This application is the U.S. National Phase under 35 U.S.C. § 371 of International Application PCT/EP2021/060593, filed Apr. 22, 2021, which claims priority to CH Application No. 00501/20, filed Apr. 29, 2020, the entire contents of each of which are incorporated by reference herein and made a part of this specification.
The present application claims the priority of Swiss Patent Application CH 00501/20.
The present invention relates to a security control module, a security control system and methods for operating thereof. Specifically, the present invention relates to a security control module, comprising an ultra-wideband transceiver and a processing unit. Furthermore, the present invention relates to a computer program product comprising computer-executable instructions which, when executed by a processing unit of a security control module or a security control system, causes the security control module respectively system to carry out the method for access control. The present invention relates to a security control system comprising a plurality of security control modules and a mobile device configured to establish a transmission with the security control modules.
Keyless entry systems have become widely used in applications ranging from vehicle entry systems and vehicle access control systems to building access control. For close-range applications, a radio-frequency identification (RFID) transponder (or tag) is often used, which has mostly replaced earlier magnetic stripe cards. Other current solutions use infra-red systems or radio systems to transmit an authenticating signal from a user device to a vehicle security system or to a building access device. The authentication can be initiated either by the user, for instance by pressing a button on the user device, or from the access device itself which periodically transmits request signals and awaits a response message.
As the communicating range between a user device and an access device increases, the convenience and ease-of-use increases, because the user device does not need to be placed in very close range, such as less than one centimeter. However, as the range increases, potential new security issues also arise. In certain entry systems it is very important that the system can determine not only the proximity of a user but also its relative location with respect to an entry/exit direction. Several use cases exist where an entry system is configured/configurable as a one-way system, wherein a user is granted access/passage only from an entry side towards and exit side of a controlled gate while access/passage is denied and/or restricted in the opposite direction, i.e. from the exit side towards the entry side. For example, boarding/check-in and passport control gates need to be configured such that access/passage is granted only in a predefined direction and is denied/restricted in the opposite direction.
Close-proximity keyless systems, (i.e. between direct contact and a threshold of 1-2 centimeters), for example RFID based systems, allow determination of a user's position with respect to an entry respectively exit side of a gate by appropriate placement of a reader device on the respective side of the gate. However, as their name implies close-proximity keyless systems suffer from the disadvantage that they require a very close proximity to the reader. This is disadvantageous since users are required to identify the location of the reader device which might be time consuming and often requires multiple user attempts.
In order to overcome the above disadvantages, mid-range keyless entry systems have been proposed, in particular based on ultra-wideband UWB communication. Ultra-wideband UWB systems are advantageous since they allow reliable mid-range communication without a user having to precisely identify the reader device. Also, Ultra-wideband UWB systems are advantageous since they allow precise measurement of a distance between a reader device and a mobile device.
However, presently known mid-range keyless entry systems only allow determination of an absolute distance of a user's mobile device, not his relative location with respect to a second section (entry side) respectively a first section (exit side) of an access controlled area (e.g. by means of an access gate). This poses a security risk in certain use cases, in particular security control systems, requiring a one-way entry system, since entry/passage may be inadvertently granted to a user in the opposite direction. Also, entry/passage may be inadvertently granted to an unauthorized user situated at a second section (entry side of a gate), closely following an authorized user situated on the first section (exit side of the same gate) of the access controlled area.
It is an object of this invention to provide a security control module, a security control system and a method for operating a security control module within a secure control area that overcomes one or more of the disadvantages of known security control modules, security control systems and of known methods for access control of security control modules/systems, in particular the security risks associated with one-way security control modules/systems.
In particular, it is an object of the present invention to provide a security control module and a corresponding method for operating a security control module, ensuring that the relative location of a user carrying a mobile device is determined with respect to the security control module.
According to the present invention, the above-mentioned objects are addressed through the features of the independent claims. In addition, further advantageous embodiments follow from the dependent claims and the description.
