The inventive arrangements relate to security systems and more particularly to security systems which employ sensors for detecting the opening and closing of doors and windows.
Security systems for homes and commercial establishments commonly employ sensors for detecting the opening and closing of doors and windows. Various types of sensors have been developed for this purpose. For example, some sensors are battery powered and wirelessly coupled to control circuitry associated with a security system or enterprise monitoring system. But the batteries used in such wireless sensors need to be periodically replaced to ensure a properly functioning sensor, thus putting a strain on serviceability. Other types of window and door sensors are passive devices. These devices are conventionally connected to the circuitry of the security system and/or the enterprise monitoring stations by means of a wired connection. But it is commonly accepted that wired connections are undesirable in many security applications because the wires provide a point of weakness to the security system. A further drawback of such conventional wired arrangements is that they tend to increase the cost and complexity of installing the security system.
Some conventional sensors for detecting the opening and/or closing of windows and/or doors use Hall Effect sensing mechanisms. Other types of conventional sensors used for this purpose include an optically coupled transmitter and receiver to detect the opening and closing of doors and windows. In such conventional systems, when the magnetic or optical coupling is “broken” between the transmitting and receiving magnetic device, the system sends a message to the security system control system or enterprise monitoring station using either a wired or wireless communications mechanism, indicating the intrusion. Such conventional wired or wireless battery powered sensors are susceptible to electrical noise due to environmental disturbances. Exemplary disturbances can include RF interference experienced by the wireless connection, mechanical vibration of the sensor, lighting strikes, and so on.
An improvement over the above described intrusion sensing mechanism, requiring no batteries and or wiring, is the self-powered door/window opening sensor described in the Applicant's U.S. Provisional Application No. 62/160,641, however, this mechanism still requires RF wireless communications infrastructure and a piezo electric device mounted to each door being monitored to generate the power on demand required, to drive the wireless radio communications device.
Embodiments of the invention concern a method and system for performing security sensing. The method involves using an optical data transceiver to illuminating a secured space with an optical data signal which has been modulated to contain a first data sequence. Thereafter, one or more retroreflected optical data signals are received at the optical data transceiver. The retroreflected optical data signals are signals which have been respectively retroreflected from reflector elements disposed in the secured space in response to the optical data signal. The process further involves authenticating one or more of the retroreflected optical data signals by determining whether the first data sequence is present therein. A security event notification is selectively generated and communicated to an enterprise security management controller if a variation occurs in regard to at least one optical beam condition associated with one or more of the plurality of optical data signals. The variation can involve one or more of a disruption of the optical beam and a displacement of the optical beam.
According to one aspect, the optical data transceiver can be used to facilitate wireless network access to a computer data network. The computer data network in such scenarios can be used to communicate the security event notification to the enterprise security management controller. Also, the first data sequence used for security sensing can comprise at least a portion of a management frame defined for a predetermined wireless communication protocol implemented by the optical data transceiver as part of the wireless network access function.
An embodiment also concerns an optical security sensing apparatus involving a plurality of retroreflectors disposed in a secured area and an optical transceiver. The optical transceiver can include an optical transmitter unit and an optical receiver unit. The optical transmitter unit is configured to illuminate at least a portion of the secured space with an optical data signal which has been modulated to contain a first data sequence. The optical receiver unit is configured to concurrently receive one or more retroreflected optical data signals which have been respectively retroreflected from the plurality of reflector elements in response to the optical data signal.
At least one processing element is provided which is configured to receive a plurality of digital data streams extracted respectively from the retroreflected optical data signals. For example, the at least one processing element can be provided as part of the optical transceiver. The at least one processing element can be arranged to determine whether the first data sequence is present in one or more of the plurality of retro-reflected optical data signals. The at least one processing element can also be configured to detect a variation in regard to at least one optical beam condition associated with one or more of the retroreflected optical data signals. Such variation can comprise a disruption of the optical beam and/or a displacement of the optical beam. The processing element can selectively generate a security event notification message if the variation is detected. The optical transceiver described herein can further be configured to function as a wireless network access point. In such scenario, the optical data signal can comprise at least a portion of a management frame defined for a predetermined wireless communication protocol.
