Method for controlling access in a system compressing a portable device associated with a user and an access control device
10249122 · 2019-04-02
Assignee
Inventors
Cpc classification
G07C2009/00317
PHYSICS
G07C9/00309
PHYSICS
G07C2209/61
PHYSICS
B60R25/24
PERFORMING OPERATIONS; TRANSPORTING
International classification
Abstract
A method for controlling access in a system comprising a portable device associated with a user and an access control device, includes the portable device and the access control device being configured to wirelessly communicate with each other, the method comprising: pairing the portable device and the access control device, upon the portable device detecting proximity to the access control device, determining at the portable device a signal strength over time of a signal received from the access control device, comparing the determined signal strength over time with a previously determined reference signal strength profile, and upon the determined signal strength over time being considered congruent with the reference signal strength profile, controlling the access control device.
Claims
1. A method for controlling access in a system comprising a portable device associated with a user and an access control device, the access control device having a locked and an unlocked state, wherein the portable device and the access control device are configured to wirelessly communicate with each other, the method comprising: pairing the portable device and the access control device, upon the portable device detecting proximity to the access control device, determining at the portable device a signal strength over time of a signal received from the access control device, comparing the determined signal strength over time with a previously determined reference signal strength profile, and upon the determined signal strength over time being considered congruent with the reference signal strength profile, controlling the access control device; upon the access control device changing state from the locked state to the unlocked state, recording or updating at the portable device at least a portion of the determined signal strength over time as a reference signal strength profile.
2. The method according to claim 1, wherein controlling of the access control device is at a predetermined point in time relative to the reference signal strength profile.
3. The method according to claim 1, wherein the congruency is determined by determining if the signal strength over time is within a predetermined tolerance band over time relative to the reference signal strength profile.
4. The method according to claim 1, the method further comprising setting the portable device in a calibration mode previous to determining at the portable device a signal strength over time of a signal received from the access control device.
5. The method according to claim 1, wherein the method further comprises, while being in the calibration mode, upon the access control device changing state from the locked state to the unlocked state at a plurality of occasions, recording or updating at the portable device the determined signal strength over time as a reference signal strength profile.
6. The method according to claim 5, wherein the recorded or updated reference signal strength profile is a representation of the, at the plurality of occasions, determined signal strengths over time.
7. The method according to claim 5, the method further comprising, after a predetermined number of occasions setting a reference signal strength profile to be used when comparing the determined signal strength over time with a previously determined reference signal strength profile.
8. The method according to claim 5, the method further comprising, after a predetermined number of occasions setting a tolerance band over time relative to the reference signal strength profile, to be used when considering congruency of the determined signal strength over time and a previously determined reference signal strength profile.
9. The method according to claim 5, the method further comprising, in response to differences between reference signal strength profiles determined at different occasions being less than a predetermined tolerance band, setting a reference signal strength profile to be used when considering congruency of the determined signal strength over time and a previously determined reference signal strength profile.
10. The method according to claim 1, wherein comparing the determined signal strength over time with a previously determined reference signal strength profile includes a comparison of first time derivatives of the determined signal strength over time and the reference signal strength profile.
11. The method according to claim 1, the method further comprising: upon the portable device detecting proximity to the access control device, determining at the portable device a sensor signal from an auxiliary sensor of the portable device over time, upon the user changing state of the access control device, recording or updating at the portable device at least a portion of the determined sensor signal from the auxiliary sensor over time as an auxiliary reference signal profile, wherein comparing the determined signal strength over time with a previously determined reference signal strength profile is performed in combination with comparing the determined sensor signal from the auxiliary sensor over time with a previously determined auxiliary signal reference profile, and upon the signal strength over time being considered congruent with the reference signal strength profile, and the sensor signal from the auxiliary sensor over time being considered congruent with the auxiliary signal reference profile, controlling the access control device.
12. The method according to claim 1, wherein the wireless communication between the portable device and the access control device is via Bluetooth, Zigbee, Wifi, RFID, NFC.
13. The method according to claim 1, wherein the portable device is a mobile phone, a tablet, a key fob, a smart watch, or a smart bracelet.
14. The method according to claim 1, wherein the signal strength over time of a signal received from the access control device is a received signal strength indicator, RSSI, or Received Channel Power Indicator, RCPI.
Description
BRIEF DESCRIPTION OF THE DRAWINGS
(1) The above and other aspects will now be described in more detail, with reference to appended drawings showing different embodiments. The figures should not be considered limiting to the specific embodiment; instead they are used for explaining and understanding the teachings.
(2) As illustrated in the figures, the sizes of layers and regions are exaggerated for illustrative purposes and, thus, are provided to illustrate the general structures of embodiments. Like reference numerals refer to like elements throughout.
