Gesture-based security system

文档序号:863560 发布日期:2021-03-16 浏览:4次 中文

阅读说明:本技术 基于示意动作的安全系统 (Gesture-based security system ) 是由 G·贝里 于 2019-12-12 设计创作,主要内容包括:示例安全系统包括多个访问控制装置,其各自控制对相应受保护区域的访问。一种移动装置包括处理器、加速度计、无线收发器以及存储凭证的存储器。处理器配置成:从加速度计接收指示;基于指示移动装置的预定义移动的来自加速度计的指示来检测用户示意动作;基于示意动作来确定包括受保护区域中的多个受保护区域的路径;以及利用无线收发器将凭证自动地传送到与路径的每个受保护区域相关联的相应访问控制装置。还公开了一种用于安全系统的示例方法。(An example security system includes a plurality of access control devices that each control access to a respective protected area. A mobile device includes a processor, an accelerometer, a wireless transceiver, and a memory storing credentials. The processor is configured to: receiving an indication from an accelerometer; detecting a user gesture based on an indication from an accelerometer indicating a predefined movement of a mobile device; determining a path including a plurality of protected regions in the protected region based on the gesture; and automatically transmitting the credentials to a respective access control device associated with each protected area of the path using the wireless transceiver. An example method for a security system is also disclosed.)

1. A security system, comprising:

a plurality of access control devices each controlling access to a respective protected area; and

a mobile device comprising a processor, an accelerometer, a wireless transceiver, and a memory storing credentials, the processor configured to:

receiving an indication from the accelerometer;

detecting a user gesture based on the indication from the accelerometer indicating a predefined movement of the mobile device;

determining a path based on the gesture, the path comprising a plurality of protected regions of the protected regions; and

automatically transmitting the credentials to respective access control devices associated with each protected area of the path using the wireless transceiver.

2. The security system of claim 1, wherein:

the path comprises an ordered sequence of the plurality of protected regions in the protected region; and is

The mobile device is configured to communicate the credentials to each of the respective access control devices to provide access to the plurality of the protected areas in the same order as the ordered sequence.

3. The security system of claim 1, wherein the gesture comprises a plurality of predefined discrete movements of the mobile device.

4. The security system of claim 3, wherein the gesture comprises a pause of a predefined duration occurring between at least two of the discrete movements.

5. The security system of claim 1, wherein the gesture comprises one or more taps on the mobile device.

6. The security system of claim 1, wherein the gesture comprises a predefined body movement of a user holding or transporting the mobile device.

7. The security system of claim 1, wherein the gesture comprises a change in walking speed of a user transporting the mobile device.

8. The security system of claim 1, wherein the gesture comprises a predefined arm-based movement trajectory of the mobile device.

9. The security system of claim 1, wherein the mobile device comprises a microphone and the processor is configured to:

recording audio from the microphone based on the detection of the user gesture;

determining whether the recorded audio includes a predefined audio signature; and

determining the path further based on the predefined audio signature detected in the recorded audio.

10. The security system of claim 1, wherein the wireless transceiver is configured to communicate with the respective access control device using bluetooth, WiFi, Zigbee, or near field communication.

11. A method for a security system, comprising:

detecting a user gesture based on an indication from an accelerometer of a mobile device indicating a predefined movement of the mobile device;

determining a path based on the gesture, the path comprising a plurality of protected areas, each protected area having an associated access control device that controls access to the protected area; and

based on the detecting and determining, automatically communicating credentials from the mobile device to respective access control devices associated with each respective protected area of the path.

12. The method of claim 11, wherein:

the path comprises an ordered sequence of the plurality of protected regions in the protected region; and is

The automatically transmitting includes transmitting the credentials to the respective access control devices to provide access to the plurality of protected regions in the same order as the ordered sequence.

13. The method of claim 11, wherein the gesture comprises a plurality of predefined discrete movements of the mobile device.