Embodiments will be described with reference to the following drawing figures, in which like numerals represent like items throughout the figures, and in which:
It will be readily understood that the components of the embodiments as generally described herein and illustrated in the appended figures could be arranged and designed in a wide variety of different configurations. Thus, the following more detailed description of various embodiments, as represented in the figures, is not intended to limit the scope of the present disclosure, but is merely representative of various embodiments. While the various aspects of the embodiments are presented in drawings, the drawings are not necessarily drawn to scale unless specifically indicated.
Reference throughout this specification to features, advantages, or similar language does not imply that all of the features and advantages that may be realized with the present invention should be or are in any single embodiment of the invention. Rather, language referring to the features and advantages is understood to mean that a specific feature, advantage, or characteristic described in connection with an embodiment is included in at least one embodiment of the present invention. Thus, discussions of the features and advantages, and similar language, throughout the specification may, but do not necessarily, refer to the same embodiment.
An improved door/window opening sensing method and apparatus is disclosed herein which makes use of an optical transceiver which can include one or more processing elements, and one or more passive remote sensor elements. According to one aspect, conventional active sensing devices are replaced with one or more totally passive devices which are placed on doors or windows. These passive devices are responsive to an optical signal from the optical transceiver to communicate door status information. This door status information is received by the optical transceiver using an optical detector element, which can be a video camera, to detect opening and/or closing of windows and doors in a secured facility.
Referring now to
The secured facility 100 is advantageously protected against unauthorized entry by an enterprise security system which includes an optical sensing system. The optical sensing system is comprised of an optical transceiver 110 and one or more reflector elements 114, 116, 126. According to one aspect, one or more of the reflector elements 114, 116, 126 are retroreflectors as discussed below in further detail. A retroreflector is a device or surface that reflects light back to its source with a minimum of scattering. An optical transceiver 110 as described herein comprises an optical source 111 (such as a light emitting diode) and an optical receiver 112 (such as a photodetector or a video camera). In an embodiment the optical transceiver 110 can also include one or more processing elements to perform certain processing functions as hereinafter described. An embodiment optical transceiver is discussed below in further detail in relation to
Referring now to
An embodiment is illustrated in
An advantage of the retroreflectors described herein is that these are passive devices and hence require no power to engage in communications with the optical transceiver 110. The modulated optical signal transmitted from the optical transceiver is reflected right back from these retroreflectors to the optical source, thus making these passive receivers virtually a permanent part of the structure.
Referring once again to
According to one aspect of the invention, a reflected optical signal from one or more of the reflector elements 114, 116, 126 is monitored by a processing element (e.g. a processing element associated with the optical transceiver 110). Disturbances associated with the reflected optical signal are then used to monitor openings and closing of the doors and windows and/or other intrusions for purposes of triggering alerts and/or alarms.
In the simplest case, a disturbance associated with a reflected optical signal can comprise an interruption or disruption of the reflected signal such that the presence of the reflected signal is no longer detected at the optical transceiver 110. As an example, such an interruption in the reflected optical signal could occur when a door 108 moves from a closed position as shown in
A similar approach can be used to detect the presence of motion or persons within the secured facility 110. For example, a reflector element 126 as described herein can be disposed on a fixed interior portion of a structure associated with the secured facility 100. The reflector element 126 in
A solid state optical detector element can be sufficient for monitoring a reflected optical signal from a single reflector element. But for purposes of monitoring a plurality of reflector elements 114, 116, 126 the optical receiver 112 associated with the optical transceiver is advantageously a video camera. Use of a video camera as the optical receiver 112 can facilitate concurrent monitoring of reflected optical signals from a plurality of reflector elements by a single optical transceiver 110.