According to the present invention, the above-mentioned objects are particularly addressed by a security control module for controlling access through a passageway of a secure control area, the security control module comprising: an ultra-wideband transceiver configured to establish an ultra-wideband transmission with an ultra-wideband communication module of a mobile device and a processing unit configured to determine a first distance between the security control module and the mobile device by processing signal properties of the ultra-wideband transmission. Ultra-wideband is a communications technology which uses radio waves for short-range, high-bandwidth communications over a large portion of the radio spectrum. Information is transmitted by generating radio wave pulses at specific time intervals, as opposed to conventional radio systems which transmit information by varying a power level of the radio transmission, or modulating a frequency and/or phase of the transmission. Information can also be modulated on ultra-wideband signals by varying an amplitude, encoding a polarity, or using orthogonal pulses.
The security control module is configured to receive a second distance from a further security control module arranged at a spacing distance apart from the security control module, the second distance being indicative of a distance between the further security control module and the mobile device. The security control module is further configured to transmit the first distance to the further security control module. As such, the security control module and the further security control module are set up to collaboratively exchange the first distance D1 and second distance D2. The processing unit of the security control module is configured to determine the relative position of the mobile device with respect to the security control module based on the first distance and the second distance.
Determining the distance between the security control modules and the mobile device by processing signal properties of ultra-wideband UWB transmissions is particularly advantageous since it allows a reliable and precise determination of the distances.
The security control module is envisaged to be an integral part of or an add-on to any installation that defines a passageway between sections of a secure control area for the passage of persons. According to further embodiments, the security control system is arranged within the secure control area such as to define a passageway between the first section and the second section of the plurality of sections of the secure control area.
According to embodiment(s) disclosed herein, the security control module is configured to transmit the first distance to the further security control module and to receive the second distance from the further security control module via an ultra-wideband transmission between the ultra-wideband transceiver and an ultra-wideband transceiver of the further security control module.
According to embodiment(s) disclosed herein the security control module is further configured to deny, disregard and/or block authentication requests from the mobile device if the mobile device has been determined to be positioned at distance greater than a threshold distance from the security control module.
According to embodiment(s) disclosed herein, the ultra-wideband transceiver is configured to determine the first distance by processing signal properties of the ultra-wideband transmission including one or more of: a propagation time; an amplitude variation; and/or a phase difference.
Determining a distance based on the propagation time of an ultra-wideband transmission comprises measuring the time required for a signal to travel from the ultra-wideband transceiver to the ultra-wideband communication module of the mobile device; and/or the time required for a signal to travel from the mobile device to the ultra-wideband transceiver. In a particular embodiment, a time difference is used as a basis for determining the distance, as it is more secure against spoofing attacks, wherein a third party may use a radio relay device to gain unauthorized access to a location or system in a so-called “relay-attack”. Depending on the embodiment, the time difference is a “one-way time-of-flight” time difference between the ultra-wideband transceiver sending the request value and the mobile device receiving the request value, or a “round-trip time-of-flight” time difference, in which a second transmission takes place from the mobile device to the ultra-wideband transceiver either prior to, or after, the first transmission of the request value. In the “one-way time-of-flight” scenario, the ultra-wide-band transceiver and the mobile device need to be provided with tightly synchronized clocks for accurately determining the distance. In the latter case of a “round-trip time-of-flight” calculation, there is stored, either in the mobile device or the ultra-wideband transceiver, an accurate representation of the processing time, i.e. the time it takes between the reception of an ultra-wideband transmission and the sending of a response ultra-wideband transmission, which processing time allows for accurately determining the distance. Measurement of a time required for the signal to travel from the ultra-wideband transceiver to the mobile device and back “round-trip time-of-flight” is advantageous as it does not require the precise synchronization of clock signals of the ultra-wideband transceiver and the mobile device.
Determining a distance based on amplitude difference, comprises determining the difference in signal amplitude between the signal transmitted by the ultra-wideband transceiver and the signal received by the mobile device (or vice-versa). By taking into consideration the attenuation of the signal, the distance between the ultra-wideband transceiver and the mobile device is calculated.
