system would be useful for enforcing exclusion orders.
- a unit may generate an alarm should a unit having a particular unique identity or class of membership be detected.
- one or more of the units may be provided with an input device which in one embodiment is a button.
- the input device which in one embodiment is a button.
- the input means may be a keyboard, a collection of keys, or other data input devices which can be used to input the identity of the units which those particular units should guard.
- the input device allows the rules which govern whether or not an alarm is generated to be altered, thus changing the functionality of the system.
- the rules may also be modified following communication from other units providing instructions to change the rules.
- the rules governing whether or not an alarm is generated may be arbitrarily complex, and may comprise Boolean or arithmetical expressions based on any number of variables. Variables may include the state of sensors, the received signal strength, the measured distance, the presence or absence of particular units with a unique identification or class, time, etc. [Each unit may be provided with a clock.]
- Sensors may be provided as an input to the processors of the units. Such sensors allow the unit to be aware of its su ⁇ oundings and may be used to generate alarms based on readings from the sensors. Examples of sensors which may be provided include: tamper-switches, continuity-loop sensor wires from external alarm systems (e.g. VolumetricTM), signals sent from a computer program running on an attached computer, signals sent from a co-located passive "RFID" chip, co-ordinates from a GPS positioning sensor, signals from a telephone (including mobile) and including the ringing signal, moisture sensors, motion and tilt sensors, magnetic field sensors including compasses, biometric sensors and physiological sensors.
- tamper-switches e.g. VolumetricTM
- continuity-loop sensor wires from external alarm systems e.g. VolumetricTM
- signals sent from a computer program running on an attached computer signals sent from a co-located passive "RFID" chip
- co-ordinates from a GPS positioning sensor signals from a telephone (including
- the key receiving mechanism on the arming units may receive mechanical keys rather than an electronic code to arm the units.
- one of the units is provided with a connector which allows the security system to interface with an external piece of apparatus.
- the external piece of apparatus may be a computer network, a telephone, a visual display unit (or other display), a portable computing device, a mobile phone network, a door lock, a turnstile, another security system, or some other device.
- a connector allows the status ofthe system to be observed.
- the processor may be adapted to cause the transmitter to transmit a predetermined class to which that particular unit has been designated.
- Not transmitting a unique identification is advantageous in some circumstances because it will prevent abuse of user's privacy wherein the transmissions could be used to track a particular unit if a unique identification is transmitted. Transmitting a predetermined class would not allow a particular unit to be tracked.
- having predetermined classes to which units belong may provide functionalities which although possible by transmitting a unique identification may be easier to implement by transmitting a class. Indeed, in some embodiments a portion of the unique identification may comprise a class, or a class may be transmitted in addition to the unique identification.
- Examples of uses relying on a class to be transmitted include providing children with units which transmit membership of a "child” class.
- Units provided on turnstiles may receive communications from the units, identify that they belong to the "child” class and only allow them to pass if a unit belonging to an "adult” class is also present.
- guns may be provided with units which only operate when they detect a communication from a unit belonging to a "firing range" class.
- a class based system could be used to guard a building where units in the vicinity of an entrance produce an alarm if a unit belonging to the class "asset” (which is attached to a company asset) leaves the building without there also being present a unit belonging to the class "employee".
- assert which is attached to a company asset
- employee The skilled person will appreciate that the use of such classes has many uses.
- a further example would be restricting access to a secure piece of equipment which requires two people to be present. People could be issued with a unit belonging to a "person” class and the equipment may only become operational if a unit attached to it detects two units ofthe "person” class.
- Class of membership (unlike unique identifications) are not specific to individual units and therefore this class of membership is harder to use to invade privacy.
- the processing means stores within the memory a log of events which the unit has experienced. This log can be accessed via communications with other units or via the connector.
- FIG. 2 An example of a circuit for providing a unit is shown in Figure 2.
- the power supply (not shown) is connected to the terminals BATl, BAT2, and the section labelled A smoothes, filters and regulates this power supply.
- the circuit section labelled B is a transmitter, which is driven by a pin 6 of UI.