An optical receiver (such as optical transceiver 112) which comprises a video camera can capture one or more video frame images. In an arrangement as described with respect to
In the first video frame image 500a, modulated optical signals 502 and 504 are detected within the frame. More particularly, reflected modulated optical signal 502 from a first reflector element (not shown) activates pixels in a frame portion C-4 (i.e., where row C and column 4 intersect). Similarly, modulated optical signal 504 from a second reflector element (not shown) activates pixels in frame portion E-8. An electronic processing element associated with optical transceiver 110 can identify or isolate the activated pixels which are associated with each reflected modulated optical signal, and process the optical signal received by those pixels to independently extract modulated data from each signal 502, 504. Accordingly, the optical transceiver 110 can concurrently independently monitor a position and/or intensity of a plurality of reflected modulated optical signals. Data can be extracted from each signal to verify that it is a reflection of a transmitted signal originating from the optical transceiver 110.
In the second video frame image 500b captured at a later moment in time, it can be seen that reflected modulated optical signal 504 is still present in frame portion E-8. But reflected modulated optical signal 502 has moved position within the frame from C-4 to B-4. The change in relative position of the modulated optical signal 502 in frame 500b as compared to 500a is an indication that a reflector element associated with such modulated optical signal 502 has moved. For example, such reflector movement might occur when a window panel 104 (to which reflector 114 is applied) is moved from a first position shown in
The processing element can detect disruptions in the intensity of an optical signal associated with each reflected modulated optical signal captured by the video camera. Similarly, if reflected modulated optical signals 502, 504 are detected in first frame 500a, but only signal 504 was detected in a second frame, the absence of signal 502 can be attributed to some action which interrupted optical signal 502. For example, such interruption might be caused by a door 108 opening, as shown in
Changes or disruptions in the optical signals captured in a video frame can be detected by comparing an image frame to an earlier capture image stored in a database. The image comparison functions described herein can be performed by a processing element associated with the optical transceiver or in an enterprise security management controller. If the optical receiver is a video camera, the detection of a disturbance or variation in the reflected modulated optical signal can also be used to trigger one or more video image frames to be stored in a memory location in the optical transceiver 110. The captured video frame image can then be communicated to the enterprise security management controller together with the event notification. Accordingly, a video record or the activities associated with the event notification can be retrieved for later inspection.
When an event notification is generated, the notification can include data specifying the location of the optical transceiver 110. The event notification can also specify a particular door, window or location in the secured facility where a disturbance has been detected with regard to a reflected modulated optical signal. The foregoing step can require a learning or training process in which reflectors associated with particular windows, doors or locations are identified to the optical transceiver 110. Thereafter, any event notification communicated to an enterprise security management controller concerning a particular reflector element can include metadata which specifies the door, window or location where the event was detected.
For example, during a training period a signal 504 could be assigned a metadata tag indicating that it is associated with the door to a particular first office, room or corridor. Reflector element 502 could be assigned a metadata tag indicating it is a window outside, within or adjacent to the first office, room or corridor. Once the tags have been defined in this way, a subsequent disturbance of a reflected modulated optical signal associated with such tag can generate an event notification including metadata to specify the location where a security event was detected.
In an embodiment, an optical transceiver as described herein can comprise a wireless access point of a data network. As such, the optical transceiver can use an optical part of the electromagnetic spectrum to facilitate wireless communications with one or more network devices which may be present in a secured facility, and other components of a data network. For example, the optical transceiver can use the same optical source and optical receiver for wireless access and security sensing operations as described herein. According to one aspect, each optical transceiver can comprise a Li-Fi wireless network access point. As is known, Li-Fi is a bidirectional high speed and fully networked wireless communication technology. Li-Fi is similar to Wi-Fi and uses IEEE 802.15.7 protocols, but offers higher data rates. Li-Fi uses radiation in the optical wavelength range to facilitate such wireless communication. For example, Li-Fi can be implemented using light in the visible, infra-red, and near ultra-violet range.
