WO2001008116A2 - Improvements relating to security - Google Patents

Improvements relating to security Download PDF

Info

Publication number
WO2001008116A2
WO2001008116A2 PCT/GB2000/002880 GB0002880W WO0108116A2 WO 2001008116 A2 WO2001008116 A2 WO 2001008116A2 GB 0002880 W GB0002880 W GB 0002880W WO 0108116 A2 WO0108116 A2 WO 0108116A2
Authority
WO
WIPO (PCT)
Prior art keywords
units
unit
ofthe
alarm
signal
Prior art date
Application number
PCT/GB2000/002880
Other languages
French (fr)
Other versions
WO2001008116A3 (en
Inventor
Pilgrim Beart
Jason Beart
Original Assignee
Biomotix Limited
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Biomotix Limited filed Critical Biomotix Limited
Priority to EP00948160A priority Critical patent/EP1208548A2/en
Priority to AU61726/00A priority patent/AU6172600A/en
Priority to JP2001513129A priority patent/JP2003505803A/en
Publication of WO2001008116A2 publication Critical patent/WO2001008116A2/en
Publication of WO2001008116A3 publication Critical patent/WO2001008116A3/en

Links

Classifications

    • GPHYSICS
    • G08SIGNALLING
    • G08BSIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
    • G08B25/00Alarm systems in which the location of the alarm condition is signalled to a central station, e.g. fire or police telegraphic systems
    • G08B25/008Alarm setting and unsetting, i.e. arming or disarming of the security system
    • GPHYSICS
    • G08SIGNALLING
    • G08BSIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
    • G08B13/00Burglar, theft or intruder alarms
    • G08B13/02Mechanical actuation
    • G08B13/14Mechanical actuation by lifting or attempted removal of hand-portable articles
    • G08B13/1427Mechanical actuation by lifting or attempted removal of hand-portable articles with transmitter-receiver for distance detection
    • GPHYSICS
    • G08SIGNALLING
    • G08BSIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
    • G08B21/00Alarms responsive to a single specified undesired or abnormal condition and not otherwise provided for
    • G08B21/02Alarms for ensuring the safety of persons
    • G08B21/0202Child monitoring systems using a transmitter-receiver system carried by the parent and the child
    • G08B21/0227System arrangements with a plurality of child units
    • GPHYSICS
    • G08SIGNALLING
    • G08BSIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
    • G08B21/00Alarms responsive to a single specified undesired or abnormal condition and not otherwise provided for
    • G08B21/02Alarms for ensuring the safety of persons
    • G08B21/0202Child monitoring systems using a transmitter-receiver system carried by the parent and the child
    • G08B21/0241Data exchange details, e.g. data protocol
    • G08B21/0258System arrangements wherein both parent and child units can emit and receive

