(19)
(11) EP 4 300 454 A1

(12) EUROPEAN PATENT APPLICATION

(43) Date of publication:
03.01.2024 Bulletin 2024/01

(21) Application number: 22181341.3

(22) Date of filing: 27.06.2022
(51) International Patent Classification (IPC): 
G08B 13/12(2006.01)
(52) Cooperative Patent Classification (CPC):
G08B 13/12; G08B 13/126
(84) Designated Contracting States:
AL AT BE BG CH CY CZ DE DK EE ES FI FR GB GR HR HU IE IS IT LI LT LU LV MC MK MT NL NO PL PT RO RS SE SI SK SM TR
Designated Extension States:
BA ME
Designated Validation States:
KH MA MD TN

(71) Applicant: KID-Systeme GmbH
21614 Buxtehude (DE)

(72) Inventor:
  • FUCHS, Andreas
    21614 Buxtehude (DE)

(74) Representative: Isarpatent 
Patent- und Rechtsanwälte Barth Charles Hassa Peckmann & Partner mbB Friedrichstrasse 31
80801 München
80801 München (DE)

   


(54) SECURITY DEVICE, SURVEILLANCE SYSTEM, VEHICLE, AND METHOD FOR SECURING AN OBJECT


(57) The present invention provides a security device (110) comprising a housing (111); a battery (112), which is arranged inside the housing (111); a wireless sending device (113), which is arranged inside the housing (111), connected to the battery (112), and configured to send wireless signals; and a triggering mechanism (114), which is arranged at least partially outside the housing (111), configured to be attached to an object to be secured, connected to the wireless sending device (113) and configured to trigger an irreversible change in a sending behavior of the wireless sending device (113) in reaction to a predefined force. The present invention further provides a surveillance system, a vehicle, and a method for securing at least one object.




Description


[0001] The present invention is directed to a security device, a surveillance system, a vehicle, and a method for securing at least one object.

[0002] There are various contexts under which it is necessary or at least desired to know if an object has been tampered with, e.g. has been moved. This can include doors, flaps, access holes and the like, which are only to be opened under extraordinary circumstances, or equipment which should only be removed from its storing space under extraordinary circumstances. One particular example is emergency equipment stored on aircraft, which has to remain in its intended place until the moment an emergency occurs and the emergency equipment is needed. Some types of emergency equipment, doors, flaps, access holes have to be inspected or maybe even completely replaced if moved or tampered with in order to ensure maximum safety in case of emergency.

[0003] If for any reasons it is impossible or at least impractical to manually surveil said objects at all times, some sort of device is necessary which can reveal if the object to be secured has been tampered with. If a lot of objects are to be secured, said devices have to be generally very simple so that enough devices can be provided at a reasonable effort and cost. For example, the objects in question can be provided with a wire or the like, which breaks when the secured object is moved or tampered with. A broken wire then indicates that the object has been tampered with. In this example, however, manual inspection of the wires by personnel is necessary to ensure that no tampering has taken place. Depending on the number and accessibility of the objects to be secured, this process of manual check-up can consume a large amount of time and effort.

[0004] In view of the above, the present invention seeks to simplify the process of securing objects against tampering, in particular for large amounts of objects and/or objects which are located at locations which are difficult to access or have special importance.

[0005] According to the present invention, this problem is solved by a security device with the features of independent claim 1, a surveillance system with the features of independent claim 7, a vehicle with the features of independent claim 11, and a method with the features of independent claim 13.

[0006] To that effect, a first aspect of the invention provides a security device comprising a housing, a battery, which is arranged inside the housing, a wireless sending device, which is arranged inside the housing, configured to be attached to an object to be secured, connected to the battery and configured to send wireless signals, and a triggering mechanism, which is arranged at least partially outside the housing, connected to the wireless sending device and configured to trigger an irreversible change in a sending behavior of the wireless sending device in reaction to a predefined force.

[0007] A second aspect of the invention provides a surveillance system, comprising at least one security device according to the first aspect, and a central control device, which is configured to receive signals sent by the at least one security device and to create a notification if a change in the sending behavior of the wireless sending device of the at least one security device is detected.

[0008] A third aspect of the present invention provides a vehicle, in particular an aircraft, comprising a surveillance system according to the second aspect.