- the receiver of the unit is provided by section C.
- the majority of section D provides the processing power of the circuit.
- a battery low sensor is provided by the Zener diode and resistor pair at E.
- An LED F provides an output to the unit, and a push button switch G provides an input.
- a piezo sounder H provides an alarm.
Abstract
Description
Claims
Priority Applications (3)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
EP00948160A EP1208548A2 (en) | 1999-07-27 | 2000-07-26 | Improvements relating to security |
AU61726/00A AU6172600A (en) | 1999-07-27 | 2000-07-26 | Improvements relating to security |
JP2001513129A JP2003505803A (en) | 1999-07-27 | 2000-07-26 | Security improvements |
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
GBGB9917490.6A GB9917490D0 (en) | 1999-07-27 | 1999-07-27 | Improvements relating to security |
GB9917490.6 | 1999-07-27 |
Publications (2)
Publication Number | Publication Date |
---|---|
WO2001008116A2 true WO2001008116A2 (en) | 2001-02-01 |
WO2001008116A3 WO2001008116A3 (en) | 2001-06-07 |
Family
ID=10857931
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/GB2000/002880 WO2001008116A2 (en) | 1999-07-27 | 2000-07-26 | Improvements relating to security |
Country Status (5)
Country | Link |
---|---|
EP (1) | EP1208548A2 (en) |
JP (1) | JP2003505803A (en) |
AU (1) | AU6172600A (en) |
GB (2) | GB9917490D0 (en) |
WO (1) | WO2001008116A2 (en) |
Cited By (28)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2002005900A3 (en) * | 2000-07-19 | 2002-07-25 | Golf Domain Com Llc | Method and apparatus for managing golf related information obtained in part by using impulse radio technology |
JP2002290538A (en) * | 2001-03-27 | 2002-10-04 | Denso Corp | Wireless call system for vehicle |
US6542114B1 (en) | 2000-09-07 | 2003-04-01 | Savi Technology, Inc. | Method and apparatus for tracking items using dual frequency tags |
US6720888B2 (en) | 2000-09-07 | 2004-04-13 | Savi Technology, Inc. | Method and apparatus for tracking mobile devices using tags |
US6747558B1 (en) | 2001-11-09 | 2004-06-08 | Savi Technology, Inc. | Method and apparatus for providing container security with a tag |
US6765484B2 (en) | 2000-09-07 | 2004-07-20 | Savi Technology, Inc. | Method and apparatus for supplying commands to a tag |
WO2004077653A1 (en) * | 2003-02-26 | 2004-09-10 | Usc Corporation | Powerless type security device |
EP1477949A1 (en) * | 2003-05-05 | 2004-11-17 | Dietrich Werner | Method and application to mark a threshold of distance |
WO2005020172A1 (en) * | 2003-08-25 | 2005-03-03 | Koninklijke Philips Electronics, N.V. | Personal proximity network |
US6940392B2 (en) | 2001-04-24 | 2005-09-06 | Savi Technology, Inc. | Method and apparatus for varying signals transmitted by a tag |
EP1606779A1 (en) * | 2003-03-26 | 2005-12-21 | Janet Elisabeth Williams | Personal safety device |
GB2422470A (en) * | 2005-01-24 | 2006-07-26 | What S Up Entpr Holdings Ltd | Proximity anti-theft alarm |
AT414178B (en) * | 2003-05-05 | 2006-09-15 | Werner Dipl Ing Dietrich | METHOD AND DEVICE FOR MARKING DISTANCE LIMITS |
WO2007012891A2 (en) * | 2005-07-25 | 2007-02-01 | Siemens Aktiengesellschaft | A radio frequency identification interrogator |
WO2007036967A1 (en) * | 2005-09-27 | 2007-04-05 | Lando Lancini | Method for detecting increasing distances between a portable radio identification device and objects fitted with a transponder |
US7317387B1 (en) | 2003-11-07 | 2008-01-08 | Savi Technology, Inc. | Method and apparatus for increased container security |