Determining a distance based on phase difference comprises detecting the difference in signal phase between the signal transmitted by the ultra-wideband transceiver and the signal received by the mobile device. By taking into consideration the change in signal phase, the distance between the ultra-wideband transceiver and the mobile device is determined. It is to be understood that for the amplitude difference and phase difference, alternatively, the signal may also be transmitted by the mobile device and received by the ultra-wideband transceiver.
The above-identified objectives are further addressed by a security control system for controlling access through a passageway of a secure control area comprising a plurality of security control modules. A security control module and a further security control module of the plurality of security control modules is located in a first section and a second section of the secure control area, respectively, the passageway connecting said first section and said second section. The processing units of the security control module and/or the further security control module are configured to determine the relative position of the mobile device further with respect to the first section and said second section of the secure control area.
The modular security control system of the present invention is particularly advantageous since it is easily deployable and extendible by additional security control module(s). The security control modules build a sort of mesh network, wherein each module performs its distance measurements by itself. After the modules exchange distance data, each module can independently determine whether it is responsible for further interaction (e.g. access control) with the mobile device, a particular module being responsible e.g. if it is the nearest or at least in the same section as the mobile device.
According to embodiments disclosed herein, the relative position (of the mobile device with respect to a first section respectively a second section of the plurality of sections of the secure control area) comprises an indication whether the mobile device is located in the first section or the second section of secure control area. Additionally, or alternatively, the relative position (of the mobile device with respect to a first section respectively a second section of the plurality of sections of the secure control area) comprises an indication whether the corresponding security control module is the closest to the mobile device (of the plurality of security control modules which exchanged distance data).
According to embodiment(s) disclosed herein, the spacing distance between any pair of the plurality of security control modules of the security control system is greater than or equal to the sum of the measurement precision of the ultra-wideband transceivers of said plurality of security control modules.
While the measurement precision using ultra-wideband technology is on the order of few centimetres, the spacing distance between the ultra-wideband transceiver and the second ultra-wideband may be up to a meter or more.
According to embodiment(s) disclosed herein, the ultra-wideband transceivers of the security control module and the further security control module of the plurality of security control modules are aligned essentially orthogonal to a border delimiting the first section from the second section of the secure control area. The processing units of the security control module and/or the further security control module are configured to determine the relative position of the mobile device further based on location data comprising transceiver distances indicative of distances of the ultra-wideband transceivers from said border. Aligning the ultra-wideband transceiver and the ultra-wideband transceiver of the further security control module essentially orthogonal to a border delimiting the first section from the second section of the secure control area allows determination of the position of the mobile device with respect to the first section or second section by triangulation, using only two ultra-wideband transceivers, as it will be described with reference to
According to embodiment(s) disclosed herein, the security control module and/or the further security control module of the plurality of security control modules are further configured to execute an access control process for the mobile device if the mobile device has been determined to be positioned in said first section or said second section of the secure control area, respectively.
According to embodiment(s) disclosed herein, a third security control module of the plurality of security control modules of the security control system is arranged in the proximity of a further passageway connecting said first section and said second section adjacent to the passageway. At least one of the processing units of the plurality of security control modules is configured to determine the relative position of the mobile device further with respect to each of the plurality of passageways, based on the first distance determined by the respective security control module and a plurality of distances received from the plurality of security control modules.
The above-identified objectives are further addressed by a computer implemented method for operating a security control module according to one of the embodiments disclosed herein, the method comprising: establishing an ultra-wideband transmission between an ultra-wideband transceiver of the security control module and an ultra-wideband communication module of a mobile device; determining—by a processing unit of the security control module—a first distance between the security control module and the mobile device by processing signal properties of the ultra-wideband transmission;
receiving a second distance from a further security control module arranged at a spacing distance apart from the security control module, the second distance being indicative of a distance between the further security control module and the mobile device; transmitting the first distance from the security control module to the further security control module; and determining—by the processing unit of the security control module—the relative position of the mobile device with respect to the security control module based on the first distance and the second distance.
According to embodiment(s) disclosed herein, the computer implemented method for operating a security control module further comprises the step of denying, disregarding and/or blocking authentication requests from the mobile device if the mobile device has been determined to be positioned at distance greater than a threshold distance from the security control module/system.