[0009] Yet a further aspect of the present invention provides a method for securing at least one object, comprising the steps of providing the at least one object with a security device according to the present invention, and monitoring whether a change in the sending behavior of the wireless sending device of the security device has occurred.

[0010] One idea of the present invention lies in utilizing simple devices emitting wireless signals, from which information can be gleaned on whether an object to be secured has been tampered with, e.g. has been moved. In this way, the status of an object can be monitored remotely and with some degree of automation, minimizing the manual effort and the probability of errors occurring during status checks for the objects to be secured.

[0011] Advantageous embodiments and further developments are apparent from the further dependent claims and from the description with reference to the figures.

[0012] According to a further embodiment of the security device the irreversible change in a sending behavior comprises a beginning of sending signals, a stopping of sending signals, or an alteration in signals sent. Depending on the use case, any of these configurations can provide various advantages, as will be explained later in detail.

[0013] According to a further embodiment of the security device, the triggering mechanism comprises a strap, which is attached to the housing at both ends and comprises an electrically conductive material. This is an advantageously simple configuration to attach the triggering mechanism to an object.

[0014] According to a further embodiment of the security device, the strap comprises a breaking point, which is configured to break when subjected to the predefined force. In this way, the triggering mechanism can be advantageously fine tuned to the intended use case.

[0015] According to a further embodiment of the security device, the housing comprises plastic. This constitutes an advantageously easy configuration of the security device with respect to manufacturing.

[0016] According to a further embodiment of the security device, the wireless sending device comprises a Bluetooth emitter, in particular a low-power Bluetooth emitter. This can allow advantageously easy integration of the security device into surveillance systems.

[0017] According to a further embodiment, the surveillance system comprises a plurality of security devices. In this way, multitude of objects can be surveilled at the same time.

[0018] According to a further embodiment of the surveillance system, each of the plurality of security devices is configured to send signals comprising a unique identification. This way, the generated notification can include information on which object has been potentially tampered with.

[0019] According to a further embodiment of the surveillance system, the central control device comprises a mobile device. This way, personnel can carry the central control device with them during check-ups and compare the results of a manual inspection with the information provided by the surveillance system.

[0020] According to a further embodiment of the vehicle, the central control device is configured to communicate with an on-board system of the vehicle. This way, already existing infrastructure can be advantageously utilized.

[0021] The above embodiments and further developments can be combined with each other as desired, if useful. Further possible embodiments, further developments and implementations of the invention also comprise combinations of features of the invention described above or below with respect to the embodiments which are not explicitly mentioned. In particular, the person skilled in the art will also add individual aspects as improvements or additions to the respective basic form of the present invention.

[0022] The present invention is explained in more detail below with reference to the embodiments shown in the schematic figures.
Fig. 1
shows a schematic illustration of a security device according to an embodiment of the present invention;
Fig. 2
shows a schematic illustration of a surveillance system according to an embodiment of the present invention; and
Fig. 3
shows a schematic flow diagram of a method for securing at least one object according to an embodiment of the present invention.


[0023] The accompanying figures are intended to provide a further understanding of embodiments of the invention. They illustrate embodiments and, in connection with the description, serve to explain principles and concepts of the invention. Other embodiments and many of the advantages mentioned will be apparent with reference to the drawings. The elements of the drawings are not necessarily shown to scale with respect to each other.

[0024] In the figures of the drawings, identical elements, features and components that have the same function and the same effect are each given the same reference signs, unless otherwise specified.

[0025] Fig. 1 shows a schematic illustration of a security device 110 according to an embodiment of the present invention.

[0026] The security device 110 comprises a housing 111, a battery 112, a wireless sending device 113, and a triggering mechanism 114. The battery 112 and the wireless sending device 113 are arranged inside the housing. The wireless sending device 130 is connected to the battery 112, which provides the wireless sending device 130 with electrical power. The triggering mechanism 114 is arranged partially outside the housing 111 and connected to the wireless sending device 113.

