+

WO2003058569A1 - Procede de securisation et de gestion d'objets mobiles, et systeme y relatif - Google Patents

Procede de securisation et de gestion d'objets mobiles, et systeme y relatif Download PDF

Info

Publication number
WO2003058569A1
WO2003058569A1 PCT/EP2003/000040 EP0300040W WO03058569A1 WO 2003058569 A1 WO2003058569 A1 WO 2003058569A1 EP 0300040 W EP0300040 W EP 0300040W WO 03058569 A1 WO03058569 A1 WO 03058569A1
Authority
WO
WIPO (PCT)
Prior art keywords
unit
security
signal
monitoring
monitoring unit
Prior art date
Application number
PCT/EP2003/000040
Other languages
German (de)
English (en)
Inventor
Michael Salewski
Martin Schröter
Original Assignee
Micro-Mel Deutschland Gmbh
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Micro-Mel Deutschland Gmbh filed Critical Micro-Mel Deutschland Gmbh
Priority to AU2003205565A priority Critical patent/AU2003205565A1/en
Publication of WO2003058569A1 publication Critical patent/WO2003058569A1/fr

Links

Classifications

    • GPHYSICS
    • G08SIGNALLING
    • G08BSIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
    • G08B21/00Alarms responsive to a single specified undesired or abnormal condition and not otherwise provided for
    • G08B21/02Alarms for ensuring the safety of persons
    • G08B21/0202Child monitoring systems using a transmitter-receiver system carried by the parent and the child
    • G08B21/0227System arrangements with a plurality of child units
    • GPHYSICS
    • G08SIGNALLING
    • G08BSIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
    • G08B13/00Burglar, theft or intruder alarms
    • G08B13/02Mechanical actuation
    • G08B13/14Mechanical actuation by lifting or attempted removal of hand-portable articles
    • GPHYSICS
    • G08SIGNALLING
    • G08BSIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
    • G08B13/00Burglar, theft or intruder alarms
    • G08B13/02Mechanical actuation
    • G08B13/14Mechanical actuation by lifting or attempted removal of hand-portable articles
    • G08B13/1427Mechanical actuation by lifting or attempted removal of hand-portable articles with transmitter-receiver for distance detection
    • GPHYSICS
    • G08SIGNALLING
    • G08BSIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
    • G08B13/00Burglar, theft or intruder alarms
    • G08B13/02Mechanical actuation
    • G08B13/14Mechanical actuation by lifting or attempted removal of hand-portable articles
    • G08B13/1436Mechanical actuation by lifting or attempted removal of hand-portable articles with motion detection
    • GPHYSICS
    • G08SIGNALLING
    • G08BSIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
    • G08B21/00Alarms responsive to a single specified undesired or abnormal condition and not otherwise provided for
    • G08B21/02Alarms for ensuring the safety of persons
    • G08B21/0202Child monitoring systems using a transmitter-receiver system carried by the parent and the child
    • G08B21/0241Data exchange details, e.g. data protocol
    • G08B21/0247System arrangements wherein the alarm criteria uses signal strength
    • GPHYSICS
    • G08SIGNALLING
    • G08BSIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
    • G08B25/00Alarm systems in which the location of the alarm condition is signalled to a central station, e.g. fire or police telegraphic systems
    • G08B25/01Alarm systems in which the location of the alarm condition is signalled to a central station, e.g. fire or police telegraphic systems characterised by the transmission medium
    • G08B25/10Alarm systems in which the location of the alarm condition is signalled to a central station, e.g. fire or police telegraphic systems characterised by the transmission medium using wireless transmission systems
    • GPHYSICS
    • G08SIGNALLING
    • G08BSIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
    • G08B26/00Alarm systems in which substations are interrogated in succession by a central station
    • G08B26/007Wireless interrogation