14. The method of claim 13, wherein the gesture comprises a pause of a predefined duration occurring between at least two of the discrete movements.

15. The method of claim 11, wherein the gesture comprises one or more taps on the mobile device.

16. The method of claim 11, wherein the gesture comprises a predefined body movement of a user holding or transporting the mobile device.

17. The method of claim 11, wherein the gesture comprises a change in walking speed of a user transporting the mobile device.

18. The method of claim 11, wherein the gesture comprises a predefined arm-based movement trajectory of the mobile device.

19. The method of claim 11, comprising:

recording audio from a microphone of the mobile device based on the detection of the user gesture;

determining whether the recorded audio includes a predefined audio signature; and

determining the path further based on the predefined audio signature detected in the recorded audio.

20. The method of claim 1, wherein the automatically transmitting comprises transmitting the credential using bluetooth, WiFi, Zigbee, or near field communication.

Background

The present application relates to providing access to a protected area, and more particularly to providing access to a sequence of protected areas based on accelerometer data from a mobile device.

Many buildings include protected areas that require user credentials for access. For example, some buildings require credentials (such as passcodes or scannable badges) in order to access certain protected areas. Having to provide the individual's credentials repeatedly is a cumbersome process, especially when multiple protected areas are accessed in a short period of time.

Disclosure of Invention

A security system according to an example of the present disclosure includes a plurality of access control devices that each control access to a respective protected area. The mobile device includes a processor, an accelerometer, a wireless transceiver, and a memory storing credentials. The processor is configured to: receiving an indication from the accelerometer; detecting a user gesture (gettrue) based on the indication from the accelerometer indicating a predefined movement of the mobile device; determining a path including a plurality of protected regions of the protected regions based on the gesture; and automatically transmitting the credentials to a respective access control device associated with each protected area of the path using the wireless transceiver.

In a further embodiment of any of the preceding embodiments, the path comprises an ordered sequence of the plurality of the protected regions, and the mobile device is configured to transmit the credential to each of the respective access control devices to provide access to the plurality of the protected regions in a same order as the ordered sequence.

In a further embodiment of any of the preceding embodiments, the gesture comprises a plurality of predefined discrete movements of the mobile device.

In a further embodiment of any of the preceding embodiments, the gesture comprises a pause of a predefined duration occurring between at least two of the discrete movements.

In a further embodiment of any of the preceding embodiments, the gesture comprises one or more taps on the mobile device.

In a further embodiment of any of the preceding embodiments, the gesture comprises a predefined body movement of a user holding or transporting the mobile device.

In a further embodiment of any of the preceding embodiments, the gesture comprises a change in walking speed of a user transporting the mobile device.

In a further embodiment of any of the preceding embodiments, the gesture comprises a predefined arm-based movement trajectory of the mobile device.

In a further embodiment of any of the preceding embodiments, the mobile device includes a microphone and the processor is configured to: recording audio from the microphone based on the detection of the user gesture; determining whether the recorded audio includes a predefined audio signature; and determining the path further based on the predefined audio signature detected in the recorded audio.

In a further embodiment of any of the preceding embodiments, the wireless transceiver is configured to communicate with the respective access control device using bluetooth, WiFi, Zigbee, or near field communication.

An example method for a security system according to an example of the present disclosure includes: detecting a user gesture based on an indication from an accelerometer of a mobile device indicating a predefined movement of the mobile device; determining, based on the gesture, a path comprising a plurality of protected areas, each protected area having an associated access control device that controls access to the protected area; and based on the detecting and determining, automatically transmitting credentials from the mobile device to respective access control devices associated with each respective protected area of the path.

In a further embodiment of any of the preceding embodiments, the path comprises an ordered sequence of a plurality of protected regions, and the automatically transmitting comprises transmitting the credential to the respective access control device to provide access to the plurality of protected regions in the same order as the ordered sequence.

In a further embodiment of any of the preceding embodiments, the gesture comprises a plurality of predefined discrete movements of the mobile device.