An embodiment as described above is illustrated in
According to one aspect, the same optical signals used for optical wireless data network communications can be used for optical security sensing as described herein. For example, Li-Fi wireless access points will periodically generate certain types of management frames which are used to allow for the maintenance of communications. One such management frame is known as a beacon frame. The beacon frame is used to periodically announce the presence of the wireless access point. It typically contains source and destination media access control (MAC) addresses, its service set identifier (SSID), a timestamp, and other parameters of interest to wireless network devices seeking to communicate through the access point. A common default beacon interval is about once every 100 milliseconds. An optical transceiver which is used for security sensing as described herein can transmit its beacon frame in a conventional manner. The optical transceiver can then compare the information contained in a transmitted beacon frame to data contained in a received optical signal to determine whether the received signal is a reflected modulated signal. If so, the reflected modulated signal derived from the beacon frame can be used for security sensing purposes to detect openings and/or closings of windows and/or doors as disclosed. The reflected beacon frame signal can also be used to detect motion as described herein. Of course, other signals communicated as part of the data network operation can also be used for security sensing without limitation. Further, it should be appreciated that in some scenarios, security dedicated optical signals can be used to facilitate the security functions described herein. Such security dedicated optical signals can be transmitted and received using the same optical source and receiver as used with the data network functions, but would be exclusively used for security sensing purposes. For example, the modulated optical data signal from the optical transceivers could include the location (coordinates) of the optical transceiver source, the occupant of the office and/or those authorized to enter a secured area, and various other attributes specific to the door being monitored.
As shown in
Referring now to
Referring now to
The output of the optical transmitter 702 is under control of the processor 712. For example, the processor 712 can control the optical transmitter 702, optical receiver 704 and network interface device 706 to facilitate security sensing operations as described herein. The processor 712 can also perform processing operations in support of such security sensing operations as described herein. In some embodiments, the processor can cause the optical transmitter 702 to output a data modulated optical output signal which is exclusively used for security sensing operations as described herein. In other embodiments, the processor 712 can also facilitate a wireless optical access point function. In such a scenario, the processor can utilize optical transmitter 702, optical receiver 704 and network interface device 706 to provides client devices (e.g. devices 614) with wireless optical access to a data network (e.g. a network 600). In that case, one or more transmitted signals used to facilitate the wireless optical access point functions can also be used by the processor 712 to facilitate optical security sensing as described herein.
In the optical transceiver 700, the main memory 720 is comprised of a computer-readable storage medium (machine readable media) on which is stored one or more sets of instructions 708 (e.g., software code) configured to implement one or more of the methodologies, procedures, or functions described herein. The instructions 708 can also reside, completely or at least partially, within the static memory 718, and/or within the processor 712 during execution thereof by the computer system. Those skilled in the art will appreciate that the optical transceiver system architecture illustrated in
Referring now to
The process continues at 808 by monitoring the retroreflected optical data signals to determine if a variation has occurred in regard to at least one optical beam condition. Such optical beam condition can involve an interruption of a retroreflected optical beam (i.e., the beam is no longer detected). However, the variation can also comprise a substantial variation in the detected intensity or optical signal strength. As an example, such a variation may occur when a door is partially opened and a retroreflector position has changed to an unfavorable (or improved) orientation for purposes of retroreflection. The variation can also involve a displacement of the optical beam as described herein with respect to
Based on such monitoring, a decision is made at 810 as to whether a variation has been detected. If not (806: No), then the process returns to 806 and 810 for continued authentication and monitoring. But if a variation is detected (806: Yes) a security event notification is selectively generated to an enterprise security management controller.