Definitions

  • the invention relates to a method for securing and managing movable objects according to claim 1 and to an object security and management system according to claim 21.
  • a transmitting device is set up at the exit of a room to be monitored.
  • Each object to be protected contains a receiving device with a resonance circuit which is tuned to the transmission frequency of the transmitting device. If the secured object reaches the radiation area of the transmitting device, a voltage source integrated in the receiving device is activated and an acoustic alarm is triggered.
  • a voltage source integrated in the receiving device is activated and an acoustic alarm is triggered.
  • you leave the room outside the range of the transmitter for example through a window or an unsecured side entrance, an alarm will not be given.
  • the safety device is therefore relatively easy to bypass.
  • DE-A1-44 17 882 proposes to provide it with an open resonant circuit in the form of a printed circuit.
  • An in the out Alarm area arranged in the corridor area has a transmitter and a receiver, which are alternately put into operation. If the security sticker comes into the range of the alarm transmitter, a natural vibration is generated in the open resonant circuit. As soon as this is detected by the receiver of the alarm transmitter, this triggers an acoustic or visual alarm.
  • the relatively short range of the safety device is also problematic here. If an object has left the secured zone, it can no longer be tracked despite the alarm.
  • DE-A1-195 12 045 describes a wireless anti-theft alarm device for securing transportable objects.
  • a signal transmitter attached to the object to be secured is connected to a receiver via a radio link. The latter is carried by the user.
  • the signal transmitter triggers an alarm signal which is intended to identify the thief.
  • the disadvantage here is that the signal transmitter must permanently emit a signal in order to maintain contact with the receiver. This leads to a high power consumption, which has to be applied by batteries or rechargeable batteries that have to be constantly replaced.
  • tracking of the stolen item is only possible to a limited extent, because the alarm is only triggered when the item has already been stolen.
  • An acoustic alarm signal is also difficult to locate in a noisy environment.
  • a security method known from DE-A1-195 28 818 has the same disadvantages.
  • a radio signal emanates from an object to be secured, which triggers an acoustic alarm when an area is defined by the range of the transmission signal at an assigned mobile receiver.
  • the transmitter is only activated when the object is moved, for example by an integrated inclination sensor. This does reduce electricity consumption.
  • Another disadvantage, however, is that each transmitter must be explicitly assigned a receiver, i.e. Securing several objects can only be achieved with the corresponding effort. If the receiver is moved or if it is outside the audible range of the alarm signal, the security system loses its effectiveness. Difficulties also arise in differentiating the alarm signals of different objects, which are difficult to assign to several receivers.
  • EP-A1-0 840 265 provides a synchronized transmit / receive system for monitoring several objects with only a single receiver station.
  • the one a transmitter to be monitored sends a defined pulse signal at regular intervals, which is detected by a synchronously activated receiver. If the pulse signal fails to appear due to an excessive distance from the receiver or if the pulse signal arrives late at the receiver, the receiver triggers an acoustic or tactile alarm.
  • the transmitter can also be activated by other electrical devices, for example a cell phone or a button integrated in the transmitter, for example to signal the receiver of an emergency situation. If several objects are secured, each transmitter sends out a different pulse signal.
  • the receiver is activated and deactivated in synchronism with all pulse signals.
  • EP-A1-0 768 629 also enables a large number of objects to be secured.
  • a central monitoring unit equipped with an ultrasound receiver and a high-frequency transmitter sends out a coded high-frequency signal every 2 to 3 seconds, a separate, frequency-modulated signal being provided for each object to be monitored.
  • Each item is provided with a security unit. This receives the high-frequency signal and compares the coding with a signal code stored in a memory. If the signal is recognized, the security unit sends a frequency-modulated ultrasound signal back to the monitoring unit. If the object is within a predefined distance from the monitoring unit, the monitoring unit can record and recognize the ultrasound signal.
  • an acoustic alarm is triggered which informs the owner of the item that it has been removed without authorization.
  • an alarm signal is only received when an object has already been removed. However, it is usually too late for tracking, especially since the object would first have to be identified using the alarm signal, which is only possible to a limited extent.
  • the aim of the invention is to overcome these and other disadvantages of the prior art and to create a method for securing any number of movable objects, wherein individual objects can not only be identified, but can also be localized and / or tracked at any time. Unauthorized access to one Object should be recognized early so that countermeasures can be taken in good time. In addition, it should also be possible to manage the secured objects.
  • An object security and management system for performing the method should be easy to use and should be freely configurable.
  • the aim is to optimally secure any number of objects against unauthorized removal, handling or theft.
  • the system is also intended to offer expansion or change options in order to adapt to changing situations. Early alarm triggering, possibly in several stages, is just as desirable as high operational reliability and flexibility with low energy consumption.
  • each security unit is assigned a freely programmable identity code which represents the object to be secured or monitored in each case. Furthermore, the security units are assigned individually and / or in groups to at least one monitoring unit, each security unit being activated when the assigned object is unauthorized to use and emitting a signal modulated in accordance with the identity code, which is detected by at least one monitoring unit and fed to an evaluation and operating unit which triggers a programmable action based on the transmission of the signal and / or on the basis of a property of the signal.
  • the monitoring unit receives the signals from the fuse units assigned to it and forwards them to the evaluation and operating unit.
  • the latter can - for example with the help of suitable software - manage almost any number of security units and - depending on the need and application - can trigger an individual action, for example a silent or acoustic alarm.
