The technology described herein relates, in general, to an access control system that grants an authorized user access to an access-restricted zone in a building or site. Embodiments of the technology relate, in particular, to an access control system having a transceiver device for radio signals and to a method for operating such an access control system.
Access control systems may be configured in a variety of different ways. The embodiments may relate, for example, to the way in which users (persons) must identify themselves as authorized to access, for example, with a key, a magnetic card, a chip card or an RFID card or with a mobile electronic device (for example, mobile phone). WO 2010/112586 A1 describes an access control system, in which a mobile phone carried by a user sends an identification code to an access node. If the identification code is identified as valid, the access node sends an access code to the cell phone, which displays the access code on a display. If the user holds the cell phone to a camera so that it can detect the displayed access code, the access control system checks whether the detected access code is valid. If the code is valid, the user is granted access.
In buildings with many floors, there may be a high volume of traffic at certain times of the day, for example in an entrance hall of an office building when a large number of employees enter the building in the morning or after a lunch break to arrive at their workplaces. At these times, high demands are placed not only on the efficiency of an elevator system installed in the building, but also on the access control system in order, for example, to avoid queuing at a security gate between a public zone and a restricted-access zone as much as possible. There is therefore a need for an access control system that fulfills these requirements, wherein the access control is nevertheless able to reliably distinguish persons having access authorization from persons who are not authorized.
One aspect of such a technology relates to a method of operating an access control system to control access to a restricted-access zone in a building in which a security gate separates the restricted-access zone from a public zone. The system comprises radio devices which are each arranged at a fixed distance from the security gate and which define a monitoring area. The radio devices are configured for radio communication with wireless devices that are within radio range and assigned to users, wherein a first wireless device at a first position of a first user is at a distance from each of the radio devices. A control device of the system is communicatively coupled to a building device, and a data storage device stores processing instructions for situation-specific calibration modes. A signal processing device is communicatively coupled to the data storage device, the radio devices, and the control device. The method evaluates radio communication in the monitoring area and, based on the evaluation, determines a situation indicator which shows a radio situation prevailing there. For each radio device, an indicator for a received signal field strength is recorded based on radio communication with the first wireless device. The method selects a calibration mode assigned to the situation indicator and reads the processing instructions assigned to it from the data storage device. A current position of the first wireless device is determined as a function of the detected indicators for the received signal field strengths in accordance with the processing instructions that have been read.
Another aspect of the technology relates to a system for controlling access to a restricted-access zone in a building. The system comprises radio devices which are each arranged at a fixed distance from the security gate and which define a monitoring area. The radio devices are configured for radio communication with wireless devices that are within radio range and assigned to users, wherein a first wireless device at a first position of a first user is at a distance from each of the radio devices. A control device of the system is communicatively coupled to a building device, and a data storage device stores processing instructions for situation-specific calibration modes. A signal processing device is communicatively coupled to the data storage device, the radio devices, and the control device. The signal processing device is configured to evaluate the radio communication in the monitoring area and to determine at least one situation indicator therefrom, which indicates a radio situation prevailing in the monitoring area. In addition, the signal processing device is configured, for each radio device, to detect a received signal field strength indicator based on a radio communication with the first wireless device and to select the calibration mode assigned to the at least one situation indicator. The signal processing device is also configured to read the processing instructions assigned to the selected calibration mode from the data storage device and to determine a current position of the first wireless device as a function of the received signal field strength indicators detected according to the processing instructions read.
The technology described here creates an access control system in which, in order to determine the position, it is first assessed which radio situation currently prevails in the monitoring area, and the calibration mode is then selected as a function of the radio situation. The selected calibration mode determines the processing instructions with which the current position of a user is determined. This allows the position determination to be flexibly adapted to the prevailing radio situation in order to be able to determine the position as precisely as possible even in the prevailing radio situation.
When traffic is high, for example, many users interfere with the propagation of a radio signal, resulting in increased signal weakening and signal shadowing. The radio signal therefore propagates differently in such a situation than during a reference situation with a single user moving along an established reference path. Processing instructions based on this reference situation may therefore not provide the most precise position determination. In one embodiment, a calibration mode can therefore be selected that takes the high volume of traffic into account. On the other hand, if the traffic volume is low, the processing instructions can be based on the reference situation.
The number of users can also indicate the number of active wireless devices present in the monitoring area. The number of wireless devices can therefore be selected as a situation indicator in one embodiment. As an alternative to the number of wireless devices or in addition, depending on the configuration of the access control system, e.g. depending on the conditions in the building, at least one of the following situation indicators can be selected: a wireless device type, a spatial orientation of a wireless device, an entry point of the user in the monitoring area, sensor data generated by a wireless device, a time, a number of radio devices, an available computing power in the access control system, a density of radio equipment or a room size. These options allow a building-specific adaptation.