Definitions

  • This invention relates to a new security system and a method of providing security.
  • burglar alarms are well known wherein sensors are provided which are connected to a centralised alarm system.
  • sensors are provided which are connected to a centralised alarm system.
  • Such systems cannot provide protection for objects which are mobile (for example collections of bags, groups of children).
  • centralised alarm systems are vulnerable to an attack on the centralised alarm system.
  • a security system comprising at least two units, each unit comprising a power source adapted to power the unit, a processor, a transmitter, a receiver and at least one of the units having an alarm, the units having the ability to communicate with each other via the transmitters and receivers, the processors being adapted to control the units and to cause the alarm to generate an alarm signal when predetermined rules are satisfied.
  • Such a system is advantageous because it allows a unit to be applied to an article to be guarded. Because the system relies on communication between the two units there is no central control system open to attack and each unit must be individually disabled to disable the security system as a whole.
  • At least one processor is adapted to generate an alarm when communication fails between the two units, providing a simple system.
  • the predetermined rules may cover a number of situations, some of which are outlined hereinbelow.
  • Each of the units in the system may be adapted to generate an alarm when predetermined rules are met, which may be when communication fails with any one of the units or when the distance from any one of the units exceeds a given value.
  • the alarm may be provided by one or more of the following: a sound or vibration generating mechanism (eg a piezo electric sounder or other electric sounder), a light emitting device, a display screen, an electric shock generator, an explosive device, an electromagnetic lock or catch, or by signalling to a connected or remote (e.g. wireless) apparatus.
  • a sound or vibration generating mechanism eg a piezo electric sounder or other electric sounder
  • a light emitting device e.g. a light emitting device
  • a display screen e.g. an electric shock generator, an explosive device, an electromagnetic lock or catch, or by signalling to a connected or remote (e.g. wireless) apparatus.
  • the units are provided with an alarm.
  • An advantage of this is that it may be cheaper to realise than providing an alarm with each unit.
  • the units may also be smaller and more convenient.
  • a unit provided with the alarm may be thought of as a master unit.
  • the transmitter of at least one of the units may be adapted periodically to transmit a signal, this being advantageous over continuous transmission because it is more power efficient.
  • the receiver may be powered periodically and therefore capable of receiving a signal periodically.
  • the processor of one of the units may be adapted to control when the transmitter transmits signals and may be adapted to operate the transmitter when the receiver of another unit is activated to receive a signal.
  • the processor may be adapted to control when the receiver receives signals and may be adapted to operate the receiver when the transmitter of another unit is transmitting a signal.
  • the processor may be adapted to learn when transmission is expected and only activate the receiver at this time.
  • the receiver may be adapted to be powered and capable of receiving a signal for a period either side of when a signal is expected so increasing the likelihood of receiving the signal.
  • the transmitter may be adapted to transmit pieces of information, which may include any from the following list: the identity of the unit from which the communication originated (unit identification), the class of unit from which the communication originated, the level of output from the power source of the unit, the status of the unit, when the next transmission will occur.
  • unit identification the identity of the unit from which the communication originated
  • the class of unit from which the communication originated the level of output from the power source of the unit
  • the status of the unit when the next transmission will occur.
  • Each of these pieces of information has its own separate advantages. For instance it is advantageous to transmit the unit identification so that the remaining units of the system can tell from where the transmission originates.
  • There may be a number of different classes of unit within the security systems which may have one or more units within them. Units within the systems may be adapted to have different responses depending upon what class of unit they are in communication with.
  • Transmission of the level of output power from the power source is advantageous in that it helps to prevent false alarms through power source failure.
  • the processors of the units may be adapted to suppress the generation of an alarm if a unit stops transmitting after a period of reporting low power source levels.
  • the processors may be adapted to warn the user of a low power source before that power source fails.
  • the processors of the units of the system may be adapted to generate an alarm if one ofthe units transmits a status signal indicating that an alarm should be generated.
  • the transmitters and receivers are respectively adapted to transmit and receive radio signals.
  • a medium is advantageous because it is generally omnidirectional, will pass through a number of obstructions (ie does not necessarily require line-of-sight communication) and has a finite range. It is advantageous to have a finite range because for some embodiments of the system to function, communication must eventually be lost if one ofthe units is removed.
  • the transmitters and the receivers are adapted to operate at substantially 433MHz.
  • a frequency is advantageous because it is an unlicensed frequency (not requiring a licence to use) and will thus be readily available for such use.
  • the skilled person will appreciate that the system may operate using any radio frequency and that 433MHz is merely one embodiment.
  • the units may communicate with each other using standard frequency-based communications, including frequency modulation and amplitude modulation.
  • frequency modulation frequency shift keying (FSK) or amplitude shift keying (ASK) may be appropriate, or frequency-hopping or spread-spectrum.
  • FSK frequency shift keying
  • ASK amplitude shift keying
  • UWB ultra-wide band
  • the transmitters and the receivers are adapted to communicate short pulse signals to each other.
  • the pulse signals will generally be unmodulated, that is to say, not capable of transmitting information other than an indication of the presence of a unit.
  • the processors of the units in this embodiment are preferably adapted to expect to receive pulse signals from predetermined other units at predetermined times or periods of time, thus providing a simple method of determining the presence or otherwise of a given unit within the system.
  • the processors may be adapted only to activate the receivers when a pulse is expected, thereby helping to reduce power consumption.
  • the units may undergo an initialisation stage in which, say, modulated RF data packets are transmitted and received at predetermined times and intervals, the data packets including information serving to identify the respective transmitting unit to the other units.
  • pulse signals say, a few cycles at a given operating frequency, e.g. 433MHz
  • full data packets may be transmitted so as to indicate the presence of each unit within the system. This process may be continuously controlled by a slowly-clocked CMOS integrated circuit, thus further helping to reduce power consumption.
  • the transmitters and receivers have a range of about lm to 150m, perhaps about 30m to 125m. In one embodiment the transmitters and receivers may have a range of about 100m. In an alternative embodiment, the transmitters and receivers may have a range of 5m, 10m or 20m. It will be apparent that, for embodiments which generate an alarm when communication fails, the range of transmission is a compromise between providing a degree of freedom of movement for each of the units but providing a relatively short distance before communication fails between units and an alarm is generated. If the range is too short alarms will be generated too easily and if the range is too long a low degree of security will be provided since too much freedom will be given to the units.
  • the range may be several kilometres (may be substantially 1, 2, 3, 4, 5, 6km or more). Such ranges are advantageous for providing security for items which in general use are separated by distances of these orders. An example of such items would be farm machinery. The skilled person will appreciate that the range must allow the item to perform its usual function without the generation of false alarms.
  • the receiver of at least one of the units may comprise a detector adapted to detect communication from another unit.
  • the unit In normal operation the unit may be adapted to operate in a low power state and be further adapted to become fully operational when the detector detects a possible communication. It will be appreciated that in the low power state some power may actually be drawn from the power source.
  • a detector which allows the units to operate in a low power state is advantageous because it increases the life of the power source.
  • the at least one unit may be adapted to become fully operational for a predetermined period of time upon detection of a possible communication. Alternatively or in addition, the at least one unit may be adapted to return to the low power state upon detection of a "sleep" communication directed either generally to all ofthe units or to that particular unit.
  • the power source may be a battery which provides a convenient source of power.
  • the battery may or may not be rechargeable.
  • a solar cell or a Peltier junction may provide the source of power.
  • a capacitor may be provided in association with the solar cell, allowing power fluctuations in the output ofthe cell to be smoothed.
  • power may be derived from an external power supply, which may or may not be permanently wired to the unit.
  • power may be derived via electromagnetic coupling or induction from a nearby coil or antenna, which may be provided on a nearby anchor unit. Power may also be provided from motion via an electric generator or piezo generator.
  • each unit of the system may be provided with an identification mechanism adapted to provide unit identity.
  • the processor of at least one of the units may be adapted to interact with the identification mechanism and transmit the unit identity via the transmitter.
  • the identification mechanism may be a part of the processor. As discussed hereinbefore this is advantageous so that each unit can identify itself to the other units of the system, and units receiving transmissions will know from where the transmission originated.
  • the identification mechanism may provide a unique identification for a particular unit or may identify a unit as belonging to a particular class. Indeed, in some embodiments the identification mechanism may provide both a unique identification and also a class of membership. Providing a class membership is advantageous because it allows the units ofthe system to behave differently when communicating with units of different classes. Further, because a class of membership is not unique to a particular unit, the communications could not be used to invade privacy as could communications involving a unique identification.
  • the units may further comprise an arming mechanism adapted to cause the unit to become operational.
  • the arming mechanism may comprise a key-receiving mechanism adapted to receive a key.
  • the key-receiving mechanism may be adapted to receive any one of the following: an electronic key (for example a smart card or similar), a mechanical key, an arming code transmitted to the unit and received by the receiver.
  • One or more units of the system may comprise an arming unit adapted to arm the system.
  • the arming unit may be adapted to transmit an arming code which arms and/or disarms the remaining units of the system.
  • the master unit and the arming unit may be the same unit.
  • the master unit and the arming unit may comprise separate units.
  • the master and/or arming unit may be adapted to transmit a suppression signal adapted to prevent the units of the system from arming.
  • the units of the system may be adapted to arm if they do not receive the suppression signal for a predetermined period. It will be appreciated that in a different embodiment the suppression signal may prevent the units of the system from disarming and keep them armed when they are receiving the signal.
  • the system may become armed when the power source of each unit is connected.
  • an arming unit may be adapted periodically to change the arming code.
  • An advantage of this is that it prevents the arming code being copied and fraudulently used by a third party to arm or disarm the system.
  • algorithms for securely changing a code are well known. Further, it will be appreciated that if the code is to be changed, the units receiving the arming code must alter the code they are expecting to receive in the same manner as the unit transmitting the arming code. An example of such an algorithm is the KeyloqTM protocol.
  • the units may be adapted to encrypt communications.
  • An advantage of encryption is that system security is increased. Encryption algorithms will be well known to the person skilled in the art but may include public-key or challenge response algorithms. When the units are encrypting the communications a single communication may become several transmissions, encoded for each recipient unit.
  • the unit may be provided with a memory.
  • the processor may be adapted to store within the memory the identities of the units with which it is in communication. Knowing the identities in this manner allows the system to track the units within the system. In embodiments where an alarm is generated when communication fails, tracking the units of the system will allow the unit to know when one of the units is no longer in communication, indicating that an alarm should be raised.
  • the processor may be adapted to store a log of events within the memory.
  • An event may be any action of which the unit becomes aware for example: a reading from a sensor, the contents of communications received from other units, the time at which the event occurs, etc.
  • the processor may be capable of causing the transmitter to transmit all or some ofthe contents of the log and/or memory.
  • the processor may be adapted to cause such a transmission when a predetermined communication is received, or at predetermined times, or after a predetermined sensor input, etc.
  • the processor of a particular unit may be adapted to store in the memory only the identity of those units which are in communication with the particular unit at a certain time or during a certain period. The period may be within a predetermined period of the system becoming armed. This is advantageous because it prevents the units, including units which are not part of the desired security system, from being included in the security system.
  • the system is designed to guard articles to which the units are attached using communications between the individual units.
  • any unit of substantially the same design is capable of communicating with the units of the system. If units are simply included into the system as and when they come into communication then the system could guard articles which it is not intended to guard (that is articles fitted with units which can communicate with units of the system). Only remembering the identity of some units has the advantage that units which should not be included into the system will not be included into the system.
  • the units may be adapted to generate an alarm if a communication is received from a unit having a particular identification or from a unit belonging to a particular class.
  • a party may be provided with a unit having a known identification and other units situated in an excluded area may be programmed so that if they detect the known identification an alarm is generated.
  • a lift may be provided with a unit and passengers may be provided with units belonging to a class defined as passengers. The unit provided on the lift may count passengers into the lift and generate an alarm once the number of passengers exceeds a predetermined limit.
  • a further example would be to exclude visitors from restricted areas of a premises. An alarm may be generated should the presence of a unit belonging to a visitor be detected.
  • the predetermined rules may be arbitrarily complex and may be based upon a number of parameters which may include any of the following: state of external sensors, the presence/absence of particular unit identities, presence/absence of units belonging to a particular class, contents of communications from other units, data held within the processor and/or memory.
  • the processor may be provided with an input device adapted to program the processor with the identity of units which are part ofthe system. As discussed in the previous paragraph this is advantageous because it will prevent units which it is not desired to guard entering the system.
  • the identities of units which are in communication with a particular unit are stored in the memory whilst the input device is activated.
  • the input device may be a button, switch, a keyboard, a collection of keys, etc. In use, a user may activate the input device for a period, during which time the processor stores the identities of units with which it is communicating.
  • the predetermined rules which define when the processor is adapted to generate an alarm may be alterable by a user.
  • the input device may be further adapted to allow the rules to be changed. Clearly, this is advantageous because it will allow the functionality of the system to be altered to suit the current requirement.
  • the processor may be adapted to alter the predetermined rules upon receipt of a predetermined communication from another unit.
  • the processor may be adapted to change the predetermined rules on the basis of events.
  • At least one of the units may be provided with other sensors whose outputs are connected to the processor.
  • the processor may be adapted to monitor the outputs from these sensors and may be further adapted to transmit information relating to the sensor output to the transmitter.
  • the sensor may be adapted to generate a signal within an allowable range and the processor may be adapted to cause the transmitter to transmit a signal if the signal from the sensor falls outside this allowable range.
  • the sensor may be adapted to generate a signal only on the occurrence of a certain circumstance and the processor may be adapted to cause a signal to be transmitted by the transmitter only when a signal is produced by the sensor.
  • sensors which may be provided are: moisture sensors, motion/tilt sensors, tamper switches, continuity-loop sensor wires from external alarm systems, signals sent from a computer program running on an attached computer, signals sent from a co-located "RFID" chip, co-ordinates from a Global Positioning sensor, signals from a mobile phone, a magnetic field sensor such as a compass, a biometric sensor and a physiological sensor. Of course any other type of sensor could be provided.
  • At least one of the units may be provided with a connector to connect the unit with apparatus remote from the security system.
  • the connector may be adapted to allow communication with any one of the following: a video display, a web site, a telephone system, a computer network, a portable computing device, a mobile phone network, a door lock, a turnstile, another security system (which may be as defined herein). This list is not intended to be exhaustive and the skilled person will appreciate it may be desirable to allow the unit to the connected to a variety of other apparatus.
  • the connector may be adapted to make available the status of the security system.
  • the connector may be adapted to transmit the contents of the memory and/or log to the device to which the unit is connected.
  • the units are provided with an attachment device adapted to attach the unit to an article to be guarded.
  • the unit may be built into the article to be guarded.
  • security will be increased if the units can be securely attached to the unit to be guarded.
  • the unit is provided as one of the following: a tag, strap, necklace, belt, wristwatch, bracelet.
  • the unit may be adapted to be worn by a user.
  • Such embodiments are useful for guarding a collection of people, which may be children. A party of people could then be guarded and an alarm would be raised should one of the party move out of communication range, perhaps by becoming disorientated and lost or perhaps due to abduction, etc.
  • the system may comprise an anchor unit.
  • the anchor unit may have the functionality of a unit of the security system.
  • the anchor unit may be attached to a substantially permanent structure.
  • Such an anchor unit is advantageous because it may allow units to be attached to and guard highly portable articles. It will be realised that the alarm will only be raised if the predetermined rules are met, perhaps a unit of the system loses communication with the remaining units of the system. Therefore, should all of the units in the system be attached to highly portable articles which are all removed at once no alarm might be raised.
  • Providing an anchor unit is advantageous because it should prevent all of the units from being removed at once.
  • a plurality of anchor units may be provided.
  • the processor may be a microprocessor or may be a micro-controller.
  • the micro-controller may be from the PIC series from the Micro-Chip Corporation.
  • the processor may be provided by an ASIC, possibly providing lower power consumption than may be obtained from a microprocessor or micro-controller.
  • the transmitter may be an LQ-TX433A-S manufactured by LPRS Ltd.
  • the transmitter may be provided by transistor oscillator or other electronic circuit which may be stabilised using a SAW (Surface Acoustic Wave) device or crystal.
  • SAW Surface Acoustic Wave
  • the transmitter may be adapted to provide one of the following modulation formats which may be advantageous due to increased range and reliability of the system: on- off keying, amplitude shift keying, frequency shift keying, frequency modulation, amplitude modulation, frequency hopping, spread spectrum and time-modulated ultra- wide band.
  • the receiver is preferably a circuit providing the function "radio in, data out".
  • An example of such a circuit is the MICRF-OOx series from the Micrel Corporation.
  • the transmitter and the receiver may be provided in a single transceiver.
  • an ASH transceiver from RF Monolithics Inc. may be provided.
  • the transmitter, the receiver and the processor could all be provided on the same circuit, for example the BlueCore Single Chip Bluetooth Modem designed by Cambridge Silicon Radio Ltd.
  • An antenna may be provided to transmit radio signals.
  • the antenna may take any one of the following designs: whip (wire, PCB stub, or PCB spiral), wire helix (or combined whip and helix), loop (wire, or PCB, open or closed), dipole, slot, patch, dielectric resonator antenna or metal part of the attached object.
  • the antenna is a X A wavelength in length.
  • the antenna is tuned to resonate at the operating radio frequency. The skilled person will appreciate that the preferred embodiment will depend on the operating frequency and space constraints of the application.
  • the same antenna may be used by both the receiver and transmitter, or alternatively separate antennas may be provided for the transmitter and the receiver.
  • two antennas are provided in a unit increasing the reliability of the signal transmission.
  • signals transmitted from an antenna do not radiate equally in all directions.
  • the orientation of a unit will be unknown and therefore other units may lie in areas which do not receive a substantial signal from a particular antenna (ie there is no or little signal transmitted in that direction).
  • two antennas may be positioned at substantially 90° to one another, or may be positioned at some distance from one another.
  • the antennas may be used alternatively for transmission and reception.
  • the antenna system may comprise an array of antennas in one of various "beam-forming" or “radio direction finding” RDF configurations well known to those skilled in the art. This allows the unit to monitor the positions of other units from which it receives communications.
  • the processor may be adapted to use this information to generate an alarm in certain circumstances. For instance an alarm may be generated if the direction of one of the units with which the unit is in communication with moves beyond predetermined limits.
  • the array of antennas may be used to beam communications substantially only in the direction ofthe intended unit.
  • a method of providing security comprising providing at least two units capable of communicating with each other using transmitters and receivers, the method comprising sending communication signals between the two units and raising an alarm when predetermined rules are satisfied.