In a further embodiment of any of the preceding embodiments, the gesture comprises a pause of a predefined duration occurring between at least two of the discrete movements.

In a further embodiment of any of the preceding embodiments, the gesture comprises one or more taps on the mobile device.

In a further embodiment of any of the preceding embodiments, the gesture comprises a predefined body movement of a user holding or transporting the mobile device.

In a further embodiment of any of the preceding embodiments, the gesture comprises a change in walking speed of a user transporting the mobile device.

In a further embodiment of any of the preceding embodiments, the gesture comprises a predefined arm-based movement trajectory of the mobile device.

In a further embodiment of any of the preceding embodiments, the method comprises: recording audio from a microphone of the mobile device based on the detection of the user gesture; determining whether the recorded audio includes a predefined audio signature; and determining the path further based on the predefined audio signature detected in the recorded audio.

In a further embodiment of any of the preceding embodiments, automatically transmitting comprises transmitting the credential using bluetooth, WiFi, Zigbee, or near field communication.

The embodiments, examples and alternatives of the preceding paragraphs, claims or the following description and drawings may be taken independently or in any combination, including any of their various aspects or respective individual features. Features described in connection with one embodiment may be applicable to all embodiments unless such features are incompatible.

Drawings

FIG. 1A schematically shows an example path that includes an ordered sequence of protected regions.

FIG. 1B schematically shows another example path that includes another ordered sequence of protected regions.

Fig. 2 schematically illustrates an example mobile device and access control device.

FIG. 3 is a flow diagram representing an example method of providing access to multiple protected regions.

Detailed Description

Fig. 1A schematically illustrates an example path 10A to a laboratory 12D. The path 10A includes a plurality of protected areas 12A-D each having an associated access control device 14A-D and a movable barrier 16A-D (e.g., a revolving door, a gate, a door, etc.).

The user 18 has a mobile device 20 on his person, the mobile device 20 having stored credentials corresponding to the user 18. The mobile device 20 is operable to detect a movement-based gesture of the user 18 to the mobile device 20 from accelerometer data of the mobile device 20, determine a path 10 associated with the gesture, and automatically transmit stored credentials to a respective access control device 14 associated with each respective protected area 12 of the path 10 based on the detected gesture. This enables the user 18 to travel along their desired path 10 without requiring the user 18 to take affirmative steps to provide their credentials to each access control device 14 along the path 10.

For the following discussion, assume that user 18 has provided mobile device 20 with a first gesture corresponding to path 10A. The example path 10A includes a pass through an ordered sequence of protected regions 12A, 12B, 12C, 12D. The protected areas 12A-D have respective associated access control devices 14A-D. The user approaches the first access control device 14A. The mobile device 20 determines that the access control device 14A corresponds to the first protected area of the path 10A and communicates the credentials to the access control device 14A. Upon receiving the credential from the mobile device 20, the access control device 14A authenticates the credential and, if successfully authenticated, provides movement of the barrier 16A (e.g., rotation of a revolving door or lifting of a gate) to access the protected area 12A.

User 18 approaches elevator 17 and mobile device 20 automatically transmits credentials to access control device 14B. Upon successful authentication of the credential, door 16B of elevator 17 is opened and user 18 is able to enter protected area 12B corresponding to the car of elevator 17. Elevator car 12B is at the first floor when user 18 enters, as shown by indicator 19A.

Elevator car 12B proceeds to the fifth floor as shown by indicator 19B and access control 14C provides access to protected area 12C by opening door 16C upon successful authentication of the credential. The user 18 proceeds to the access control device 14D and the mobile device 20 automatically transmits the credentials to the access control device 14D. The access control device 14D authenticates the credentials and provides access to the protected area 12D by enabling opening of the door 16D upon successful authentication.