The technology described here detects a large number of received signal strength indicators and processes them according to a calculation model, wherein the calculation model depends on the selected calibration mode. It is advantageous that the received signal strength indicators are easy to determine and that their determination and monitoring is already provided for in known norms and standards for radio communication. In these norms and standards, a received signal field strength indicator is also referred to as a Received Signal Strength Indicator (RSSI). An exemplary standard relates to Bluetooth technology, e.g. the Bluetooth Low Energy (BLE) technology.
In one embodiment of the technology described here, radio signals are transmitted and evaluated in accordance with Bluetooth technology, in particular BLE technology. This is an advantage above all because this technology is usually available in wireless devices and users can also use the device they are familiar with in conjunction with the access control system. This is done in a convenient way for a user because, for example, the user does not have to handle the wireless device when he wants access.
The data storage device stores data determined in a calibration phase which can be read in an application phase. The data relate, for example, to a radio signal strength reference value that was determined in the calibration phase from radio communication between one of the radio devices and a reference wireless device arranged at a reference distance for this purpose. The data can also relate to a reference radio signal pattern as a function of a position of the reference wireless device, wherein the reference radio signal pattern is determined from the radio communication between the radio devices and the reference wireless device in the calibration phase. In addition, the data can relate to a loss coefficient determined in the calibration phase for each of the radio devices as a function of the reference position of the reference wireless device.
In one embodiment, first processing instructions for a first calibration mode can determine the position according to
where NA is a number of radio devices and di(p) is a Euclidean distance between an i-th radio device (6) and a variable position (p) of the user (4), wherein a distance (d′i) between the wireless device (2) and an i-th radio device (6) determined based on the reference radio signal pattern (FP) results as follows:
The loss coefficient is defined according to
where j=1, . . . , Nj,k denotes the j-th measurement in a k-th path segment of an established path for the i-th radio device, wherein the path segments are established in a calibration phase.
In one embodiment, second processing instructions can establish a trajectory of a movement of the user to be determined for a second calibration mode, wherein the determination is based on the established locations of the radio devices, the detected indicators for the received signal field strengths and the radio signal strength reference value, wherein loss coefficients using a maximum likelihood estimate are determined, wherein residual costs are determined according to a negative log-likelihood function, taking into account the loss coefficients determined and wherein the residual costs are minimized over the position path.
In one embodiment, the data storage device also stores an individual identifier of the first wireless device, which is transmitted by the first wireless device. The identifier can be used to infer the user who owns the first wireless device. In one embodiment, it can thus be checked whether the user is authorized to access. In the access control system, the signal processing device is configured to feed a control signal to the control device when an established rule is met based on the identifier and the determined current position of the wireless device. The control device is configured to initiate a building action corresponding to the established rule, in particular to release the security gate.
Various aspects of the improved technology are described in greater detail below with reference to embodiments in conjunction with the drawings. In the drawings, identical elements have identical reference signs. In the drawings:
According to one embodiment, the access control system 1 comprises radio devices 6, for example four radio devices 6 identified by RF1, RF2, RF3, RF4. The person skilled in the art recognizes that in another embodiment more than four radio devices 6 (generally RFi, with i=1, 2, . . . N) can be arranged, which is indicated in
The radio devices 6 are arranged stationary at fixed locations; these locations can be specified in relation to a building plan, for example for a building floor using x-y coordinates. The location of the security gate 14 can be specified in a similar manner for a building floor by means of x-y coordinates. In one embodiment, data indicating the locations of the radio devices 6 and the location of the security gate 14 are stored in the access control system 1, for example in a data storage device 18 (hereinafter also referred to as storage device 18).
The radio devices 6 arranged in this way define a region that is monitored by the access control system 1; this region is referred to below as the monitoring area. Depending on the building situation, the monitoring area can, for example, border on a main entrance door, a landing entrance or an elevator door, the locations of which are also specified in the building plan and are therefore known. If a user 4 enters the monitoring area through such a door, for example a door movement can be detected, a current position of the user 4 results from the known location of this door. Since the user 4 is moving away from the door, this current position can be viewed as the starting position of the movement in the monitoring area. In one embodiment, a radio device 6 can be arranged at a prominent location, such as the said doors, to define this location as the starting position.
The access control system 1 also comprises a signal processing device 8 (shown as a DSP) and a control device 10, 12 connected to the signal processing device 8. The memory device 18 is also connected to the signal processing device 8. The signal processing device 8 is communicatively coupled to the radio devices 6, which is indicated by a double arrow 9. The control device 10, 12 comprises a control system 12 (shown in
In the situation shown in
The technology determines a position of the user 4 using a calculation model, also referred to below as a channel model, which describes transmission losses of the radio signals that propagate between the wireless device 2 and the radio devices 6. As a measure of the transmission losses, the channel model uses indicators for received signal strength indicators (RSSI), which are determined for the current position with respect to the individual radio devices 6. This channel model is adapted dependent on a radio situation prevailing in the monitoring area, e.g. a number of cellular devices 2 present, their types (e.g. iPhone devices or Android devices) and/or directional information (e.g., position/orientation of a wireless device 2), and a situation indicator determined therefrom. The adaptation takes place according to a calibration mode selected for the radio situation; the selected calibration mode can be based on previously determined and saved values (e.g., reference values) or manage without such a prior value determination. This technology implemented in the access control system 1 improves the accuracy of the position determination. In one embodiment, the improvement in accuracy is supported in that the radio signals are sent in accordance with a standard for Bluetooth technology and/or that the highest possible degree of diversity is provided in the access control system 1 (as explained elsewhere in this description).