  • Such a method is advantageous because it provides decentralised security in which each ofthe units must be disarmed in order to disable the security.
  • the method may generate an alarm when communication fails between two units.
  • the units are attached to articles which it is desired to guard.
  • the method includes providing a plurality of units, preferably one for each article which it is desired to guard.
  • the method may comprise providing an arming mechanism to arm and/or disarm the system which is advantageous because it provides controllability over the method.
  • the method may comprise providing a master unit (or aiming unit) which transmits a suppression signal which prevents the units of the system from arming.
  • the units/system may automatically arm in the absence of the suppression signal. This is advantageous because it may allow the system to automatically arm if the master unit were moved outside the transmission range of the remaining units; for example if a person carrying the master unit moves away from units to be guarded by the security system. The system may not require guarding if the person with the master unit is in the vicinity of the remaining units.
  • the method may comprise providing more than one master and/or arming unit.
  • the system may perform a communication check. Such a check may be initiated by a unit, which may be the master unit.
  • the communication check may cause each ofthe units to communicate. Such a check is advantageous since it gives the user knowledge that the system is working.
  • a communication check is especially advantageous in situations where there is likely to be poor communication, perhaps in the vicinity of large radio or radar transmitters, or may be used to detect if j amming is occurring.
  • the method comprises causing each unit to remember the identity of all of the units with which it is in communication when the system is armed or may be within a predetermined period of the system being armed.
  • a different method may be provided for determining which units form part of the security system.
  • An input device may be provided which may be used to input the identity of units which form part of the security system.
  • the units may remember with which units they are in communication when an input is made to an input device. Each of these methods provides a convenient way of restricting the units which are protected by the method.
  • the method may comprise causing the units to transmit signals at predetermined periods. This is advantageous because it reduces the power consumption ofthe units.
  • the method may comprise causing the units to receive signals periodically. Again this is advantageous because it means that power consumption is reduced.
  • the units receive signals when a signal is being transmitted and the method may comprise techniques to ensure that transmission and reception occur at substantially concurrent times to ensure that transmissions are not lost.
  • the units transmit their status, which may include the status of a power source.
  • This is advantageous because it allows the failure of power sources to be taken into account and thus, possibly reduce the generation of false alarms.
  • the method may include the step of suppressing an alarm signal if a unit stops transmitting after a period of reporting a low power source.
  • the method also includes noting the signal strength of transmissions received form units. This again may help to reduce the number of false alarms. If it is clear that one of the units is on the fringes of a receivable signal range, it may not be surprising if it drifts in and out of communication. Therefore the method may include the step of suppressing an alarm if communication is broken to a unit which has been experiencing a weak signal strength. The skilled person will appreciate that such a step is a compromise between reducing the security offered and reducing the number of false alarms. Clearly, if the method is made too tolerant of weak signals it would become possible slowly to remove a unit so that it begins to experience reception problems and finally to remove the unit completely thus fooling the system.
  • each ofthe units may estimate the range of the other units in the system with which it is communicating. This estimation may be performed by measuring the signal strength of the signal received from other units or by measuring the time-of- flight.
  • the method may comprise causing a particular unit to ignore units which are greater than a predetermined range from the particular unit. As discussed in the previous paragraph this is advantageous because it helps to reduce the likelihood of false alarms. The skilled person will appreciate that as the range increases the received signal strength will fall and that ignoring units above a threshold distance effectively ignores those with a less than acceptable signal strength.
  • the method may provide a warning to a user that one of the units is experiencing a weak signal strength, or may be that one of the units is greater than the predetermined distance. This is advantageous because it allows the user to alter the position of the units such that all of them are within good communication range of each other.
  • the method may include providing tolerance to missed transmissions.
  • the alarm may be activated if more than a certain number of transmissions are missed. This is advantageous because it may reduce the number of false alarms.
  • Examples where the method may be used include guarding pictures within a gallery. Each picture may be fitted with a unit communicating with the other units of the system. If one of the pictures were to be stolen, the alarm may activate as disclosed herein.
  • Another possible use of the method would be to guard skis, golf clubs, etc. which could be left outside lodges, or to guard farm equipment.
  • a security unit comprising: a transmitter for transmitting a signal; a receiver for receiving such a signal when transmitted by a second, substantially identical, unit; an alarm generator; a processor adapted to activate the alarm generator according to a predetermined condition relating to the receipt or otherwise of a said signal.
  • FIGURE 1 is a schematic of a security system according to the invention.
  • FIGURE 2 is a circuit diagram for realising a unit ofthe security system of Figure 1;
  • FIGURES 3 AND 4 are schematics of further examples of security systems realising the invention.
  • FIGURE 5 shows a block diagram of a unit ofthe security system.
  • a security system comprising a number of units 2, 4, 6 is shown.
  • Each of the units comprises a transmitter 8 (in this case a LQ-TX433A-S from LPRS) capable of transmitting radio waves of substantially 433MHz with a power of lmW and a receiver 10 (in this case a MICRF-001 capable of receiving radio waves of substantially the same frequency.
  • the operation of the transmitter and receiver 8, 10 is controlled by a processor 12 (in this case a PIC12C508 micro-controller) which is provided with a memory 14.
  • the processor 12 is also connected to an alarm 16, in this case a piezo-ceramic element.
  • the components ofthe unit 2, 4, 6 are powered by a power source 18, in this case two lithium coin cells in parallel generating substantially 6 volts.
  • the processor 12 receives binary data from the receiver 10 and also receives an output from a Received Signal Strength Indication (RSSI) output of the receiver 10.
  • RSSI Received Signal Strength Indication
  • the processor 12 sends binary data to the transmitter 8.
  • the skilled person will appreciate that the rate of transmission need not be high and will be dependent upon the components used. In this particular embodiment rates of substantially 1kbps were used.
  • An antenna (not shown) comprising a printed circuit whip tuned via capacitance to a ground plane on the opposite side of the circuit board is provided for signal transmission/reception.
  • the receiver comprises a detector which is permanently operational whilst the remainder ofthe electronics within the unit is in a substantially zero power state.
  • the detector monitors for possible communications from other units and if such a communication is received fully powers the remainder of the electronics such that if the communication is a genuine communication it can be received by the receiver and processed by the processor.
  • each of a collection of articles to be guarded is provided with a unit 2, 4, 6 according to the invention, the units being securely attached to the articles.
  • a collection of articles which may be guarded using the system is a collection of suitcases.
  • the processor 12 causes the transmitter 8 periodically to transmit a signal.
  • the signal contains the identity of the unit making the transmission (which is held within an identification mechanism (not shown) of the unit).
  • the status of the battery 18 is also transmitted. Periodic transmission is beneficial because it will increase the life ofthe battery 18.
  • Each unit has a fixed transmission period, eg once every 30 seconds. Initially the receiver of a particular unit is powered continuously until a transmission has been received from each other unit. Then the receivers simply turn-on shortly before each subsequent communication is expected from other units. In order for systems comprising more than 2 units to function properly, each unit must have a different transmission period to avoid the danger of transmissions repeatedly colliding. One way of achieving this is to make each transmission-period "relatively-prime" to all the others, so that there is a low chance of two communications occurring at the same time.
  • Another way of achieving this is to "dither" the transmission time of each unit according to some complex, perhaps pseudo-random, algorithm, between limits (eg between 6 seconds and 30 seconds).
  • limits eg between 6 seconds and 30 seconds.
  • Many such algorithms are possible, for example sets of linear-feedback shift-registers, with the feedback taps chosen uniquely for each unit to minimise the number of successive collisions that are possible in the system as a whole.
  • the transmission period changes on each transmission.
  • the receiver can either have a duplicate algorithm to allow it to predict the next transmission time from each remote unit, or the "time to next transmission" can be encoded in the transmission itself.
  • the unit may attempt to re-establish communications by occasionally reverting to the initial state of "receiver always on” for the maximum allowable transmission period, during which it should hear from all other units at least once.
  • each bit of the packet is bi-phase encoded, meaning that each bit-period starts with a transition (low-to-high or high-to-low) and "one" bits have an additional transition in the centre of the period.
  • the data packets may include any ofthe following parts:
  • AGC Address Control
  • the packet may comprise a break, or silence, which may be longer than an allowable bit period. This allows the receiver 10 to recognise the following bit as the start of valid data.
  • the first byte contains an identification code and the second byte contains the status ofthe unit.
  • the communications between the units are encrypted thereby further increasing the security of the communication.
  • public-key or challenge-response algorithms may be applied to the communications.
  • each of the units 2, 4, 6 transmits such a signal 3.
  • the transmissions from each of the units 2, 4, 6 are received by the receiver 10 and the received signal is processed by the processor 12.
  • the units 2, 4, 6 have a relatively low power and therefore the transmitted signal has a range only in the order of tens of meters. Consequently units separated by more than this distance will not be able to communicate with one another. Of course, in other applications the units may have a range ofthe order of kilometres.
  • Each unit will know how many other units there are in the security system from data stored in the memory 14 and will expect to receive a signal from each of the other units. If, unexpectedly, a signal is not received from one ofthe units 2, 4, 6, each of the processors 12 within the security system causes the alarm 16 to be activated. Also, if one particular unit does not receive any signals from the remaining units (eg it is the unit that has been removed/stolen) it will sound its alarm 16. Therefore, if, as in this example, a unit 2, 4, 6 is attached to a number of suitcases the alarm will sound on each of the suitcases. To improve tolerance to false alarms there may be more than one missed communication before the processor causes an alarm to be generated.
  • Such a system may be beneficial if a user were travelling with a number of suitcases.
  • the cases By providing a unit according to the invention on each of the cases, the cases would effectively guard one another. If one of the cases were stolen, and moved out of the transmitting range of the other units, then the alarm 16 would sound on each of the cases; on the stolen case and on the ones which were not stolen.
  • the battery 18 If the system is left active for a long period it is possible for the battery 18 to fail. Clearly, should the battery fail within a particular unit then that unit will no longer be capable of transmitting a signal. This situation would be analogous to the unit being stolen and being moved out of transmission range. Therefore, in this particular embodiment the battery 18 status is transmitted within the signal. If a particular unit has been reporting a low battery 18 status for a period of time then the remaining units of the system do not activate the alarm 16 if that particular unit suddenly stops transmitting. The remaining units effectively realise that the battery 18 of the particular unit has failed.
  • the units may estimate the range of other units based upon the received signal strength. If the estimated range is above a threshold limit that particular unit may be discounted. Of course, other units may still be in range of that particular unit and continue to guard that unit. A user of the system may be provided with a warning that a unit is "out of range" allowing the user to move that particular unit.
  • an anchor unit 20 (or base station) is provided on a substantially permanent structure 22, in this case a pillar.
  • a substantially permanent structure 22 in this case a pillar.
  • the provision of the anchor unit 20 on the pillar 22 ensures that not all of the units of the system can be stolen, and removed, at the same instance. Should all of the suitcases 24, 26, 28 be stolen together, the units 30, 32, 34 would still each remain in communication, but each of those units (30, 32, 34) would lose communication with the anchor unit 20. Because communication with one of the units has been lost then all of the alarm means 16 would be activated.
  • Fixed units such as anchor unit 20 may be provided in public areas so that users of the security system can guard articles fitted with the security system. Of course, more than one anchor 20 could be provided.
  • FIG. 4 Yet another embodiment of the invention is shown in Figure 4 wherein a master unit 36 is provided.
  • the master unit 36 can be used to control the security system and is provided with a display 44 and an alarm 46.
  • the remaining units 38, 40, 42 are not provided with alarms (although of course they could be) but are provided with key-receiving mechanisms.
  • An arming mechanism 48 is also provided on the master unit. (The master unit may be thought of as an arming unit).
  • the display is adapted in this embodiment to display the status of units within the security system and in this embodiment comprises an LCD display.
  • the display 44 may function in conjunction with an input device (not shown) so that the user can manipulate the display so that the desired information is displayed on the display 44.
  • the whole system can be armed by the use of the arming mechanism 48.
  • the master unit 36 transmits an arming code or key to the remaining units 38, 40, 42 which is received by the receiver and the key-receiving mechanism.
  • the units start periodically to transmit signals as described in relation to Figures 1 and 3.
  • a signal propagates back to the master unit that the alarm 46 is activated.
  • the master unit 36 and other units change the arming code after each use according to a predetermined sequence so that the code cannot be fraudulently copied.
  • Providing a master unit 36 in this manner allows the remaining units 38, 40, 42 to be made simpler and cheaper, whilst maintaining the functionality ofthe system.
  • the master unit 36 is not provided with a physical arming mechanism 48 which must be activated, neither is the master unit 36 the only unit provided with an alarm (each unit being provided with its own alarm).
  • the master unit 36 periodically transmits a suppression signal which is received by the remaining units 38, 40, 42. As long as the remaining units 38, 40, 42 receive the suppression signal the system remains unarmed. As soon as reception of the suppression signal by the remaining units 38, 40, 42 is lost or the distance exceeds a given value, the system becomes armed, this reception acting as the arming mechanism. Once armed, should communication be lost between any of the remaining units 38, 40, 42, then the alarm of each of the remaining units 38, 40, 42 is activated.
  • Such an embodiment is useful because it provides for automatic arming of the system.
  • the master unit 36 would be carried by the person in charge ofthe cases. Whilst that person is carrying the cases there is no need for the system to be armed, and indeed in this embodiment the system would not be armed because each of the units on the cases would be in communication with the master unit and receive the suppression signal.
  • the system would automatically arm when the cases are left by the person looking after them and would guard one another.
  • each of the units of the system is provided with an arming mechanism.
  • a user activates the arming mechanism on each ofthe units ofthe system in order to activate the security system.
  • the units of the system will only remember the identities of units which start communication within a predetermined period of the system being activated. This will prevent the units from guarding units which are not part of that particular security system. For instance, if two groups of suitcases were each fitted with units according to the invention, then each suitcase within each group would guard each of the others. If, however, the two groups were brought into close proximity and the units simply guarded any unit with which they were in communication, then the units of the two groups would start guarding each other. Therefore, when the two groups were again separated the alarms of the units would be activated. Programming the units to guard only those units which are in communication with each other within a predetermined arming period would overcome this problem.
  • the basic algorithm of the security system may be thought of as "when armed, detect all other units and then generate an alarm if predetermined circumstances occur (or predetermined rules are satisfied)". Thus, as discussed in the preceding paragraph, this may cause the system to guard units which it should not be guarding. Causing the units to remember the units which they should guard may be likened to a teaching phase.
  • the predetermined rules may require that an alarm be generated if communication is lost with any unit of the systems. Such rules are useful as described in the embodiment described above.
  • the rules may require that an alarm is generated if communication is received from a unit or too many units. Generation of an alarm by too many units may be useful for preventing overcrowding, perhaps in lifts or other confined spaces.
  • an alarm may be generated if a unit becomes present. Such a system would be useful for enforcing exclusion orders.
  • a unit may generate an alarm should a unit having a particular unique identity or class of membership be detected.
  • one or more of the units may be provided with an input device which in one embodiment is a button.
  • the input device which in one embodiment is a button.
  • the input means may be a keyboard, a collection of keys, or other data input devices which can be used to input the identity of the units which those particular units should guard.
  • the input device allows the rules which govern whether or not an alarm is generated to be altered, thus changing the functionality of the system.
  • the rules may also be modified following communication from other units providing instructions to change the rules.
  • the rules governing whether or not an alarm is generated may be arbitrarily complex, and may comprise Boolean or arithmetical expressions based on any number of variables. Variables may include the state of sensors, the received signal strength, the measured distance, the presence or absence of particular units with a unique identification or class, time, etc. [Each unit may be provided with a clock.]
  • Sensors may be provided as an input to the processors of the units. Such sensors allow the unit to be aware of its su ⁇ oundings and may be used to generate alarms based on readings from the sensors. Examples of sensors which may be provided include: tamper-switches, continuity-loop sensor wires from external alarm systems (e.g. VolumetricTM), signals sent from a computer program running on an attached computer, signals sent from a co-located passive "RFID" chip, co-ordinates from a GPS positioning sensor, signals from a telephone (including mobile) and including the ringing signal, moisture sensors, motion and tilt sensors, magnetic field sensors including compasses, biometric sensors and physiological sensors.
  • tamper-switches e.g. VolumetricTM
  • continuity-loop sensor wires from external alarm systems e.g. VolumetricTM
  • signals sent from a computer program running on an attached computer signals sent from a co-located passive "RFID" chip
  • co-ordinates from a GPS positioning sensor signals from a telephone (including
  • the key receiving mechanism on the arming units may receive mechanical keys rather than an electronic code to arm the units.
  • one of the units is provided with a connector which allows the security system to interface with an external piece of apparatus.
  • the external piece of apparatus may be a computer network, a telephone, a visual display unit (or other display), a portable computing device, a mobile phone network, a door lock, a turnstile, another security system, or some other device.
  • a connector allows the status ofthe system to be observed.
  • the processor may be adapted to cause the transmitter to transmit a predetermined class to which that particular unit has been designated.
  • Not transmitting a unique identification is advantageous in some circumstances because it will prevent abuse of user's privacy wherein the transmissions could be used to track a particular unit if a unique identification is transmitted. Transmitting a predetermined class would not allow a particular unit to be tracked.
  • having predetermined classes to which units belong may provide functionalities which although possible by transmitting a unique identification may be easier to implement by transmitting a class. Indeed, in some embodiments a portion of the unique identification may comprise a class, or a class may be transmitted in addition to the unique identification.
  • Examples of uses relying on a class to be transmitted include providing children with units which transmit membership of a "child” class.
  • Units provided on turnstiles may receive communications from the units, identify that they belong to the "child” class and only allow them to pass if a unit belonging to an "adult” class is also present.
  • guns may be provided with units which only operate when they detect a communication from a unit belonging to a "firing range" class.
  • a class based system could be used to guard a building where units in the vicinity of an entrance produce an alarm if a unit belonging to the class "asset” (which is attached to a company asset) leaves the building without there also being present a unit belonging to the class "employee".
  • assert which is attached to a company asset
  • employee The skilled person will appreciate that the use of such classes has many uses.
  • a further example would be restricting access to a secure piece of equipment which requires two people to be present. People could be issued with a unit belonging to a "person” class and the equipment may only become operational if a unit attached to it detects two units ofthe "person” class.
  • Class of membership (unlike unique identifications) are not specific to individual units and therefore this class of membership is harder to use to invade privacy.
  • the processing means stores within the memory a log of events which the unit has experienced. This log can be accessed via communications with other units or via the connector.
  • FIG. 2 An example of a circuit for providing a unit is shown in Figure 2.
  • the power supply (not shown) is connected to the terminals BATl, BAT2, and the section labelled A smoothes, filters and regulates this power supply.
  • the circuit section labelled B is a transmitter, which is driven by a pin 6 of UI.
  • the receiver of the unit is provided by section C.
  • the majority of section D provides the processing power of the circuit.
  • a battery low sensor is provided by the Zener diode and resistor pair at E.
  • An LED F provides an output to the unit, and a push button switch G provides an input.
  • a piezo sounder H provides an alarm.