  • the method is extremely flexible, since one or more security units can each be assigned to a monitoring unit. Changes or extensions are also possible at any time. It can be Monitor several separate rooms as well as entire groups of goods or objects individually and independently of each other. If several monitoring units are used, spatial movements of the security units can also be detected so that the objects to be secured can be tracked via the evaluation and operating unit.
  • Another advantage is that the security units are only activated if an unauthorized handling of an object takes place. As a result, the energy consumption of the fuse units is extremely low, which has a favorable effect on their service life. Furthermore, the security units can always be reused by simply assigning a new identity code when changing from one product to another.
  • the identity code is created by means of the evaluation and operating unit, transmitted to the relevant security unit via a monitoring unit and stored in a retrievable manner.
  • the assignment of an identity code to a security unit is preferably carried out via a further programmable identity code, which is stored in the relevant security unit.
  • the ease of use achieved thereby facilitates and accelerates the assignment of the individual fuse units.
  • It is also possible to manage the secured items by querying the identity codes from the security units at regular intervals - for example for the purpose of an inventory.
  • the evaluation and control unit compares the answers received with the expected signals and creates e.g. an inventory list. Additional information and / or data relating to the object to be monitored can be assigned to each identity code, which expands the area of application accordingly.
  • the identity codes of the security units assigned to a monitoring unit can be stored in the relevant monitoring unit. At the same time, further data or information can be stored, for example information about the location of the monitoring unit or criteria for triggering or activating an action. This ensures a high level of operational safety at all times, since an alarm function can also be triggered if the evaluation and control unit fails. Data security is also extremely high, since any information that may be required cannot be lost.
  • the assignment of the security units to a monitoring unit takes place via a third programmable identity code, which is also stored in the relevant monitoring unit.
  • a further embodiment of the invention ensures a high degree of security for the objects to be monitored, in that the security unit is activated by touch, movement and / or change in position. Just touching or lifting goods is enough to activate the monitoring process. Thefts or unauthorized events are immediately recorded so that appropriate countermeasures can be prepared or initiated.
  • the property of the modulated signal that triggers a programmable action is preferably a predetermined signal strength and / or signal delay. This enables simple room monitoring, for example. As soon as an object moves away from its assigned monitoring unit in such a way that the modulated signal can no longer be received, an action is triggered automatically. It is irrelevant in which way the object leaves the secured area. The use of multiple monitoring units can expand the secured area or allow tracking of an object.
  • the programmable action is preferably a silent, acoustic, optical and / or tactile alarm which is generated on the security unit, on the monitoring unit and / or on the evaluation and operating unit.
  • Another embodiment of the method according to the invention provides that the programmable action activates a room monitoring device, for example a camera or motion detector, so that the object concerned can be observed from a central monitoring station or a security center.
  • a room monitoring device for example a camera or motion detector
  • the programmable action can identify the object, the evaluation and operating unit for each security unit, which emits a modulated signal in accordance with the programmed identity code, indicating and / or a location description, for example a site plan, of the assigned object and / or issues.
  • a modulated signal in accordance with the programmed identity code, indicating and / or a location description, for example a site plan, of the assigned object and / or issues.
  • At least three monitoring units are assigned to a security unit, which record the signal generated by the security unit. Differences in the signal strength, the field strength and / or the signal transit time at the individual monitoring units enable the calculation of a movement of the object in question. In addition, its direction and speed of movement can be recorded.
  • the calculations required for this are preferably carried out by the evaluation and operating unit or a software stored therein. It is expedient if the evaluation and operating unit of each security unit, which emits a modulated signal in accordance with the programmed identity code, displays and / or outputs the current position and / or the direction of movement.
  • a monitor or an LCD display serves as the display device. In connection with the typing of the object, targeted countermeasures can be initiated immediately.
  • the signal emitted by the security unit and / or the monitoring unit is expediently a radio signal, which is preferably in the MHz range.
  • the signals can be sent intermittently. Changing operating frequencies (frequency hopping) increase the operational safety. This effectively prevents interference from outside.
  • the evaluation and control unit can query the presence of all or selected security units at predetermined time intervals.
  • the security units are activated via the monitoring units, so that the respectively stored signals are sent to the evaluation and operating unit, in particular in the form of a response signal.
  • the evaluation and control unit compares the incoming information, for example with a stored reference list, and carries out a comparison. If certain objects are missing or do not respond to the query carried out, a programmed action can be triggered, for example an alarm or a comparison of the information stored in the monitoring units.
  • the Memory of the monitoring units can be read out. At the same time, the storage data of the monitoring units can be updated.
  • Another aspect of the invention provides that a separate alarm is triggered when an unauthorized removal of the security unit from an object. This is important in order to prevent misuse of the fuse units.
  • the invention represents an essential further development also with regard to an object management and security system for the security and management of movable objects.