Since the locations of the radio devices 6 are known/established, in particular in relation to the security gate 14, the position of the user 4 in relation to the radio devices 6 or the security gate 14 results from the determination of the position of the wireless device 2. It can thus be determined, for example, how far the user 4 is from the security gate 14 and/or in which direction he is moving, e.g. towards the security gate 14 or away from it. A radio signal sent by the wireless device 2 includes an individual identifier (e.g. device ID, serial number, device address), by means of which it can be checked whether the user 4 is authorized to access, should he want access and not just be walking past the lock 14. If the user 6 moves along one of the paths 26, 28 shown by way of example in
The channel model and the options for adapting the channel model are described in more detail below. In addition, further properties of the access control system 1 and its components are indicated.
In the embodiment shown, the radio devices 6 of the access control system 1 are arranged in the public zone 22 and in the restricted-access zone 20. As a result, the monitoring area extends over both zones 20, 22. In the situation with four radio devices 6 shown in
The security gate 14 separates the restricted-access zone 20 from the public zone 20. Depending on the building and its requirements, the security gate 14 may be a physical barrier, e.g. a door, a revolving or sliding door, a barrier or a turnstile, or be configured without such a physical barrier. The access control system 1 uses the security gate 14 to ensure that only authorized users 4 can enter the restricted-access zone 20, for example by blocking or releasing the physical barrier. In the case of security gates 14 without a physical barrier, the access control system 1 can, for example, control access by initiating a security measure when an unauthorized user 4 enters the restricted-access zone 20, e.g. an optical and/or acoustic alarm is triggered; alternatively or in addition, a notification of a security service can be initiated. Regardless of whether or not the security gate 14 is equipped with a physical barrier, an information device that may be present can also be activated in order to, for example, inform a user 4.
In
A characteristic radio pattern FP (also referred to as radio fingerprint FP) results from these radio signals for the position P of the user 4. In one embodiment, the radio fingerprint FP includes all received signal strength indicators RSSIi measured for position P; in
The person skilled in the art recognizes that the mentioned highest possible degree of diversity can be achieved in various ways. In communications engineering, diversity technology is used for redundant transmission of data via stochastically independent channels that are only prone to errors with a low probability at the same time. Various forms of diversity operating modes are known: with time diversity, the information in the user data is time-shifted several times and thus transmitted several times over the same radio channel in order to compensate for time-dependent fluctuations in the signal strength. In the case of spatial diversity, two or more transmit-receive paths are operated. This is mostly realized by spatially separated antennas that are operated in parallel. Depending on the method, the receiving device then selects, for example, from the strongest received signal. With frequency diversity, the same signal is transmitted over two or more different carrier frequencies at the same time. In the event of interference or a complete signal cancellation, it is to be expected that not all frequency ranges used will be affected.
In one embodiment of the technology described here, the radio communication between the wireless device 2 (or the reference wireless device 2a) and the radio devices 6 takes place in accordance with a standard for Bluetooth technology, e.g. Bluetooth Low Energy (BLE) (hereinafter referred to as BLE technology); the wireless device 2 (2a) and the radio devices 6 are equipped with corresponding devices for this purpose. As an alternative to BLE technology, other known radio technologies can be used, e.g. a WLAN/WiFi technology. The wireless device 2 sends, for example, an attention notice referred to as an advertising event as a radio signal. All radio devices 6 located within radio range receive this radio signal, and each of these radio devices 6 can determine the signal strength of the radio signal it receives, from which the received signal strength indicator RSSIi results. The person skilled in the art recognizes that this process can also take place in reverse, i.e. each radio device 6 sends an advertising event as a radio signal and the wireless device 2 uses this to determine the signal strengths or the received signal strength indicators RSSIi (further explanations are given below).
In one embodiment of the BLE technology (Bluetooth 5.0), three main radio channels are used, each of which has a relatively small bandwidth and is separated from one another by a relatively large frequency spacing; further details on the BLE technology, in particular on the communication protocol, are known to the person skilled in the art, so that explanations on this do not appear to be necessary at this point. In one embodiment, diversity can be implemented by averaging measurements of the received signal strength indicators RSSIi which follow one another in time. These are normally independent of time, as they are transmitted over different radio channels and thus over different frequencies.
A person skilled in the art recognizes that the received signal strength indicators RSSIi can be measured by the wireless device 2 (or the reference wireless device 2a) and/or by the radio devices 6 or the signal processing device 8. For example, in a first case, the radio devices 6 can continuously send advertising event packets. The wireless device 2 receives these packets and can determine all received signal strength indicators RSSIi associated therewith. The measured values are now available on the wireless device 2. A software application (also referred to as an “app”) can now determine the position of the wireless device 2 according to the technology described here and, if necessary, also use sensor values (IMU data) generated by a sensor module (IMU, Inertial Measurement Unit) of the wireless device 2, since these are also present on the wireless device 2. The access control system 1 is then informed of the determined position by the wireless device 2.