According to embodiment(s) disclosed herein, determining the first distance between the ultra-wideband transceiver and the mobile device comprises transmitting a request message to the ultra-wideband communication module of the mobile device and processing a response message received from the mobile device, referred to as gate initiated transmission. Gate initiated transmission is advantageous as the timing respectively the frequency of the interrogation (transmitting a request message to the mobile device) is solely in the control of the security control system.
Alternatively, or additionally, determining the first distance between the ultra-wideband transceiver and a mobile device comprises receiving and processing a broadcast signal from the mobile device, referred to as mobile device initiated transmission. Mobile device initiated transmission is advantageous since it allows the mobile device to control the timing/frequency of the broadcast signal(s) (to establish the first respectively second ultra-wideband transmission), allowing the mobile device to switch its respective radio communication module into a standby/low-power or off mode to thereby conserve energy.
The above-identified objectives are further addressed by a computer implemented method for operating a security control system according to one of the embodiments disclosed herein, the method comprising: establishing an ultra-wideband transmission between each ultra-wideband transceiver of the plurality of security control modules and an ultra-wideband communication module of a mobile device; determining—by the processing units of each security control module—a first distance between the security control modules and the mobile device by processing signal properties of the ultra-wideband transmissions; at least one security control module transmitting the first distance to the further security control modules; at least one security control module receiving a second distance from a further security control module arranged at a spacing distance apart, the second distance being indicative of a distance between the further security control modules and the mobile device; and determining—by at least one processing unit(s) of the security control module(s)—the relative position of the mobile device with respect to the security control modules and relative to the first section and said second section of the secure control area based on the first distance and the second distance.
According to embodiment(s) disclosed herein, the computer implemented method for operating a security control system further comprises the step of executing an access control process for the mobile device by the security control module and/or the further security control module of the plurality of security control modules if the mobile device has been determined to be positioned in said first section or said second section of the secure control area, respectively.
According to embodiment(s) disclosed herein, executing access control for the mobile device comprises: requesting authentication data from the mobile device; receiving authentication data from the mobile device; verifying said authentication data from the mobile device in order to determine whether the mobile device is authorized; and granting access for the mobile device if the mobile device is authorized, particularly comprising one or more of: opening a section separation panel(s); unlocking a door and/or allowing passage of a turnstile operatively connected to the security control system.
Authentication data, as used herein, comprises—but is not limited to—a user ID, a user name, a government- or institution-issued identification number and/or identity verification data such as a secure ID, a personal identification number PIN, an access key, and/or a password. According to embodiments disclosed herein, the authentication data is transmitted by the mobile device to the security control system in an encrypted format to prevent unauthorized access (eavesdropping) of said authentication data. In a subsequent step, the security control system receives authentication data from the mobile device. Alternatively, or additionally, the authentication data is confirmed by biometric data, such as a fingerprint, retinal scan and/or voice pattern.
According to embodiments disclosed herein, the authentication data is transmitted from the mobile device to the security control system in the same ultra-wideband frequency as the messages used for determining its distance and received by the ultra-wideband transceiver or ultra-wideband transceiver of the further security control module. Alternatively, or additionally the authentication data is transmitted from the mobile device to the security control system using a wireless communication module of the mobile device and a corresponding wireless communication module of the security control system, using an alternative communication technology (as compared to UWB) such as a Bluetooth (BT), Bluetooth Low Energy (BLE), a Wireless Local Area Network (WLAN), Zig Bee, Radio Frequency Identification (RFID), Z-Wave, and/or Near Field Communication (NFC).
Further disclosed herein is a computer program product comprising computer-executable instructions which, when executed by a processing unit of a security control module, causes the security control module to carry out the computer implemented method for operating a security control module according to one of the embodiments disclosed herein.
Further disclosed herein is a computer program product comprising computer-executable instructions which, when executed by a processing unit of a plurality of security control modules of a security control system, causes the security control system to carry out the computer implemented method for operating a security control system according to one of the embodiments disclosed herein.