[0027] In the embodiment shown in Fig. 1, the triggering mechanism 114 comprises a strap, which is attached to the housing and reaches into the housing to connect to the wireless sending device 113. The strap forms a closed loop outside the housing 111. Through this loop, an object to be secured can be attached to a fixed object. If someone tries to move the object to be secured, the strap can either break, for example at a predetermined breaking point, or detach from the housing 111, once a predefined force is applied to the strap. This breaking or detaching can then trigger a change in the sending behavior of the wireless sending device 113. For example, the strap can comprise an electrically conductive material and form part of the electrical circuit powering the wireless sending device 113. If the strap breaks, the electrical circuit is also broken and the wireless sending device 113 is no longer powered. In that case, the change in sending behavior could be a stopping of sending signals, as the wireless sending device 113 no longer sends signals once it is no longer powered.

[0028] In the embodiment shown, the triggering mechanism 114 is directly connected to the wireless sending device 113. However, other, indirect methods of connection are possible. For example, the triggering mechanism 114 and the wireless sending device 113 can be connected via electrical or electronic components, which can be powered by the battery 112. The term connected can also be understood in its strictly functional meaning. For example, the triggering mechanism 114 could be physically connected to the battery 112, and disrupt the provision of electrical power to the wireless sending device 113 from the battery 112 in reaction to the predefined force. In such an embodiment, the triggering mechanism 114 would still be understood to be functionally connected to the wireless sending device 113 and be configured to trigger a change in sending behavior, i.e. by switching the wireless sending device off.

[0029] Various schematics for what change of sending behavior is triggered by the triggering mechanism 114 can be envisaged, depending on the specifics of the use case. For example, if an object is to be secured for a long time with regular checks of its status, it can be advantageous for the wireless sending device 113 to not send signals until the triggering mechanism 114 is triggered. In that case, the wireless sending device 113 does not draw power from the battery 112 until it is triggered. On the other hand, if the object to be secured is not checked up on on a regular schedule, it can be more advantageous, if the wireless sending device 113 is sending signals until the triggering mechanism 114 is triggered. This way, it can be avoided that the battery 112 runs out of power after the triggering mechanism 114 has been triggered but before the change in sending behavior has been noticed. Alternatively the triggering mechanism 114 can trigger a change in signals sent by the wireless sending device 113. This way the wireless sending device 113 can transmit information pertinent to its status before and after the triggering event.

[0030] The wireless sending device 113 can for example be a Bluetooth emitter. Thanks to the wide spread of Bluetooth technology, this way the security device can easily be integrated into already existing infrastructure. For example, in the context of the surveillance system shown in Fig. 2, the central control device can be any sort of mobile device, which regularly come with Bluetooth connectivity, can be used as a central control device, if provided with adequate software. Of course, other wireless communication methods can be utilized, for example in situation where a longer transmission range is necessary.

[0031] It can be advantageous to configure the housing 111 to be safe against manipulation. For example, if the housing 111 is manufactured by molding plastic around the components arranged therein, manipulation of said components becomes next to impossible without damaging the housing. Such damages could then be spotted during manual inspection.

[0032] In the embodiment shown in Fig. 1, the battery 112 and the wireless sending device 113 are shown as separate components arranged in the housing. It is, however, only required that the wireless sending device 113 be supplied with adequate electrical power to perform its functions. Consequently, embodiments in which the battery 112 forms an integral part of the wireless sending device 113 also fall under the scope of the present invention.

[0033] Fig. 2 shows a schematic illustration of a surveillance system 100 according to an embodiment of the present invention.

[0034] The surveillance system 100 comprises two security devices 110, in particular as described in conjunction with Figure 1, and a central control device 120. The security devices 110 are attached to objects 200 to be secured. The security devices 110 are in communication with the central control device 120, meaning that the central control device 120 is configured to receive and interpret signals sent by the wireless sending devices of the security devices 110.

[0035] As the central control device 120 is in communication with the security devices 110, it can detect a change in sending behavior of the wireless sending devices of the security devices 110, caused by their respective triggering mechanisms if the respective object 200 is moved or otherwise tampered with. Upon such a detection, the central control device 120 can create a notification that such a change has occurred and that the respective object 200 should be checked up on.

[0036] Advantageously, the signals sent by the wireless sending devices of the security devices 110 can comprise identifying information, which can then be incorporated into the notification created by the central control device 120.

[0037] In Fig. 2, the central control device 120 is shown as a stand-alone device, which can be for example a handheld or mobile device, or a computation device which is installed at a fixed location, e.g. any kind of personal computer running corresponding software. Alternatively, the central control device 120 could be incorporated into a larger system, for example into an on-board system of a vehicle comprising the surveillance system 100.