In the opposite (second) case, the wireless device 2 continuously sends out advertising event packets. The radio devices 6 receive these packets and can determine all received signal strength indicators RSSIi associated therewith. The measured values are now available in the radio devices 6 and can be stored in the memory device 18 provided with a time stamp. The signal processing device 8 processes this data in accordance with the technology described here in order to determine the position of the wireless device 2. IMU data can be transmitted from the wireless device 2 to the signal processing device 8 and used in determining the position. The following describes the technology based on the second case.
The technology described here is based on a concept that describes a loss of signal strength during transmission over a transmission channel. The transmission channel comprises the signal path from the wireless device 2 (including its antenna) over the air to one of the radio devices 6 (including its antenna), which can also contribute to the losses. Antenna losses and multipath propagation are considered random variables in the technology described here. It can be seen from
In this case:
A momentary radio situation prevails in the monitoring area at a given point in time (here only the radio signals (Bluetooth technology) between the wireless device 2 and the radio devices 6 are considered, but not any other radio signals present in the building). Because each wireless device 2 also sends out at least one individual identifier with a radio signal, wireless devices 2 can be differentiated; this allows conclusions to be drawn about the number of active wireless devices 2 present in the monitoring area. The identifier can be a telephone number, an International Mobile Subscriber Identity (IMSI), a device ID (International Mobile Station Equipment Identity (IMEI)), a device address (Media Access Control (MAC) Address) or another type of unambiguous identification of a wireless device 2. The extent of radio shadowing by the users 4 present and the channel utilization can be estimated from the number of wireless devices 2. In addition, it may be possible to recognize, e.g. depending on the number of users 4, whether the user 4 in
The number of wireless devices 2 represents a situation indicator, as does the type of wireless device 2. Further situation indicators are an entry point of the user 4 into the monitoring area (e.g. the mentioned prominent place), sensor data generated by a wireless device 2, a user ID, a time, a number of radio devices 6, a (computer) computing power available in the access control system 1, a density of the radio devices 6 and a room size. From the evaluation of the radio communication in the monitoring area, at least one of these situation indicators can be determined, which indicates the radio situation in the monitoring area. The person skilled in the art recognizes that several of these situation indicators can be detected in order to display the radio situation, and that not all of the mentioned situation indicators can be determined in the access control system 1 at a certain time or for a certain wireless device 2.
According to the technology described here, the situation indicator is used to select a calibration mode that is appropriate to the situation and through which the channel model is adapted. Three different calibration modes, each with several possible calibration algorithms, are described below:
The parameters of the channel model mentioned, in particular the average received power (PR,d
First, reference is made to the calibration mode that is independent of the wireless device, also referred to below as self-calibration. The loss coefficients αi, which describe path losses, are determined on the basis of measurements between the radio devices 6 and knowledge of the locations of the radio devices 6. In a calibration phase, each radio device 6 is used as an individual transmitter, while the remaining radio devices 6 are receivers. If a first radio device 6 radio transmits test signals to all other radio devices 6, the received signal strength indicators RSSIi determined by them are stored. The first radio device 6 that was previously transmitting then changes to a receiver mode and the next radio device 6 begins to transmit. This process is repeated until all radio devices 6 have sent radio test signals once. Based on the knowledge of all the locations of the radio devices 6 and thus also the distances between the radio devices 6, the received signal strength indicators RSSIi can be used to determine the corresponding loss coefficients αi for all radio devices 6. One advantage of self-calibration is that it can be automated without great effort and repeated if necessary, e.g. with changes in the environment. It can be used, for example, when the wireless device 2 is located in the vicinity of the radio devices 6 due to the building situation (e. g. a building door leads directly into the monitoring area) if its position is to be determined; this can, for example, be detected by the said radio fingerprinting in order to select the mode of self-calibration.
The automated real-time calibration mode has the advantage that it requires little or no prior knowledge and thus reduces the installation effort. In one embodiment, the automated real-time calibration mode manages without a special calibration phase. The position of the wireless device 2 is determined without any prior knowledge other than the locations of the radio devices 6. Instead of estimating the parameters of the channel model used for the position determination in a previous calibration phase, these parameters are viewed as interference parameters and are determined in real time together with the position of the wireless device 2. This approach eliminates the need for calibration, since the corresponding optimization does not depend on the reference RSSI values or the loss coefficients αi. As a result, the algorithm can adapt to new propagation environments or to an antenna pattern of the wireless device 2. In one embodiment, the accuracy can be improved if only the loss coefficients αi are considered as interference parameters, but the mean received signal strength indicator M (RSSId
In another embodiment, the real-time automated calibration mode is iterative; it is based on the assumption that the first position of the user 4 is known. As stated above, this can be the case if the user 4 comes directly into the monitoring area through a landing door or elevator door and moves on from this initial position. By means of a single determination of the received signal strength indicator RSSIi for each radio device 6, the loss coefficient αi can be determined for each radio device 6. The loss coefficients αi determined in this way are then used to determine the (new) position of the user 4. This new position determination is then used to determine new loss coefficients α, for each radio device 6 on the basis of two received signal strength indicators RSSIi This process is then continued iteratively for the entire path.