The present invention will be explained in more detail, by way of example, with reference to the drawings in which:
As illustrated in the highly schematic perspective view of
Depending on the specific safety provisions, the first sidewall 2 and second sidewall 3 are waist, shoulder or even floor-to-ceiling high and provide appropriate structural stability/strength to contain a person(s). The passageway 4 is actually not necessarily a structural element of the security control system 1, rather a gap defined by the first sidewall 2 and second sidewall 3 of the security control system 1. Alternatively, the passageway 4 may comprise a floor and/or ceiling portion(s) (not shown) linking the first sidewall 2 and second sidewall 3.
According to further embodiments, the security control system 1 is provided as an add-on to existing access control systems (e.g. gates, doors) comprising their own sidewalls and/or section separation panels, the security control system 1 being configured to control section separation panel(s) 5 of existing access control system.
As will be described in more detail in the following paragraphs, the security control system 1 according to the present disclosure comprises means for surveillance of presence around the security control system 1, in particular within said passageway 4. According to further embodiments disclosed herein, the security control system 1 further comprises means for controlling passage of persons through said passageway 4. In an embodiment shown in
Means for surveillance of presence around the security control system—in particular within said passageway 4—comprise a security control module 10 and a further security control module 20. As shown in
In
As illustratively shown in
As illustrated in
According to particular embodiments, the relative position of the mobile device 100 with respect to a first section I respectively a second section O is further determined based on location data indicative of the absolute position of the security control module 10, respectively the further security control module 20 with respect to said first section I and second section O, the location data comprising a first transceiver distance a1 indicative of a distance of the security control module 10 from said border B and a second transceiver distance a2 indicative of a distance of the further security control module 20 from said border B. As illustrated in
As illustrated in
According to particular embodiments, the relative position of the mobile device 100 with respect to a first section I respectively a second section O is further determined based on location data indicative of the absolute position of the security control module 10, respectively the further security control module 20 with respect to said first section I and second section O, the location data comprising a first transceiver distance a1 indicative of a distance of the security control module 10 from said border B and a second transceiver distance a2 indicative of a distance of the further security control module 20 from said border B. As illustrated in
As illustrated in
According to further embodiments, the relative position of the mobile device 100 is determined further based on location data indicative of the absolute position of the security control module 10, the further security control module 20 as well as location data indicative of the absolute position of the adjacent security control module 10′ with respect to said first section I, second section O, the passageway 4 and with respect to the adjacent passageway 4′.
In a particular embodiment of the present invention, the location data indicative of the absolute position of the adjacent security control module 10′ comprises a first adjacent transceiver distance a1′ indicative of a distance of the adjacent security control module 10′ from said border B.
As illustrated in
In order to be able to not only determine the relative position of the mobile device 100 with respect to the first section I and O of the secure control area A, but also with respect to the plurality of passageways 4, 4′, the processing unit(s) 14, 14′, 24 needs to process the first adjacent distance D1′ from the adjacent security control module 10′ of the adjacent passageway 4′ (third circle in
Turning now to
In a step S10, a first distance D1 between the security control module 10 and a mobile device 100 is determined by the security control module 10. In a first substep S12 of step S10, the ultra-wideband transceiver 12 of the security control module 10 and an ultra-wideband communication module 102 of the mobile device 100 jointly establish a first ultra-wideband transmission. Thereafter, in a second substep S14 of step S10, signal properties of the first ultra-wideband transmission between the security control module 10 and the ultra-wideband communication module 102 of the mobile device 100 are processed by the processing unit 14 to thereby determine the first distance D1 between the security control module 10 and a mobile device 100.
In a step S20, a second distance D2 between the ultra-wideband transceiver 22 of the further security control module 20 and the mobile device 100 is determined by the ultra-wideband transceiver 22 of the further security control module 20. In a first substep S22 of step S20, the further security control module 20 and an ultra-wideband communication module 102 of the mobile device 100 jointly establish a second ultra-wideband transmission. Thereafter, in a second substep S24 of step S20, signal properties of the second ultra-wideband transmission between the further security control module 20 and the ultra-wideband communication module 102 of the mobile device 100 are processed to thereby determine the second distance D2 between the ultra-wideband transceiver 22 and the mobile device 100.