  • This is characterized by a modular structure with at least one programmable security unit which can be fixed to an object and which, in the event of unauthorized handling of the object in question, acts as a security unit emits identifying signal, with at least one monitoring unit, which detects the signal emitted by the security unit, and with an evaluation and operating unit, which receives the signal forwarded by the monitoring unit, and a programmable signal due to the transmission of the signal and / or due to a property of the signal Action triggers
  • any number of objects can be individually monitored and managed.
  • the transmitter units attached to the objects to be secured or monitored can be assigned individually or in groups to one or more monitoring units, which forwards the previously programmed signals to the evaluation and operating unit.
  • Any unauthorized handling of a secured object is immediately recorded and processed by the evaluation and control unit.
  • an individually programmable action can be triggered, for example a silent alarm when the object is touched or raised, followed by an acoustic alarm when the object leaves a predetermined area.
  • the transmitter units and the monitoring units can be combined as desired and configured via the central evaluation and control unit, whereby the variety of possible uses is extremely high.
  • An expansion or reduction of the number of security units can also be implemented at any time without any problems by forwarding the new assignments between security units and objects from the evaluation and operating units to the monitoring and security units.
  • the A security unit can be changed from one item to another.
  • objects can be secured as well as animals or people. The latter is of great use, for example, in hospitals, old people's homes or nursing homes. Machine or access security in industrial and private areas is also possible, whereby an existing system can be expanded at any time.
  • FIG. 1 is a schematic representation of a device management and security system
  • FIG. 2 is a block diagram of a fuse unit
  • FIG. 3 is a block diagram of a monitoring unit
  • 5 shows a security unit located in the area of three monitoring units
  • Fig. 6 shows another embodiment of a fuse unit
  • FIG. 7 shows another embodiment of a monitoring unit.
  • the item management and security system is used to secure and manage items 20 in a company or a department store.
  • items 20 For example, computers, notebooks, typewriters, telephones, televisions, electrical appliances, tools, furnishings, items of clothing, household items and the like are monitored which are used by employees or are offered for sale to customers and which can be located in different rooms R1, R2 or departments ,
  • the overall modular security system 10 consists of security units 30 which are attached to the objects 20 to be secured or monitored, at least one monitoring unit 40 installed in each room R1, R2 and a centrally arranged further monitoring unit 50 which is connected via a connecting line 52 an evaluation and operating unit 60 connected.
  • the security units 30 and the monitoring units 40, 50 are connected to one another via radio links F.
  • Each security unit 30 is an active micro radio sensor. As shown in FIG. 2, the latter has a housing 31 in which a sensor 32, a microprocessor 33, a memory 34, a transceiver 36, a power supply 37 and an acoustic signal generator 38 are integrated.
  • the sensor 32 is preferably a motion detector without a zero position, which detects any change regardless of the absolute position of the object 20 to be secured. As a result, every dynamic change in position is immediately detected and reported by the sensor 32 to the microprocessor 33, which can be programmed via the transceiver 36.
  • an identity code G-ID and further data and information are stored in the memory 34.
  • the security unit 30 itself is identified via a further identity code S-ID, which is stored in an EPROM 35 or can be specified by means of dip switches (not shown).
  • the memory 34 which is preferably designed as a flash controller, can be written to and read out via the microprocessor 33 and the transceiver 36.
  • All building blocks 32, 33, 34, 35 and 36 are miniaturized building blocks e.g. executed in hybrid technology. They obtain their required energy from the power supply 37, which is also integrated in the housing 31 in the form of a replaceable battery or rechargeable battery.
  • the radio sensor 30 is activated via the motion detector 32, which switches on the power supply 37 and thus activates the entire circuit. If the security unit 30 is not moved, the circuit is de-energized so that no energy is consumed.
  • the transceiver 36 is ready to receive at any time in order to be able to receive signals from the monitoring unit 40.
  • An antenna (not shown) enables data to be sent and received via the transceiver 36.
  • the acoustic signal generator 38 is preferably a piezo element.
  • the overall dimensions of the fuse unit 30 are extremely compact and are preferably 30 x 10 x 2 mm (length, width, height). Dimensions below this can also be realized, particularly with regard to the overall height, which can also be less than 2 mm.
  • the weight is also very light and is about 2 g.
  • sabotage protection 39 is provided in each security unit 30. This responds if, for example, an attempt is made to manipulate the security unit 30 or to remove it by force from the object 20 to be secured.
  • the sabotage protection 39 consists, for example, of a film structure (not shown) made of conductive material which is applied to the housing 31 and which is glued to the object 20 to be secured when the securing unit 30 is fixed.
  • the line structure is automatically destroyed.
  • a circuit which is interrupted or can be closed in this way activates the security unit 30, which immediately sends a signal via the transceiver 36 or gives an alarm by means of the piezo element 38.
  • the monitoring unit 40 installed in the rooms R1, R2 has a microprocessor 43, a memory 44, a transceiver 46, an interface 42 and a power supply 47 in a housing 41 (see FIG. 3).
  • the microprocessor 43 is optionally programmable via the interface 42 or the transceiver 46, an antenna (not shown) making it possible to send and receive data via the transceiver 46.
  • the interface 42 can either be connected to a data line or a bus system. Data and information which can be read out via the interface 42 or the transceiver 46 are stored in the memory 44.
  • a third identity code Ü-ID is burned into an EPROM 45, which, however, can also be specified by means of dip switches (not shown).
  • the power supply 46 for the monitoring unit 40 is preferably a mains connection. However, depending on the place of use, it is also possible to use a battery or a rechargeable battery accommodated in the housing 41. The latter are provided in any case as an emergency power supply 51, so that the operation of the object management and security system 10 is not interrupted in the event of a temporary power failure.
