ADDITIONAL ZONE MONITORING FOR A BUILDING DOOR
20230206710 · 2023-06-29
Inventors
Cpc classification
G07C9/00174
PHYSICS
E05Y2900/14
FIXED CONSTRUCTIONS
G07C9/25
PHYSICS
G07C9/15
PHYSICS
International classification
G07C9/15
PHYSICS
G07C9/25
PHYSICS
Abstract
A system for controlling access to a building or a restricted zone in the building includes a building door system having a building door, an electronic locking device, and a recognition device for capturing credentials for an object. If the credentials are valid, the building door can be unlocked and can be brought from a closed position into an open position. A sensor system monitors an access zone that includes a specified access region to the building door, in order to detect a person who is in the access zone. A control device generates an alarm signal when the building door system grants access and the sensor system detects a person in the access zone, wherein the building door system disables access upon receipt of the alarm signal.
Claims
1-15. (canceled)
16. A system for controlling access to a building or a restricted zone in the building, the system comprising: a building door system including a building door, an electronic locking device, and a recognition device that captures credentials for an object, wherein, if the credentials are valid, the building door is unlocked by the electronic locking device and brought from a closed position into an open position in order to grant the object access at the building door; a sensor system that (i) monitors an access zone that comprises a specified access region to the building door, and (ii) detects a person in the access zone; and a control device that is communicatively connected to the building door system and the sensor system, wherein the control device generates an alarm signal when the building door system grants the object access and the sensor system detects a person in the access zone, wherein the building door system disables access upon receipt of the alarm signal.
17. The system of claim 16, wherein the recognition device is arranged on the building door.
18. The system of claim 17, wherein the locking device and the recognition device are arranged on the building door.
19. The system of claim 16, wherein the recognition device comprises at least one of: a transceiver for radio signals, a capturing device for a biometric feature, a capturing device for an optical code, a reader for a magnetic stripe card or a chip card, or a keyboard or touch-sensitive screen for manual entry of a password.
20. The system of claim 16, wherein the sensor system comprises a camera and is configured to evaluate an image recorded by the camera in order to detect a person who is in the access zone.
21. The system of claim 20, wherein the camera comprises a 2D camera or a 3D camera.
22. The system of claim 21, wherein the 3D camera comprises a time-of-flight camera.
23. The system of claim 16, wherein the building door system comprises a sliding door, wherein a door frame includes a passage region and a wall shell region which at least partially accommodates the sliding door in the open position, and wherein the sliding door has an end face which points toward the passage region in the open position.
24. The system of claim 23, wherein the sliding door comprises an actuator that positions door leaves of the sliding door in a first position with a first leaf spacing when the sliding door is in a closed position and in a second position with a second leaf spacing when the sliding door is in an open position, wherein the first leaf spacing is greater than the second leaf spacing.
25. The system of claim 16, further comprising an interface device that is arranged on the building door and is configured to transmit data to or receive data from a building management system.
26. The system of claim 16, wherein the control device is configured to determine a data record in a storage device if the credentials for the object are valid, in which data record the credentials are assigned to an access authorization.
27. A method for operating a system for controlling access to a building or a restricted zone in the building, wherein the system comprises a building door system that includes a building door, an electronic locking device, a recognition device that captures credentials for an object, a sensor system for monitoring an access zone that comprises a specified access region to the building door, a control device that is communicatively connected to the building door system and the sensor system, the method comprising: capturing credentials for the object using the recognition device while the object is located in an access zone of the building door, wherein, if the credentials are valid, the building door is unlocked and brought from a closed position into an open position in order to grant the object access at the building door; detecting, by the sensor system, whether there is a person in the access zone; generating, by the control device, an alarm signal when the building door system grants access to the object at the building door and the sensor system detects a person in the access zone; and upon receipt of the alarm signal by the building door system, disabling access at the building door using the building door system.
28. The method of claim 27, wherein disabling access comprises blocking the building door in the closed position.
29. The method of claim 27, wherein disabling access comprises blocking the building door in a partially open position.
30. The method of claim 27, wherein disabling access comprises closing the building door from a fully or partially open position, wherein the fully open position is specified for the object.
