[0001] The present invention is directed to a security device, a surveillance system, a
vehicle, and a method for securing at least one object.
[0002] There are various contexts under which it is necessary or at least desired to know
if an object has been tampered with, e.g. has been moved. This can include doors,
flaps, access holes and the like, which are only to be opened under extraordinary
circumstances, or equipment which should only be removed from its storing space under
extraordinary circumstances. One particular example is emergency equipment stored
on aircraft, which has to remain in its intended place until the moment an emergency
occurs and the emergency equipment is needed. Some types of emergency equipment, doors,
flaps, access holes have to be inspected or maybe even completely replaced if moved
or tampered with in order to ensure maximum safety in case of emergency.
[0003] If for any reasons it is impossible or at least impractical to manually surveil said
objects at all times, some sort of device is necessary which can reveal if the object
to be secured has been tampered with. If a lot of objects are to be secured, said
devices have to be generally very simple so that enough devices can be provided at
a reasonable effort and cost. For example, the objects in question can be provided
with a wire or the like, which breaks when the secured object is moved or tampered
with. A broken wire then indicates that the object has been tampered with. In this
example, however, manual inspection of the wires by personnel is necessary to ensure
that no tampering has taken place. Depending on the number and accessibility of the
objects to be secured, this process of manual check-up can consume a large amount
of time and effort.
[0004] In view of the above, the present invention seeks to simplify the process of securing
objects against tampering, in particular for large amounts of objects and/or objects
which are located at locations which are difficult to access or have special importance.
[0005] According to the present invention, this problem is solved by a security device with
the features of independent claim 1, a surveillance system with the features of independent
claim 7, a vehicle with the features of independent claim 11, and a method with the
features of independent claim 13.
[0006] To that effect, a first aspect of the invention provides a security device comprising
a housing, a battery, which is arranged inside the housing, a wireless sending device,
which is arranged inside the housing, configured to be attached to an object to be
secured, connected to the battery and configured to send wireless signals, and a triggering
mechanism, which is arranged at least partially outside the housing, connected to
the wireless sending device and configured to trigger an irreversible change in a
sending behavior of the wireless sending device in reaction to a predefined force.
[0007] A second aspect of the invention provides a surveillance system, comprising at least
one security device according to the first aspect, and a central control device, which
is configured to receive signals sent by the at least one security device and to create
a notification if a change in the sending behavior of the wireless sending device
of the at least one security device is detected.
[0008] A third aspect of the present invention provides a vehicle, in particular an aircraft,
comprising a surveillance system according to the second aspect.
[0009] Yet a further aspect of the present invention provides a method for securing at least
one object, comprising the steps of providing the at least one object with a security
device according to the present invention, and monitoring whether a change in the
sending behavior of the wireless sending device of the security device has occurred.
[0010] One idea of the present invention lies in utilizing simple devices emitting wireless
signals, from which information can be gleaned on whether an object to be secured
has been tampered with, e.g. has been moved. In this way, the status of an object
can be monitored remotely and with some degree of automation, minimizing the manual
effort and the probability of errors occurring during status checks for the objects
to be secured.
[0011] Advantageous embodiments and further developments are apparent from the further dependent
claims and from the description with reference to the figures.
[0012] According to a further embodiment of the security device the irreversible change
in a sending behavior comprises a beginning of sending signals, a stopping of sending
signals, or an alteration in signals sent. Depending on the use case, any of these
configurations can provide various advantages, as will be explained later in detail.
[0013] According to a further embodiment of the security device, the triggering mechanism
comprises a strap, which is attached to the housing at both ends and comprises an
electrically conductive material. This is an advantageously simple configuration to
attach the triggering mechanism to an object.
[0014] According to a further embodiment of the security device, the strap comprises a breaking
point, which is configured to break when subjected to the predefined force. In this
way, the triggering mechanism can be advantageously fine tuned to the intended use
case.
[0015] According to a further embodiment of the security device, the housing comprises plastic.