WO2008021874A1 (en) * | 2006-08-08 | 2008-02-21 | Robert Poor | Wireless protection system |
US7436298B2 (en) | 2003-10-27 | 2008-10-14 | Savi Technology, Inc. | Container security and monitoring |
US7538672B2 (en) | 2005-11-01 | 2009-05-26 | Savi Technology, Inc. | Method and apparatus for capacitive sensing of door position |
US7667597B2 (en) | 2007-03-09 | 2010-02-23 | Savi Technology, Inc. | Method and apparatus using magnetic flux for container security |
US7808383B2 (en) | 2005-11-03 | 2010-10-05 | Savi Technology, Inc. | Method and apparatus for monitoring an environmental condition with a tag |
DE102009014641A1 (en) * | 2009-03-24 | 2010-10-07 | Töteberg, Andreas | System for monitoring loss and determining position of e.g. passenger car, has holder device delivering alarm and optically or acoustically brought to display such that conclusions about direction and distance to charge is provided |
WO2011058513A1 (en) * | 2009-11-11 | 2011-05-19 | Kruger Andre Christopher | System and method for detecting loss of a portable item |
EP2469491A1 (en) * | 2010-12-22 | 2012-06-27 | Commissariat à l'Énergie Atomique et aux Énergies Alternatives | Antitheft system for mobile equipment |
US8258950B2 (en) | 2004-07-15 | 2012-09-04 | Savi Technology, Inc. | Method and apparatus for control or monitoring of a container |
WO2013024475A1 (en) * | 2011-08-15 | 2013-02-21 | Mayer-Sommer Arthur | Micro handheld alarm network system for and method for alerting to any loss of a network entity |
CN105631372A (en) * | 2014-10-13 | 2016-06-01 | 美新纳瑞私人有限公司 | Proximity monitoring device and method |
EP3040955A1 (en) * | 2014-12-31 | 2016-07-06 | Xiaomi Inc. | Video monitoring method and device |
Families Citing this family (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
GB2394585A (en) * | 2002-10-26 | 2004-04-28 | Tariq Belkadi | Apparatus for preventing loss of personal valuables |
GB2400711A (en) * | 2003-04-16 | 2004-10-20 | Paul Thomas Dimmer | Wireless alarm system monitoring the position of valuables that is suitable for protecting computers or mobile phones which are using wireless data networks |
DE102005038811A1 (en) | 2005-08-17 | 2007-03-01 | Rainer Brenner | Method and device for securing objects |
GB0613732D0 (en) * | 2006-07-10 | 2006-08-23 | Jones Philip A | Club watch |
DE202007011808U1 (en) * | 2007-08-23 | 2008-12-24 | Rademacher, Wilhelm | Verliersicherungsanordnung |
DE102014215750A1 (en) * | 2014-08-08 | 2016-02-25 | Sp Sicherheitsprodukte Vertriebs Gmbh | Security system for a safekeeping |
Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US5661460A (en) * | 1994-12-13 | 1997-08-26 | Secure Technologies, Inc. | Distance determination and alarm system |
EP0840265A1 (en) * | 1996-11-04 | 1998-05-06 | E Lead Electronic Co., Ltd. | A synchronous receiving/transmitting departure alarm |
FR2768249A1 (en) * | 1997-09-08 | 1999-03-12 | Ralph Feingold | Search/surveillance mechanism |
Family Cites Families (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
GB2243739A (en) * | 1990-04-27 | 1991-11-06 | Arrowaxe Ltd | Frequency modulation distance measurement of active target |
GB2276478A (en) * | 1993-03-23 | 1994-09-28 | Trevor Martin Dance | Electronic alarm/finder |
GB2279170A (en) * | 1993-05-04 | 1994-12-21 | Trevor Newton | Electronic tagging system |
AUPM402394A0 (en) * | 1994-02-23 | 1994-03-17 | Monaad Corporation Pty Limited | Security access arrangement |
