FIELD OF THE INVENTION
[0001] In general, the invention relates to a security system providing monitoring of objects
and persons, with person identifications assigned to the persons, where each person
identification is assigned to at least one user role, object identifications assigned
to the objects, where each object identification is assigned to at least one object
class, at least one identification interrogator identifying the object and person
identifications within an area.
[0002] The invention also relates in general to a method for monitoring persons and objects
with providing person identifications to the persons, where each person identification
is assigned to at least one user role, providing object identifications to the objects,
where each object identification is assigned to at least one object class, and interrogating
an area to identify the object and person identifications.
[0003] Further, in general, the invention relates to a computer program product for providing
monitoring of objects and persons, the product having stored thereon a computer program
with instructions operable to cause a computer to control an identification interrogator
for identifying object and person identifications within an area, retrieving for the
identified person identifications at least one user role from a database, respectively,
retrieving for the identified object identification at least one object class, respectively,
from a database.
BACKGROUND
[0004] It is known to provide radio frequency identification (RFID) tags to persons and
objects to allow identifying them. For instance, from
US 4,418,411 A a method and an apparatus for interrogating such RFIDs is known. A stationary interrogator
may interrogate a transponder, fastened to the object or the living being. The transponder
may retrieve its energy from the interrogating frequency of the interrogator. Using
this energy, the transponder may send its identification to the interrogator using
a different frequency. Each of the transponders may carry a unique identification
number. This unique identification number may be transmitted to the interrogator.
The unique identification numbers allow identifying each of the transponders uniquely.
[0005] It is also known, to secure entries to buildings by using chip cards and chip card
readers. It is possible, to interrogating the chip cards of personnel at the entry
to a building and to grant access to the building or not. The chip cards may provide
a unique identification number depending on the identified unique identification number
read out from the chip cards for each user. A security rule may be applied, which
only allows entry to the building or particular areas within the building for certain
individuals. These individuals may be identified by their identification cards, e.g.
the respective unique identification numbers. Entry and exit to buildings may insofar
be controlled. It may also be logged, which persons enter and exit which area of a
building at which time. This information may, for instance, be used for updating a
balance sheet of a person regarding the time present in the building.
[0006] Further, from
US 2001/0169583 A1, it is known to provide RFID tokens to persons. The tokens permit the persons to
identify themselves within an area. It may also be possible, to monitor different
persons within a building, and to provide alarm signals, in case the identified persons
do not react according to security rules. For instance, the presence of a person in
a living-room may be detected. It may also be detected that a person needing help
is located in a bedroom. According to security rules, the reaction of the person in
the living room may be monitored, and an alarm signal may be generated if none of
a set of expected events, such as the person in the living room moving to the bedroom;
is detected in a predefined interval.
[0007] However, the technical problem of these systems is that a relation between persons
and objects within an area may not be monitored. A further technical problem is that
the persons recognised within the area may not be distinguished from each other. Another
technical problem is that even though the persons may be recognised, the security
rules may not take into account states and locations of objects in relation to the
location of certain persons, which have certain abilities.
[0008] Document
US 6,300,872 relates to a security system incorporating a reasoning system and security rules
and processes that are designed to be as unobtrusive as the situation permits. Two
independent aspects of the system facilitate the enforcement of rules and processes
in an unobtrusive manner. First, transponders that can be triggered and sensed from
a distance are preferably used to identify both items and individuals. These remotely
sensed identifiers are processed by the reasoning system to determine whether each
identified item is authorized, or likely to be authorized, to be removed from, or
brought into, a secured location by the identified individual. Second, the system
continually modifies and optimizes its rules and processes based on assessments of
security events. An initial set of rules is created for the security system that,
generally, prohibit the removal of secured items from the secured location, except
that certain individuals are authorized to remove specified items from the secured
location. Thereafter, the security system is configured to enforce these security
rules and processes, and to receive feedback from authorized security personnel regarding
the efficacy of the enforced security rules and processes.
[0009] Document
EP 1 316 814 relates to tracing objects for which distributed transmitter stations are provided,
each transmitting an activation signal. Tags are attached to objects. The tags receive
the activation signals when in an operating area of one of the transmitter stations.
The received activation signal causes the tag to transmit a reaction signal. A receiver
station receives the reaction signals. Data representing positions of tags in accordance
with the received reaction signals are registered. The activation signals each also
include a transmitter station code associated to the transmitter station transmitting
that signal. The transmitter station codes transmitted by different transmitter stations
are mutually different. The reaction signals transmitted by the tags each include
the transmitter station code included in the received activation signal that caused
the tag to transmit that reaction signal. Data representing positions of tags are
registered in accordance with transmitter station codes received from the tags by
the receiver station.
SUMMARY
[0010] As described below, systems, methods, and computer program products as claimed in
the independent claims are provided for monitoring a relationship between persons
and objects within an area. Further, the persons recognized within the area may be
distinguished from each other. Rules may be used that consider the recognized persons
in combination with classes, states, and locations of objects, perhaps in relation
to the location(s) of certain ones of the persons. The rules may further consider
defined roles of the persons, such as, for example, a job title or security clearance.