One advantage of a security sensing system described herein derives from the fact that the optical data signal transmitted by the optical transceiver is modulated to contain a particular data sequence. The presence of the data sequence allows the optical transceiver to authenticate a received optical signal to determine whether it is a retroreflected optical data signal. This authentication process can involve comparing a data sequence in the received signal optical signal to the transmitted optical signal to determining whether the same data sequence is present in each. But in some scenarios, a person attempting to thwart the security sensing system may try to do so by using an optical jammer. For example, such persons could attempt to overpower the optical receiver with a higher powered beam of light. In such a scenario, the person seeking to jam the sensor without modulating the higher powered beam of light. Alternatively, they might use an optical receiver to detect the transmitted optical beam and then independently generate a new optical beam which actually contains the particular data sequence contained in the optical beam transmitted by the security system.
To overcome this potential issue, the processing components of the optical transceiver described herein can apply further authentication criteria. For example, the processing components can compare a timing of a modulated data stream in a received optical signal to a timing of the modulated data signal in the transmitted modulated optical data signal. A timing of a modulated data sequence in an authentic retroreflected optical data signal should be delayed only a very small duration of time relative to the modulated data sequence in a transmitted optical data signal. If the delay exceeds a predetermined threshold, then the received optical signal can be rejected as non-authentic.
Further, the optical transceiver in response to detecting a jamming signal or a non-authentic optical data signal, can perform certain countermeasure actions. For example, if a video camera is used as the optical receiver, then the wavelength of the received optical signal (jamming signal and/or non-authentic optical data signal) can be determined or approximated. In such scenarios, the processor can cause the optical transceiver to selectively transition to another wavelength so that the transmitted modulated optical data signal illuminates the secured area using optical radiation having an alternate optical wavelength. The alternate optical wavelength can be in a portion of the visible, infrared or near ultraviolet spectrum which is different as compared to that previously in use by the system. For example, if the optical transceiver system were to detect a significantly high level of light in the 530 nm (green) or 630 nm (red) wavelengths, the transceiver can dynamically shift its dominating transmitting and receiving frequencies to a less sensitive wavelength such as 430 nm (blue), thus preventing the monitoring system from being defeated. According to a further embodiment, the optical transceiver can be caused to periodically hop at a rapid rate among a plurality of different optical wavelengths to thwart attempts at defeating the system. If a received optical data signal has the wrong wavelength at a particular moment in time, then it can be determined to be a non-authentic retroreflected optical data signal on that basis alone.
Although the invention has been illustrated and described with respect to one or more implementations, equivalent alterations and modifications will occur to others skilled in the art upon the reading and understanding of this specification and the annexed drawings. In addition, while a particular feature of the invention may have been disclosed with respect to only one of several implementations, such feature may be combined with one or more other features of the other implementations as may be desired and advantageous for any given or particular application. Thus, the breadth and scope of the present invention should not be limited by any of the above described embodiments. Rather, the scope of the invention should be defined in accordance with the following claims and their equivalents.
This application claims the benefit of provisional U.S. Patent Application No. 62/319,410, filed on Apr. 7, 2016, which is hereby incorporated herein by reference.