Abstract

A security system comprising a plurality of units (2, 4, 6), each being provided with a power source, a processor (U1), a transmitter (TX1) and a receiver (U2), and at least one of the units further being provided with an alarm (H). The units (2, 4, 6) are operable to communicate with each other by way of the transmitters (TX1) and receivers (U2), and the processor (U1) is adapted to generate an alarm signal in the event that certain communication events occur.

Description

IMPROVEMENTS RELATING TO SECURITY
This invention relates to a new security system and a method of providing security.
It is well known that it is desirable to provide security for various types of articles. For example items of high value, high intrinsic value, of sentimental value, children, pets, may all need to be guarded.
There are many known security systems which aim to provide security for objects. As will be appreciated each of these existing systems has its own separate advantages and disadvantages. One ofthe most basic systems is provided by locking the articles in place. This is simple but effective and yet is easy to overcome if the correct tools are available. Further, such an approach is not applicable to certain situations, for example guarding children in a playground and other similar situations.
It is also known to provide an alarm in association with each item that is being guarded. Such an alarm may be activated by motion, tampering, removal of the article, etc. Again, such a system would not be suitable for guarding children within a playground, or guarding a collection of articles which are moved from place to place (for example a group of suitcases). These systems are vulnerable to attack on each of the alarms, ie the individual alarm can be muffled, or broken to prevent it from sounding.
Further, so-called burglar alarms are well known wherein sensors are provided which are connected to a centralised alarm system. Once again such systems cannot provide protection for objects which are mobile (for example collections of bags, groups of children). Further, such centralised alarm systems are vulnerable to an attack on the centralised alarm system.
According to a first aspect of the invention there is provided a security system comprising at least two units, each unit comprising a power source adapted to power the unit, a processor, a transmitter, a receiver and at least one of the units having an alarm, the units having the ability to communicate with each other via the transmitters and receivers, the processors being adapted to control the units and to cause the alarm to generate an alarm signal when predetermined rules are satisfied.
Such a system is advantageous because it allows a unit to be applied to an article to be guarded. Because the system relies on communication between the two units there is no central control system open to attack and each unit must be individually disabled to disable the security system as a whole.
In one embodiment, at least one processor is adapted to generate an alarm when communication fails between the two units, providing a simple system. As will be appreciated the predetermined rules may cover a number of situations, some of which are outlined hereinbelow.
In one arrangement if one of the units is disabled then the other will lose communication with it and an alarm will be raised. If an article to which one of the units is attached is simply removed then eventually it is likely that it will be taken beyond the communication range of the units (or an obstruction will intervene) and again communication will fail allowing an alarm to be raised, if communication failure is a predetermined rule.
Preferably there are more than two units, each of which has the ability to communicate with all the other units of the system. This is advantageous because it will allow more than two articles to be guarded with a single unit being provided for each article.
Each of the units in the system may be adapted to generate an alarm when predetermined rules are met, which may be when communication fails with any one of the units or when the distance from any one of the units exceeds a given value.
This is advantageous since an alarm will emanate from each of the units even if only one of the units has been stolen, run away, etc. causing the predetermined rules to be met.
The alarm may be provided by one or more of the following: a sound or vibration generating mechanism (eg a piezo electric sounder or other electric sounder), a light emitting device, a display screen, an electric shock generator, an explosive device, an electromagnetic lock or catch, or by signalling to a connected or remote (e.g. wireless) apparatus.
In an alternative embodiment only some of the units are provided with an alarm. An advantage of this is that it may be cheaper to realise than providing an alarm with each unit. The units may also be smaller and more convenient. In such an embodiment a unit provided with the alarm may be thought of as a master unit.
The transmitter of at least one of the units may be adapted periodically to transmit a signal, this being advantageous over continuous transmission because it is more power efficient. Of course, it would be equally possible to provide a transmitter which transmitted a signal continuously. Further, the receiver may be powered periodically and therefore capable of receiving a signal periodically.
The skilled person will appreciate that two initially in-phase uncoπelated periodic signals will gradually drift out of phase. Therefore, should two units simply communicate at predetermined intervals, eventually the units may drift apart so that no receivers are listening when a transmission occurs. Therefore, the processor of one of the units may be adapted to control when the transmitter transmits signals and may be adapted to operate the transmitter when the receiver of another unit is activated to receive a signal. Alternatively, or additionally, the processor may be adapted to control when the receiver receives signals and may be adapted to operate the receiver when the transmitter of another unit is transmitting a signal. The processor may be adapted to learn when transmission is expected and only activate the receiver at this time. The receiver may be adapted to be powered and capable of receiving a signal for a period either side of when a signal is expected so increasing the likelihood of receiving the signal.
Further, the transmitter may be adapted to transmit pieces of information, which may include any from the following list: the identity of the unit from which the communication originated (unit identification), the class of unit from which the communication originated, the level of output from the power source of the unit, the status of the unit, when the next transmission will occur. Each of these pieces of information has its own separate advantages. For instance it is advantageous to transmit the unit identification so that the remaining units of the system can tell from where the transmission originates. There may be a number of different classes of unit within the security systems which may have one or more units within them. Units within the systems may be adapted to have different responses depending upon what class of unit they are in communication with.
Transmission of the level of output power from the power source is advantageous in that it helps to prevent false alarms through power source failure. Clearly, if a power source fails the unit will stop transmitting. Generally, such a lack of transmission would cause the remaining units to generate an alarm. However, the processors of the units may be adapted to suppress the generation of an alarm if a unit stops transmitting after a period of reporting low power source levels. The processors may be adapted to warn the user of a low power source before that power source fails.
The processors of the units of the system may be adapted to generate an alarm if one ofthe units transmits a status signal indicating that an alarm should be generated.
Preferably the transmitters and receivers are respectively adapted to transmit and receive radio signals. Such a medium is advantageous because it is generally omnidirectional, will pass through a number of obstructions (ie does not necessarily require line-of-sight communication) and has a finite range. It is advantageous to have a finite range because for some embodiments of the system to function, communication must eventually be lost if one ofthe units is removed.
In one embodiment the transmitters and the receivers are adapted to operate at substantially 433MHz. Such a frequency is advantageous because it is an unlicensed frequency (not requiring a licence to use) and will thus be readily available for such use. The skilled person will appreciate that the system may operate using any radio frequency and that 433MHz is merely one embodiment.
The units may communicate with each other using standard frequency-based communications, including frequency modulation and amplitude modulation. Where digital signals are used, frequency shift keying (FSK) or amplitude shift keying (ASK) may be appropriate, or frequency-hopping or spread-spectrum. Alternatively, time-modulated ultra-wide band (UWB) communications technology may be employed, in which precisely timed (possibly down to picosecond resolution) extremely short pulses are used to transmit digital data over a wide range of frequencies.
In an alternative embodiment, the transmitters and the receivers are adapted to communicate short pulse signals to each other. The pulse signals will generally be unmodulated, that is to say, not capable of transmitting information other than an indication of the presence of a unit. The processors of the units in this embodiment are preferably adapted to expect to receive pulse signals from predetermined other units at predetermined times or periods of time, thus providing a simple method of determining the presence or otherwise of a given unit within the system.
Furthermore, the processors may be adapted only to activate the receivers when a pulse is expected, thereby helping to reduce power consumption. As a development of this communications protocol, the units may undergo an initialisation stage in which, say, modulated RF data packets are transmitted and received at predetermined times and intervals, the data packets including information serving to identify the respective transmitting unit to the other units. Once the processors of the various units have learned the expected pattern of times and intervals, pulse signals (say, a few cycles at a given operating frequency, e.g. 433MHz) rather than full data packets may be transmitted so as to indicate the presence of each unit within the system. This process may be continuously controlled by a slowly-clocked CMOS integrated circuit, thus further helping to reduce power consumption.
In some embodiments the transmitters and receivers have a range of about lm to 150m, perhaps about 30m to 125m. In one embodiment the transmitters and receivers may have a range of about 100m. In an alternative embodiment, the transmitters and receivers may have a range of 5m, 10m or 20m. It will be apparent that, for embodiments which generate an alarm when communication fails, the range of transmission is a compromise between providing a degree of freedom of movement for each of the units but providing a relatively short distance before communication fails between units and an alarm is generated. If the range is too short alarms will be generated too easily and if the range is too long a low degree of security will be provided since too much freedom will be given to the units.
In other embodiments, the range may be several kilometres (may be substantially 1, 2, 3, 4, 5, 6km or more). Such ranges are advantageous for providing security for items which in general use are separated by distances of these orders. An example of such items would be farm machinery. The skilled person will appreciate that the range must allow the item to perform its usual function without the generation of false alarms.
The receiver of at least one of the units may comprise a detector adapted to detect communication from another unit. In normal operation the unit may be adapted to operate in a low power state and be further adapted to become fully operational when the detector detects a possible communication. It will be appreciated that in the low power state some power may actually be drawn from the power source. A detector which allows the units to operate in a low power state is advantageous because it increases the life of the power source. The at least one unit may be adapted to become fully operational for a predetermined period of time upon detection of a possible communication. Alternatively or in addition, the at least one unit may be adapted to return to the low power state upon detection of a "sleep" communication directed either generally to all ofthe units or to that particular unit.
The power source may be a battery which provides a convenient source of power. The battery may or may not be rechargeable. Alternatively, or additionally, a solar cell or a Peltier junction may provide the source of power. A capacitor may be provided in association with the solar cell, allowing power fluctuations in the output ofthe cell to be smoothed.
Alternatively, or additionally, power may be derived from an external power supply, which may or may not be permanently wired to the unit. An example of this would be a charger or mains wiring. In another alternative or additional embodiment power may be derived via electromagnetic coupling or induction from a nearby coil or antenna, which may be provided on a nearby anchor unit. Power may also be provided from motion via an electric generator or piezo generator.
At least one and preferably each unit of the system may be provided with an identification mechanism adapted to provide unit identity. The processor of at least one of the units may be adapted to interact with the identification mechanism and transmit the unit identity via the transmitter. Indeed, the identification mechanism may be a part of the processor. As discussed hereinbefore this is advantageous so that each unit can identify itself to the other units of the system, and units receiving transmissions will know from where the transmission originated. The identification mechanism may provide a unique identification for a particular unit or may identify a unit as belonging to a particular class. Indeed, in some embodiments the identification mechanism may provide both a unique identification and also a class of membership. Providing a class membership is advantageous because it allows the units ofthe system to behave differently when communicating with units of different classes. Further, because a class of membership is not unique to a particular unit, the communications could not be used to invade privacy as could communications involving a unique identification.
The units may further comprise an arming mechanism adapted to cause the unit to become operational. The arming mechanism may comprise a key-receiving mechanism adapted to receive a key. The key-receiving mechanism may be adapted to receive any one of the following: an electronic key (for example a smart card or similar), a mechanical key, an arming code transmitted to the unit and received by the receiver.
One or more units of the system may comprise an arming unit adapted to arm the system. The arming unit may be adapted to transmit an arming code which arms and/or disarms the remaining units of the system. When the system comprises a master unit having an alarm, the master unit and the arming unit may be the same unit. In an alternative embodiment the master unit and the arming unit may comprise separate units.
In an alternative embodiment the master and/or arming unit may be adapted to transmit a suppression signal adapted to prevent the units of the system from arming. The units of the system may be adapted to arm if they do not receive the suppression signal for a predetermined period. It will be appreciated that in a different embodiment the suppression signal may prevent the units of the system from disarming and keep them armed when they are receiving the signal.
Alternatively, the system may become armed when the power source of each unit is connected.
Where an arming unit is provided it may be adapted periodically to change the arming code. An advantage of this is that it prevents the arming code being copied and fraudulently used by a third party to arm or disarm the system. The skilled person will appreciate that algorithms for securely changing a code are well known. Further, it will be appreciated that if the code is to be changed, the units receiving the arming code must alter the code they are expecting to receive in the same manner as the unit transmitting the arming code. An example of such an algorithm is the Keyloq™ protocol.
The units may be adapted to encrypt communications. An advantage of encryption is that system security is increased. Encryption algorithms will be well known to the person skilled in the art but may include public-key or challenge response algorithms. When the units are encrypting the communications a single communication may become several transmissions, encoded for each recipient unit.
The unit may be provided with a memory. The processor may be adapted to store within the memory the identities of the units with which it is in communication. Remembering the identities in this manner allows the system to track the units within the system. In embodiments where an alarm is generated when communication fails, tracking the units of the system will allow the unit to know when one of the units is no longer in communication, indicating that an alarm should be raised.
The processor may be adapted to store a log of events within the memory. An event may be any action of which the unit becomes aware for example: a reading from a sensor, the contents of communications received from other units, the time at which the event occurs, etc. The processor may be capable of causing the transmitter to transmit all or some ofthe contents of the log and/or memory. The processor may be adapted to cause such a transmission when a predetermined communication is received, or at predetermined times, or after a predetermined sensor input, etc.
The processor of a particular unit may be adapted to store in the memory only the identity of those units which are in communication with the particular unit at a certain time or during a certain period. The period may be within a predetermined period of the system becoming armed. This is advantageous because it prevents the units, including units which are not part of the desired security system, from being included in the security system. The system is designed to guard articles to which the units are attached using communications between the individual units. Clearly, any unit of substantially the same design is capable of communicating with the units of the system. If units are simply included into the system as and when they come into communication then the system could guard articles which it is not intended to guard (that is articles fitted with units which can communicate with units of the system). Only remembering the identity of some units has the advantage that units which should not be included into the system will not be included into the system.