In a further embodiment of the automated real-time calibration mode, the (old) data obtained through this iterative procedure can be used in an extension in order to initially achieve a certain minimum stability of the position determination. This algorithm is based on earlier but outdated information on the loss coefficients α. While these lead to inaccurate position determinations, their accuracy is often superior to the initial positions determined by means of the iterative approach at the beginning of a run. For example, the first 10-30 measurements, in particular the first 20-25 measurements, can be used. This number of measurements is sufficient to obtain preliminary and stable positions for a correct estimation of the loss coefficients α.
In one embodiment of the access control system 1, a calibration phase is provided which, for example, is carried out when the access control system 1 is put into operation on site. In this calibration phase, a reference constant (mean value M(RSSId0)) and several loss coefficients αi can be determined. As an alternative to calibration during commissioning on site, the calibration, in particular with regard to the reference constant M (RSSId0), can be carried out centrally if the radio devices 6 are structurally identical and have substantially identical radio properties, for example at the manufacturer or supplier of the access control system 1. If necessary, the calibration phase can be repeated after commissioning.
The calibration mode based on the reference wireless device 2a is explained below. In this case, the reference wireless device 2a is guided in the calibration phase along an established path (and thus known position information) and received signal strength indicators RSSIi are measured and stored together with the known position information. It is not necessary that the exact distance is known, it is sufficient that it is roughly established, with a beginning, an end, and a constant speed between the beginning and the end. In one embodiment, this approach is expanded in that the path is divided into individual path segments (k) in order to determine different loss coefficients αi for the path loss for each radio device 6 and each path segment (k). For a user 4 whose position is to be determined, the algorithm selects the path segment (k) in which the user 4 could be (determined by means of radio fingerprinting), and consequently assigns to each radio device 6 the corresponding loss coefficient αi for this path segment (k). Further explanations are given in connection with
The user 4 is located, as shown by way of example in
The user 4 moves, for example, along the path 26 from the public zone 22 in the direction of the restricted-access zone 20. It is assumed here that the wireless device 2 is already within radio range of the radio devices 6 (RF1-RF4). The method begins with a step T1 and ends with a step T6.
In a step T2, radio communication in the monitoring area is evaluated by the signal processing device 8. For the technology described here, this radio communication represents the entirety of the radio signals transmitted and considered in the monitoring area (Bluetooth technology). These include, for example, radio signals that transmit the aforementioned advertising events and radio signals that respond to them. The signal processing device 8 determines from this, for example, the identifiers of the wireless devices 2 present.
The signal processing device 8 also detects the signal strength with which the radio signals are received by the radio devices 6 and/or the wireless devices 2 present. In one embodiment, a received signal strength indicator RSSIi based on a radio communication with a wireless device 2 is detected by the signal processing device 8 for each radio device 6.
In a step T3, the signal processing device 8 determines at least one situation indicator which indicates a radio situation prevailing in the monitoring area. The situation indicator is determined based on the evaluation carried out in step T2. Exemplary situation indicators are mentioned above.
In a step T4, at least one calibration mode assigned to the situation indicator is selected. For this purpose, at least one rule is defined in the access control system 1, in particular in a computer program and/or a processor of the signal processing device 8. Those skilled in the art will recognize that several rules can be established. Examples of such a rule are given below:
Those skilled in the art will recognize that other and/or additional rules can be established.
If the calibration mode is selected, the signal processing device 8 reads the processing instructions assigned to this calibration mode from the data storage device 18.
In a step T5, the position P′ of the first wireless device 2 is determined in accordance with the processing instructions that have been read. The position is determined according to an embodiment as described in connection with
A reference distance do is established in a step S2. The reference distance d0 is the distance between the reference wireless device 2a and a selected radio device 6 (in
If the reference wireless device 2a and the selected radio device 6 are switched on so that they are in radio communication according to the BLE technology, a large number of received signal strength indicators RSSId0 are determined in a step S3. In one embodiment, each received signal strength indicator RSSId0 is measured in relation to the radio signal arriving at the radio device 6. With the reference distance do unchanged, the reference wireless device 2a is rotated or moved around the selected radio device 6. An antenna of the reference wireless device 2a thus assumes different antenna orientations in relation to the selected radio device 6 (angular diversity). In addition, this results in a high (spatial) diversity. After each change in the antenna alignment, at least one received signal strength indicator RSSId0 is determined and stored in the memory device 18. The number of measurements and the number of antenna alignments changed can be specified in a calibration specification.