It shall be noted that, according to particular embodiments disclosed herein, the steps S10 and S20 are analogous or even identical steps performed by different security control modules 10, 20 of a plurality of security control modules 10, 20 of a security control system 1.
According to embodiments disclosed herein, the security control module 10 and/or the further security control module 20 are configured to determine the first distance D1 respectively the second distance D2 by processing signal properties of the ultra-wideband transmissions including one or more of: a propagation time; an amplitude variation; and/or a phase difference.
Determining the first distance D1 respectively second distance D2 based on the propagation time of the ultra-wideband transmissions comprising measuring the time required for a signal to travel from the ultra-wideband transceiver 12, 22 to the ultra-wideband communication module 102 of the mobile device 100; and/or the time required for a signal to travel from the ultra-wideband communication module 102 of the mobile device 100 to the ultra-wideband transceiver. In a particular embodiment, a time difference is used as a basis for determining the first distance D1 respectively second distance D2, as it is more secure against spoofing attacks, wherein a third party may use a radio relay device to gain unauthorized access to a location or system in a so-called “relay-attack”. Depending on the embodiment, the time difference is a “one-way time-of-flight” time difference between the ultra-wideband transceiver 12, 22 sending the request value and the mobile device 100 receiving the request value, or a “round-trip time-of-flight” time difference, in which a second transmission takes place from 102 of the mobile device 100 to the ultra-wideband transceiver 12, 22 either prior to, or after, the first transmission of the request value. In the “one-way time-of-flight” scenario, the ultra-wide-band transceiver 10, 12 and the ultra-wideband communication module 102 of the 100 need to be provided with tightly synchronized clocks for accurately determining the distance D1, D2. In the latter case of a “round-trip time-of-flight” calculation, there is stored, either in the mobile device 100 or the ultra-wideband transceiver 12, 22, an accurate representation of the processing time, i.e. the time it takes between the reception of an ultra-wideband transmission and the sending of a response ultra-wideband transmission, which processing time allows for accurately determining the distance D1, D2. Measurement of a time required for the signal to travel from the ultra-wideband transceiver 12, 22 to the ultra-wideband communication module 102 of the mobile device 100 and back “round-trip time-of-flight” is advantageous as it does not require the precise synchronization of clock signals of the ultra-wideband transceiver 12, 22 and the mobile device 100.
Determining the distance D1, D2 based on amplitude difference, comprises determining the difference in signal amplitude between the signal transmitted by the ultra-wideband transceiver 12, 22 and the signal received by the ultra-wideband communication module 102 of the mobile device 100 (or vice-versa). By taking into consideration the attenuation of the signal, the distance D1, D2 between the ultra-wideband transceiver 12, 22 and the mobile device 100 is calculated.
Determining a distance D1, D2 based on phase difference comprises detecting the difference in signal phase between the signal transmitted by the ultra-wideband transceiver 12, 22 and the signal received by the ultra-wideband communication module 102 of the mobile device 100. By taking into consideration the change in signal phase, the distance D1, D2 between the ultra-wideband transceiver 12, 22 and the ultra-wideband communication module 102 of the mobile device 100 is determined. It is to be understood that for the amplitude difference and phase difference, alternatively, the signal may also be transmitted by the ultra-wideband communication module 102 of the mobile device 100 and received by the ultra-wideband transceiver 12, 22.
In a subsequent step S30, the relative position of the mobile device 100 with respect to the security control module 10, 20 is determined by the processing unit(s) 14, 24, as described above in detail with reference to
According to embodiments disclosed herein, the relative position of the mobile device 100 with respect to the security control module 10 comprises (but is not limited to) an indication whether the mobile device 100 is within a defined proximity range of the security control module 10.
According to further embodiments, within step S30, the processing units 14, 24 determine the relative position of the mobile device 100 further with respect to the first section I and the second section O of the plurality of sections I, O of the secure control area A.