  • An acoustic signal generator 48 integrated in the housing 41 is preferably a piezo element or a loudspeaker.
  • a sabotage protection 49 can be constructed in exactly the same way as the sabotage protection 39 of the securing units 30.
  • Other solutions are conceivable, for example fastening screws integrated in a safety circuit, predetermined breaking points and the like. It is important that unauthorized removal or manipulation of the monitoring unit 40 leads to an immediate signal delivery or alarm triggering.
  • the monitoring unit 50 which is arranged outside the rooms R1, R2, for example in a monitoring center (not shown in detail) and is connected to the evaluation and operating unit 60, is constructed identically to the monitoring units 40 in the rooms R1, R2, the connecting line 52 being connected to the Interface 42 is connected.
  • the latter is preferably a bus interface. Alternatively, you can use a serial, a parallel or an optical interface.
  • the evaluation and control unit 60 is preferably a commercially available PC, a notebook or a tablo with a computer unit 61, a monitor 62, a keyboard 63 and a mouse 64. Administrative software is installed on the computer 60, with the aid of which the object management and Security system 10 is set up, operated and managed as follows.
  • a security unit 30 is provided for each object 20 to be secured. So that these can be addressed or selected individually, each security unit 30 is assigned an identity code S-ID at the factory, which is burned into the respective EPROM 35.
  • the monitoring units 40, 50 are also assigned an individual identity code Ü-ID, which are stored in the EPROMS 45.
  • the management software installed on the computer 60 comprises an assignment list or table 66 with assignment fields 67 in which the identity codes S-ID of the security units 30 supplied and the identity codes U-ID of the monitoring units 40, 50 are entered or entered in columns.
  • each security unit 30 is attached to an object 20 to be secured.
  • the assignment made here is entered in the assignment list 66 on the computer 60.
  • a further column A with input fields 68 is provided in addition to a first column for the identity codes S-ID of the security units 30. In it, for example, a name of the object 20 in question, its article number, an inventory number or the like. entered.
  • Further input columns B, C, ... with input fields 68 can provide information about the location or location of an object 20, in particular a product, or information about the (current) user of an object 20, for example a computer or a book, and further information record about the object 20 in question, for example the user's powers, times for its use and presence, and the like.
  • the software contains appropriate user guidance for entering and assigning the required data to the input fields 68.
  • the input itself takes place via the keyboard 63 and / or the mouse 64.
  • Voice-controlled input or the reading of information via a scanner (not shown) by means of barcodes attached or printed on the objects 20 is also possible.
  • a monitoring unit 40 is installed in each room R1, R2. This assignment is also entered in the assignment list 66 or in a separate table (not shown) which is correspondingly linked to the assignment list 66 on the basis of the predetermined identity codes Ü-ID. Each security unit 30 is then assigned to a room R1, R2 and thus to a monitoring unit 40. This assignment also takes place in the assignment list 66, the entries being able to be made manually or using a preprogrammed or preprogrammable routine.
  • the management software assigns an individual identity code G-ID to each object 20, which is entered in a corresponding column in the assignment list 66. All data are stored in the evaluation and control unit 60 or the computer unit 61 in a memory (not shown).
  • the identity codes G-ID assigned to a monitoring unit 40 together with all the assignments are transmitted by radio to the relevant monitoring units 40 via the central monitoring unit 50, the respective data being transmitted by the transceivers 43 sent or received and then stored in the memories 44 of the monitoring units 40. This process is repeated until all rooms R1, R2 have been processed.
  • Each monitoring unit 40 then transmits the temporarily stored identity codes G-ID to the respectively assigned security unit 30 in the relevant room R1, R2.
  • the data sent by the transceivers 46 are received by the transceivers 36 of the relevant security units 30 and stored in the memories 34 via the microprocessors 32.
  • Each object 20 is now assigned an identity code G-ID by the security unit 30, which is transmitted via the central evaluation and operating unit 60
  • Assignment list 66 can be queried, checked, updated or changed at any time.
  • the transceivers 46 in the monitoring units 40 have a definable range, which in the example in FIG. 1 covers the entire space R1 or R2.
  • the motion sensor 32 responds to the security unit 30 and reports this to the processor 33.
  • the latter activates the radio sensor 30 and sends the identity code stored in the memory 34 G-ID via the transceiver 36 to the assigned monitoring unit 40.
  • the latter transmits a corresponding message via its transceiver 46 directly to the central monitoring unit 50, which finally transmits the identity code G-ID via the connecting line 52 to the evaluation and operating unit 60.
  • the latter uses the assignments made in the assignment table 66 via the monitor 62 to indicate which object 20 is affected in which room (here R2). By means of an assignment routine of the management software, further information about the item 20 contained in the assignment table 66 can be displayed on the monitor 62, so that, for example, the monitoring personnel can determine whether, for example, handling of the item 20 is permitted or not.
  • the evaluation and operating unit 60 can trigger further programmable actions on the basis of the transmission of the identity code G-ID by the security unit 30.
  • a suitable warning can be sent to an in-house detective or to a porter so that the latter can keep an eye on the object 20 on site if necessary.
  • the required information or the warning can be sent by radio via the transceiver 46 of the monitoring unit 40.
  • a GSM module 96 can also be integrated in each monitoring unit 40 (see FIG. 7), which addresses a mobile phone (not shown) carried by the security personnel. It is also possible to send SMS messages, the allocation of the available mobile phone numbers preferably being carried out via the allocation table 66.