Number | Name | Date | Kind |
---|---|---|---|
4325146 | Lennington | Apr 1982 | A |
4993068 | Piosenka et al. | Feb 1991 | A |
5365266 | Carpenter | Nov 1994 | A |
5387993 | Heller et al. | Feb 1995 | A |
5502447 | Kumpfbeck et al. | Mar 1996 | A |
5532705 | Hama | Jul 1996 | A |
5763868 | Kubota et al. | Jun 1998 | A |
5947369 | Frommer et al. | Sep 1999 | A |
5960085 | de la Huerga | Sep 1999 | A |
5966227 | Dubois et al. | Oct 1999 | A |
5988645 | Downing | Nov 1999 | A |
6219439 | Burger | Apr 2001 | B1 |
6288644 | Mathews | Sep 2001 | B1 |
6339999 | Newell | Jan 2002 | B1 |
6346886 | De La Huerga | Feb 2002 | B1 |
6788262 | Adams et al. | Sep 2004 | B1 |
6888502 | Beigel et al. | May 2005 | B2 |
6950098 | Brabander et al. | Sep 2005 | B2 |
7119688 | Wildman | Oct 2006 | B2 |
7202789 | Stilp | Apr 2007 | B1 |
7424316 | Boyle | Sep 2008 | B1 |
7450024 | Wildman et al. | Nov 2008 | B2 |
7450077 | Waterhouse et al. | Nov 2008 | B2 |
7629934 | Rhodes et al. | Dec 2009 | B2 |
7696882 | Rahimi et al. | Apr 2010 | B1 |
7849619 | Mosher, Jr. et al. | Dec 2010 | B2 |
7898385 | Kocher | Mar 2011 | B2 |
7982616 | Banerjee et al. | Jul 2011 | B2 |
7983565 | Varshneya et al. | Jul 2011 | B2 |
8267325 | Phaneuf | Sep 2012 | B2 |
8447188 | Scott et al. | May 2013 | B2 |
8497808 | Wang | Jul 2013 | B2 |
8502681 | Bolling et al. | Aug 2013 | B2 |
8599101 | Christie et al. | Dec 2013 | B2 |
8646695 | Worrall et al. | Feb 2014 | B2 |
8674810 | Uysal et al. | Mar 2014 | B2 |
8917214 | Forster | Dec 2014 | B2 |
8985439 | Braun | Mar 2015 | B2 |
9076273 | Smith et al. | Jul 2015 | B2 |
9384608 | Strulovitch et al. | Jul 2016 | B2 |
9514584 | Burge et al. | Dec 2016 | B1 |
9519853 | Tolle | Dec 2016 | B2 |
9600999 | Stenzler | Mar 2017 | B2 |
20020084904 | De La Huerga | Jul 2002 | A1 |
20020140558 | Lian et al. | Oct 2002 | A1 |
20030005193 | Seroussi et al. | Jan 2003 | A1 |
20040085208 | Fukuoka | May 2004 | A1 |
20040246103 | Lukowski | Dec 2004 | A1 |
20050168340 | Mosher et al. | Aug 2005 | A1 |
20050285740 | Kubach et al. | Dec 2005 | A1 |
20060022816 | Yukawa | Feb 2006 | A1 |
20060219778 | Komatsu | Oct 2006 | A1 |
20070182559 | Lawrence et al. | Aug 2007 | A1 |
20080055045 | Swan et al. | Mar 2008 | A1 |
20080074652 | Fouquet | Mar 2008 | A1 |
20090121931 | Katz | May 2009 | A1 |
20090322513 | Hwang et al. | Dec 2009 | A1 |
20100315244 | Tokhtuev et al. | Dec 2010 | A1 |
20100328043 | Jantunen et al. | Dec 2010 | A1 |
20110022121 | Meskins | Jan 2011 | A1 |
20110148602 | Goh et al. | Jun 2011 | A1 |
20110206378 | Bolling et al. | Aug 2011 | A1 |
20110316700 | Kasahara et al. | Dec 2011 | A1 |
20120056719 | Krishna et al. | Mar 2012 | A1 |
20120189312 | Maryfield et al. | Jul 2012 | A1 |
20120234921 | Tiedmann et al. | Sep 2012 | A1 |
20120242481 | Gemandt et al. | Sep 2012 | A1 |
20120242501 | Tran et al. | Sep 2012 | A1 |
20120256492 | Song et al. | Oct 2012 | A1 |
20120286927 | Hagl | Nov 2012 | A1 |
20130010962 | Buer et al. | Jan 2013 | A1 |
20130027180 | Lakamraju et al. | Jan 2013 | A1 |