Referring now to FIG. 1B, a different example path 10B is shown that provides access to the office 12E of the user 18. The path 10B includes the following ordered sequence of protected regions 12A, 12B, 12E, 12F. Path 10B provides elevator car 12B transporting user 18 away to a third floor (see indicator 19C) where mobile device 20 communicates a credential to access control device 14E, which opens door 16E to provide access to protected area 12E. Upon approaching the access control device 14F of the office 12F, the mobile device 20 automatically transmits the user's credentials to the access control device 14F, which access control device 14F authenticates the credentials and provides access to the office 12F through the door 16F.

In the example discussed above, each path 10A-B includes an ordered sequence of protected regions 12, and the mobile device 20 is configured to transmit credentials to each respective access control device 14 associated with each protected region 12 of the path 10 in the same order as the ordered sequence. For example, for path 10A, the ordered sequence is 12A, 12B, 12C, 12D, and for path 10B, the ordered sequence is 12A, 12B, 12E, 12F. In other examples, the user 18 may be able to traverse the path in a different order (e.g., back within the path and then proceed in reverse and/or traverse the path).

The gestures associated with each path 10 include one or more predefined discrete movements of the mobile device 20. Each discrete movement may include, for example, any one or more of the following:

as a tap of the mobile device when held or hung by the user 18 in the user's pocket or bag.

A change in walking speed pattern of a user 18 transporting a mobile device 20 (e.g., held or stored in a pocket or purse or backpack of the user 18). For example, if a user slows from their normal walking pace to a slowed pace for a predetermined period of time, this may be used as a gesture to indicate a desired path.

Body movements (e.g. rotations, jumps, etc.) of a user holding or transporting the mobile device.

An arm-based movement trajectory of the mobile device (e.g., circular movement, dive movement, sideways movement, up-and-down movement, etc.).

In one example, the gesture further includes a pause of a predefined duration occurring between at least two movements in the gesture. For example, the gesture for path 10A may comprise three consecutive taps of the mobile device, and the gesture for path 10B may comprise two consecutive taps, followed by a pause of a predefined duration, followed by a third tap.

Because each gesture is based on accelerometer data, the speed of movement of the mobile device 20 may be part of the gesture (e.g., pitch at a first speed for a first gesture and a different second speed for a second gesture).

As discussed in the examples above, movement of the mobile device 20 may be conveniently provided by the user 18 to indicate the desired path without requiring the user to repeatedly take affirmative steps to provide their credentials at each access control device 14 along the desired path.

Fig. 2 schematically shows an example mobile device 20 and an example access control device 14. The mobile device 20 includes a processor 30, a memory 32, an accelerometer 36, a microphone 37, and a wireless transceiver 38. Processor 30 may include, for example, one or more microprocessors, microcontrollers, Application Specific Integrated Circuits (ASICs), and the like. The memory 32 may comprise one of several types of memory, such as Read Only Memory (ROM), random access memory, cache memory, flash memory devices, optical storage devices, and the like. The memory 32 stores credentials 34 for the user 18 and a database 35 that includes a mapping between the movement-based gestures of the mobile device 20 and the corresponding paths 10. Alternatively, the database 35 may be stored on another device (e.g., a server, etc.).

The accelerometer 36 is operable to detect one or more discrete movements of the mobile device 20. The processor 30 cooperates with the accelerometer 36 to obtain an indicator that includes accelerometer data from the accelerometer 36. The processor 30 determines whether the indicator indicative of one or more discrete movements of the mobile device 20 corresponds to any predefined user gesture corresponding to the path 10 stored in the database 35.

The microphone 37 is operable to record audio from the user 18, and in one example, the processor 30 is configured to record audio from the microphone 37 based on detection of user gestures, determine whether the recorded audio includes a predefined audio signature, and further determine the path 10 based on the predefined audio signature detected in the recorded audio.

In one example, the recorded audio may be non-verbal (e.g., clapping hands, finger flicking, tapping a phone, etc.). In one example, the recorded audio may be verbal (e.g., tapping the phone to initiate recording and then providing an audible indicator of the path such as "lobby to lab" or "lobby to office"). In such an example, the processor 30 may further determine the path based on the audio recording and correspondingly determine which access control device 14 should automatically receive the credential 34.