[0011] More specifically, the present invention provides a security system providing monitoring
of objects and persons, with a classifier operable to associate a person identifier
and user role with each of the persons, and further operable to associate an object
identifier and object class with each of the objects. An identification interrogator
is provided for identifying the object and person identifiers within an area, and
a rule generator determines rules defining which persons of which user roles together
with which objects of which object classes are allowed or required within the area.
A controller is connected to the identification interrogator and checks whether the
identified identifications comply with the rules.
[0012] As just mentioned, each person is assigned to at least one user role. The user role
may classify certain persons into groups with certain attributes. For instance, certain
abilities, characteristics, or job titles of persons may account for a user role.
Thus, persons having the particular ability, characteristic, or job title may be assigned
to this user role. The user role for each person identifier may be stored within a
database. Due to privacy reasons the person identifier need not be unique. It may
also be possible to determine from the person identifier only the user role, without
any individual identification information (e.g., unique number).
[0013] Processing the rules may occur solely upon identification of a user role. The user
role may be read from the person identifiers; however, individual identification need
not be read. The rule compliance may be checked based solely on the user role. The
controller may check the rule compliance without otherwise identifying the individual
ID of a person.
[0014] In case the person identifier includes, or is interrogated from, for instance, an
RFID tag, the respective user role may be determined from the database. For instance,
a technician may have a different user role than a bookkeeper. Another example may
be a child that belongs to a different user role than an adult. A further user role
may, for instance, be defined by the gender of the person. Any other classification
of users and user roles, according to attributes of the users, is also possible. By
providing the user role, persons may be categorized into groups.
[0015] Object classes are also defined. These object classes may allow classifying objects
into groups, according to attributes of the objects. For instance, a fragile object
may be classified into a different object class than a robust object. As another example,
different chemicals may be assigned to different object classes, according to how
hazardous the chemicals are.
[0016] For each object identified within an area, the respective object class may be retrieved
from a database (e.g., the classifier mentioned above). Within the database, a mapping
between an object identifier and a particular object class may be possible.
[0017] To monitor a certain area, such as, for example, a building, a room or a certain
area within a building, or a defined outside area, an identification interrogator
may be provided. This identification interrogator may interrogate the identifiers,
for example, by using high frequency interrogating signals. The interrogator may be
designed to allow monitoring only of a particular area. By monitoring the particular
area, all persons and objects may be identified using their identifiers. These identifiers
may be tangibly attached to the persons or objects. Also, persons may carry their
person identifiers as a badge or as a chip card.
[0018] To provide security and other features, a rule generator is provided. This rule generator
may define rules. These rules may establish combinations of user roles and objects/object
classes that are allowed or required within a certain area. For example, it may be
defined whether certain persons having certain user roles need to be within a particular
area. It may also be defined which objects of certain object classes are allowed within
particular areas. In addition, it may be defined which persons of which user roles
in combination with which objects of which object classes are allowed and/or required
within particular areas.
[0019] For instance, certain objects, such as those classified as hazardous, may require
persons of certain user roles, for example technicians, to be located within the same
area. Another example might be that a person of the user role bookkeeper may not enter
a room if, within the room, a person classified as technician is working with an object
classified as hazardous. In this case, access may be denied to the bookkeeper until
certain further conditions are fulfilled (for example, until the hazardous object
is removed or contained).
[0020] To control whether particular rules are fulfilled, a controller connected to the
identification interrogator is provided. This controller may check whether the identified
identifiers comply with the rules. The controller may be responsible for compliance
with the defined rules. In case the identified persons and objects and their roles
and classes do not comply with desired conditions as set forth by the rules, the controller
may initiate actions to change this state. For example, the controller may issue an
alarm signal, or any other signal, or may automatically send an email to a supervisor
of the monitoring system.
[0021] An alarm signal may, for instance, be any acoustical or optical signal. An alarm
signal may also be a signal sent to a supervision station where a supervisor may react
to the alarm signal and take any necessary steps to control the situation.
[0022] In some implementations, the person identifiers may be wirelessly accessible tags,
including, for example, RFID tags. Such tags may be interrogated wirelessly to monitor
an area, without having to connect person identifiers to the interrogator. The wirelessly
accessible tags may, for instance, be interrogated using high frequency. The area
monitored may be restricted.
[0023] According to the invention, the object identifications are accessed using a power
line of the objects that is providing electrical power to the objects. For example,
many objects, such as electrically driven devices, including ovens, microwaves, irons,
and furnaces, may be interrogated using their power line connection.
[0024] According to the invention, this also allows interrogating the state of the devices,
namely whether the device is currently on or off. As the rules are defined that also
take states of objects into account, it may be possible to monitor devices in connection
with their states and the availability of persons of particular user roles within
an area.