Description
BRIEF DESCRIPTION OF THE DRAWINGS
[0018] Various aspects of the improved technology are described in greater detail below with reference to embodiments in connection with the drawings. In the drawings, identical elements have identical reference signs. In the drawings:
[0019]
[0020]
[0021]
[0022]
[0023]
[0024]
DETAILED DESCRIPTION
[0025]
[0026] In the embodiment shown, the building has a ground floor L0 and an upper floor L1, which can be used by persons 4 or objects 20. For illustration,
[0027]
[0028] Each of the building doors 2a shown in
[0029]
[0030] In the embodiment shown, one aspect of the building management system 22 relates to controlling and monitoring access to the building and to the individual regions and rooms within the building. This aspect can be implemented for the building in one embodiment by a control device (.Math.P) 24 in conjunction with the building door system 2, the sensor system 8, and a storage device 26 in which a database is stored; these components are part of an access control system 1 to which reference is made in the following description.
[0031] In the situation shown in
[0032] The technology thus uses the sensor system 8 to recognize, for example, the object 20 (shown in
[0033] If the object 20 is then located at the building door 2a and presents proof of a valid access authorization (credentials), the building door 2a can be unlocked. Before the building door 2a is opened, the access control system 1 uses the sensor system 8 to check whether the access zone Z3 is “secure.” If there is no person 4 in the access zone Z3, e.g., the object 20 is located alone in front of the building door 2a, the access zone Z3 is secure and the building door 2a can be opened in response to a control signal to allow the object 20 access. If, on the other hand, the access zone Z3 is not secure because, in addition to the object 20, there is also a person 4 (e.g., without access authorization to the building door 2a) in the access zone Z3, the control device 24 generates an alarm signal; the alarm signal is generated when the building door system 2 grants access to the object 20 and the sensor system 8 detects the person 4 in the access zone Z3 substantially at the same time. Access can then be disabled; for example, it can be interrupted until the access zone Z3 is secure again. During this interruption, the building door 2a is locked and closed. Alternatively, if the process is already in progress, it can be aborted; the building door 2a is in the locked and/or closed state. In one embodiment, after a specified waiting time, the object 20 may re-present the credentials; the process mentioned is then repeated, possibly until the access zone Z3 is secure. The technology thus reduces the risk that an unauthorized person can enter the room through the building door 2a that is open for the robot.
[0034] According to the technology described herein, the sensor system 8 is used to detect persons 4 who are in the access zones Z1, Z2, Z3. In one embodiment, the sensor system 8 can comprise optical sensors in the visible or infrared optical spectrum in conjunction with an evaluation device. In another embodiment, the sensor system 8 can comprise sensors that are based on a different physical principle, for example, ultrasonic sensors or radar sensors. In one embodiment, the evaluation of sensor signals makes it possible to determine the location of the person 4, their speed of movement, and velocity. In the following description, the sensor system 8 has cameras as optical sensors in conjunction with an evaluation device for digital image recordings. Such a camera can, for example, be a 2D or 3D camera, the modes of operation of which are known to a person skilled in the art, and so only the mode of operation of a 3D camera is summarized herein.
[0035] A camera based on the principle of time-of-flight measurement (TOF sensor) can be used as the 3D camera. The 3D camera comprises a light-emitting diode unit or laser diode unit which, for example, emits light in the infrared range, the light being emitted in short pulses (e.g., several tens of nanoseconds). The 3D camera also comprises a sensor group consisting of a number of light-sensitive elements. The sensor group is connected to a processing chip (e.g., a CMOS sensor chip), which determines the time of flight of the emitted light. The processing chip simultaneously measures the distance to a number of target points in space in a few milliseconds. The 3D camera can also be based on a measuring principle according to which the time of flight of emitted light over the phase of the light is captured. The phase position when the light is transmitted and when it is received is compared and the time elapsed or the distance to the reflecting object is determined therefrom. For this purpose, a modulated light signal is preferably emitted instead of short light pulses. Further details on measurement principles are given, for example, in the following publications: “Fast Range Imaging by CMOS Sensor Array Through Multiple Double Short Time Integration (MDSI),” P. Mengel et al., Siemens AG, Corporate Technology Department, Munich, Germany, and “A CMOS Photosensor Array for 3D Imaging Using Pulsed Laser,” R. R. Jeremias et al., 2001 IEEE International Solid-State Circuits Conference, p. 252.