The wireless transceiver 38 is operable to automatically communicate the credentials 34 to the access control device 14 of the determined path. In one example, the wireless transceiver uses the bluetooth signaling protocol (IEEE 802.15.1). Of course, other protocols may be used, such as WiFi (IEEE 802.11), Zigbee (IEEE 802.15.4), Near Field Communication (NFC), for example.

The access control device 14 includes a processor 40, a memory 42, and a wireless transceiver 44. Similar to the mobile device 20, the processor 40 may include, for example, one or more microprocessors, microcontrollers, ASICs, or the like, and the memory 42 may include one of several types of memory, such as Read Only Memory (ROM), random access memory, cache memory, flash memory devices, optical storage devices, or the like. The wireless transceiver 44 of the access control device 14 is operable to communicate with the wireless transceiver 38 of the mobile device 20. Also, processor 40 is operatively connected to barrier 16 to control whether movement of barrier 16 is performed/allowed.

Fig. 3 is a flow diagram 100 representing an example method implemented by the mobile device 20 for providing access to a plurality of protected areas 12. The processor 30 of the mobile device 20 waits for a gesture (block 102). Upon detecting the gesture ("yes" of block 104), the mobile device 20 uses its database 35 (or a database stored on another network-connected device) to determine the path 10 associated with the gesture (block 106), and searches for the access control device 14 associated with the path 10 (block 108).

Upon detecting the access control device 14, the mobile device 20 determines whether the access control device 14 is part of a path (block 110) (e.g., through bluetooth signaling and/or bluetooth pairing). If the detected access control device 14 is not part of the predefined path 10, the mobile device 20 continues to search for other access control devices 14 (block 108). Otherwise, if the detected access control device 14 is part of the predefined path 10, the mobile device 20 automatically transmits the credentials 34 to the access control device 14 for authentication (block 112).

If the path is complete ("yes" of block 114), the mobile device 20 stops searching for the access control device 14 and waits for a new gesture by the mobile device 20. In one example, path completion includes the mobile device 20 receiving a notification from each access control device 14 to which the mobile device 20 transmitted credentials that the credentials were successfully authenticated.

If the path has not been completed ("no" of block 114), the mobile device 20 continues to search for access control devices 14 in the predefined path (block 108).

In one example, the mobile device 20 transmits the credentials 34 to the access control device 14 only in an order corresponding to the predefined path (e.g., for the path 10A, transmission to the access control device 14B is not enabled until the credentials have been transmitted to the access control device 14A).

In one example, if for some reason user 18 is able to bypass intermediate access control device 14 (e.g., because the door is held open by another person), mobile device 20 enables access control device 14 to be skipped (e.g., allowing transmissions to access control device 14C even if access control device 14B is not found).

The security system described above allows a user to traverse a predefined path with a single gesture. Unlike prior art access control devices that have required repeated user intervention to provision credentials at each of a plurality of protected areas, the security system described herein conveniently allows a user 18 to provide a gesture once and then have their credentials automatically provided at each necessary access control device along a path corresponding to the gesture.

In one example, mobile device 20 includes a training feature whereby a user defines a path by traversing the path and mobile device 20 records an ordered list for each access control device 14 of the path. The user may associate a particular gesture with a path learned through the training feature.

Although example embodiments have been disclosed, a worker of ordinary skill in this art would recognize that certain modifications would come within the scope of this disclosure. For that reason, the following claims should be studied to determine the scope and content of this disclosure.

12页详细技术资料下载
上一篇:一种医用注射器针头装配设备
下一篇:显示控制系统、显示控制方法、以及显示控制程序

网友询问留言

已有0条留言

还没有人留言评论。精彩留言会获得点赞!

精彩留言,会给你点赞!

技术分类