If the specified measurements have been carried out in step S3, the mean value of the received signal strength indicators measured and stored in step S3 is determined in step S4 RSSId
In this calibration method, a large number of measurements of the received signal strength (RSSI measurements) are carried out while the reference wireless device 2a is moved along an established path in the building. For this purpose, the path for the given situation in the building is established in a step A2. For the calibration, for example, the path 26 shown in
In a step A3, the path 26 is divided into a number (Nk) of path segments. The person skilled in the art recognizes that this is a division intended for calibration. Depending on the path and the building situation, the path segments can be the same or different lengths. After this division, the path 26 has a first path segment (k=1), a second path segment (k=2), generally a k-th path segment. In the following, the index k indicates for which of these path segments an RSSI measured value was determined.
The switched-on reference wireless device 2a is initially located at the beginning of the path 26 and is moved from there at a constant speed along the path 26. If the reference wireless device 2a is in one of the path segments (index k), the received signal strength indicator RSSIi,k is determined in a step A4 for each radio device 6 (index i) and stored, namely as often (index j, number of measurements per path segment) until the reference wireless device 2a reaches the end of the current path segment. At the end of the current path segment, the reference wireless device 2a sends a segment signal according to an embodiment. The signaling of the end of a path segment ensures that the RSSI measured values can be correctly assigned, processed and saved. If, for example, for each radio device 6 (index i) and within a path segment (index k) the received signal strength indicator is determined Nj,k times (index j), the result is the set of measured values to {RSSIi,k,j}, which is stored in the memory device 18. If the end of the path 26 has not yet been reached, the next path segment follows, and the measurement process described is repeated.
In a step A5, an average of the RSSIi,k measured values is formed over all measurements (index j) of a respective path segment (index k) for each individual radio device 6 (index i). This mean value is referred to below as M(RSSIi,k). Its determination is based on:
where j=1, . . . , Nj,k denotes the j-th measurement in the corresponding k-th path segment for the i-th radio device 6.
In a step A6, a loss coefficient αi, k is determined for each radio device 6 and each path segment using the mean values M (RSSIi, k) determined in step A5. The determination is made according to:
where j=1, . . . , Nj, k denotes the j-th measurement in the corresponding k-th path segment for the i-th radio device 6. With known locations of the radio devices 6, this results in the distance di,k,j to the wireless device 2a for each radio device 6 (for the tuple (i,k,j).
In a step A7, an empirical covariance matrix Σ′w is determined over the entire path 26. The values of σi2 the main diagonals of this matrix are saved. These diagonal elements are a measure of the different model error variance of the individual radio devices 6. The covariance matrix Σ′w refers to the remaining model error εk,j:
In a step A8, the mean values M(RSSIi,k), the loss coefficients αi,k and the covariance matrix Σ′w are saved. They are then available for a position determination in the application phase. The reference wireless device 2a and the selected radio device 6 can then be deactivated and the method ends in step S6.
In one embodiment of the technology described here, the information obtained and stored in the calibration phase is used in the application phase in order to determine a current position P′ of the user 4. Since the user 4 moves in the building, his movement can be followed if the position determination is repeated at successive time intervals. The positions P′ determined in this way result in the named trajectory (position path). The time intervals can be selected as required.
If the wireless device 2 communicates with one of the radio devices 6, the wireless device 2 also transmits a specific identifier. In
In a step B2, a received signal strength indicator RSSIi is determined for each of the radio devices 6. In the embodiment described here, the received signal strength indicators RSSIi are determined by the radio devices 6, wherein the determination is carried out synchronously, i.e. the radio devices 6 have a common time reference (e.g. identical clocks that allow the received signal strength indicators RSSIi to be determined simultaneously). The wireless device 2 is located at a current position, so that for the current position, for example, four received signal strength indicators RSSIi (i=1, 2, 3, 4) are present. With each subsequent measurement, four received signal strength indicators RSSI are measured again. The received signal strength indicators RSSIi are stored in one embodiment in the memory device 18, for example, per measurement a group of four received signal strength indicators RSSIi.
A current radio pattern (FP in
In a step B4, a path segment (k) is determined, specifically the path segment (k) in which the user 4 is currently located. For this purpose, the current radio fingerprint determined in step B3 is used to search the memory device 18 for the same or at least a very similar radio fingerprint. As explained in connection with steps A4 and A5 of
In a step B5, the loss coefficients αi,k are read which are assigned to the path segment (k) determined in step B4. The loss coefficients αi,k are stored in the memory device 18, as set out in conjunction with step A8 of
In a step B6, a weighting factor wi is determined. The weighting factor w specifies what influence the measurement of a received signal strength indicator RSSIi relative to an i-th radio device 6 has on the position determination. In one embodiment, only the strongest radio signals, i.e., those having the highest received signal strength indicators RSSIi, are taken into account. For example, the three (or four) highest received signal strength indicators RSSIi can be selected; i.e., for these three (or four) radio signals the weighting factor is wi wi=1 in each case, wi=0 for the remaining radio signals. In general, the weighting factor wi can be determined by the following equation:
In a step B7, the current position P′ is determined by the user. The current position P′ is a vector and indicates the x-y position coordinates at a specific point in time. The instantaneous position P′ determined in this way can be the same as the actual position P of the user 4, but it can also deviate therefrom to a certain extent, especially under real conditions in the building. The determination is made according to the following equation:
wherein:
The corresponding distance calculated from the measured values d′i results in:
where RSSIi is a current measured value at the i-th radio device 6.