  • the management software of the evaluation and control unit 60 can activate a ceiling camera 90, for example to monitor the room R2. If the object 20 leaves the space R1, R2 protected by a monitoring unit 40, the radio signal emitted by the security unit 30 tears off. Or it is only received very weakly by the monitoring unit 40. If the signal signal falls below a predefined signal strength, the monitoring unit 40 sends a corresponding message via the central monitoring unit 50 to the evaluation and operating unit 60. From there, an alarm is triggered immediately by the acoustic signal generator 48 integrated in the on-site monitoring unit 40 or an alarm transmitter (not shown) connected to the evaluation or control unit 60 is activated. Since the guards are already warned by the silent alarm, suitable countermeasures can be taken immediately.
  • the range of the transceivers 46 in the monitoring units 40 can be directed to the entrance or exit area of a room R1, R2, e.g. department store. If a customer lifts a secured object 20 in order to take it with him, the securing unit 30 is activated immediately by the sensor 32.
  • the transceiver 36 transmits the stored identity code G-ID.
  • the security unit 30 arrives in the reception area of the monitoring unit 40 and thus in an impermissible area, it sends the received identity code G-ID via the transceiver (s) 46 to the evaluation and operating unit 60. The latter triggers an acoustic alarm on the relevant security unit 30 or the associated monitoring unit 40 by means of a corresponding radio signal.
  • a ceiling camera 90 can be activated in order to be able to observe the process from the evaluation and operating unit 60. On the basis of the stored data, the latter also shows what the object is and in which department or in which room R1, R2 it is located.
  • three monitoring units 40 are provided for each room R1, R2.
  • Their transceivers 46 are designed such that, in addition to the identity code G-ID emitted by a security unit 30, they can also determine the signal transit time and / or the field strength of the associated radio signal.
  • These measurement data are forwarded to the evaluation and control unit 60 as a repeater via a central monitoring unit 50 (not shown in FIG. 5), possibly with intermediate storage in the monitoring units 40, which is based on the transit time or field strength differences and their changes a possible movement of the relevant security unit 30 and thus the associated object 20 calculated and displayed on the monitor 62.
  • the ID signal G-ID With the aid of the ID signal G-ID, the precise typing of the object 20 is possible, the assignment table 66 being able to provide further useful information.
  • objects 30 to be monitored can be tracked reliably within a room R1, R2 or — with an appropriate arrangement of the monitoring units 40, 50 — within an entire building and beyond, which is particularly advantageous in the case of objects 20 which are naturally frequently moved because, for example, it requires their use.
  • the evaluation and control unit 60 can immediately trigger a silent or acoustic alarm, for example to alert a detective or the security personnel. Based on the information on the object 20 displayed by the evaluation and operating unit, these can immediately take targeted countermeasures.
  • GSM modules 92 integrated in the security units 30 (see FIG. 6 in this regard). After their activation by the evaluation and control unit 60 and or the microprocessor 33, these transmit a corresponding radio signal which can be located within 1 km within the GSM radio network existing in Germany. The final destination can be determined by means of a handheld receiver (not shown) on the basis of the identity code G-ID sent by the relevant security unit 30.
  • a GPS module 94 can be provided in the security units 30, which emits a corresponding search signal.
  • An essential advantage of the method according to the invention and the device according to the invention consists in the modular construction of only 3 components, namely the security units 30, the monitoring units 40, 50 and the evaluation and operating unit 60. These basic modules are combined or combined as desired depending on the application and assigned and managed using management software.
  • a single monitoring unit 40 is sufficient, for example, to equip a smaller office or a shop.
  • the monitoring unit 40 is connected directly to the PC 61 of the evaluation and operating unit 60 via a connecting line 53.
  • the number of security units 30 depends on the number of objects 20 to be monitored.
  • the system can be expanded or supplemented at any time by adding further monitoring units 40 with assigned security units 30.
  • a plurality of monitoring units 40 can in turn be assigned to individual monitoring units 50 which forward the transmitted data as a repeater.
  • a central monitoring unit 50, at which all signals converge, is connected to the PC 61 via the connecting line 52.
  • the new components are assigned centrally via the evaluation and operating unit 60 or by means of the management software installed thereon and the assignment table 66.
  • the new items 20 are entered in the fields 68 provided for this purpose and are automatically assigned by the computer 61 or the software ,
  • the data are then sent to the security units 30 via the monitoring units 40, 50.
  • the installation effort is just as short as the preparation times, so that the system is ready for use in the shortest possible time (plug and secure).
  • the system is radio-based, i.e. no complex cables have to be laid.
  • Fuse units 30 and monitoring units 40, 50 preferably operate at different frequencies.
  • frequency hopping is carried out, i.e. the transceivers 36, 46 change the transmission frequency at regular time intervals. All signals are only transmitted for a few milliseconds, which further reduces power consumption.
  • the item management and security system 10 can be used in addition to the monitoring of items 20 at the same time for inventory or for inventory monitoring or management.
  • query codes are sent from the central evaluation and operating unit 60 via the monitoring units 40, 50. Addressing takes place via the identity codes G-ID and S-ID stored in the assignment table 66, so that all registered objects 20 are reached.
  • the query codes of the respective security unit 30 sends back a response signal via the transceiver 36, which is forwarded by the monitoring units 40, 50 to the evaluation and operating unit 60. This compares the received data with the stored data and carries out a comparison. The result is correspondingly processed and output on the monitor 62 or a printer (not shown).
  • the invention is not limited to one of the above-described embodiments, but can be modified in many ways.
  • the programming of the security units 30 can also take place via the GSM modules 92, 96.
  • Further areas of application are, for example, in the logistics area, namely when the securing units 30 are attached to a pallet or transport containers. These can not only be monitored inside a warehouse, but also outside during transport.
  • the evaluation and control unit 60 can be used at any time to determine whether all the pallets are still present and where they are currently located. The latter is preferably carried out via the GSM and / or GPS modules 92, 94, 96.