[0025] As non-compliance with the rules may result in dangerous situations in some cases,
or may necessitate further actions to be taken, some implementations provide for the
controller to generate an alarm signal in case the identified identifications do not
comply with the rules, similarly to the implementations described above. The alarm
signal may, for instance, be an acoustical or optical signal. An alarm signal may
also be a signal sent to a supervision station where a supervisor may react to the
alarm signal and takes any necessary steps to correct the situation.
[0026] To allow regulating of accessing and exiting certain areas based on the availability
of objects and persons of certain classes and roles within the area, implementations
provide an access controller controlling access to the area, such that a person may
enter or exit the area only if the identified identifiers still comply with the rules
after the person has entered or exited the area.
[0027] One possible example of such an implementation may be that an object classified as
hazardous is within a room, and the rules require a person in the room who is classified
as technician. In case that the only currently-present technician wants to exit this
room, the controller might detect that the technician's exit would result in non-compliance
with the rules. Therefore, exit to the room would not be granted to the technician.
[0028] Another example may be that an oven is turned on. The oven may be classified as object
class "dangerous." The rules may require that an adult is within the house if the
oven is turned on. In this case, the controller would identify non-compliance with
the rules if the only person of the user role adult wanted to exit the house. Exit
may be denied, or, in other implementations, a warning message may be generated.
[0029] According to other implementations, rules may define user roles, to which, in combination
with objects of an object class, exit to and/or exit from an area is allowed. For
example, certain materials may only be removed from certain areas by authorized persons.
The materials may be classified as "limited removability." The persons allowed to
remove these materials may be in the user role "extended access." If a person of the
user role "extended access" wants to remove the material of "limited removability"
from a room, this is in compliance with the rules and exit is granted. Any other person
of a different user role may not remove this material, and as such, exit from the
room may be denied for these persons. To control exit and entry, the identifiers may
need to be interrogated during exiting and entering certain areas.
[0030] According to the invention, the object ON/OFF statuses are also accounted for. The
interrogator also identifies ON/OFF statuses of objects. The rule generator may generate
rules defining which persons of which user roles, in combination with which objects
of which object classes and in which object ON/OFF status, are allowed and/or required
within the area. For instance, it may be possible to check the state of an oven, e.g.,
whether it is turned on or off. For instance, if the identified oven within the area
is in the state "on" and an adult is detected in the house, a certain rule may be
complied with. If the adult leaves the house, or if the oven is turned "on" in case
no adult is within the house, non-compliance with certain rules may be detected and
certain measures may be taken, including, for example, sounding of an alarm.
[0031] To provide centralized control over user roles and object classes, some implementations
provide a central database connected to the controller and providing a user role for
each identified person and/or an object class for each identified object. By providing
the central database, persons and objects may be classified centrally. Centrally changing
user roles of certain persons and object classes of certain objects may be possible.
This may, for instance, be useful in case of a centralized data management, such as
in enterprise resource planning (ERP) software. In master data management (MDM) software,
data of objects may be stored centrally. Each object may be assigned a certain object
class out of a list of different object classes. Also, a user may be assigned a user
role out of a list of different user roles. This centralized approach may allow centralized
control and monitoring.
[0032] To provide centralized control, implementations provide for connecting the rule generator
to the central database and retrieving the rules from the central database.
[0033] An example of the invention is a security system providing monitoring of objects
and persons, with person identifiers assigned to the persons, where each person identifier
is assigned to at least one user role. Object identifiers are assigned to the objects,
where each object identification is assigned to at least one object class. An identification
interrogator identifies the object and person identifiers within an area, and a central
database provides user roles for each identified person, and object classes for each
identified object. A rule generator connected to the central database determines rules
from information from the central database defining which persons of which user roles
together with which objects of which object classes are allowed or required within
the area. A controller connected to the identification interrogator checks whether
the identified identifications comply with the rules, and an access controller controls
access to the area such that a person is allowed to enter or exit the area only if
the identified identifiers still comply with the rules after the person has entered
or exited the area.
[0034] Another example provides a method for monitoring persons and objects by interrogating
person identifiers assigned to the persons, where each person identifier is assigned
to at least one user role, by interrogating object identifiers assigned to the objects,
where each object identifier is assigned to at least one object class, by determining
rules defining which persons and which objects are allowed or required within the
area, based on the user roles and object classes, and by checking whether the identified
identifiers comply with the rules.
[0035] One further example is a computer program product for monitoring persons and objects,
the computer program product comprising a computer program operable to cause a computer
to instruct an interrogator to interrogate person identifiers assigned to the persons,
where each person identifier is assigned to at least one user role, and interrogate
object identifiers assigned to the objects, where each object identifier is assigned
to at least one object class, and to instruct a rule generator to determine rules
defining which persons and which objects are allowed or required within the area,
based on the user roles and object classes, and check whether the identified identifiers
comply with the rules.