In an alternative embodiment the units may be adapted to generate an alarm if a communication is received from a unit having a particular identification or from a unit belonging to a particular class. This is advantageous because it could be used to enforce an exclusion order against a party. For instance, that party may be provided with a unit having a known identification and other units situated in an excluded area may be programmed so that if they detect the known identification an alarm is generated. In another example, a lift may be provided with a unit and passengers may be provided with units belonging to a class defined as passengers. The unit provided on the lift may count passengers into the lift and generate an alarm once the number of passengers exceeds a predetermined limit. A further example would be to exclude visitors from restricted areas of a premises. An alarm may be generated should the presence of a unit belonging to a visitor be detected.
The predetermined rules may be arbitrarily complex and may be based upon a number of parameters which may include any of the following: state of external sensors, the presence/absence of particular unit identities, presence/absence of units belonging to a particular class, contents of communications from other units, data held within the processor and/or memory.
The processor may be provided with an input device adapted to program the processor with the identity of units which are part ofthe system. As discussed in the previous paragraph this is advantageous because it will prevent units which it is not desired to guard entering the system. In another embodiment the identities of units which are in communication with a particular unit are stored in the memory whilst the input device is activated. The input device may be a button, switch, a keyboard, a collection of keys, etc. In use, a user may activate the input device for a period, during which time the processor stores the identities of units with which it is communicating.
The predetermined rules which define when the processor is adapted to generate an alarm may be alterable by a user. The input device may be further adapted to allow the rules to be changed. Clearly, this is advantageous because it will allow the functionality of the system to be altered to suit the current requirement. Alternatively, or additionally, the processor may be adapted to alter the predetermined rules upon receipt of a predetermined communication from another unit. The processor may be adapted to change the predetermined rules on the basis of events.
At least one of the units may be provided with other sensors whose outputs are connected to the processor. The processor may be adapted to monitor the outputs from these sensors and may be further adapted to transmit information relating to the sensor output to the transmitter. For instance, the sensor may be adapted to generate a signal within an allowable range and the processor may be adapted to cause the transmitter to transmit a signal if the signal from the sensor falls outside this allowable range. In another embodiment the sensor may be adapted to generate a signal only on the occurrence of a certain circumstance and the processor may be adapted to cause a signal to be transmitted by the transmitter only when a signal is produced by the sensor.
Examples of sensors which may be provided are: moisture sensors, motion/tilt sensors, tamper switches, continuity-loop sensor wires from external alarm systems, signals sent from a computer program running on an attached computer, signals sent from a co-located "RFID" chip, co-ordinates from a Global Positioning sensor, signals from a mobile phone, a magnetic field sensor such as a compass, a biometric sensor and a physiological sensor. Of course any other type of sensor could be provided.
At least one of the units may be provided with a connector to connect the unit with apparatus remote from the security system. For example the connector may be adapted to allow communication with any one of the following: a video display, a web site, a telephone system, a computer network, a portable computing device, a mobile phone network, a door lock, a turnstile, another security system (which may be as defined herein). This list is not intended to be exhaustive and the skilled person will appreciate it may be desirable to allow the unit to the connected to a variety of other apparatus. The connector may be adapted to make available the status of the security system. The connector may be adapted to transmit the contents of the memory and/or log to the device to which the unit is connected.
Preferably the units are provided with an attachment device adapted to attach the unit to an article to be guarded. Alternatively the unit may be built into the article to be guarded. Clearly, security will be increased if the units can be securely attached to the unit to be guarded.
In one embodiment the unit is provided as one of the following: a tag, strap, necklace, belt, wristwatch, bracelet. The unit may be adapted to be worn by a user. Such embodiments are useful for guarding a collection of people, which may be children. A party of people could then be guarded and an alarm would be raised should one of the party move out of communication range, perhaps by becoming disorientated and lost or perhaps due to abduction, etc.
The system may comprise an anchor unit. The anchor unit may have the functionality of a unit of the security system. The anchor unit may be attached to a substantially permanent structure. Such an anchor unit is advantageous because it may allow units to be attached to and guard highly portable articles. It will be realised that the alarm will only be raised if the predetermined rules are met, perhaps a unit of the system loses communication with the remaining units of the system. Therefore, should all of the units in the system be attached to highly portable articles which are all removed at once no alarm might be raised. Providing an anchor unit is advantageous because it should prevent all of the units from being removed at once. A plurality of anchor units may be provided.
The processor may be a microprocessor or may be a micro-controller. In one embodiment the micro-controller may be from the PIC series from the Micro-Chip Corporation. In another embodiment the processor may be provided by an ASIC, possibly providing lower power consumption than may be obtained from a microprocessor or micro-controller.
In one embodiment the transmitter may be an LQ-TX433A-S manufactured by LPRS Ltd. In an alternative embodiment the transmitter may be provided by transistor oscillator or other electronic circuit which may be stabilised using a SAW (Surface Acoustic Wave) device or crystal.
The transmitter may be adapted to provide one of the following modulation formats which may be advantageous due to increased range and reliability of the system: on- off keying, amplitude shift keying, frequency shift keying, frequency modulation, amplitude modulation, frequency hopping, spread spectrum and time-modulated ultra- wide band.
The receiver is preferably a circuit providing the function "radio in, data out". An example of such a circuit is the MICRF-OOx series from the Micrel Corporation.
Alternatively, the transmitter and the receiver may be provided in a single transceiver. For example an ASH transceiver from RF Monolithics Inc. may be provided. Indeed, the transmitter, the receiver and the processor could all be provided on the same circuit, for example the BlueCore Single Chip Bluetooth Modem designed by Cambridge Silicon Radio Ltd.
An antenna may be provided to transmit radio signals. The antenna may take any one of the following designs: whip (wire, PCB stub, or PCB spiral), wire helix (or combined whip and helix), loop (wire, or PCB, open or closed), dipole, slot, patch, dielectric resonator antenna or metal part of the attached object. Preferably, the antenna is a XA wavelength in length. Conveniently the antenna is tuned to resonate at the operating radio frequency. The skilled person will appreciate that the preferred embodiment will depend on the operating frequency and space constraints of the application.
The same antenna may be used by both the receiver and transmitter, or alternatively separate antennas may be provided for the transmitter and the receiver.
In one embodiment two antennas are provided in a unit increasing the reliability of the signal transmission. The skilled person will appreciate that signals transmitted from an antenna do not radiate equally in all directions. The orientation of a unit will be unknown and therefore other units may lie in areas which do not receive a substantial signal from a particular antenna (ie there is no or little signal transmitted in that direction). Should two antennas be provided they may be positioned at substantially 90° to one another, or may be positioned at some distance from one another. The antennas may be used alternatively for transmission and reception. These techniques are advantageous due to increased coverage of the radio transmission and reducing possible blind spots.
In some embodiments the antenna system may comprise an array of antennas in one of various "beam-forming" or "radio direction finding" RDF configurations well known to those skilled in the art. This allows the unit to monitor the positions of other units from which it receives communications. The processor may be adapted to use this information to generate an alarm in certain circumstances. For instance an alarm may be generated if the direction of one of the units with which the unit is in communication with moves beyond predetermined limits. Alternatively, or additionally, the array of antennas may be used to beam communications substantially only in the direction ofthe intended unit.
According to a second aspect of the invention there is provided a method of providing security comprising providing at least two units capable of communicating with each other using transmitters and receivers, the method comprising sending communication signals between the two units and raising an alarm when predetermined rules are satisfied.
Such a method is advantageous because it provides decentralised security in which each ofthe units must be disarmed in order to disable the security.
The method may generate an alarm when communication fails between two units.
Preferably the units are attached to articles which it is desired to guard. Conveniently, the method includes providing a plurality of units, preferably one for each article which it is desired to guard.
The method may comprise providing an arming mechanism to arm and/or disarm the system which is advantageous because it provides controllability over the method.
The method may comprise providing a master unit (or aiming unit) which transmits a suppression signal which prevents the units of the system from arming. The units/system may automatically arm in the absence of the suppression signal. This is advantageous because it may allow the system to automatically arm if the master unit were moved outside the transmission range of the remaining units; for example if a person carrying the master unit moves away from units to be guarded by the security system. The system may not require guarding if the person with the master unit is in the vicinity of the remaining units. The method may comprise providing more than one master and/or arming unit.
The system may perform a communication check. Such a check may be initiated by a unit, which may be the master unit. The communication check may cause each ofthe units to communicate. Such a check is advantageous since it gives the user knowledge that the system is working. A communication check is especially advantageous in situations where there is likely to be poor communication, perhaps in the vicinity of large radio or radar transmitters, or may be used to detect if j amming is occurring.
In one embodiment, the method comprises causing each unit to remember the identity of all of the units with which it is in communication when the system is armed or may be within a predetermined period of the system being armed. This has the advantage that the units which are not part of the system but which are capable of communicating with the units (perhaps on neighbouring systems) do not become included in the method (unless they are in communication when the system is armed).
Alternatively, or additionally, a different method may be provided for determining which units form part of the security system. An input device may be provided which may be used to input the identity of units which form part of the security system. Alternatively, or additionally, the units may remember with which units they are in communication when an input is made to an input device. Each of these methods provides a convenient way of restricting the units which are protected by the method.
The method may comprise causing the units to transmit signals at predetermined periods. This is advantageous because it reduces the power consumption ofthe units. The method may comprise causing the units to receive signals periodically. Again this is advantageous because it means that power consumption is reduced. Preferably, the units receive signals when a signal is being transmitted and the method may comprise techniques to ensure that transmission and reception occur at substantially concurrent times to ensure that transmissions are not lost.
Preferably the units transmit their status, which may include the status of a power source. This is advantageous because it allows the failure of power sources to be taken into account and thus, possibly reduce the generation of false alarms. The skilled person will appreciate that if a power source fails the unit which it is powering will stop transmitting generally resulting in an alarm. However, the method may include the step of suppressing an alarm signal if a unit stops transmitting after a period of reporting a low power source.
Preferably the method also includes noting the signal strength of transmissions received form units. This again may help to reduce the number of false alarms. If it is clear that one of the units is on the fringes of a receivable signal range, it may not be surprising if it drifts in and out of communication. Therefore the method may include the step of suppressing an alarm if communication is broken to a unit which has been experiencing a weak signal strength. The skilled person will appreciate that such a step is a compromise between reducing the security offered and reducing the number of false alarms. Clearly, if the method is made too tolerant of weak signals it would become possible slowly to remove a unit so that it begins to experience reception problems and finally to remove the unit completely thus fooling the system.
Further, each ofthe units may estimate the range of the other units in the system with which it is communicating. This estimation may be performed by measuring the signal strength of the signal received from other units or by measuring the time-of- flight. The method may comprise causing a particular unit to ignore units which are greater than a predetermined range from the particular unit. As discussed in the previous paragraph this is advantageous because it helps to reduce the likelihood of false alarms. The skilled person will appreciate that as the range increases the received signal strength will fall and that ignoring units above a threshold distance effectively ignores those with a less than acceptable signal strength.
Additionally or alternatively the method may provide a warning to a user that one of the units is experiencing a weak signal strength, or may be that one of the units is greater than the predetermined distance. This is advantageous because it allows the user to alter the position of the units such that all of them are within good communication range of each other.
The method may include providing tolerance to missed transmissions. The alarm may be activated if more than a certain number of transmissions are missed. This is advantageous because it may reduce the number of false alarms.
Examples where the method may be used include guarding pictures within a gallery. Each picture may be fitted with a unit communicating with the other units of the system. If one of the pictures were to be stolen, the alarm may activate as disclosed herein.
Another possible use of the method would be to guard skis, golf clubs, etc. which could be left outside lodges, or to guard farm equipment.
According to a third aspect of the invention there is provided a security unit comprising: a transmitter for transmitting a signal; a receiver for receiving such a signal when transmitted by a second, substantially identical, unit; an alarm generator; a processor adapted to activate the alarm generator according to a predetermined condition relating to the receipt or otherwise of a said signal. For a better understanding ofthe present invention and to show how it may be carried into effect, reference shall now be made, by way of example, to the accompanying drawings, in which:
FIGURE 1 is a schematic of a security system according to the invention;
FIGURE 2 is a circuit diagram for realising a unit ofthe security system of Figure 1;
FIGURES 3 AND 4 are schematics of further examples of security systems realising the invention; and
FIGURE 5 shows a block diagram of a unit ofthe security system.
A security system comprising a number of units 2, 4, 6 is shown. Each of the units comprises a transmitter 8 (in this case a LQ-TX433A-S from LPRS) capable of transmitting radio waves of substantially 433MHz with a power of lmW and a receiver 10 (in this case a MICRF-001 capable of receiving radio waves of substantially the same frequency. The operation of the transmitter and receiver 8, 10 is controlled by a processor 12 (in this case a PIC12C508 micro-controller) which is provided with a memory 14. The processor 12 is also connected to an alarm 16, in this case a piezo-ceramic element. The components ofthe unit 2, 4, 6 are powered by a power source 18, in this case two lithium coin cells in parallel generating substantially 6 volts.
The processor 12 receives binary data from the receiver 10 and also receives an output from a Received Signal Strength Indication (RSSI) output of the receiver 10. The RSSI output is particularly useful as will be appreciated from the discussions hereinafter. The processor 12 sends binary data to the transmitter 8. The skilled person will appreciate that the rate of transmission need not be high and will be dependent upon the components used. In this particular embodiment rates of substantially 1kbps were used. An antenna (not shown) comprising a printed circuit whip tuned via capacitance to a ground plane on the opposite side of the circuit board is provided for signal transmission/reception.
In some embodiments the receiver comprises a detector which is permanently operational whilst the remainder ofthe electronics within the unit is in a substantially zero power state. The detector monitors for possible communications from other units and if such a communication is received fully powers the remainder of the electronics such that if the communication is a genuine communication it can be received by the receiver and processed by the processor.
In one embodiment, each of a collection of articles to be guarded is provided with a unit 2, 4, 6 according to the invention, the units being securely attached to the articles. An example of a collection of articles which may be guarded using the system is a collection of suitcases.
Once the units 2, 4, 6 ofthe system are armed the processor 12 causes the transmitter 8 periodically to transmit a signal. The signal contains the identity of the unit making the transmission (which is held within an identification mechanism (not shown) of the unit). The status of the battery 18 is also transmitted. Periodic transmission is beneficial because it will increase the life ofthe battery 18.