(3)
(4)
(5)
(6)
(7)
(8)
(9)
(10)
(11)
(12)
(13)
DETAILED DESCRIPTION
(14) The present teachings will now be described more fully hereinafter with reference to the accompanying drawings, in which currently preferred embodiments are shown. The teachings may, however, be embodied in many different forms and should not be construed as limited to the embodiments set forth herein; rather, these embodiments are provided for thoroughness and completeness, and to fully convey the scope of the teachings to the skilled person.
(15) In the following, with reference to
(16)
(17) The portable device 104 may be a mobile communication device such as a mobile phone or a tablet.
(18) The portable device 104 is associated with a user 106. The association may be via the portable device 104 requiring a user identification, ID. The user identification may, for example, comprise a touch based ID or a PIN code lock.
(19) The portable device 104 and the access control device 102 may each comprise a memory 112 for storing information. The memory 112 of the portable device 104 may store information pertaining to the user identification.
(20) The portable device 104 and the access control device 102 are further configured to wirelessly communicate 110 with each other. The portable device 104 may pair 111 with the access control device 102. The pairing 111 occurs to establish a connection between two devices 102, 104.
(21) The pairing may be initiated by the portable device, e.g. by the user selecting an access device from a list of access control devices on the portable device. The pairing may comprise an authentication procedure. The authentication procedure may comprise an authentication via entering, at the portable device, a security code. The security code may be a password or a pin code. The authentication may be achieved by the portable device capturing an image of the access control device. An identification of the control access device may thereby be obtained.
(22) The authentication may be achieved via QR code, a barcode or a text. The QR code, the barcode or the text may be arranged at the access control device or adjacent to the access control device. Hence, a visual indication may be used to establish an authentication.
(23) A camera of the portable device may be configured to image the control access device or the QR code, the barcode, or the text associated with the control access device.
(24) A camera of the portable device may be configured to authenticate the access control device via the QR code, the barcode, or the text associated with the control access device.
(25) The portable device may select a previously determined reference signal strength profile based on the authenticated access control device.
(26) The portable device may alternatively select a previously determined reference signal strength profile based on a selected access control device.
(27) A record of information comprising data pertaining to the connection may further be stored in the memory of at least one of the respective devices 102, 104. Either memory 112 may be configured for storing information pertaining to the pairing.
(28) The wording wireless communication should be understood as transfer of information or power between the two devices not being connected by an electrical conductor. The portable device 104 and the access control device 102 may, respectively, comprise a communication unit 114 for providing the wireless communication 110. The wireless communication may be via Bluetooth.
(29) The portable device 104 and the access control device 102 may each further comprise a processor 116. The processor 116 may, for example, be a microcontroller configured to process data received or transmitted by the communication units 114 of the portable device 104 and the access control device 102, respectively. The processor 116 of the portable device 104 may further be configured to process data pertaining to a signal strength over time of a signal received from the access control device 102.
(30) Next a method 200 for controlling access in the system 100 comprising a portable device 104, associated with the user 106, and an access control device 102 is described, see
(31)
(32) With reference to
(33) Upon the portable device 104 detecting proximity to the access control device 102, the method further comprises determining 204 at the portable device 104 the signal strength over time of a signal received from the access control device 102.
(34)
(35) The method 200 further comprises comparing 206 the determined signal strength over time 502 with a previously determined reference signal strength profile 504. The previously determined reference signal strength profile 504 is illustrated in
(36) From the comparison it is possible to extract information on how the user 106 is approaching the door 108. The method 200 thereby allows for control of an access control device 102 by an identified characteristic movement pattern associated with the user 106. Thus, the access control device 102 may be controlled when the determined signal strength over time 502 is considered congruent with the reference signal strength profile 504. Congruency may, for example, be determined by a correlation, a cross correlation, a minimum deviation or by comparing the integrals of the determined signal strength over time 502 and the reference signal strength profile 504.
(37) The controlling 208 of the access control device 102 may be by changing a state of the access control device 102. The change of state may be to unlock the door 108. This is illustrated in the
(38) If the determined signal strength over time 502 is considered congruent with the reference signal strength profile 504 the state of the control access device 102 may be changed such that the door 108 in unlocked. The door may further be automatically opened such that the user may pass 109 through the open door 108 in an efficient manner, see
(39) The controlling of the access control device 102 may further be at a predetermined point in time, t.sub.unlock, relative to the reference signal strength profile 504. Thereby, e.g. a door may begin to open before the user reaches the door and the user may thereby pass the door without having to wait or slow down at all or at least not to any significant extent. An improved passage of the door 108 is thereby achieved by the method 200.