The position P′ corresponds to a snapshot while the user 4 is moving along the path 26. The person skilled in the art will recognize that from the repeated determination of positions P′ the movement of the user 4 can be tracked. This can be shown graphically, for example, as shown in box 40 in
In one embodiment, the position determined in step B7 P′ can be further processed. This further processing can include temporal filtering, as shown in box 34 of
According to one embodiment, time filtering can be carried out because a large number of successive position determinations are carried out. Accordingly, a large number of positions P′ are determined, including outliers, i.e. positions that deviate too much from neighboring values can be located. The influence of these outliers can be reduced by filtering them over time. In one embodiment, a mean value is determined over five specific positions P′.
In one embodiment, a Kalman filter, in particular a so-called extended Kalman filter (EKF), can be used. Kalman Filters and Advanced Kalman Filters are known to those skilled in the art, e.g. from I. Guvenc, et al., “Enhancements to RSS Based Indoor Tracking Systems Using Kalman Filters”, International Signal Processing Conference (ESPC) and Global Signal Processing Expo (GPSx), 2003. A Kalman filter is generally used to reduce errors in real measured values and to provide estimates for non-measurable system variables. The prerequisite for this is that the values of interest can be described by a mathematical model, for example in the form of equations of motion. Kalman filters work with alternating prediction and measurement steps, which require a state space vector x, a vector state update function f and an observation space vector z or a vector measurement function h.
The state of a system is often understood to be the smallest set of determinants that fully describes the system. This is represented as part of the modeling in the form of a multi-dimensional vector x with the corresponding equation of motion f, the so-called equation of state. This vector function fm describes the expected transitions between temporally successive states (xm-1 and xm) at each point in time m, assumed according to the motion model. The process of observations zm of the true system status reflects the properties of the observer or the measuring apparatus. These are linked with the system states expected according to the equation of motion via the so-called observation equation hm. The corresponding modeling of the status and observation processes is given below.
The state space vectors xm-1, xm should be determined as precisely as possible. At a given point in time (m), these contain the successive positions P of the user 4, his absolute speed (∥v∥) and his orientation (θ). If these are estimated, it is predicted how this state space vector could look in the next time step (e.g. from time m−1 to time m) (predicted state space vector xmpred). The vector function ƒm (xm-1) is used. In one embodiment, the vector function ƒm is selected in each time step in such a way that it can be assumed that the user 4 is moving at a constant speed and with the same orientation.
In a next step, the predicted state space vector xmpred, which so far has only been based on the last state and the transition function, can be improved by using current measurements. Two different embodiments can be used for this (the two embodiments differ in the vectorial measurement functions hm and the corresponding observation space vectors or measurement vectors zm).
In the first embodiment (tri), the position determinations (positions P′) from the previous position determination method are used as a measurement. The predicted state space vector xmpred is corrected with these position determinations. Hence it follows:
In the second embodiment, via the vectorial measuring function hm,dir ((which the channel model is based on), it is calculated which RSSI values can be expected if the user 4 is really in a state defined by one of the predicted state space vectors xmpred. These expected RSSI values are then corrected directly (“dir” in the following equations) with the measured RSSI values. Hence it follows:
In one embodiment, the method takes sensor values into account when determining the position. In this embodiment, the wireless device 2 contains an inertial measurement unit (IMU). If the wireless device 2 is configured as a so-called smartphone, it usually contains an IMU measuring unit. The IMU measuring unit is a spatial combination of several inertial sensors, e.g. B. acceleration sensors, magnetometers, pedometers and yaw rate sensors. In the case of a smartphone, the IMU measuring unit detects e.g. its inclination, position and/or rotation. This is known, for example, by a compass function of the smartphone or a function that rotates the screen display, depending on how the smartphone is held by the user 4.
With the IMU measuring unit, the wireless device 2 determines, for example, the direction of movement of the user 4 and the acceleration that it experiences when the user 4 walks along the path 26. The steps of the user 4 can be counted from the acceleration values. In one embodiment, the known dead reckoning method is used to determine the speed of movement of the user 4 from the direction of movement and the steps counted. The dead reckoning allows the current approximate location of a moving object based on the direction of movement and speed. In one embodiment (wireless device 2 sends the advertising event packets), the signal processing device 8 receives the measured values from the IMU measuring unit. After the measurement, the IMU data were transmitted to the signal processing device 8 together with the RSSI measurements.
By adding the movement speed of the user 4 and the IMU compass angle to the observation spaces and the measuring function of the filter, the sensor data are merged with the position and the received signal strength indicator RSSI. As a result, in particular the change in the movement of the user 4 over time can be better followed. If the user 4 changes, for example, the direction of movement, this can be recognized earlier so that, for example, the release of the security gate 14 can be omitted.