Possible schemes which may allow the periodic transmission to work are as follows:
Each unit has a fixed transmission period, eg once every 30 seconds. Initially the receiver of a particular unit is powered continuously until a transmission has been received from each other unit. Then the receivers simply turn-on shortly before each subsequent communication is expected from other units. In order for systems comprising more than 2 units to function properly, each unit must have a different transmission period to avoid the danger of transmissions repeatedly colliding. One way of achieving this is to make each transmission-period "relatively-prime" to all the others, so that there is a low chance of two communications occurring at the same time.
Another way of achieving this is to "dither" the transmission time of each unit according to some complex, perhaps pseudo-random, algorithm, between limits (eg between 6 seconds and 30 seconds). Many such algorithms are possible, for example sets of linear-feedback shift-registers, with the feedback taps chosen uniquely for each unit to minimise the number of successive collisions that are possible in the system as a whole.
In such a pseudo-random scheme the transmission period changes on each transmission. The receiver can either have a duplicate algorithm to allow it to predict the next transmission time from each remote unit, or the "time to next transmission" can be encoded in the transmission itself.
If communication is lost, the unit may attempt to re-establish communications by occasionally reverting to the initial state of "receiver always on" for the maximum allowable transmission period, during which it should hear from all other units at least once.
It will be appreciated that the transmitted data could be provided in any number of formats. However, in one embodiment each bit of the packet is bi-phase encoded, meaning that each bit-period starts with a transition (low-to-high or high-to-low) and "one" bits have an additional transition in the centre of the period. Further, the data packets may include any ofthe following parts:
A preamble which allows the receiving means 10 to adjust its Automatic Gain
Control (AGC) to enable proper decoding of the rest of the packet. It will be appreciated that the early part of the preamble may well be lost whilst the AGC corrects its setting.
After the preamble the packet may comprise a break, or silence, which may be longer than an allowable bit period. This allows the receiver 10 to recognise the following bit as the start of valid data.
After a break, two bytes of data are sent. The first byte contains an identification code and the second byte contains the status ofthe unit.
In some embodiments the communications between the units are encrypted thereby further increasing the security of the communication. For instance, public-key or challenge-response algorithms may be applied to the communications.
As can be seen from Figure 1 each of the units 2, 4, 6 transmits such a signal 3. The transmissions from each of the units 2, 4, 6 are received by the receiver 10 and the received signal is processed by the processor 12.
The units 2, 4, 6 have a relatively low power and therefore the transmitted signal has a range only in the order of tens of meters. Consequently units separated by more than this distance will not be able to communicate with one another. Of course, in other applications the units may have a range ofthe order of kilometres.
Each unit will know how many other units there are in the security system from data stored in the memory 14 and will expect to receive a signal from each of the other units. If, unexpectedly, a signal is not received from one ofthe units 2, 4, 6, each of the processors 12 within the security system causes the alarm 16 to be activated. Also, if one particular unit does not receive any signals from the remaining units (eg it is the unit that has been removed/stolen) it will sound its alarm 16. Therefore, if, as in this example, a unit 2, 4, 6 is attached to a number of suitcases the alarm will sound on each of the suitcases. To improve tolerance to false alarms there may be more than one missed communication before the processor causes an alarm to be generated.
Such a system may be beneficial if a user were travelling with a number of suitcases. By providing a unit according to the invention on each of the cases, the cases would effectively guard one another. If one of the cases were stolen, and moved out of the transmitting range of the other units, then the alarm 16 would sound on each of the cases; on the stolen case and on the ones which were not stolen.
If the system is left active for a long period it is possible for the battery 18 to fail. Clearly, should the battery fail within a particular unit then that unit will no longer be capable of transmitting a signal. This situation would be analogous to the unit being stolen and being moved out of transmission range. Therefore, in this particular embodiment the battery 18 status is transmitted within the signal. If a particular unit has been reporting a low battery 18 status for a period of time then the remaining units of the system do not activate the alarm 16 if that particular unit suddenly stops transmitting. The remaining units effectively realise that the battery 18 of the particular unit has failed.
It is conceivable that one of the units may be on the fringes of transmission range of the transmitters 8 and therefore experience unreliable communication with the units ofthe system. In such circumstances the other units may note the unreliable nature of the communication and consequently ignore the unit experiencing unreliable communication. The signal output by the RSSI output of the receiver 10, or an ongoing measure ofthe Bit Error Rate, may be used to determine the reliability ofthe transmission. This will help to prevent false alarms. Clearly, if a unit is experiencing communication difficulties from the time that the system is armed it is likely to trigger a false alarm due to missed transmissions or transmission. In one particular embodiment the units may estimate the range of other units based upon the received signal strength. If the estimated range is above a threshold limit that particular unit may be discounted. Of course, other units may still be in range of that particular unit and continue to guard that unit. A user of the system may be provided with a warning that a unit is "out of range" allowing the user to move that particular unit.
In a further embodiment in which an alarm is raised if communication is lost with any particular unit, as shown in Figure 3, an anchor unit 20 (or base station) is provided on a substantially permanent structure 22, in this case a pillar. It will be appreciated that should a number of highly mobile objects (for example a number of suitcases 24, 26, 28 each fitted with a unit 30, 32, 34) which are guarded by the security system all be stolen together, then the alarms 16 will not be activated; the units 30, 32, 34 will remain in communication with one another and will therefore not realise that anything is amiss.
However, the provision of the anchor unit 20 on the pillar 22 ensures that not all of the units of the system can be stolen, and removed, at the same instance. Should all of the suitcases 24, 26, 28 be stolen together, the units 30, 32, 34 would still each remain in communication, but each of those units (30, 32, 34) would lose communication with the anchor unit 20. Because communication with one of the units has been lost then all of the alarm means 16 would be activated. Fixed units such as anchor unit 20 may be provided in public areas so that users of the security system can guard articles fitted with the security system. Of course, more than one anchor 20 could be provided.
Yet another embodiment of the invention is shown in Figure 4 wherein a master unit 36 is provided. In this embodiment the master unit 36 and the remaining units 38, 40, 42 are not identical as with the other embodiments so far described. The master unit 36 can be used to control the security system and is provided with a display 44 and an alarm 46. The remaining units 38, 40, 42 are not provided with alarms (although of course they could be) but are provided with key-receiving mechanisms. An arming mechanism 48 is also provided on the master unit. (The master unit may be thought of as an arming unit). The display is adapted in this embodiment to display the status of units within the security system and in this embodiment comprises an LCD display. The display 44 may function in conjunction with an input device (not shown) so that the user can manipulate the display so that the desired information is displayed on the display 44.
In this embodiment the whole system can be armed by the use of the arming mechanism 48. When the arming mechanism 48 is activated the master unit 36 transmits an arming code or key to the remaining units 38, 40, 42 which is received by the receiver and the key-receiving mechanism. The units start periodically to transmit signals as described in relation to Figures 1 and 3. In this embodiment, if communication is lost with any one of the units 36, 38, 40, 42, a signal propagates back to the master unit that the alarm 46 is activated. The master unit 36 and other units change the arming code after each use according to a predetermined sequence so that the code cannot be fraudulently copied.
Providing a master unit 36 in this manner allows the remaining units 38, 40, 42 to be made simpler and cheaper, whilst maintaining the functionality ofthe system.
In a slight modification of this embodiment the master unit 36 is not provided with a physical arming mechanism 48 which must be activated, neither is the master unit 36 the only unit provided with an alarm (each unit being provided with its own alarm). In this embodiment the master unit 36 periodically transmits a suppression signal which is received by the remaining units 38, 40, 42. As long as the remaining units 38, 40, 42 receive the suppression signal the system remains unarmed. As soon as reception of the suppression signal by the remaining units 38, 40, 42 is lost or the distance exceeds a given value, the system becomes armed, this reception acting as the arming mechanism. Once armed, should communication be lost between any of the remaining units 38, 40, 42, then the alarm of each of the remaining units 38, 40, 42 is activated. Such an embodiment is useful because it provides for automatic arming of the system. Using the example of a collection of suitcases fitted with the security system the master unit 36 would be carried by the person in charge ofthe cases. Whilst that person is carrying the cases there is no need for the system to be armed, and indeed in this embodiment the system would not be armed because each of the units on the cases would be in communication with the master unit and receive the suppression signal.
When the cases are left unattended it is desirable for them to be guarded. In this embodiment the system would automatically arm when the cases are left by the person looking after them and would guard one another.
In an alternative embodiment, not shown, each of the units of the system is provided with an arming mechanism. In use, a user activates the arming mechanism on each ofthe units ofthe system in order to activate the security system.
In another embodiment the units of the system will only remember the identities of units which start communication within a predetermined period of the system being activated. This will prevent the units from guarding units which are not part of that particular security system. For instance, if two groups of suitcases were each fitted with units according to the invention, then each suitcase within each group would guard each of the others. If, however, the two groups were brought into close proximity and the units simply guarded any unit with which they were in communication, then the units of the two groups would start guarding each other. Therefore, when the two groups were again separated the alarms of the units would be activated. Programming the units to guard only those units which are in communication with each other within a predetermined arming period would overcome this problem.
In its widest concept the basic algorithm of the security system may be thought of as "when armed, detect all other units and then generate an alarm if predetermined circumstances occur (or predetermined rules are satisfied)". Thus, as discussed in the preceding paragraph, this may cause the system to guard units which it should not be guarding. Causing the units to remember the units which they should guard may be likened to a teaching phase.
In one embodiment the predetermined rules may require that an alarm be generated if communication is lost with any unit of the systems. Such rules are useful as described in the embodiment described above.
In another embodiment, the rules may require that an alarm is generated if communication is received from a unit or too many units. Generation of an alarm by too many units may be useful for preventing overcrowding, perhaps in lifts or other confined spaces.
The skilled person will appreciate that the rules which govern whether or not an alarm is generated can be arbitrarily complex and based on any number of circumstances.
In another embodiment an alarm may be generated if a unit becomes present. Such a system would be useful for enforcing exclusion orders. A unit may generate an alarm should a unit having a particular unique identity or class of membership be detected.
In alternative embodiments different methods of programming the units to know which units form the system may be provided. For instance, one or more of the units may be provided with an input device which in one embodiment is a button. When the button is pressed the units forming the system remember the identities of each of the units with which they are in communication. Once the button is released the units will not start to guard other units and will only guard those units which they have been in communication with when the button was pressed. Alternatively, the input means may be a keyboard, a collection of keys, or other data input devices which can be used to input the identity of the units which those particular units should guard.
In some embodiments the input device allows the rules which govern whether or not an alarm is generated to be altered, thus changing the functionality of the system. The rules may also be modified following communication from other units providing instructions to change the rules.
The rules governing whether or not an alarm is generated may be arbitrarily complex, and may comprise Boolean or arithmetical expressions based on any number of variables. Variables may include the state of sensors, the received signal strength, the measured distance, the presence or absence of particular units with a unique identification or class, time, etc. [Each unit may be provided with a clock.]
Sensors may be provided as an input to the processors of the units. Such sensors allow the unit to be aware of its suπoundings and may be used to generate alarms based on readings from the sensors. Examples of sensors which may be provided include: tamper-switches, continuity-loop sensor wires from external alarm systems (e.g. Volumetric™), signals sent from a computer program running on an attached computer, signals sent from a co-located passive "RFID" chip, co-ordinates from a GPS positioning sensor, signals from a telephone (including mobile) and including the ringing signal, moisture sensors, motion and tilt sensors, magnetic field sensors including compasses, biometric sensors and physiological sensors.
The key receiving mechanism on the arming units may receive mechanical keys rather than an electronic code to arm the units.
In one embodiment one of the units is provided with a connector which allows the security system to interface with an external piece of apparatus. The external piece of apparatus may be a computer network, a telephone, a visual display unit (or other display), a portable computing device, a mobile phone network, a door lock, a turnstile, another security system, or some other device. Such a connector allows the status ofthe system to be observed.
In the embodiments discussed above, it is disclosed to transmit the identity of a particular unit. In other embodiments the identity ofthe unit may not form part ofthe transmission. In some embodiments the processor may be adapted to cause the transmitter to transmit a predetermined class to which that particular unit has been designated.
Not transmitting a unique identification is advantageous in some circumstances because it will prevent abuse of user's privacy wherein the transmissions could be used to track a particular unit if a unique identification is transmitted. Transmitting a predetermined class would not allow a particular unit to be tracked.
Further, having predetermined classes to which units belong may provide functionalities which although possible by transmitting a unique identification may be easier to implement by transmitting a class. Indeed, in some embodiments a portion of the unique identification may comprise a class, or a class may be transmitted in addition to the unique identification.
Examples of uses relying on a class to be transmitted include providing children with units which transmit membership of a "child" class. Units provided on turnstiles may receive communications from the units, identify that they belong to the "child" class and only allow them to pass if a unit belonging to an "adult" class is also present. Further, guns may be provided with units which only operate when they detect a communication from a unit belonging to a "firing range" class.
A class based system could be used to guard a building where units in the vicinity of an entrance produce an alarm if a unit belonging to the class "asset" (which is attached to a company asset) leaves the building without there also being present a unit belonging to the class "employee". The skilled person will appreciate that the use of such classes has many uses. A further example would be restricting access to a secure piece of equipment which requires two people to be present. People could be issued with a unit belonging to a "person" class and the equipment may only become operational if a unit attached to it detects two units ofthe "person" class.
Class of membership (unlike unique identifications) are not specific to individual units and therefore this class of membership is harder to use to invade privacy.
In some embodiments the processing means stores within the memory a log of events which the unit has experienced. This log can be accessed via communications with other units or via the connector.
An example of a circuit for providing a unit is shown in Figure 2. The power supply (not shown) is connected to the terminals BATl, BAT2, and the section labelled A smoothes, filters and regulates this power supply.
The circuit section labelled B is a transmitter, which is driven by a pin 6 of UI. The receiver of the unit is provided by section C. The majority of section D provides the processing power of the circuit. However, a battery low sensor is provided by the Zener diode and resistor pair at E. An LED F provides an output to the unit, and a push button switch G provides an input. Also, a piezo sounder H provides an alarm.
A table showing the component values for the circuit now follows:
Figure imgf000033_0001