This constitutes an advantageously easy configuration of the security device with
respect to manufacturing.
[0016] According to a further embodiment of the security device, the wireless sending device
comprises a Bluetooth emitter, in particular a low-power Bluetooth emitter. This can
allow advantageously easy integration of the security device into surveillance systems.
[0017] According to a further embodiment, the surveillance system comprises a plurality
of security devices. In this way, multitude of objects can be surveilled at the same
time.
[0018] According to a further embodiment of the surveillance system, each of the plurality
of security devices is configured to send signals comprising a unique identification.
This way, the generated notification can include information on which object has been
potentially tampered with.
[0019] According to a further embodiment of the surveillance system, the central control
device comprises a mobile device. This way, personnel can carry the central control
device with them during check-ups and compare the results of a manual inspection with
the information provided by the surveillance system.
[0020] According to a further embodiment of the vehicle, the central control device is configured
to communicate with an on-board system of the vehicle. This way, already existing
infrastructure can be advantageously utilized.
[0021] The above embodiments and further developments can be combined with each other as
desired, if useful. Further possible embodiments, further developments and implementations
of the invention also comprise combinations of features of the invention described
above or below with respect to the embodiments which are not explicitly mentioned.
In particular, the person skilled in the art will also add individual aspects as improvements
or additions to the respective basic form of the present invention.
[0022] The present invention is explained in more detail below with reference to the embodiments
shown in the schematic figures.
- Fig. 1
- shows a schematic illustration of a security device according to an embodiment of
the present invention;
- Fig. 2
- shows a schematic illustration of a surveillance system according to an embodiment
of the present invention; and
- Fig. 3
- shows a schematic flow diagram of a method for securing at least one object according
to an embodiment of the present invention.
[0023] The accompanying figures are intended to provide a further understanding of embodiments
of the invention. They illustrate embodiments and, in connection with the description,
serve to explain principles and concepts of the invention. Other embodiments and many
of the advantages mentioned will be apparent with reference to the drawings. The elements
of the drawings are not necessarily shown to scale with respect to each other.
[0024] In the figures of the drawings, identical elements, features and components that
have the same function and the same effect are each given the same reference signs,
unless otherwise specified.
[0025] Fig. 1 shows a schematic illustration of a security device 110 according to an embodiment
of the present invention.
[0026] The security device 110 comprises a housing 111, a battery 112, a wireless sending
device 113, and a triggering mechanism 114. The battery 112 and the wireless sending
device 113 are arranged inside the housing. The wireless sending device 130 is connected
to the battery 112, which provides the wireless sending device 130 with electrical
power. The triggering mechanism 114 is arranged partially outside the housing 111
and connected to the wireless sending device 113.
[0027] In the embodiment shown in Fig. 1, the triggering mechanism 114 comprises a strap,
which is attached to the housing and reaches into the housing to connect to the wireless
sending device 113. The strap forms a closed loop outside the housing 111. Through
this loop, an object to be secured can be attached to a fixed object. If someone tries
to move the object to be secured, the strap can either break, for example at a predetermined
breaking point, or detach from the housing 111, once a predefined force is applied
to the strap. This breaking or detaching can then trigger a change in the sending
behavior of the wireless sending device 113. For example, the strap can comprise an
electrically conductive material and form part of the electrical circuit powering
the wireless sending device 113. If the strap breaks, the electrical circuit is also
broken and the wireless sending device 113 is no longer powered. In that case, the
change in sending behavior could be a stopping of sending signals, as the wireless
sending device 113 no longer sends signals once it is no longer powered.
[0028] In the embodiment shown, the triggering mechanism 114 is directly connected to the
wireless sending device 113. However, other, indirect methods of connection are possible.