[0036] Yet a further example of the invention is a computer program for monitoring persons
and objects, with instructions operable to cause a computer to instruct an interrogator
to interrogate person identifiers assigned to the persons, where each person identifier
is assigned to at least one user role, and interrogate object identifiers assigned
to the objects, where each object identifier is assigned to at least one object class,
and to instruct a rule generator to determine rules defining which persons and which
objects are allowed or required within the area, based on the user roles and object
classes, and check whether the identified identifiers comply with the rules.
[0037] Referring now to the drawings, in which like numerals represent like elements throughout
the several figures, aspects of the present invention and the exemplary operating
environment will be described.
BRIEF DESCRIPTION OF THE DRAWINGS
[0038] In the drawings:
- FIG. 1
- is a block diagram of a computer system that may be used to implement a monitoring
and alarm system;
- FIG. 2
- is a block diagram of a first implementation of a monitoring and alarm system;
- FIG. 3
- is a block diagram of a second implementation of a monitoring and alarm system;
- FIG. 4
- is a screen shot of a monitoring computer program;
- FIG. 5
- is a flow chart illustrating example operations of the systems of FIGS 1-4;
- FIG. 6
- is a further flow chart illustrating example operations of the systems of FIGS. 1-4.
DETAILED DESCRIPTION OF THE DRAWINGS
[0039] In FIGS 1 to 6, reference numbers 100/200, 110/210 .. denote similar elements, the
function of these elements can be different
[0040] The invention may be implemented by a computer system. An exemplary computer system
is illustrated in figure 1.
[0041] FIG. 1 illustrates a simplified block diagram of exemplary computer system 999 having
a plurality of computers 900, 901, 902 (or even more).
[0042] Computer 900 can communicate with computers 901 and 902 over network 990. Computer
900 has processor 910, memory 920, bus 930, and, optionally, input device 940 and
output device 950 (I/O devices, user interface 960). As illustrated, the invention
is implemented by computer program product 100 (CPP), carrier 970 and signal 980.
In respect to computer 900, computer 901/902 is sometimes referred to as "remote computer",
computer 901/902 is, for example, a server, a peer device or other common network
node, and typically has many or all of the elements described relative to computer
900.
[0043] Computer 900 is, for example, a conventional personal computer (PC); a desktop device
or a hand-held device, a multiprocessor computer, a pen computer, a microprocessor-
based or programmable consumer electronics device, a minicomputer, a mainframe computer,
a personal mobile computing device, a mobile phone, a portable or stationary personal
computer, a palmtop computer or the like. Processor 910 is, for example, a central
processing unit (CPU), a micro-controller unit (MCU), digital signal processor (DSP),
or the like.
[0044] Memory 920 is elements that temporarily or permanently store data and instructions.
Although memory 920 is illustrated as part of computer 900, memory can also be implemented
in network 990, in computers 901/902 and in processor 910 itself (e.g., cache, register),
or elsewhere. Memory 920 can be a read only memory (ROM), a random access memory (RAM),
or a memory with other access options. Memory 920 is physically implemented by computer-readable
media, for example: (a) magnetic media, like a hard disk, a floppy disk, or other
magnetic disk, a tape, a cassette tape; (b) optical media, like optical disk (CD-ROM,
digital versatile disk - DVD); (c) semiconductor media, like DRAM, SRAM, EPROM, EEPROM,
memory stick.
[0045] Optionally, memory 920 is distributed. Portions of memory 920 can be removable or
non-removable. For reading from media and for writing in media, computer 900 uses
well-known devices, for example, disk drives, or tape drives.
[0046] Memory 920 stores modules such as, for example, a basic input output system (BIOS),
an operating system (OS), a program library, a compiler, an interpreter, and a text-processing
tool. Modules are commercially available and can be installed on computer 900. For
simplicity, these modules are not illustrated.
[0047] CPP 100 has program instructions and - optionally - data that cause processor 910
to execute method steps of the present invention. In other words, CPP 100 can control
the operation of computer 900 and its interaction in network system 999 so that is
operates to perform in accordance with the invention. For example and without the
intention to be limiting, CPP 100 can be available as source code in any programming
language, and as object code ("binary code") in a compiled form.
[0048] Although CPP 100 is illustrated as being stored in memory 920, CPP 100 can be located
elsewhere. CPP 100 can also be embodied in carrier 970.
[0049] Carrier 970 is illustrated outside computer 900. For communicating CPP 100 to computer
900, carrier 970 is conveniently inserted into input device 940. Carrier 970 is implemented
as any computer readable medium, such as a medium largely explained above (cf. memory
920). Generally, carrier 970 is an article of manufacture having a computer readable
medium with computer readable program code to cause the computer to perform methods
of the present invention. Further, signal 980 can also embody computer program product
100.
[0050] Having described CPP 100, carrier 970, and signal 980 in connection with computer
900 is convenient. Optionally, further carriers and further signals embody computer
program products (CPP) to be executed by further processors in computers 901 and 902.