Claims

CLAIMS:
1. A security system comprising at least two units, each unit comprising a power source adapted to power the unit, a processor, a transmitter, a receiver and at least one of the units having an alarm, the units having the ability to communicate with each other via the transmitters and receivers, the processors being adapted to control the units and to cause the alarm to generate an alarm signal when predetermined rules are satisfied.
2. A system as claimed in claim 1, wherein at least one but not all ofthe units is provided with an alarm.
3. A system as claimed in claim 1 or 2, wherein all of the units are provided with an alarm.
4. A system as claimed in claim 1, 2 or 3, wherein the alarm on every unit provided with an alarm is caused to generate an alarm signal when a predetermined rule is satisfied.
5. A system as claimed in any preceding claim, wherein the transmitter of at least one ofthe units is adapted periodically to transmit a signal.
6. A system as claimed in any preceding claim, wherein the receiver of at least one of the units is activated periodically so as periodically to be capable of receiving a signal.
7. A system as claimed in claim 5 or 6, wherein the processor of at least one of the units is adapted to operate the transmitter of that unit so as to transmit a signal only when the receiver of another unit is activated to receive a signal.
8. A system as claimed in claim 5, 6 or 7, wherein the processor of at least one of the units is adapted to operate the receiver of that unit so as to be capable of receiving a signal only when the transmitter of another unit is activated to transmit a signal.
9. A system as claimed in any one of claims 5 to 8, wherein the processor of at least one of the units is adapted to learn when a transmission is expected from another unit and to operate the receiver ofthe at least one unit accordingly.
10. A system as claimed in any preceding claim, wherein at least one of the units is adapted to operate in a low power state until a possible communication is detected by the receiver, in which event the at least one unit is adapted to become fully operational.
11. A system as claimed in claim 10, wherein the at least one unit is adapted to become fully operational for a predetermined time upon detection of a possible communication, returning to the low power state upon elapse of the predetermined period of time.
12. A system as claimed in claim 10 or 11, wherein the at least one unit is adapted to return to a low power state upon detection of an appropriate communication.
13. A system as claimed in any preceding claim, wherein at least one of the units is provided with an identification mechanism adapted to provide unit identity.
14. A system as claimed in claim 13, wherein the processor of the at least one unit is adapted to interact with the identification mechanism so as to transmit a unit identity by way ofthe transmitter of that at least one unit.
15. A system as claimed in claim 14, wherein the identification mechanism is an integral part ofthe processor.
16. A system as claimed in any one of claims 13 to 15, wherein the identification mechanism provides a unique identification code for each unit provided therewith.
17. A system as claimed in any one of claims 13 to 16, wherein the identification mechanism provides an identification code that identifies each unit provided therewith as belonging to a predetermined class of units.
18. A system as claimed in any preceding claim, wherein at least one ofthe units is provided with an arming mechanism adapted to arm the unit by causing it to become fully operational.
19. A system as claimed in claim 18, wherein the arming mechanism is further adapted to disarm the unit by causing it to enter into a dormant or low power state.
20. A system as claimed in claim 18 or 19, wherein the arming mechanism includes a key-receiving mechanism adapted to receive a key.
21. A system as claimed in claim 20, wherein the key-receiving mechanism is adapted to receive a key selected from the group comprising: an electronic key such as a smart card or the like, a mechanical key and an arming code transmitted to the at least one unit and received by the receiver thereof.
22. A system as claimed in any one of claims 18 to 21, wherein at least one ofthe units comprises an arming unit adapted to arm the system as a whole.
23. A system as claimed in claim 22, wherein the arming unit is adapted to transmit an arming code that arms and/or disarms the remaining units ofthe system.
24. A system as claimed in claim 22 or 23, wherein at least one of the units is adapted to transmit a suppression signal adapted to prevent the remaining units ofthe system from arming.
25. A system as claimed in claim 24, wherein the remaining units of the system become armed if the suppression signal is not detected for a predetermined period of time.
26. A system as claimed in claim 22 or 23, wherein at least one of the units is adapted to transmit a suppression signal adapted to prevent the remaining units ofthe system from disarming.
27. A system as claimed in claim 26, wherein the remaining units of the system become armed if the suppression signal is not detected for a predetermined period of time.
28. A system as claimed in claim 23 or any one of claims 24 to 27 depending from claim 23, wherein the arming unit is adapted periodically to change the arming code.
29. A system as claimed in any preceding claim, wherein communications between the units are encrypted.
30. A system as claimed in any preceding claim, wherein at least one of the units is provided with a memory.
31. A system as claimed in claim 30 depending from claim 13 or any claim dependent therefrom, wherein the processor ofthe at least one unit is adapted to store within the memory the identity of at least one further unit with which it is in communication.
32. A system as claimed in claim 30 or 31, wherein the processor of the at least one unit is adapted to store a log of events within the memory.
33. A system as claimed in any one of claims 30 to 32, wherein the processor of the at least one unit is adapted to cause the transmitter of that unit to transmit all or some ofthe contents ofthe memory.
34. A system as claimed in claim 31 or any claim dependent therefrom, wherein the processor of the at least one unit is adapted to store within the memory only the identity of at least one further unit with which it is in communication at a predetermined time or within a predetermined period of time.
35. A system as claimed in any preceding claim, wherein the processor of at least one of the units is adapted to generate an alarm when communication fails between that unit and at least one other ofthe units.
36. A system as claimed in claim 13 or any claim dependent therefrom, wherein the processor of at least one of the units is adapted to generate an alarm if a communication is received from at least one other unit having a predetermined identity or belonging to a class of units having a predetermined identity.
37. A system as claimed in claim 13 or any claim dependent therefrom, wherein the processor of at least one of the units is provided with an input device adapted to program the processor with the identity or identities of other units which are part of the system.
38. A system as claimed in claim 37, wherein the identity or identities of the other units is or are stored in a memory ofthe at least one unit when the input device is activated.
39. A system as claimed in any preceding claim, wherein at least one of the units is provided with at least one sensor having an output connected to the processor.
40. A system as claimed in claim 39, wherein the processor of the at least one unit is adapted to monitor the output of the at least one sensor and to cause information relating to the sensor output to be transmitted by the transmitter.
41. A system as claimed in claim 39 or 40, wherein the sensor is selected from the group comprising: moisture sensors, motion/tilt sensors, tamper switches, continuity-loop sensor wires from external alarm systems, a computer program running on an attached computer, RFID chips, Global Positioning sensors, mobile telephones, magnetic field sensors including compasses, biometric sensors and physiological sensors.
42. A system as claimed in any preceding claim, wherein at least one ofthe units is provided with a connector to connect the unit with apparatus remote from the system.
43. A system as claimed in claim 42, wherein the connector is adapted to allow communication with at least one member of the group comprising: a video display, a website, a telephone system, an external computer, a computer network, a portable computing device, a mobile telephone network, a door lock, a turnstile and another security system.
44. A system as claimed in claim 42 or 43, wherein the connector is adapted to make available information regarding a status ofthe system.
45. A system as claimed in any one of claims 42 to 44 depending ultimately from claim 30, wherein the connector is adapted to transmit the contents ofthe memory.
46. A system as claimed in any one of claims 42 to 45 depending ultimately from claim 32, wherein the connector is adapted to transmit the contents of the log of events.
47. A system as claimed in any preceding claim, wherein at least one of the units is provided with an attachment device adapted to attach the unit to an object to be guarded.
48. A system as claimed in any preceding claim, wherein at least one of the units is attached to or incorporated into a substantially permanently fixed structure so as to constitute an anchor unit.
49. A system as claimed in any preceding claim, wherein the transmitter is adapted to provide a modulation format selected from the group comprising: on-off keying, amplitude shift keying, frequency shift keying, frequency modulation, amplitude modulation, frequency hopping, spread spectrum and time-modulated ultra-wide band.
50. A system as claimed in any preceding claim, wherein the transmitter and receiver are provided together as a transceiver.
51. A system as claimed in any preceding claim, wherein at least one of the units is provided with at least one antenna for transmitting and/or receiving radio signals.
52. A system as claimed in claim 51, wherein the at least one unit is provided with at least two antennas.
53. A system as claimed in claim 52, wherein the at least two antennas are disposed in a mutually substantially orthogonal configuration.
54. A system as claimed in claim 52 or 53, wherein the at least two antennas are spaced from each other.
55. A system as claimed in any one of claims 52 to 54, wherein the at least two antennas are used alternatively for transmission and reception.
56. A system as claimed in claim 52, wherein the at least two antennas form an array of antennas having "beam-forming" or "radio direction finding" (RDF) directional properties.
57. A system as claimed in any preceding claim, wherein there is provided more than two units, and wherein each unit is able to communicate with every other unit in the system.
58. A system as claimed in any preceding claim, wherein the transmitter at least one of the units is adapted to transmit pieces of information selected from the group comprising: an identity of the unit, a class of the unit, a status of the unit, an indication of when a next transmission will be transmitted by the unit.
59. A system as claimed in any preceding claim, wherein the transmitter of at least one of the units as adapted to transmit information regarding a level of output from the power source ofthe unit.
60. A system as claimed in claim 59, wherein the processor of at least one of the units is adapted to suppress the generation of an alarm if communications are not received from another unit that has been reporting low power levels for a predetermined period.
61. A system as claimed in any preceding claim, wherein the transmitters and receivers are adapted to communicate by way of radio signals.
62. A system as claimed in claim 61, wherein the transmitters and receivers have a range of lm to 150m.
63. A system as claimed in claim 61, wherein the transmitters and receivers have a range of 30m to 125m.
64. A system as claimed in claim 61, wherein the transmitters and receivers have a range of 5m.
65. A system as claimed in claim 61, wherein the transmitters and receivers have a range of 10m.
66. A system as claimed in claim 61, wherein the transmitters and receivers have a range of 20m.
67. A system as claimed in claim 61, wherein the transmitters and receivers have a range of 1km.
68. A system as claimed in claim 61, wherein the transmitters and receivers have a range of 5km.
69. A system as claimed in claim 61, wherein the transmitters and receivers are adapted to operate at a frequency of substantially 433MHz.
70. A method of providing security comprising providing at least two units capable of communicating with each other using transmitters and receivers, the method comprising sending communication signals between the at least two units and raising an alarm when predetermined rules are satisfied.
71. A method according to claim 70, wherein an alarm is generated when communication fails between at least two units.
72. A method according to claim 70 or 71, wherein the units are armed and/or disarmed by way of an arming mechanism.
73. A method according to claim 72, wherein the units are prevented from arming through the transmission of a suppression signal from a predetermined master unit.
74. A method according to claim 73, wherein the units become armed in the absence ofthe suppression signal.
75. A method according to any one of claims 70 to 74, wherein the units perform a communications check to establish that each unit is in communication with at least one other unit.
76. A method according to any one of claims 72 to 75, wherein at least one ofthe units is caused to remember an identity of each other unit with which it is in communication when the units are armed or within a predetermined time therefrom.
77. A method according to any one of claims 70 to 76, wherein at least one ofthe units is provided with an input device which is operable to input an identity of each other unit with which the at least one unit is intended to be in communication.
78. A method according to any one of claims 70 to 77, wherein at least one ofthe units is provided with an input device and wherein each of the units remembers with which other units it is in communication when an input is made to the input device.
79. A method according to any one of claims 70 to 78, wherein the units are caused to transmit signals only at predetermined periods of time.
80. A method according to any one of claims 70 to 79, wherein the units are operable to receive signals only at predetermined periods of time.
81. A method according to any one of claims 70 to 80, wherein each unit is operable to transmit information regarding a status ofthe unit.
82. A method according to claim 81, wherein the information includes the status of a power source ofthe unit.
83. A method according to claim 82, wherein an alarm signal is suppressed if a unit stops transmitting after a predetermined period of reporting a low power source.
84. A method according to any one of claims 70 to 83, wherein a signal strength of received transmissions is noted.
85. A method according to claim 84, wherein an alarm signal is suppressed if no signal is received from a unit that has been noted to have a weak signal strength for a predetermined period of time.
86. A method according to any one of claims 70 to 85, wherein at least one ofthe units estimates its distance from each of the other units with which it is in communication.
87. A method according to claim 86, wherein the estimation is performed by measuring received signal strength.
88. A method according to claim 86 or 87, wherein at least one of the units is caused to ignore signals from units which are more than a predetermined distance therefrom.
89. A method according to claim 84 or any claim dependent therefrom, wherein a warning is issued to a user if one ofthe units is experiencing a weak signal strength.
90. A method according to claim 86 or any claim dependent therefrom, wherein a warning is issued to a user if a unit is estimated to be greater than a predetermined distance from the at least one unit.
91. A method according to claim 76 or 77 or any claim dependent therefrom, wherein an alarm is generated if the at least one unit receives a signal from a unit having a predetermined identity.
92. A method according to claim 76 or 77 or any claim dependent therefrom, wherein an alarm is generated if the at least one unit receives a signal from a unit having an unknown identity.
93. A security unit comprising:
a transmitter for transmitting a signal;
a receiver for receiving such a signal when transmitted by a second, substantially identical, unit;
an alarm generator; and
a processor adapted to activate the alarm generator according to a predetermined condition relating to the receipt or otherwise of a said signal.
PCT/GB2000/002880 1999-07-27 2000-07-26 Improvements relating to security WO2001008116A2 (en)

Priority Applications (3)

Application Number Priority Date Filing Date Title
EP00948160A EP1208548A2 (en) 1999-07-27 2000-07-26 Improvements relating to security
AU61726/00A AU6172600A (en) 1999-07-27 2000-07-26 Improvements relating to security
JP2001513129A JP2003505803A (en) 1999-07-27 2000-07-26 Security improvements

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
GBGB9917490.6A GB9917490D0 (en) 1999-07-27 1999-07-27 Improvements relating to security
GB9917490.6 1999-07-27

Publications (2)

Publication Number Publication Date
WO2001008116A2 true WO2001008116A2 (en) 2001-02-01
WO2001008116A3 WO2001008116A3 (en) 2001-06-07

Family

ID=10857931

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/GB2000/002880 WO2001008116A2 (en) 1999-07-27 2000-07-26 Improvements relating to security

Country Status (5)

Country Link
EP (1) EP1208548A2 (en)
JP (1) JP2003505803A (en)
AU (1) AU6172600A (en)
GB (2) GB9917490D0 (en)
WO (1) WO2001008116A2 (en)