Landscapes

  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Business, Economics & Management (AREA)
  • Emergency Management (AREA)
  • Health & Medical Sciences (AREA)
  • Child & Adolescent Psychology (AREA)
  • General Health & Medical Sciences (AREA)
  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Alarm Systems (AREA)
  • Burglar Alarm Systems (AREA)

Abstract

L'invention concerne un procédé de sécurisation et de gestion d'objets mobiles (20) au moyen d'unités sécurisées (30) assujetties à ceux-ci, procédé selon lequel à chaque unité sécurisée (30) est associé un code d'identité librement programmable (G-ID) qui représente à chaque fois l'objet à sécuriser ou à surveiller (20), les unités sécurisées (30) étant associées individuellement et/ou groupées au moins à une unité de surveillance (40). Chaque unité sécurisée (30) est activée pour une manipulation non autorisée de l'objet associé (20) et fournit un signal modulé conformément au code d'identité (G-ID), lequel signal est détecté par au moins une unité de surveillance (40) et transmis à une unité d'évaluation et de commande (60) qui, sur la base de l'émission du signal et/ou d'une propriété du signal, déclenche une action programmable.
PCT/EP2003/000040 2002-01-07 2003-01-06 Procede de securisation et de gestion d'objets mobiles, et systeme y relatif WO2003058569A1 (fr)

Priority Applications (1)

Application Number Priority Date Filing Date Title
AU2003205565A AU2003205565A1 (en) 2002-01-07 2003-01-06 Method for securing and managing mobile objects and object securing and managing system

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
DE10200302A DE10200302A1 (de) 2002-01-07 2002-01-07 Verfahren zur Sicherung und Verwaltung beweglicher Gegestände sowie Gegenstandssicherungs- und managementsystem
DE10200302.5 2002-01-07

Publications (1)

Publication Number Publication Date
WO2003058569A1 true WO2003058569A1 (fr) 2003-07-17

Family

ID=7711592

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/EP2003/000040 WO2003058569A1 (fr) 2002-01-07 2003-01-06 Procede de securisation et de gestion d'objets mobiles, et systeme y relatif

Country Status (3)

Country Link
AU (1) AU2003205565A1 (fr)
DE (1) DE10200302A1 (fr)
WO (1) WO2003058569A1 (fr)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP1793352A3 (fr) * 2005-12-05 2008-03-19 Robert Bosch Gmbh Système de surveillance et dispositif mobile d'alarme
US9053621B2 (en) 2013-07-03 2015-06-09 Faraday Technology Corp. Image surveillance system and image surveillance method

Families Citing this family (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
BE1015693A5 (nl) * 2003-09-23 2005-07-05 Euro Associates M L S I Micro Detectie-en lokalisatiesysteem van objecten, bijvoorbeeld voor het beveiligen van winkels.
NL1024821C2 (nl) * 2003-11-20 2005-05-23 Xsp V O F Systeem voor het bewaken van een aantal mobiele objecten.
DE102011107839A1 (de) * 2011-07-01 2013-01-03 Carsten Koch Optoelektronische Vorrichtung zur Analyse der Belegung eines Server-Racks

Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US4337462A (en) * 1977-12-27 1982-06-29 Lemelson Jerome H Theft detection system and method
FR2672410A1 (fr) * 1991-02-01 1992-08-07 Elektron Dispositif de surveillance et de protection anti-vol.
WO1997038364A1 (fr) * 1996-04-11 1997-10-16 Edis S.A. Etiquette intelligente de forme adaptable
EP0811959A1 (fr) * 1996-06-07 1997-12-10 GRUNDIG Aktiengesellschaft Système d'alarme commandé par radio avec sous-stations et transmission sûr de données
WO1999033040A1 (fr) * 1997-12-19 1999-07-01 Transportonline As Procede et systeme de surveillance d'articles transportables
GB2333389A (en) * 1998-01-15 1999-07-21 Bell Security Response initiator
FR2784771A1 (fr) * 1998-10-16 2000-04-21 Veronique Roulleaux Robin Systeme de surveillance utilisable a la protection contre le vol du patrimoine informatique d'une entreprise
FR2784775A1 (fr) * 1998-10-16 2000-04-21 Veronique Roulleaux Robin Systeme pour la protection des marchandises transportees par un vehicule

Family Cites Families (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1233327A (zh) * 1996-10-17 1999-10-27 准确定位公司 物品跟踪系统
US5920261A (en) * 1996-12-31 1999-07-06 Design Vision Inc. Methods and apparatus for tracking and displaying objects
US5963134A (en) * 1997-07-24 1999-10-05 Checkpoint Systems, Inc. Inventory system using articles with RFID tags
DE19733579A1 (de) * 1997-08-02 1999-02-04 Kdm Sicherheitstechnik Gmbh Verfahren und Einrichtung zum Überwachen von Personen und/oder beweglichen Objekten

Patent Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US4337462A (en) * 1977-12-27 1982-06-29 Lemelson Jerome H Theft detection system and method
FR2672410A1 (fr) * 1991-02-01 1992-08-07 Elektron Dispositif de surveillance et de protection anti-vol.
WO1997038364A1 (fr) * 1996-04-11 1997-10-16 Edis S.A. Etiquette intelligente de forme adaptable
EP0811959A1 (fr) * 1996-06-07 1997-12-10 GRUNDIG Aktiengesellschaft Système d'alarme commandé par radio avec sous-stations et transmission sûr de données
WO1999033040A1 (fr) * 1997-12-19 1999-07-01 Transportonline As Procede et systeme de surveillance d'articles transportables
GB2333389A (en) * 1998-01-15 1999-07-21 Bell Security Response initiator
FR2784771A1 (fr) * 1998-10-16 2000-04-21 Veronique Roulleaux Robin Systeme de surveillance utilisable a la protection contre le vol du patrimoine informatique d'une entreprise
FR2784775A1 (fr) * 1998-10-16 2000-04-21 Veronique Roulleaux Robin Systeme pour la protection des marchandises transportees par un vehicule