[0051] Input device 940 provides data and instructions for processing by computer 900. Device
940 can be a keyboard, a pointing device (e.g., mouse, trackball, cursor direction
keys), microphone, joystick, game pad, scanner, or disc drive. Although the examples
are devices with human interaction, device 940 can also be a device without human
interaction, for example, a wireless receiver (e.g., with satellite dish or terrestrial
antenna), a sensor (e.g., a thermometer), a counter (e.g., a goods counter in a factory).
Input device 940 can serve to read carrier 970.
[0052] Output device 950 presents instructions and data that have been processed. For example,
this can be a monitor or a display, (cathode ray tube (CRT), flat panel display, liquid
crystal display (LCD), speaker, printer, plotter, vibration alert device, cellular
phone, mobile device (PDA). Output device 950 can communicate with the user, but it
can also communicate with further computers.
[0053] Input device 940 and output device 950 can be combined to a single device. Any device
940 and 950 can be provided optional.
[0054] Bus 930 and network 990 provide logical and physical connections by conveying instruction
and data signals. While connections inside computer 900 are conveniently referred
to as "bus 930", connections between computers 900-902 are referred to as "network
990". Optionally, network 990 includes gateways which are computers that specialize
in data transmission and protocol conversion.
[0055] Devices 940 and 950 are coupled to computer 900 by bus 930 (as illustrated) or by
network 990 (optional). While the signals inside computer 900 are mostly electrical
signals, the signals in network are electrical, electromagnetic, optical or wireless
(radio) signals.
[0056] Networks are commonplace in offices, enterprise-wide computer networks, intranets
and the Internet (e.g., world wide web WWW). Network 990 can be a wired or a wireless
network. To name a few network implementations, network 990 can be, for example, a
local area network (LAN), a wide area network (WAN), a public switched telephone network
(PSTN); a Integrated Services Digital Network (ISDN), an infra-red (IR) link, a radio
link, like Universal Mobile Telecommunications System (UMTS), Global System for Mobile
Communication (GSM), Code Division Multiple Access (CDMA), or satellite link.
[0057] A variety of transmission protocols, data formats and conventions is known, for example,
as transmission control protocol/internet protocol (TCP/IP), hypertext transfer protocol
(HTTP), secure HTTP, wireless application protocol (WAP), unique resource locator
(URL), a unique resource identifier (URI), hypertext markup language (HTML), extensible
markup language (XML), extensible hypertext markup language (XHTML), wireless markup
language (WML), Standard Generalized Markup Language (SGML).
[0058] Interfaces coupled between the elements are also well known in the art. For simplicity,
interfaces are not illustrated. An interface can be, for example, a serial port interface,
a parallel port interface, a game port, a universal serial bus (USB) interface, an
internal or external modem, a video adapter, or a sound card.
[0059] Computer and program are closely related. As used hereinafter, phrases, such as "the
computer provides" and "the program provides", are convenient abbreviation to express
actions by a computer that is controlled by a program.
[0060] FIG. 2 illustrates an area 2, for example a room or a building, or any other area.
It should be understood that the area 2 may represent a very large building, or a
large number of rooms. The area 2 may even include a first portion within a building,
and a second portion outside of the building, or may represent an area that is entirely
external to a building. As a result, it is possible that persons within the area 2
may not be able to visibly see or otherwise determine a number of other persons within
the area, if any.
[0061] Within and around the area 2, different objects 4a-d are located. Further located
within and around the area 2 are persons 6a-d. In addition, an interrogator 8 is located
within the area 2. The interrogator 8 is connected to a controller 10. The controller
10 may retrieve data from a database 12. The persons 6a-d and the objects 4a-d each
carry a unique identification or identifier, such as, for example, a RFID tag. The
RFID tags may comprise identification numbers, which may be unique to the individual
user. The unique identification numbers may be used to identify the persons 6a-d and
the objects 4a-d.
[0062] Interrogator 8 interrogates area 2. During interrogation of area 2, interrogator
8 may read all RFID tags of the objects 4a-c and the persons 6a-c within area 2. Persons
6d and objects 4d, which are depicted outside of area 2, would not be read out by
interrogator 8 in this scenario.
[0063] After the unique identification numbers are read, they are transmitted from interrogator
8 to controller 10. Within controller 10, the unique identification numbers are used
for mapping the identified persons 6a-c onto user roles, and for mapping the identified
objects 4 onto object classes. For example, each of the persons 6 may have a different
user role, and each of the objects 4 may also have a different object class. Additionally,
or alternatively, different persons or objects may be classified into groups of persons
or objects, respectively.
[0064] Database 12 may store rules, and may store the classifications associating person
identifiers with persons and their user roles, and associating object identifiers
with objects and object classes. The controller 10 may retrieve the classifications
and rules from the database 12. The rules may define, for example, which persons of
certain user roles, together with which objects of certain object classes, are required
within area 2. Controller 10 may apply these rules and check whether the persons 6a-c
and the objects 4a-c comply with the rules.