GB2314986A (en) * | 1996-07-02 | 1998-01-14 | Alan Michael Cox | Electronic child protection system |
GB2344914A (en) * | 1998-06-18 | 2000-06-21 | Paul Anthony Delahunty | System for protecting an article or child |
-
1999
- 1999-07-27 GB GBGB9917490.6A patent/GB9917490D0/en not_active Ceased
-
2000
- 2000-07-26 AU AU61726/00A patent/AU6172600A/en not_active Abandoned
- 2000-07-26 EP EP00948160A patent/EP1208548A2/en not_active Withdrawn
- 2000-07-26 WO PCT/GB2000/002880 patent/WO2001008116A2/en not_active Application Discontinuation
- 2000-07-26 JP JP2001513129A patent/JP2003505803A/en active Pending
- 2000-07-26 GB GB0018284A patent/GB2355565B/en not_active Expired - Fee Related
Patent Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US5661460A (en) * | 1994-12-13 | 1997-08-26 | Secure Technologies, Inc. | Distance determination and alarm system |
EP0840265A1 (en) * | 1996-11-04 | 1998-05-06 | E Lead Electronic Co., Ltd. | A synchronous receiving/transmitting departure alarm |
FR2768249A1 (en) * | 1997-09-08 | 1999-03-12 | Ralph Feingold | Search/surveillance mechanism |
Non-Patent Citations (1)
Title |
---|
See also references of EP1208548A2 * |
Cited By (38)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US6705942B1 (en) | 2000-07-19 | 2004-03-16 | Golf-Domain.Com Llc | Method and apparatus for managing golf related information obtained in part by using impulse radio technology |
WO2002005900A3 (en) * | 2000-07-19 | 2002-07-25 | Golf Domain Com Llc | Method and apparatus for managing golf related information obtained in part by using impulse radio technology |
US6542114B1 (en) | 2000-09-07 | 2003-04-01 | Savi Technology, Inc. | Method and apparatus for tracking items using dual frequency tags |
US6720888B2 (en) | 2000-09-07 | 2004-04-13 | Savi Technology, Inc. | Method and apparatus for tracking mobile devices using tags |
US6765484B2 (en) | 2000-09-07 | 2004-07-20 | Savi Technology, Inc. | Method and apparatus for supplying commands to a tag |
JP2002290538A (en) * | 2001-03-27 | 2002-10-04 | Denso Corp | Wireless call system for vehicle |
US6940392B2 (en) | 2001-04-24 | 2005-09-06 | Savi Technology, Inc. | Method and apparatus for varying signals transmitted by a tag |
US8253541B2 (en) | 2001-04-24 | 2012-08-28 | Savi Technology, Inc. | Method and apparatus for varying signals transmitted by a tag |
US6747558B1 (en) | 2001-11-09 | 2004-06-08 | Savi Technology, Inc. | Method and apparatus for providing container security with a tag |
US7049959B2 (en) | 2003-02-26 | 2006-05-23 | Usc Corporation | Powerless type security device |
WO2004077653A1 (en) * | 2003-02-26 | 2004-09-10 | Usc Corporation | Powerless type security device |
EP1606779A1 (en) * | 2003-03-26 | 2005-12-21 | Janet Elisabeth Williams | Personal safety device |
EP1477949A1 (en) * | 2003-05-05 | 2004-11-17 | Dietrich Werner | Method and application to mark a threshold of distance |
AT414178B (en) * | 2003-05-05 | 2006-09-15 | Werner Dipl Ing Dietrich | METHOD AND DEVICE FOR MARKING DISTANCE LIMITS |
WO2005020172A1 (en) * | 2003-08-25 | 2005-03-03 | Koninklijke Philips Electronics, N.V. | Personal proximity network |
CN100458854C (en) * | 2003-08-25 | 2009-02-04 | 皇家飞利浦电子股份有限公司 | Personal proximity network |
US7436298B2 (en) | 2003-10-27 | 2008-10-14 | Savi Technology, Inc. | Container security and monitoring |
US7317387B1 (en) | 2003-11-07 | 2008-01-08 | Savi Technology, Inc. | Method and apparatus for increased container security |