Cited By (28)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2002005900A3 (en) * 2000-07-19 2002-07-25 Golf Domain Com Llc Method and apparatus for managing golf related information obtained in part by using impulse radio technology
JP2002290538A (en) * 2001-03-27 2002-10-04 Denso Corp Wireless call system for vehicle
US6542114B1 (en) 2000-09-07 2003-04-01 Savi Technology, Inc. Method and apparatus for tracking items using dual frequency tags
US6720888B2 (en) 2000-09-07 2004-04-13 Savi Technology, Inc. Method and apparatus for tracking mobile devices using tags
US6747558B1 (en) 2001-11-09 2004-06-08 Savi Technology, Inc. Method and apparatus for providing container security with a tag
US6765484B2 (en) 2000-09-07 2004-07-20 Savi Technology, Inc. Method and apparatus for supplying commands to a tag
WO2004077653A1 (en) * 2003-02-26 2004-09-10 Usc Corporation Powerless type security device
EP1477949A1 (en) * 2003-05-05 2004-11-17 Dietrich Werner Method and application to mark a threshold of distance
WO2005020172A1 (en) * 2003-08-25 2005-03-03 Koninklijke Philips Electronics, N.V. Personal proximity network
US6940392B2 (en) 2001-04-24 2005-09-06 Savi Technology, Inc. Method and apparatus for varying signals transmitted by a tag
EP1606779A1 (en) * 2003-03-26 2005-12-21 Janet Elisabeth Williams Personal safety device
GB2422470A (en) * 2005-01-24 2006-07-26 What S Up Entpr Holdings Ltd Proximity anti-theft alarm
AT414178B (en) * 2003-05-05 2006-09-15 Werner Dipl Ing Dietrich METHOD AND DEVICE FOR MARKING DISTANCE LIMITS
WO2007012891A2 (en) * 2005-07-25 2007-02-01 Siemens Aktiengesellschaft A radio frequency identification interrogator
WO2007036967A1 (en) * 2005-09-27 2007-04-05 Lando Lancini Method for detecting increasing distances between a portable radio identification device and objects fitted with a transponder
US7317387B1 (en) 2003-11-07 2008-01-08 Savi Technology, Inc. Method and apparatus for increased container security
WO2008021874A1 (en) * 2006-08-08 2008-02-21 Robert Poor Wireless protection system
US7436298B2 (en) 2003-10-27 2008-10-14 Savi Technology, Inc. Container security and monitoring
US7538672B2 (en) 2005-11-01 2009-05-26 Savi Technology, Inc. Method and apparatus for capacitive sensing of door position
US7667597B2 (en) 2007-03-09 2010-02-23 Savi Technology, Inc. Method and apparatus using magnetic flux for container security
US7808383B2 (en) 2005-11-03 2010-10-05 Savi Technology, Inc. Method and apparatus for monitoring an environmental condition with a tag
DE102009014641A1 (en) * 2009-03-24 2010-10-07 Töteberg, Andreas System for monitoring loss and determining position of e.g. passenger car, has holder device delivering alarm and optically or acoustically brought to display such that conclusions about direction and distance to charge is provided
WO2011058513A1 (en) * 2009-11-11 2011-05-19 Kruger Andre Christopher System and method for detecting loss of a portable item
EP2469491A1 (en) * 2010-12-22 2012-06-27 Commissariat à l'Énergie Atomique et aux Énergies Alternatives Antitheft system for mobile equipment
US8258950B2 (en) 2004-07-15 2012-09-04 Savi Technology, Inc. Method and apparatus for control or monitoring of a container
WO2013024475A1 (en) * 2011-08-15 2013-02-21 Mayer-Sommer Arthur Micro handheld alarm network system for and method for alerting to any loss of a network entity
CN105631372A (en) * 2014-10-13 2016-06-01 美新纳瑞私人有限公司 Proximity monitoring device and method
EP3040955A1 (en) * 2014-12-31 2016-07-06 Xiaomi Inc. Video monitoring method and device

Families Citing this family (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
GB2394585A (en) * 2002-10-26 2004-04-28 Tariq Belkadi Apparatus for preventing loss of personal valuables
GB2400711A (en) * 2003-04-16 2004-10-20 Paul Thomas Dimmer Wireless alarm system monitoring the position of valuables that is suitable for protecting computers or mobile phones which are using wireless data networks
DE102005038811A1 (en) 2005-08-17 2007-03-01 Rainer Brenner Method and device for securing objects
GB0613732D0 (en) * 2006-07-10 2006-08-23 Jones Philip A Club watch
DE202007011808U1 (en) * 2007-08-23 2008-12-24 Rademacher, Wilhelm Verliersicherungsanordnung
DE102014215750A1 (en) * 2014-08-08 2016-02-25 Sp Sicherheitsprodukte Vertriebs Gmbh Security system for a safekeeping

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5661460A (en) * 1994-12-13 1997-08-26 Secure Technologies, Inc. Distance determination and alarm system
EP0840265A1 (en) * 1996-11-04 1998-05-06 E Lead Electronic Co., Ltd. A synchronous receiving/transmitting departure alarm
FR2768249A1 (en) * 1997-09-08 1999-03-12 Ralph Feingold Search/surveillance mechanism

Family Cites Families (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
GB2243739A (en) * 1990-04-27 1991-11-06 Arrowaxe Ltd Frequency modulation distance measurement of active target
GB2276478A (en) * 1993-03-23 1994-09-28 Trevor Martin Dance Electronic alarm/finder
GB2279170A (en) * 1993-05-04 1994-12-21 Trevor Newton Electronic tagging system
AUPM402394A0 (en) * 1994-02-23 1994-03-17 Monaad Corporation Pty Limited Security access arrangement
GB2314986A (en) * 1996-07-02 1998-01-14 Alan Michael Cox Electronic child protection system
GB2344914A (en) * 1998-06-18 2000-06-21 Paul Anthony Delahunty System for protecting an article or child

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5661460A (en) * 1994-12-13 1997-08-26 Secure Technologies, Inc. Distance determination and alarm system
EP0840265A1 (en) * 1996-11-04 1998-05-06 E Lead Electronic Co., Ltd. A synchronous receiving/transmitting departure alarm
FR2768249A1 (en) * 1997-09-08 1999-03-12 Ralph Feingold Search/surveillance mechanism

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
See also references of EP1208548A2 *

Cited By (38)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6705942B1 (en) 2000-07-19 2004-03-16 Golf-Domain.Com Llc Method and apparatus for managing golf related information obtained in part by using impulse radio technology
WO2002005900A3 (en) * 2000-07-19 2002-07-25 Golf Domain Com Llc Method and apparatus for managing golf related information obtained in part by using impulse radio technology
US6542114B1 (en) 2000-09-07 2003-04-01 Savi Technology, Inc. Method and apparatus for tracking items using dual frequency tags
US6720888B2 (en) 2000-09-07 2004-04-13 Savi Technology, Inc. Method and apparatus for tracking mobile devices using tags
US6765484B2 (en) 2000-09-07 2004-07-20 Savi Technology, Inc. Method and apparatus for supplying commands to a tag
JP2002290538A (en) * 2001-03-27 2002-10-04 Denso Corp Wireless call system for vehicle
US6940392B2 (en) 2001-04-24 2005-09-06 Savi Technology, Inc. Method and apparatus for varying signals transmitted by a tag
US8253541B2 (en) 2001-04-24 2012-08-28 Savi Technology, Inc. Method and apparatus for varying signals transmitted by a tag
US6747558B1 (en) 2001-11-09 2004-06-08 Savi Technology, Inc. Method and apparatus for providing container security with a tag
US7049959B2 (en) 2003-02-26 2006-05-23 Usc Corporation Powerless type security device
WO2004077653A1 (en) * 2003-02-26 2004-09-10 Usc Corporation Powerless type security device
EP1606779A1 (en) * 2003-03-26 2005-12-21 Janet Elisabeth Williams Personal safety device
EP1477949A1 (en) * 2003-05-05 2004-11-17 Dietrich Werner Method and application to mark a threshold of distance
AT414178B (en) * 2003-05-05 2006-09-15 Werner Dipl Ing Dietrich METHOD AND DEVICE FOR MARKING DISTANCE LIMITS
WO2005020172A1 (en) * 2003-08-25 2005-03-03 Koninklijke Philips Electronics, N.V. Personal proximity network
CN100458854C (en) * 2003-08-25 2009-02-04 皇家飞利浦电子股份有限公司 Personal proximity network
US7436298B2 (en) 2003-10-27 2008-10-14 Savi Technology, Inc. Container security and monitoring
US7317387B1 (en) 2003-11-07 2008-01-08 Savi Technology, Inc. Method and apparatus for increased container security
US8258950B2 (en) 2004-07-15 2012-09-04 Savi Technology, Inc. Method and apparatus for control or monitoring of a container
GB2422470A (en) * 2005-01-24 2006-07-26 What S Up Entpr Holdings Ltd Proximity anti-theft alarm
WO2007012891A2 (en) * 2005-07-25 2007-02-01 Siemens Aktiengesellschaft A radio frequency identification interrogator
WO2007012891A3 (en) * 2005-07-25 2007-06-28 Siemens Ag A radio frequency identification interrogator
WO2007036967A1 (en) * 2005-09-27 2007-04-05 Lando Lancini Method for detecting increasing distances between a portable radio identification device and objects fitted with a transponder
US7538672B2 (en) 2005-11-01 2009-05-26 Savi Technology, Inc. Method and apparatus for capacitive sensing of door position
US7808383B2 (en) 2005-11-03 2010-10-05 Savi Technology, Inc. Method and apparatus for monitoring an environmental condition with a tag
WO2008021874A1 (en) * 2006-08-08 2008-02-21 Robert Poor Wireless protection system
US7667597B2 (en) 2007-03-09 2010-02-23 Savi Technology, Inc. Method and apparatus using magnetic flux for container security
DE102009014641A1 (en) * 2009-03-24 2010-10-07 Töteberg, Andreas System for monitoring loss and determining position of e.g. passenger car, has holder device delivering alarm and optically or acoustically brought to display such that conclusions about direction and distance to charge is provided
WO2011058513A1 (en) * 2009-11-11 2011-05-19 Kruger Andre Christopher System and method for detecting loss of a portable item
FR2969683A1 (en) * 2010-12-22 2012-06-29 Commissariat Energie Atomique ANTI-THEFT SYSTEM FOR MOBILE EQUIPMENT
EP2469491A1 (en) * 2010-12-22 2012-06-27 Commissariat à l'Énergie Atomique et aux Énergies Alternatives Antitheft system for mobile equipment
WO2013024475A1 (en) * 2011-08-15 2013-02-21 Mayer-Sommer Arthur Micro handheld alarm network system for and method for alerting to any loss of a network entity
CN105631372A (en) * 2014-10-13 2016-06-01 美新纳瑞私人有限公司 Proximity monitoring device and method
EP3207439A4 (en) * 2014-10-13 2018-05-23 Maxwell Forest Pty Ltd. Proximity monitoring devices and methods
US10055969B2 (en) 2014-10-13 2018-08-21 Maxwell Forest Pty Ltd Proximity monitoring devices and methods
CN105631372B (en) * 2014-10-13 2020-06-12 麦克斯韦尔福瑞斯特私人有限公司 Proximity monitoring apparatus and method
EP3040955A1 (en) * 2014-12-31 2016-07-06 Xiaomi Inc. Video monitoring method and device
RU2633223C2 (en) * 2014-12-31 2017-10-11 Сяоми Инк. Method and device for videomonitoring

Also Published As

Publication number Publication date
GB2355565A (en) 2001-04-25
EP1208548A2 (en) 2002-05-29
AU6172600A (en) 2001-02-13
GB2355565B (en) 2002-10-09
JP2003505803A (en) 2003-02-12
GB0018284D0 (en) 2000-09-13
GB9917490D0 (en) 1999-09-29
WO2001008116A3 (en) 2001-06-07

Similar Documents

Publication Publication Date Title
EP1208548A2 (en) Improvements relating to security
KR100508515B1 (en) Measuring or security system
US9218696B2 (en) Wireless access control system and related methods
US5448221A (en) Dual alarm apparatus for monitoring of persons under house arrest
AU2003272231B2 (en) A system for monitoring and locating people and objects
US5963131A (en) Anti-theft device with alarm screening
AU778793B2 (en) Authentication techniques in a monitoring system
US8169319B2 (en) Virtual group maintenance and security
US5640144A (en) RF/ultrasonic separation distance alarm
US20140240088A1 (en) Apparatus and method for locating, tracking, controlling and recognizing tagged objects using active rfid technology
US20060017566A1 (en) RF volumetric intrusion detection device, system and method
EP2941844A1 (en) Wireless access control system and related methods
US20190212086A1 (en) Gun lock with alarm system supervisory by zone
US9830443B2 (en) Device and method for controlling access to at least one machine
JP2007039895A (en) Lock control system and program
US7339464B2 (en) Detection-resistant transponder with “stealth packaging” for high-risk surveillance applications
GB2400711A (en) Wireless alarm system monitoring the position of valuables that is suitable for protecting computers or mobile phones which are using wireless data networks
JP2009217668A (en) Message tracking system, and program
WO2001069563A1 (en) System for detecting the proximity of an object or a person
RU2290698C1 (en) Method and system for controlling and signaling about change of positions of guarded objects
JP2008067129A (en) Radio communication system
AU2021398447A1 (en) Access control method, device and system
GB2390205A (en) Security code transmitter
CA2760408A1 (en) Reseam

Legal Events

Date Code Title Description
AK Designated states

Kind code of ref document: A2

Designated state(s): AE AG AL AM AT AU AZ BA BB BG BR BY BZ CA CH CN CR CU CZ DE DK DM DZ EE ES FI GB GD GE GH GM HR HU ID IL IN IS JP KE KG KP KR KZ LC LK LR LS LT LU LV MA MD MG MK MN MW MX MZ NO NZ PL PT RO RU SD SE SG SI SK SL TJ TM TR TT TZ UA UG US UZ VN YU ZA ZW

AL Designated countries for regional patents

Kind code of ref document: A2

Designated state(s): GH GM KE LS MW MZ SD SL SZ TZ UG ZW AM AZ BY KG KZ MD RU TJ TM AT BE CH CY DE DK ES FI FR GB GR IE IT LU MC NL PT SE BF BJ CF CG CI CM GA GN GW ML MR NE SN TD TG

121 Ep: the epo has been informed by wipo that ep was designated in this application
DFPE Request for preliminary examination filed prior to expiration of 19th month from priority date (pct application filed before 20040101)
AK Designated states

Kind code of ref document: A3

Designated state(s): AE AG AL AM AT AU AZ BA BB BG BR BY BZ CA CH CN CR CU CZ DE DK DM DZ EE ES FI GB GD GE GH GM HR HU ID IL IN IS JP KE KG KP KR KZ LC LK LR LS LT LU LV MA MD MG MK MN MW MX MZ NO NZ PL PT RO RU SD SE SG SI SK SL TJ TM TR TT TZ UA UG US UZ VN YU ZA ZW

AL Designated countries for regional patents

Kind code of ref document: A3

Designated state(s): GH GM KE LS MW MZ SD SL SZ TZ UG ZW AM AZ BY KG KZ MD RU TJ TM AT BE CH CY DE DK ES FI FR GB GR IE IT LU MC NL PT SE BF BJ CF CG CI CM GA GN GW ML MR NE SN TD TG

WWE Wipo information: entry into national phase

Ref document number: 2000948160

Country of ref document: EP

REG Reference to national code

Ref country code: DE

Ref legal event code: 8642

WWP Wipo information: published in national office

Ref document number: 2000948160

Country of ref document: EP

WWE Wipo information: entry into national phase

Ref document number: 10048149

Country of ref document: US

WWW Wipo information: withdrawn in national office

Ref document number: 2000948160

Country of ref document: EP