[0065] For example, area 2 may be a nuclear power plant. In this example, object 4a may
be classified as within object class "radioactive." Object 4b may be classified as
object class "computer" and object 4c may be classified as object class "chemical."
Further, person 6a may be classified as being of user role "physicist." Person 6b
may be classified as being of user role "chemist." In addition, person 6c may be identified
as of user role "electrical engineer."
[0066] Interrogator 8 interrogates the identifications of the persons 6a-c and the objects
4a-c, and identifies the respective user roles and object classes. The rules may request
that in case radioactive material is within area 2, a physicist and an electrical
engineer are required within area 2. As in the current example person 6a is identified
as physicist and person 6c is identified as electrical engineer, the present condition
complies with the rule.
[0067] In some cases, it may occur that radioactive material is assumed always to be present
in the area 2. In this case, the rule may simply require that at least one physicist
and one electrical engineer are always present within area 2. That is, the rule may
not require a simultaneous check for the presence of radioactive material, and may
thereby save time and other resources (e.g., the number of required interrogations)
in implementing the rule.
[0068] A further rule may be defined, which requests that in case a chemical is in the area
2, a chemist is required within the area 2. As in the current case the person 6b is
identified as chemist, this rule is also complied with.
[0069] It should be noted in the above examples that the unique identifiers and/or identification
numbers may be unique to the user role, and not necessarily unique to the individual
person. For example, all chemists may be assigned the same identification number.
In this way, private information regarding an individual chemist may be protected,
and resource usage (e.g., memory and processing requirements) may be minimized.
[0070] FIG. 3 shows a similar system as FIG. 2. In addition, an access control 14 is provided.
By means of this access control 14, rules may be applied which allow controlling entry
and exit to area 2.
[0071] For instance, one rule may be defined, which states that a bookkeeper may not enter
area 2 if a chemical is within the room. For instance, in case person 6d wants to
enter the room, his or her unique identification number is read using access controller
14. This unique identification number is sent to controller 10. Controller 10 retrieves
the user role of person 6d from database 12. The user role of person 6d may be identified
as being "bookkeeper."
[0072] Within area 2, object 4c has been identified as of object class "chemical." As the
exemplary rule states that a bookkeeper is not allowed to enter the area 2 in case
a chemical is within the room, in the current case access may be denied to person
6d by access controller 14.
[0073] Another example may be that a rule defines that only a chemist may exit the room
carrying a chemical. In such a case, when person 6a wants to leave the area 2 carrying
object 4c, access controller 14 retrieves the respective unique identification numbers
from the RFID tags attached to person 6a and object 4c. Access controller 14 sends
the unique identification numbers to controller 10. Controller 10 uses these unique
identification numbers for determining the user role of person 6a and the object class
of object 4c. These are determined as user role "physicist" and object class "chemical."
As the exemplary rule states that only a chemist may exit the area 2 carrying a chemical,
exit may be denied to person 6a, as this person is not of user role "chemist."
In case person 6c requests exit from area 2 carrying object 4c, again, its unique
identification number as well as the unique identification number of object 4c are
read by access controller 14. These numbers are used to determine the respective user
role and object class. The determined unique identification number of person 6c allows
classifying this person to user group "chemist." The determined unique identification
number of object 4c allows classifying this object to object class "chemical." In
such a case, person 6c would be allowed to exit area 2 carrying object 4c, as this
would be in compliance with the exemplary rule.
[0074] The above examples are discussed with respect to user roles (e.g., chemist) and object
classes (e.g., chemical). However, it should be understood that similar rules could
be implemented with respect to individual users and/or individual objects. For example,
if the only non-chemist in the area 2 is an administrative assistant, it may not be
necessary for the system to create a user role of "administrative assistant." Rather,
the system may include rules that apply solely to the administrative assistant based
on the assistant's unique identification number. Similarly, a rule may apply to a
specific chemical, rather than to the object class "chemical."
[0075] Another exemplary rule may request an electrical engineer in a room with a computer.
In such a case, when person 6c requests to exit the room the request may be denied.
From the unique identification numbers of persons 6a-c it may be determined that person
6c is the only electrical engineer. As non-compliance with the rule would occur when
person 6c leaves the room, exit may be denied, or a warning message generated.
[0076] FIGS. 2 and 3 are discussed above with respect to rules for governing a presence,
entrance, or exit of persons from an the area 2. In the examples given, the rules
govern combinations of users, user roles, objects, and object classes that may be
present, enter, or exit the area 2. It should be understood that these are merely
examples, and other examples also may exist. According to the invention, as referred
to above, the rules also consider a current ON/OFF status of an object.
[0077] For instance, if the object is an electrical appliance, the rules may consider whether
the appliance is on or off. In FIG. 2, then, if the object 4a is a stove, the controller
10 may determine from the rules of database 12 that an user having a user role "adult"
must be present in the area 2 when the stove 4a is currently on. Similarly, in FIG.
3, the identified adult may be prevented from leaving the area 2 in the case where
the stove 4a is determined to be on.