20130221938 | Conte et al. | Aug 2013 | A1 |
20140068742 | Phillips | Mar 2014 | A1 |
20140077929 | Dumas et al. | Mar 2014 | A1 |
20140159959 | Rhoads et al. | Jun 2014 | A1 |
20140159975 | Apostolos et al. | Jun 2014 | A1 |
20140226844 | Kerselaers | Aug 2014 | A1 |
20140240087 | Liu et al. | Aug 2014 | A1 |
20140240088 | Robinette et al. | Aug 2014 | A1 |
20140327517 | Portet | Nov 2014 | A1 |
20140354494 | Katz | Dec 2014 | A1 |
20140375429 | Cristache | Dec 2014 | A1 |
20150022321 | Lefevre | Jan 2015 | A1 |
20150041614 | Tran et al. | Feb 2015 | A1 |
20150054696 | Werner et al. | Feb 2015 | A1 |
20150070134 | Nagisetty et al. | Mar 2015 | A1 |
20150078741 | O'Connor et al. | Mar 2015 | A1 |
20150149310 | He et al. | May 2015 | A1 |
20150154486 | McFarthing et al. | Jun 2015 | A1 |
20150168554 | Aharoni et al. | Jun 2015 | A1 |
20150180716 | Aminzade | Jun 2015 | A1 |
20150185160 | Lacoste | Jul 2015 | A1 |
20150188632 | Aoyama et al. | Jul 2015 | A1 |
20150221147 | Daniel-Wayman et al. | Aug 2015 | A1 |
20150250419 | Cooper et al. | Sep 2015 | A1 |
20150264431 | Cheng | Sep 2015 | A1 |
20150280829 | Breuer et al. | Oct 2015 | A1 |
20150339870 | Cojocaru et al. | Nov 2015 | A1 |
20150341114 | Pederson | Nov 2015 | A1 |
20150365166 | Deyle et al. | Dec 2015 | A1 |
20150379791 | Russell et al. | Dec 2015 | A1 |
20160007315 | Lundgreen et al. | Jan 2016 | A1 |
20160014103 | Masters et al. | Jan 2016 | A1 |
20160055692 | Trani | Feb 2016 | A1 |
20160095189 | Vangeel et al. | Mar 2016 | A1 |
20160164607 | Pederson | Jun 2016 | A1 |
20160267760 | Trani | Sep 2016 | A1 |
20160284183 | Trani | Sep 2016 | A1 |
20160294835 | Beaumont et al. | Oct 2016 | A1 |
20160343187 | Trani | Nov 2016 | A1 |
20160344091 | Trani | Nov 2016 | A1 |
20170026118 | Pederson | Jan 2017 | A1 |
20170228953 | Lupovici | Aug 2017 | A1 |
Number | Date | Country |
---|---|---|
203825788 | Sep 2014 | CN |
2495621 | Sep 2012 | EP |
WO 8301855 | May 1983 | WO |
1999041721 | Aug 1999 | WO |
2014113882 | Jul 2014 | WO |
2014210000 | Dec 2014 | WO |
2015023737 | Feb 2015 | WO |
Entry |
---|
Rais, N.H.M., et al., “A Review of Wearable Antenna,” Antennas & Propagation Conference, 2009, LAPC 2009, Loughborough, Published IEEE; 978-1-4244-2720-8; DOI: 10.1109/LAPC.2009.5352373. |
Hall, P.S., et al., “Antennas and Propoagation for Body Centric Communications,” Proc. 'EUCAP 2006', Nice, France, Nov. 6-10, 2006 (ESA SP-626, Oct. 2006). |
Conway, G.A., et al., “Antennas for Over-Body-Surface Communication at 2.45 GHz,” IEEE Transactions on Antennas and Propagation, vol. 57, No. 4, Apr. 2009, 0018-926X, copyright 2009 IEEE. |
Ito, K., et al., “Wearable Antennas for Body-Centric Wireless Communications,” copyright IEEE 2010; 978-1-4244-6418-0/10. |
Matthews, J.C.G., et al., “Body Wearable Antennas fo UHF/VHF,” 2008 Loughborough Antennas & Propagation conference, 978-1-4244-1894-7108, copyright 2008 IEEE. |
Number | Date | Country | |
---|---|---|---|
20170294088 A1 | Oct 2017 | US |
Number | Date | Country | |
---|---|---|---|
62319410 | Apr 2016 | US |