For example, the triggering mechanism 114 and the wireless sending device 113 can
be connected via electrical or electronic components, which can be powered by the
battery 112. The term connected can also be understood in its strictly functional
meaning. For example, the triggering mechanism 114 could be physically connected to
the battery 112, and disrupt the provision of electrical power to the wireless sending
device 113 from the battery 112 in reaction to the predefined force. In such an embodiment,
the triggering mechanism 114 would still be understood to be functionally connected
to the wireless sending device 113 and be configured to trigger a change in sending
behavior, i.e. by switching the wireless sending device off.
[0029] Various schematics for what change of sending behavior is triggered by the triggering
mechanism 114 can be envisaged, depending on the specifics of the use case. For example,
if an object is to be secured for a long time with regular checks of its status, it
can be advantageous for the wireless sending device 113 to not send signals until
the triggering mechanism 114 is triggered. In that case, the wireless sending device
113 does not draw power from the battery 112 until it is triggered. On the other hand,
if the object to be secured is not checked up on on a regular schedule, it can be
more advantageous, if the wireless sending device 113 is sending signals until the
triggering mechanism 114 is triggered. This way, it can be avoided that the battery
112 runs out of power after the triggering mechanism 114 has been triggered but before
the change in sending behavior has been noticed. Alternatively the triggering mechanism
114 can trigger a change in signals sent by the wireless sending device 113. This
way the wireless sending device 113 can transmit information pertinent to its status
before and after the triggering event.
[0030] The wireless sending device 113 can for example be a Bluetooth emitter. Thanks to
the wide spread of Bluetooth technology, this way the security device can easily be
integrated into already existing infrastructure. For example, in the context of the
surveillance system shown in Fig. 2, the central control device can be any sort of
mobile device, which regularly come with Bluetooth connectivity, can be used as a
central control device, if provided with adequate software. Of course, other wireless
communication methods can be utilized, for example in situation where a longer transmission
range is necessary.
[0031] It can be advantageous to configure the housing 111 to be safe against manipulation.
For example, if the housing 111 is manufactured by molding plastic around the components
arranged therein, manipulation of said components becomes next to impossible without
damaging the housing. Such damages could then be spotted during manual inspection.
[0032] In the embodiment shown in Fig. 1, the battery 112 and the wireless sending device
113 are shown as separate components arranged in the housing. It is, however, only
required that the wireless sending device 113 be supplied with adequate electrical
power to perform its functions. Consequently, embodiments in which the battery 112
forms an integral part of the wireless sending device 113 also fall under the scope
of the present invention.
[0033] Fig. 2 shows a schematic illustration of a surveillance system 100 according to an
embodiment of the present invention.
[0034] The surveillance system 100 comprises two security devices 110, in particular as
described in conjunction with Figure 1, and a central control device 120. The security
devices 110 are attached to objects 200 to be secured. The security devices 110 are
in communication with the central control device 120, meaning that the central control
device 120 is configured to receive and interpret signals sent by the wireless sending
devices of the security devices 110.
[0035] As the central control device 120 is in communication with the security devices 110,
it can detect a change in sending behavior of the wireless sending devices of the
security devices 110, caused by their respective triggering mechanisms if the respective
object 200 is moved or otherwise tampered with. Upon such a detection, the central
control device 120 can create a notification that such a change has occurred and that
the respective object 200 should be checked up on.
[0036] Advantageously, the signals sent by the wireless sending devices of the security
devices 110 can comprise identifying information, which can then be incorporated into
the notification created by the central control device 120.
[0037] In Fig. 2, the central control device 120 is shown as a stand-alone device, which
can be for example a handheld or mobile device, or a computation device which is installed
at a fixed location, e.g. any kind of personal computer running corresponding software.
Alternatively, the central control device 120 could be incorporated into a larger
system, for example into an on-board system of a vehicle comprising the surveillance
system 100.
[0038] Fig. 3 shows a schematic flow diagram of a method M for securing at least one object
according to an embodiment of the present invention.
[0039] In a first method step M1, the at least one object to be secured is provided with
a security device, in particular a security device as described in conjunction with
Figures 1 and 2. In a second method step M2, the security device is monitored for
a change in sending behavior of the wireless sending device of the security device.