[0038] Fig. 3 shows a schematic flow diagram of a method M for securing at least one object according to an embodiment of the present invention.

[0039] In a first method step M1, the at least one object to be secured is provided with a security device, in particular a security device as described in conjunction with Figures 1 and 2. In a second method step M2, the security device is monitored for a change in sending behavior of the wireless sending device of the security device. In an additional optional method step M3, a notification is created if a change in sending behavior of the wireless sending device of the security device is detected.

[0040] If the object to be secured is tampered with, e.g. is moved, the triggering mechanism of the security device triggers a change in the sending behavior of the respective wireless sending device. This change in sending behavior is then detected in the monitoring step M2, indicating that the respective object has been tampered with.

[0041] With the method shown in Fig. 3, a potentially very large number of objects, or objects located in hard to access locations, can be monitored for interference or manipulation and thereby secured in an advantageously simple and reliable manner. It is not necessary for personnel to go out and check each object to be secured manually.

[0042] The terms "security" and "securing" have been used throughout this application not in the meaning that access to the objects to be "secured" should be denied, i.e. made impossible, but rather in the meaning that unexpected access should be detected. In this context, "security" and "securing" can be understood to be synonymous with "monitoring".

List of reference signs



[0043] 
100
surveillance system
110
security device
111
housing
112
battery
113
wireless sending device
114
triggering mechanism
120
central control device
200
object
M
method
M1
method step of providing security devices
M2
method step of monitoring
M3
method step of generating notification



Claims

1. Security device (110) comprising

a housing (111);

a battery (112), which is arranged inside the housing (111);

a wireless sending device (113), which is arranged inside the housing (111), connected to the battery (112), and configured to send wireless signals; and

a triggering mechanism (114), which is arranged at least partially outside the housing (111), configured to be attached to an object (200) to be secured, connected to the wireless sending device (113) and configured to trigger an irreversible change in a sending behavior of the wireless sending device (113) in reaction to a predefined force.


 
2. Security device (110) according to claim 1, wherein the irreversible change in a sending behavior comprises a beginning of sending signals, a stopping of sending signals, or an alteration in signals sent.
 
3. Security device (110) according to claim 1 or 2, wherein the triggering mechanism (114) comprises a strap, which is attached to the housing (111) at both ends and comprises an electrically conductive material.
 
4. Security device (100) according to claim 3, wherein the strap comprises a breaking point, which is configured to break when subjected to the predefined force.
 
5. Security device (100) according to any one of the preceding claims, wherein the housing (111) comprises plastic.
 
6. Security device (100) according to any one of the preceding claims, wherein the wireless sending device (113) comprises a Bluetooth emitter, in particular a low-power Bluetooth emitter.
 
7. Surveillance system (100), comprising

at least one security device (110) according to any one of the preceding claims; and

a central control device (120), which is configured to receive signals sent by the at least one security device (110) and to create a notification if a change in the sending behavior of the wireless sending device (113) of the at least one security device (110) is detected.


 
8. Surveillance system (100) according to claim 7, comprising a plurality of security devices (110).
 
9. Surveillance system (100) according to claim 8, wherein each of the plurality of security devices (110) is configured to send signals comprising a unique identification.
 
10. Surveillance system (100) according to one of claims 7 to 9, wherein the central control device (120) comprises a mobile device.
 
11. Vehicle, in particular aircraft, comprising a surveillance system (100) according to one of claims 7 to 10.
 
12. Vehicle according to claim 11, wherein the central control device (120) is configured to communicate with an on-board system of the vehicle.
 
13. Method (M) for securing at least one object (200), comprising the steps of providing (M1) the at least one object (200) with a security device (110) according to any one of claims 1 to 6;
monitoring (M2) whether a change in the sending behavior of the wireless sending device (11) of the security device (110) has occurred.
 
14. Method (M) according to claim 13, wherein the monitoring step (M2) is performed by a central control device (120).
 
15. Method (M) according to one of claims 13 or 14, further comprising a step of creating (M3) a notification if a change in the sending behavior of the wireless sending device (111) of the at least one security device (110) is detected.
 




Drawing










Search report









Search report