[0078] FIG. 4 shows a screen shot 16 of an example of an example computer system . For instance,
the screen shot 16 may comprise various windows 16a-16d. Window 16a may comprise a
list of areas being monitored by different interrogators. These areas are selectable
by a user. According to the user selection of the certain area within window 16a,
in window 16b the respective person identifiers together with their determined user
roles may be shown in a list in window 16b.
[0079] In addition, the identified object identifiers together with the determined object
classes within the selected area may be shown in window 16c. In window 16d, rules
may be shown which are defined for the respective rooms selected in window 16a. Further,
compliance with these rules may be indicated with icons or colors within window 16d.
For instance, if the persons and the objects in the room have user roles and object
classes that comply with a particular rule, this rule may be underlined in green.
On the other hand, if the persons in the room do not have the required user roles
set forth by a further rule, this rule may be underlined in red. Also, an icon may
indicate whether an alarm has been issued.
[0080] FIG. 5 shows a flow chart illustrating an example of a process flow of the system
of FIG. 2. The person identifiers within a room are checked (18). Also, the object
identifiers are checked (20). The determined person identifiers and object identifiers
are sent to a controller and within the controller the respective user roles are determined
from a database (22). Further, the respective object classes of the identified objects
are determined from the database (24).
[0081] Using these user roles and object classes, compliance with various rules is checked
(26). In case one of the rules is not complied with, an alarm is generated (28). After
generation of the alarm (28) or if all requirements set forth by rules are complied
with, the person identifiers are checked (18) again.
[0082] FIG. 6 shows an exemplary flow chart of a method for granting or denying exit from
(or access to) an area. In case a person requests exit from a room (30), the person
identifiers is checked (32). In addition, the area which the user wants to exit is
checked (34), as is done in step (18, 20) shown in FIG. 5. The user roles of the users
in the area and the user requesting exit as well as the object classes are retrieved
(36) as already depicted in FIG. 5 within the steps (22, 24). The information about
the user roles and the object classes is used to apply rules (38).
[0083] If compliance with the rules would still be in effect after the user has exited the
area, exit is granted (40). On the other hand, if the user exiting the room has a
user role that is required within the room and no other user having this user role
is within the room, exit is denied (42).
[0084] Given the inventive method and the inventive system as defined by the independent
claims, monitoring of areas is possible. Security and safety may be increased, as
user roles and object classes may be accounted for. Certain rules may define combinations
of persons and objects are required within particular areas, based on combinations
of user roles, object classes, or object ON/OFF statuses of the persons and objects.
In this way, individuals such as, for example, the elderly or the very young, may
receive improved supervision. Moreover, by ensuring proper supervision and use of
dangerous objects including, for example, chemicals, radioactive materials, and electrical
appliances, a potential for expensive damages is reduced.
REFERENCE NUMBERS
[0085]
- 2
- area
- 4a-d
- object
- 6a-d
- person
- 8
- interrogator
- 10
- controller
- 12
- database
- 14
- access control
- 16
- screen shot
- 18
- check person
- 20
- check object
- 22
- determine user role
- 24
- determine object class
- 26
- apply rules
- 28
- generate alarm
- 30
- request exit
- 32
- check person
- 34
- check object
- 36
- determine user role and object class
- 38
- apply rules
- 40
- grant exit
- 42
- deny exit
- 100
- computer program product
- 900
- computer
- 910
- processor
- 920
- memory
- 930
- bus
- 940
- input device
- 950
- output device
- 960
- user interface
- 970
- program carrier
- 980
- program signal
- 990
- computer network
- 999
- computer network system
1. Ein Sicherheitssystem zur Überwachung von Gegenständen (4a-d) und Personen (6a-d),
das Folgendes umfasst:
- einen Klassifizierer, der betriebsbereit ist, um eine Personen-Kennung bzw. - Identifikator
und eine Benutzerrolle mit jeder der Personen (6a-d) zu assoziieren, die einen Personen-Identifikator
trägt und der des Weiteren betriebsbereit ist, um einen Gegenstands-Identifikator
und eine Gegenstandsklasse mit jedem der Gegenstände (4a-d) zu assoziieren, der einen
Gegenstands -Identifikator trägt;
- eine Identifikations-Abfrageeinrichtung (8), die betriebsbereit ist, um zu identifizieren
bzw. festzustellen, welche der Gegenstands- (4a-d) und Personen-Identifikatoren sich
gegenwärtig in einem bestimmten Bereich (2) befinden, wobei die Gegenstands-Identifikatoren
durch die Verwendung einer Stromleitung der Gegenstände (4a-d) zugänglich sind, die
die Gegenstände (4a-d) mit elektrischer Energie versorgt, um zusätzlich festzustellen,
ob die Gegenstände (4a-d) gegenwärtig ein- oder ausgeschaltet sind,
- einen Regeln-Generator, der betriebsbereit ist, um Regeln zu implementieren, die
definieren, welche Personen (6a-d) welcher Benutzerrollen in Kombination mit welchen
Gegenständen (4a-d) welcher Gegenstandsklassen, und ob die Gegenstände an oder ausgeschaltet
sind, innerhalb des Bereichs (2) zugelassen oder benötigt werden; und
- eine Steuerung (10), die in Kommunikation mit der Identifikations-Abfrageeinrichtung
(8) steht und die betriebsbereit ist, zu bestimmen, ob die identifizierten Gegenstands-
und Personen-Identifikatoren den Regeln entsprechen bzw. diese einhalten,
wobei die genannte Regel-Einhaltung kontrolliert wird, und falls eine dieser Regeln
nicht eingehalten wird, ein Alarm ausgelöst wird.