(40) Trends in the signal strength over time may alternatively be used to derive the predetermined point in time.
(41) The method 200 may further comprise upon the user changing state of the access control device, recording or updating 210 at the portable device at least a portion of the determined signal strength over time as a reference signal strength profile.
(42) The point in time at which the user changes the state of the access control device thereby triggers recording or updating of a reference signal strength profile. Thus, the method utilizes the signal strength profile of the portable device of the user to record or update a movement pattern of the user as the user approaches the access control device. The similarity of the determined movement pattern of the user to a stored movement pattern, i.e. the reference signal strength profile, may then be used to identify the user and for controlling the access control device. The controlling of the access control device may thereby be tailored to fit the movement characteristics of a specific individual.
(43)
(44) The changing state of the access control device may be achieved by the user deliberately changing the state of the access control device. Thus, the user changing the state of the access control device 102 may trigger a recording at the portable device at least a portion of the determined signal strength over time as a reference signal strength profile. To this end, the changing of the state of the access control device may e.g. be an unlocking of for instance a door lock. The unlocking may be by the user physically unlocking the door by key or key code or by the portable device sending a signal triggering the unlocking, i.e. changing the state of the access control device.
(45) By way of example, the changing state of the access control device by the user may be recorded to occur at time t.sub.unlock, see
(46)
(47) More specifically, the measurement points 702 illustrate four different movement patterns recorded for a user approaching the access control device. The measurement points 702 further lie within the predetermined tolerance band 706 whereby congruency may be determined. An advantage of utilizing the condition of the signal strength over time being within a predetermined tolerance band over time relative to the reference signal strength profile is that it enables an identification of the user which may be used to ensure that a correct or certified user controls the access control device. In this case, all four movement patterns 702 may be correlated to a single user. In
(48) The method may further comprise setting 203 the portable device 104 in a calibration mode previous to determining 204 at the portable device 104 a signal strength over time of a signal received from the access control device 102.
(49) To this end, the method may further comprise, while being in the calibration mode, at a plurality of occasions, upon the user changing state of the access control device, recording or updating at the portable device the determined signal strength over time as a reference signal strength profile.
(50) The use of the calibration mode opens up for a learning procedure in which the user may be efficiently identified. The method thereby allows for an efficient mapping of the movement of the user when the user approaches the access control device. A more reliable determining of the reference signal strength profile is further achieved. The recording of the reference signal strength profile is further triggered by the user changing state of the access control device.
(51) The recorded or updated reference signal strength profile may be a representation of the, at one occasion, determined signal strengths over time.
(52) The recorded or updated reference signal strength profile may alternatively be a representation of the, at the plurality of occasions, determined signal strengths over time. Thus, representation may e.g. be an average or a weighted average of the actually determined, and optionally data processed, signal strength over time.
(53) For example, the four different determined signal strength over time indicated by the measurement points 702 in
(54) The reference signal strength may be recorded or updated after a plurality of occasions upon which the determined signal strength over time has been considered congruent with the reference signal strength profile. The recorded or updated reference signal strength profile may thereby be a representation of the, at the plurality of occasions. determined or updated determined signal strengths over time. The representation may comprise averaging or filtering. Thus, the reference signal strength may be recorded or updated after the access control device has been controlled one or more times.
(55) The method may further comprise, after a predetermined number of occasions setting a reference signal strength profile to be used when comparing the determined signal strength over time with a previously determined reference signal strength profile. A learning procedure may thereby be established. An update of the reference signal profile is further possible.
(56) The method may further comprise, after a predetermined number of occasions setting a tolerance band over time relative to the reference signal strength profile, to be used when considering congruency of the determined signal strength over time and a previously determined reference signal strength profile.
(57) The method may further comprise, in response to differences between reference signal strength profiles determined at different occasions being less than a predetermined tolerance band, setting a reference signal strength profile to be used when considering congruency of the determined signal strength over time and a previously determined reference signal strength profile.
(58) A procedure for ending the calibration mode of the method is thereby provided. That is the calibration mode is ended when there is a sufficient agreement of the reference signal strength profile determined at different occasions. The method thereby provides a more reliable reference signal profile.
(59) The comparison of the determined signal strength over time with a previously determined reference signal strength profile may include a comparison of first time derivatives of the determined signal strength over time and the reference signal strength profile. Trends in the movement of the user when approaching the access control device may thereby be utilized. An improved reliability in controlling the access control device may thereby be achieved.