According to further embodiments, within step S30, location data indicative of the absolute position of the security control module 10, respectively the further security control module 20 with respect to said first section I and second section O is made available to the processing unit(s) 14, 24. According to embodiments disclosed herein, the data is retrieved by the processing unit(s) 14, 24 from a storage unit, such as an internal memory and/or a database. Alternatively, or additionally, the data is transmitted to the processing unit(s) 14, 24 from an external storage, such as an external database, a remote server or from the security control module 10 or further security control module 20. According to a particular embodiment of the present invention, said location data indicative of the absolute position of the of the security control module 10 comprises a first transceiver distance a1 indicative of a distance of the security control module 10 from said border B and a second transceiver distance a2 indicative of a distance of the further security control module 20 from said border B.
As illustrated in
Alternatively, or additionally, step S40 comprises surveillance actions comprising, logging said relative position of the mobile device 100 onto an internal data storage, transmitting said relative position of the mobile device 100 to an external data storage, raising an alarm if certain conditions are met with respect to the relative position and/or the mobile device 100 itself.
As illustrated in
Turning now to
In a subsequent step S30, at least one of the processing units 14, 14′ and 24 of the plurality of security control modules 10, 20, 10′ determines the relative position of the mobile device 100 with respect to each of the plurality of passageways 4, 4′. In a first substep S32 of step S30, the security control modules 10, 20 and 10′ exchange the distances D1, D2, D1′ between themselves (each security control module transmits the distance D1 itself determined and receives the distances D1′, D2 determined by the “other” security control modules).
Having exchanged distance data D1, D1′ and D2, at least one of the processing units 14, 14′ and 24 of the plurality of security control modules 10, 20, 10′ determines the relative position of the mobile device 100 based on the first distance D1 determined by itself and the distances D2, D1′ received from the other of security control modules 10, 20, 10′.
According to further embodiments, within step 30, location data indicative of the absolute position of the security control module 10, the security control module 10′, and the further security control module 20 with respect to said first section I, the second section O and with respect to the passageway 4 and the adjacent passageway 4′ is made available to the processing unit(s) 14, 24, 14′. According to embodiments disclosed herein, the data is retrieved by the processing unit(s) 14, 24, 14′ from a storage unit, such as an internal memory and/or a database. Alternatively, or additionally, the data is transmitted to the processing unit(s) 14, 24, 14′ from an external storage, such as an external database, a remote server. According to a particular embodiment of the present invention, said location data indicative of the absolute position of the of the security control module 10 comprises a first transceiver distance a1 indicative of a distance of the security control module 10 from said border B, a first adjacent transceiver distance a1′ indicative of a distance of the adjacent security control module 10′ from said border B and a second transceiver distance a2 indicative of a distance of the further security control module 20 from said border B.
It should be noted that, in the description, the computer program code has been associated with specific processors and the sequence of the steps has been presented in a specific order, one skilled in the art will understand, however, that the computer program code may be structured differently and that the order of at least some of the steps could be altered, without deviating from the scope of the invention. For example, one skilled in the art will understand that at least some of the functions and operations described above can be implemented and performed on the computer system.
Further disclosed and proposed are:
Number | Date | Country | Kind |
---|---|---|---|
00501/20 | Apr 2020 | CH | national |
Filing Document | Filing Date | Country | Kind |
---|---|---|---|
PCT/EP2021/060593 | 4/22/2021 | WO |
Publishing Document | Publishing Date | Country | Kind |
---|---|---|---|
WO2021/219492 | 11/4/2021 | WO | A |
Number | Name | Date | Kind |
---|---|---|---|
20040002346 | Santhoff | Jan 2004 | A1 |
20160343183 | Dumas | Nov 2016 | A1 |
20170148243 | Shin et al. | May 2017 | A1 |
20180081025 | Jonsson et al. | Mar 2018 | A1 |
20210112064 | Losseva | Apr 2021 | A1 |
Number | Date | Country |
---|---|---|
WO 2018048956 | Mar 2018 | WO |
WO 2018227118 | Dec 2018 | WO |
Entry |
---|
International Search Report and Written Opinion of the International Searching Authority for International Application No. PCT/EP2021/060593, dated Jul. 16, 2021, in 16 pages. |
Number | Date | Country | |
---|---|---|---|
20230169811 A1 | Jun 2023 | US |