2. Das Sicherheitssystem nach Anspruch 1, wobei die Personen-Identifikatoren drahtlos
zugängliche Tags beinhalten.
3. Das Sicherheitssystem nach Anspruch 1 oder 2, das des Weiteren eine Zugangs-Steuerung
(14) umfasst, die betriebsbereit ist, den Zugang zum Bereich (2) derart zu steuern,
dass einer der Personen (6a-d) erlaubt wird den Bereich (2) zu betreten oder zu verlassen,
ausschließlich falls die identifizierten Gegenstands- und Personen-Identifikatoren
den Regeln immer noch entsprechen, nachdem die Person (6a-d) den Bereich (2) betreten
oder verlassen hat.
4. Das Sicherheitssystem nach Anspruch 3, wobei die Regeln die Benutzerrollen derart
definieren, dass der Zugang zum oder das Verlassen des Bereich/s (2) durch die assoziierten
Personen (6a-d) in Kombination mit bestimmten Gegenständen (4a-d) einer Gegenstandsklasse
festgelegt wird.
5. Das Sicherheitssystem nach einem der Ansprüche 1 bis 4, das eine zentrale Datenbank
(12) umfasst, die mit der Steuerung (10) verbunden ist, und die Benutzerrolle für
jede identifizierte Person (6a-d) oder die Gegenstandsklasse für jeden identifizierten
Gegenstand (4a-d) bereitstellt.
6. Das Sicherheitssystem nach Anspruch 5, wobei der Regeln-Generator mit der zentralen
Datenbank (12) verbunden ist und die Regeln von der zentralen Datenbank (12) abruft.
7. Das Sicherheitssystem nach einem der Ansprüche 1 bis 6, umfassend eine Zutrittssteuerung
(14), die den Zutritt zu einem Bereich (2) derart steuert, dass einer der Personen
(6a-d) erlaubt wird, den Bereich (2) zu betreten oder zu verlassen ausschließlich
falls die identifizierten Identifikatoren den Regeln immer noch entsprechen, nachdem
die Person (6a-d) den Bereich (2) betreten oder verlassen hat.
8. Ein Verfahren zur Überwachung von Personen (6a-d) und Gegenständen (4a-d), das Folgendes
umfasst:
- befragen von Personen-Identifikatoren, die Personen (6a-d) zugeordnet und von diesen
getragen werden, wobei jedem Personen-Identifikator mindestens einer Benutzerrolle
zugeordnet ist, um dadurch eine identifizierte Person (6a-d) in einem Bereich (2)
zu erhalten;
- befragen von Gegenstands-Identifikatoren, die Gegenständen (4a-d) zugeordnet und
von diesen getragen werden, wobei jedem Gegenstands-Identifikator mindestens einer
Gegenstands-Klasse zugeordnet ist, um dadurch einen identifizierten Gegenstand (4a-d)
in einem Bereich (2) zu erhalten;
- zugreifen auf Gegenstands-Identifikatoren unter Verwendung einer Stromleitung der
Gegenstände (4a-d), die die Gegenstände (4a-d) mit elektrischer Energie versorgt,
um zusätzlich festzustellen, ob die Gegenstände (4a-d) gegenwärtig ein- oder ausgeschaltet
sind,
- bestimmen von Regeln, die definieren, welche Personen (6a-d) welcher Benutzerrollen
in Kombination mit welchen Gegenständen (4a-d) welcher Gegenstandsklassen, und ob
die Gegenstände an oder ausgeschaltet sind, innerhalb des Bereichs (2) zugelassen
oder benötigt werden; und
- kontrollieren, ob die identifizierte Person (6a-d) und der identifizierte Gegenstand
(4a-d) den Regeln entsprechen bzw. diese einhalten,
wobei die genannte Regel-Einhaltung kontrolliert wird, und falls eine dieser Regeln
nicht eingehalten wird, ein Alarm ausgelöst wird.
9. Ein Computerprogrammprodukt zur Überwachung von Personen (6a-d) und Gegenständen (4a-d),
wobei das Computerprogrammprodukt Anweisungen umfasst, die, wenn sie in ein Computersystem
geladen und ausgeführt werden, betriebsbereit sind, das Computersystem dazu zu bringen,
ein Verfahren nach Anspruch 8 durchzuführen.