In a step B9 it is checked whether a rule defined in the access control system 1 is satisfied. To check the rule, the identifier determined in step B10 is used to check whether a user profile exists for user 4. If there is a user profile, the user 4 is known in the access control system 1 and it can be checked whether he is authorized to access at this point in time. If, on the other hand, the identifier is not stored in the access control system 1, there is no access authorization for the user 4.
As a rule, it can be specified, for example, that the security gate 14 is to be released when the user 4 is authorized to access. If it is a barrier-free security gate, the rule can state that no measures (e.g. alarm) need to be taken. If, on the other hand, the user 4 is not authorized to access, the rule can stipulate that the security gate 14 remains blocked and/or a security measure is to be initiated (e.g. notification of security personnel). Depending on the building, the rule can also stipulate that a building action specified in his user profile is to be carried out for the (access-authorized) user 4. The building action may, for example, involve triggering a destination call for user 4 (according to the data of the user profile existing for this user 4), assigning an elevator 10 to this destination call and displaying the assigned elevator to the user 4 at the security gate 14 or the wireless device 2. In a step B1i, the building action is carried out. The person skilled in the art will recognize that several building actions can also be carried out in combination, e.g. unlocking the security gate 14 and triggering an elevator call. The method ends in step B12.
In one embodiment, a plausibility check can be provided in the method. Such a check is intended to identify whether a position that has been determined can be plausible at all, i.e., any obvious inaccuracy that may be present is to be recognized. An obvious inaccuracy can consist, for example, in the fact that the determined position is outside the monitoring area or that two users are in the same position and are therefore supposedly standing on top of each other. In response to this, the position determined can be viewed as an outlier and rejected.
In the first branch of the method (steps C4-C8), the calibration mode is selected in step C3. The selection is made analogously to the selection disclosed in step T4 of
If the automated real-time calibration mode is selected, the received signal strength indicators RSSIi determined in step C2 in relation to the user 4 are stored in a step C4. The storage takes place, for example, in the storage device 18.
In a step C5, all of the received signal strength indicators RSSIi stored in step C4 for the user 4 are combined to form a signal strength vector.
In a step C6, the mean value of the reference received signal strength indicators M(RSSId
In a step C8, the position of the user 4 is determined. With the indicators for the received signal field strengths RSSIi determined in steps C2 and C4-C6, the mean value of the reference received signal strength indicators M(RSSId
With the position of the user 4 determined in this way, the method can carry out the further steps C9, C16, and C17. The method ends in step C18.
In one embodiment, the signal processing device 8 is configured to use the technology described herein in conjunction with one or more machine learning algorithms, with the aim of determining the accuracy of the position determination or position tracking. A computer program installed in the signal processing device 8 is programmed to execute the corresponding algorithm or algorithms. Machine learning algorithms typically consist of a training phase and a deployment phase. When executing during the deployment phase, the computer program accesses one or more data records stored in the storage device 18 which were created in the training phase. Such a data record contains data on position determinations that have already taken place (e.g., situation indicators, received signal strength indicators RSSIi), for example also whether a position determination or position tracking was successful. Whether a position tracking was successful can be verified afterwards, for example, if the user 4 who came in through a door A actually walks through a door B. In the application phase, currently determined data (radio situation, current received signal strength indicators RSSIi) in conjunction with the data determined in the training phase are analyzed by the computer program in order to determine a function that maps the current position or its trajectory based on the currently determined data.
The wireless device 2 can have e.g. an application-specific software application (also referred to as an app) that can be activated by the user 4, for example. The application-specific software application is used in one embodiment in connection with the access control and with the use of elevators. In one embodiment, the application-specific software controls the generation and transmission of the radio signal. Depending on the configuration, this software can also generate the identifier of the wireless device 2, for example an identifier that is unique to the wireless device 2 and cannot be changed over time. Such an identifier generated by software is an alternative to a device identification number and a telephone number, which can also be used as an identifier.
The wireless device 2 may be, for example, a cell phone, a smartphone, a tablet PC or a smartwatch, wherein these devices usually are equipped with hardware that allows radio communication. However, the wireless device 2 may also be eyeglasses with a miniature computer or another body-worn, computer-aided device (also referred to as a “wearable device”), in particular a smartwatch. Depending on the design of the wireless device 2, it can have, for example, a graphical user interface (GUI) in order to be able to selectively activate and deactivate the wireless device 2 and its functions.
In summary, one aspect of the technology described herein relates to a system for controlling access to a restricted-access zone in a building, and another aspect relates to a method for controlling access to a restricted-access zone in a building. Further aspects of the technology described herein relate to a system and method for determining a position or a time profile of the position of a user, such as described in conjunction with
Number | Date | Country | Kind |
---|---|---|---|
19171358.5 | Apr 2019 | EP | regional |
Filing Document | Filing Date | Country | Kind |
---|---|---|---|
PCT/EP2020/061410 | 4/24/2020 | WO |