(60) The portable device 104 may comprise an auxiliary sensor 118 for registering its movement and/or orientation, see
(61) To take advantage of this, the method 200 may further comprise: upon the portable device 104 detecting proximity to the access control device 102, determining 211 at the portable device 102 a sensor signal from the auxiliary sensor 118 of the portable device 104 over time, see the block scheme in
(62) As mentioned above, the method 200 may be used to address the issue of unintentional triggering of the access control device and still being capable of triggering the access control device well in advance of the user's approach to the object controlled by the access control device thereby avoiding or at least reducing undesirable delay or waiting time for the user.
(63)
(64) To exemplify this,
(65) Movement pattern 812 illustrates a user approaching the access control 102. The system 100 and method 200 thereby allows for a recording of the signal strength over time 1002 of a signal received from the access control device 102.
(66) The method 200 further compares the determined signal strength over time 1002, i.e. the movement pattern 812, with the previously determined reference signal strength profile. The method 200 thereby allows for control of an access control device 102 by the identified characteristic movement pattern associated with the user. The access control device 102 may further be controlled in this case as the determined signal strength over time 1002 may be considered congruent with the reference signal strength profile 1006. From the comparison it is also possible to extract information on how the user 106 is approaching the door 810. The method 200 thereby allows for triggering of the access control device 102. As a result, the door 810 may be opened by the access control device 102, i.e. the door lock may be unlocked as the user approaches the door 108. The method 100 thereby avoids or at least reduces undesirable delay or waiting time for the user.
(67) Unintentional triggering of the access control device may further be mitigated by the method 200. Movement pattern 814 illustrates such a situation where the user approaches the access control 102, but at a point in time changes direction and moves away from the access control device 102. As a result of the movement 814 a signal strength over time 1004 may be recorded which differs from the signal strength over time 1002. In this case, the determined signal strength over time 1004 is considered, by the method 200, not to be congruent with a reference signal strength profile 1006 whereby the access control device is not controlled. Expressed differently, there is no change in state of the access control device if congruency is not found, resulting in that the door 108 remains locked as the user passes by.
(68) It may also be noted that the movement pattern 816 may give rise to a different determined signal strength over time than for movement pattern 812. The different movement patterns may thereby be used to identify the users as well as to determine an individualized point in time for controlling the control access device, as discussed in relation to
(69) To summarize, by determining the signal strengths over time 1002 and 1004, and by comparing them with the determined reference signal strength profile 1006 it is possible to differentiate between a first situation where the user is passing the door 810 with the intention to enter for instance into the office 802 and a second situation where the user is approaching the door 810 with the intention to open and pass through it.
(70) To this end, an auxiliary sensor 118 may provide additional information specifying the movement of the user 106 of the portable device 104. Referring to
(71) The wireless communication between the portable device and the access control device may preferably be via Bluetooth, Bluetooth Low Energy, and/or Zigbee.
(72) The wireless communication between the portable device and the access control device may alternatively, be via Radio Frequency Identification, RFID, Near Field Communication, NFC, FeliCa, ANT+, Z-Wave, ZigBee, Infrared communication or ultrasound.
(73) The wireless communication between the portable device and the access control device may preferably be via Wifi.
(74) The portable device may be a mobile phone, a tablet, a key fob, a smart watch, or a smart bracelet.
(75) It is preferred that the portable device has sufficient computing capability to be able to compare the determined signal strength over time with a previously determined reference signal strength profile. Thereby the access control device may e.g. be a typical electronic lock having wireless communication capability. The intelligence may then reside in the portable device which facilitates physical implementation of the method.
(76) The signal strength over time of a signal received from the access control device is a received signal strength indicator, RSSI, or Received Channel Power Indicator, RCPI.
(77) The person skilled in the art realizes that the present teaching by no means is limited to the preferred embodiments described above. On the contrary, many modifications and variations are possible within the scope of the appended claims.
(78) For example, the comparison of the determined signal strength over time with a previously determined reference signal strength profile may include a comparison of second time derivatives of the determined signal strength over time and the reference signal strength profile.
(79) The detection of proximity of the two devices may be by the portable device determining a signal power and or a trend in signal power of the received signal.
(80) The signal strength over time may be a received signal strength indicator, RSSI which is the measured power present in a received radio signal at a given point in time.
(81) It may be noted, that alternatively the signal strength over time may be RX which is the measured signal power in milliwatts, mW, or decibel-milliwatts, dBm, whereas RSSI is a signal strength percentage, i.e. the higher the RSSI number, the stronger the signal.
(82) The signal strength over time may be received channel power indicator, RCPI. The RCPI is an 802.11 measure of the received radio frequency power in a selected communication channel.
(83) Additionally, variations to the disclosed embodiments can be understood and effected by the skilled person in practicing the claims from a study of the drawings, the disclosure, and the appended claims.