US8258950B2 (en) | 2004-07-15 | 2012-09-04 | Savi Technology, Inc. | Method and apparatus for control or monitoring of a container |
GB2422470A (en) * | 2005-01-24 | 2006-07-26 | What S Up Entpr Holdings Ltd | Proximity anti-theft alarm |
WO2007012891A2 (en) * | 2005-07-25 | 2007-02-01 | Siemens Aktiengesellschaft | A radio frequency identification interrogator |
WO2007012891A3 (en) * | 2005-07-25 | 2007-06-28 | Siemens Ag | A radio frequency identification interrogator |
WO2007036967A1 (en) * | 2005-09-27 | 2007-04-05 | Lando Lancini | Method for detecting increasing distances between a portable radio identification device and objects fitted with a transponder |
US7538672B2 (en) | 2005-11-01 | 2009-05-26 | Savi Technology, Inc. | Method and apparatus for capacitive sensing of door position |
US7808383B2 (en) | 2005-11-03 | 2010-10-05 | Savi Technology, Inc. | Method and apparatus for monitoring an environmental condition with a tag |
WO2008021874A1 (en) * | 2006-08-08 | 2008-02-21 | Robert Poor | Wireless protection system |
US7667597B2 (en) | 2007-03-09 | 2010-02-23 | Savi Technology, Inc. | Method and apparatus using magnetic flux for container security |
DE102009014641A1 (en) * | 2009-03-24 | 2010-10-07 | Töteberg, Andreas | System for monitoring loss and determining position of e.g. passenger car, has holder device delivering alarm and optically or acoustically brought to display such that conclusions about direction and distance to charge is provided |
WO2011058513A1 (en) * | 2009-11-11 | 2011-05-19 | Kruger Andre Christopher | System and method for detecting loss of a portable item |
FR2969683A1 (en) * | 2010-12-22 | 2012-06-29 | Commissariat Energie Atomique | ANTI-THEFT SYSTEM FOR MOBILE EQUIPMENT |
EP2469491A1 (en) * | 2010-12-22 | 2012-06-27 | Commissariat à l'Énergie Atomique et aux Énergies Alternatives | Antitheft system for mobile equipment |
WO2013024475A1 (en) * | 2011-08-15 | 2013-02-21 | Mayer-Sommer Arthur | Micro handheld alarm network system for and method for alerting to any loss of a network entity |
CN105631372A (en) * | 2014-10-13 | 2016-06-01 | 美新纳瑞私人有限公司 | Proximity monitoring device and method |
EP3207439A4 (en) * | 2014-10-13 | 2018-05-23 | Maxwell Forest Pty Ltd. | Proximity monitoring devices and methods |
US10055969B2 (en) | 2014-10-13 | 2018-08-21 | Maxwell Forest Pty Ltd | Proximity monitoring devices and methods |
CN105631372B (en) * | 2014-10-13 | 2020-06-12 | 麦克斯韦尔福瑞斯特私人有限公司 | Proximity monitoring apparatus and method |
EP3040955A1 (en) * | 2014-12-31 | 2016-07-06 | Xiaomi Inc. | Video monitoring method and device |
RU2633223C2 (en) * | 2014-12-31 | 2017-10-11 | Сяоми Инк. | Method and device for videomonitoring |
Also Published As
Publication number | Publication date |
---|---|
GB2355565A (en) | 2001-04-25 |
EP1208548A2 (en) | 2002-05-29 |
AU6172600A (en) | 2001-02-13 |
GB2355565B (en) | 2002-10-09 |
JP2003505803A (en) | 2003-02-12 |
GB0018284D0 (en) | 2000-09-13 |
GB9917490D0 (en) | 1999-09-29 |
WO2001008116A3 (en) | 2001-06-07 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
EP1208548A2 (en) | Improvements relating to security | |
KR100508515B1 (en) | Measuring or security system | |
US9218696B2 (en) | Wireless access control system and related methods | |
US5448221A (en) | Dual alarm apparatus for monitoring of persons under house arrest | |
AU2003272231B2 (en) | A system for monitoring and locating people and objects | |
US5963131A (en) | Anti-theft device with alarm screening | |