In an additional optional method step M3, a notification is created if a change in
sending behavior of the wireless sending device of the security device is detected.
[0040] If the object to be secured is tampered with, e.g. is moved, the triggering mechanism
of the security device triggers a change in the sending behavior of the respective
wireless sending device. This change in sending behavior is then detected in the monitoring
step M2, indicating that the respective object has been tampered with.
[0041] With the method shown in Fig. 3, a potentially very large number of objects, or objects
located in hard to access locations, can be monitored for interference or manipulation
and thereby secured in an advantageously simple and reliable manner. It is not necessary
for personnel to go out and check each object to be secured manually.
[0042] The terms "security" and "securing" have been used throughout this application not
in the meaning that access to the objects to be "secured" should be denied, i.e. made
impossible, but rather in the meaning that unexpected access should be detected. In
this context, "security" and "securing" can be understood to be synonymous with "monitoring".
List of reference signs
[0043]
- 100
- surveillance system
- 110
- security device
- 111
- housing
- 112
- battery
- 113
- wireless sending device
- 114
- triggering mechanism
- 120
- central control device
- 200
- object
- M
- method
- M1
- method step of providing security devices
- M2
- method step of monitoring
- M3
- method step of generating notification
1. Security device (110) comprising
a housing (111);
a battery (112), which is arranged inside the housing (111);
a wireless sending device (113), which is arranged inside the housing (111), connected
to the battery (112), and configured to send wireless signals; and
a triggering mechanism (114), which is arranged at least partially outside the housing
(111), configured to be attached to an object (200) to be secured, connected to the
wireless sending device (113) and configured to trigger an irreversible change in
a sending behavior of the wireless sending device (113) in reaction to a predefined
force.
2. Security device (110) according to claim 1, wherein the irreversible change in a sending
behavior comprises a beginning of sending signals, a stopping of sending signals,
or an alteration in signals sent.
3. Security device (110) according to claim 1 or 2, wherein the triggering mechanism
(114) comprises a strap, which is attached to the housing (111) at both ends and comprises
an electrically conductive material.
4. Security device (100) according to claim 3, wherein the strap comprises a breaking
point, which is configured to break when subjected to the predefined force.
5. Security device (100) according to any one of the preceding claims, wherein the housing
(111) comprises plastic.
6. Security device (100) according to any one of the preceding claims, wherein the wireless
sending device (113) comprises a Bluetooth emitter, in particular a low-power Bluetooth
emitter.
7. Surveillance system (100), comprising
at least one security device (110) according to any one of the preceding claims; and
a central control device (120), which is configured to receive signals sent by the
at least one security device (110) and to create a notification if a change in the
sending behavior of the wireless sending device (113) of the at least one security
device (110) is detected.
8. Surveillance system (100) according to claim 7, comprising a plurality of security
devices (110).
9. Surveillance system (100) according to claim 8, wherein each of the plurality of security
devices (110) is configured to send signals comprising a unique identification.
10. Surveillance system (100) according to one of claims 7 to 9, wherein the central control
device (120) comprises a mobile device.
11. Vehicle, in particular aircraft, comprising a surveillance system (100) according
to one of claims 7 to 10.
12. Vehicle according to claim 11, wherein the central control device (120) is configured
to communicate with an on-board system of the vehicle.
13. Method (M) for securing at least one object (200), comprising the steps of providing
(M1) the at least one object (200) with a security device (110) according to any one
of claims 1 to 6;
monitoring (M2) whether a change in the sending behavior of the wireless sending device
(11) of the security device (110) has occurred.
14. Method (M) according to claim 13, wherein the monitoring step (M2) is performed by
a central control device (120).
15. Method (M) according to one of claims 13 or 14, further comprising a step of creating
(M3) a notification if a change in the sending behavior of the wireless sending device
(111) of the at least one security device (110) is detected.