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP1793352A3 (fr) * 2005-12-05 2008-03-19 Robert Bosch Gmbh Système de surveillance et dispositif mobile d'alarme
US9053621B2 (en) 2013-07-03 2015-06-09 Faraday Technology Corp. Image surveillance system and image surveillance method
TWI507661B (zh) * 2013-07-03 2015-11-11 Faraday Tech Corp 影像監控系統及其方法

Also Published As

Publication number Publication date
DE10200302A1 (de) 2003-07-17
AU2003205565A1 (en) 2003-07-24

Similar Documents

Publication Publication Date Title
US9311586B2 (en) Apparatus and method for locating, tracking, controlling and recognizing tagged objects using active RFID technology
US10649433B2 (en) Modular safety monitoring and warning system and methods for use thereof
DE60008107T2 (de) Identifizierungsmarkierung
DE112016004282T5 (de) Drahtbrückenüberwachungssystem
DE102010029671B4 (de) Sicherungsmodul zur Positionsüberwachung von Objekten
EP3156857B1 (fr) Dispositif et procede destines a la surveillance d'un batiment
WO2015124140A1 (fr) Système d'accès et de surveillance et procédé
WO2008065046A1 (fr) Procédé et dispositif de surveillance d'un objet en particulier portatif, au moyen d'un signal radio
EP1868248B1 (fr) Dispositif de protection d'une installation photovoltaique contre le vol
WO2003058569A1 (fr) Procede de securisation et de gestion d'objets mobiles, et systeme y relatif
DE102014002736A1 (de) Zugangs- und Überwachungssystem und Verfahren
DE102008052077A1 (de) Meldesystem zur Anwesenheit von Gegenständen an Personen
DE102010024478A1 (de) Schutzsystem und -verfahren für einen Manipulator
GB2277850A (en) Intelligent radio frequency transponder system
US20070030142A1 (en) Protection system of a work station by network-centralised management
DE102008063981A1 (de) Elektronisches Sicherungssystem sowie Mittel dafür, und Verfahren zur elektronischen Sicherung beweglicher Gegenstände
DE102007059978A1 (de) Schutzsystem, welches vor Verlust eines mobilen Telefons und vor Verlust wichtiger persönlicher Gegenstände schützt
EP1793352B1 (fr) Système de surveillance et dispositif mobile d'alarme
DE19711087C1 (de) Verfahren und Einrichtung zum Auffinden und zur Ortsbestimmung von Personen bzw. beweglichen Gegenständen
DE102018131302A1 (de) Verfahren zum Diebstahlschutz für ein Fahrzeug
DE10156968A1 (de) Einrichtung zur Erfassung der Veränderung des Abstandes zwischen einem Objekt und einer Kontrolleinrichtung
DE10357023A1 (de) System zum Orten von Gegenständen
DE60007173T2 (de) Vorrichtung zum erkennen und identifizieren der bewegung eines gegenstandes
DE10108217C2 (de) Elektronisch unterstütztes Lagerungssystem und Verfahren zum Auffinden von gelagerten Gegenständen
DE102006037757A1 (de) Verfahren zum Betreiben eines Artikelsichrungssystems und ein Artikelsicherungssystem

Legal Events

Date Code Title Description
AK Designated states

Kind code of ref document: A1

Designated state(s): AE AG AL AM AT AU AZ BA BB BG BR BY BZ CA CH CN CO CR CU CZ DE DK DM DZ EC EE ES FI GB GD GE GH GM HR HU ID IL IN IS JP KE KG KP KR KZ LC LK LR LS LT LU LV MA MD MG MK MN MW MX MZ NO NZ OM PH PL PT RO RU SD SE SG SK SL TJ TM TN TR TT TZ UA UG US UZ VN YU ZA ZM ZW

AL Designated countries for regional patents

Kind code of ref document: A1

Designated state(s): GH GM KE LS MW MZ SD SL SZ TZ UG ZM ZW AM AZ BY KG KZ MD RU TJ TM AT BE BG CH CY CZ DE DK EE ES FI FR GB GR HU IE IT LU MC NL PT SE SI SK TR BF BJ CF CG CI CM GA GN GQ GW ML MR NE SN TD TG

121 Ep: the epo has been informed by wipo that ep was designated in this application
WWE Wipo information: entry into national phase

Ref document number: 164627

Country of ref document: IL

WWE Wipo information: entry into national phase

Ref document number: 164801

Country of ref document: IL

REG Reference to national code

Ref country code: DE

Ref legal event code: 8642

122 Ep: pct application non-entry in european phase
NENP Non-entry into the national phase

Ref country code: JP

WWW Wipo information: withdrawn in national office

Country of ref document: JP

点击 这是indexloc提供的php浏览器服务,不要输入任何密码和下载