AU778793B2 (en) | Authentication techniques in a monitoring system | |
US8169319B2 (en) | Virtual group maintenance and security | |
US5640144A (en) | RF/ultrasonic separation distance alarm | |
US20140240088A1 (en) | Apparatus and method for locating, tracking, controlling and recognizing tagged objects using active rfid technology | |
US20060017566A1 (en) | RF volumetric intrusion detection device, system and method | |
EP2941844A1 (en) | Wireless access control system and related methods | |
US20190212086A1 (en) | Gun lock with alarm system supervisory by zone | |
US9830443B2 (en) | Device and method for controlling access to at least one machine | |
JP2007039895A (en) | Lock control system and program | |
US7339464B2 (en) | Detection-resistant transponder with “stealth packaging” for high-risk surveillance applications | |
GB2400711A (en) | Wireless alarm system monitoring the position of valuables that is suitable for protecting computers or mobile phones which are using wireless data networks | |
JP2009217668A (en) | Message tracking system, and program | |
WO2001069563A1 (en) | System for detecting the proximity of an object or a person | |
RU2290698C1 (en) | Method and system for controlling and signaling about change of positions of guarded objects | |
JP2008067129A (en) | Radio communication system | |
AU2021398447A1 (en) | Access control method, device and system | |
GB2390205A (en) | Security code transmitter | |
CA2760408A1 (en) | Reseam |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
AK | Designated states |
Kind code of ref document: A2 Designated state(s): AE AG AL AM AT AU AZ BA BB BG BR BY BZ CA CH CN CR CU CZ DE DK DM DZ EE ES FI GB GD GE GH GM HR HU ID IL IN IS JP KE KG KP KR KZ LC LK LR LS LT LU LV MA MD MG MK MN MW MX MZ NO NZ PL PT RO RU SD SE SG SI SK SL TJ TM TR TT TZ UA UG US UZ VN YU ZA ZW |
|
AL | Designated countries for regional patents |
Kind code of ref document: A2 Designated state(s): GH GM KE LS MW MZ SD SL SZ TZ UG ZW AM AZ BY KG KZ MD RU TJ TM AT BE CH CY DE DK ES FI FR GB GR IE IT LU MC NL PT SE BF BJ CF CG CI CM GA GN GW ML MR NE SN TD TG |
|
121 | Ep: the epo has been informed by wipo that ep was designated in this application | ||
DFPE | Request for preliminary examination filed prior to expiration of 19th month from priority date (pct application filed before 20040101) | ||
AK | Designated states |
Kind code of ref document: A3 Designated state(s): AE AG AL AM AT AU AZ BA BB BG BR BY BZ CA CH CN CR CU CZ DE DK DM DZ EE ES FI GB GD GE GH GM HR HU ID IL IN IS JP KE KG KP KR KZ LC LK LR LS LT LU LV MA MD MG MK MN MW MX MZ NO NZ PL PT RO RU SD SE SG SI SK SL TJ TM TR TT TZ UA UG US UZ VN YU ZA ZW |
|
AL | Designated countries for regional patents |
Kind code of ref document: A3 Designated state(s): GH GM KE LS MW MZ SD SL SZ TZ UG ZW AM AZ BY KG KZ MD RU TJ TM AT BE CH CY DE DK ES FI FR GB GR IE IT LU MC NL PT SE BF BJ CF CG CI CM GA GN GW ML MR NE SN TD TG |
|
WWE | Wipo information: entry into national phase |
Ref document number: 2000948160 Country of ref document: EP |
|
REG | Reference to national code |
Ref country code: DE Ref legal event code: 8642 |
|
WWP | Wipo information: published in national office |
Ref document number: 2000948160 Country of ref document: EP |
|
WWE | Wipo information: entry into national phase |
Ref document number: 10048149 Country of ref document: US |
|
WWW | Wipo information: withdrawn in national office |
Ref document number: 2000948160 Country of ref document: EP |