[0036] The control device 24 of the access control system 1 is connected to the recognition device 6. The recognition device 6 is generally configured to capture credentials on the basis of which the access control system 1 can determine the access authorization of the person 4 or the object 20. The credentials can, for example, be in the form of a physical key, a manually input password (e.g., a PIN code), a biometric feature (e.g., fingerprint, iris pattern, speech/voice characteristics or facial features) or an access code captured from a magnetic card, chip card or RFID card or from an electronic device (using NFC, Bluetooth or a cellular network). The credentials must be presented when access to the restricted zone 36 is desired.
[0037] Corresponding to the mentioned forms which the credentials can take, the credentials can be presented in different ways, for example, by a conscious manual action (e.g., entering a PIN code or holding out an RFID card) or by approaching the door to come within radio range of the recognition device 6 (e.g., to establish an RFID or Bluetooth connection). The recognition device 6 can be arranged on the building door 2a or in the vicinity thereof, for example, it can be arranged on an outside of the building door 2a so that it can capture the credentials when the person or the object 20 is in front of the building door 2a.
[0038] The recognition device 6 is configured according to the credentials provided in the access control system 1. This means that the recognition device 6 has, for example, a door cylinder, a capturing device for a biometric feature, a capturing device for an optical code (e.g., bar code, QR code, and color code (see WO2015049186A1), a reader for a magnetic stripe card or a chip card, a keypad or a touch-sensitive screen for manually entering a password, or a transceiver for radio signals. A person skilled in the art would recognize that, in one embodiment, the recognition device 6 may be configured for one or more of these credentials. In one embodiment, the recognition device 6 can comprise, for example, a transceiver for radio signals and a digital camera for capturing an optical code or a face. The optical code can be visibly printed on a carrier material or displayed on a display of a mobile phone. In the situation shown in
[0039] A person skilled in the art would recognize that the building management system 22 can be entirely or partially outsourced to an IT infrastructure for cloud computing (also known as the “cloud” in colloquial terms). This includes, for example, storing data in a remote data center, but also executing programs that are not installed locally but rather remotely. Depending on the configuration, a certain functionality can be made available, for example, in the control device 24 or via the “cloud.” For this purpose, a software application or program parts thereof can be executed in the “cloud,” for example. The control device 24 then accesses this infrastructure as required in order to execute the software application.
[0040]
[0041] The sliding door system 2 shown in
[0042] The sliding door 2a is slidable in the door frame 44 between a closed position shown in
[0043] The sliding door 2a has two substantially parallel door leaves 32 (on an inner side and an outer side of the sliding door 2a, respectively). The door leaves 32 are spaced apart from one another (in the y-direction) such that there is an inner space between the door leaves 32 in which system components and insulating material for soundproofing and fire protection can be arranged. The door leaves 32 are connected to one another in the region of the end face 38, as shown for example, in
[0044]
[0045] The communication network 28 can comprise an electronic bus system in an execution system. In one embodiment, the electrical connection of the sliding door system 2, including its supply with electrical energy, is established via the interface device 48. A person skilled in the art would recognize that a plurality of sliding door systems 2 can be provided in the building and that each of these sliding door systems 2 is coupled to the communication network 28 in order to communicate with the building management system 22, for example, in conjunction with determining and checking access authorizations, if this is carried out centrally by the building management system 22.
[0046] The processor unit 54 is connected to a sensor unit 40 by an electrical connection 58. The processor unit 54 is also connected to the locking device 50 and to the interface device 48 by means of an electrical connection 52. The electrical connections 52, 58 are configured for signal and/or energy transmission; for this purpose, they can each comprise individual electrical lines or an electrical bus system.
[0047] The processor unit 54 is also connected to the recognition device 6. In the embodiment shown in
[0048] The transceiver 56, alone or in conjunction with the processor unit 54 and/or the control device 24 and the stored database (26), determines the credentials from the received radio signal, which are then used to determine the access authorization. If the credentials are valid, the object 20 is granted access; in this case, the processor unit 54 controls the locking device 50, which moves the sliding door 2a toward the open position. If the credentials are not valid, the sliding door 2a remains closed and locked.
[0049] The sensor unit 40 is arranged on the end face of the sliding door 2a, for example, in a region of an upper (corner) edge of the sliding door 2a. From this elevated region, the sensor unit 40 has an optimized detection field in the direction of the passage region 42 and the floor. An example of a detection field is shown in
[0050] According to the technology described herein, a (vertical) height of the object 20 is determined using the sensor unit 40. In the present description, the term “height” is used for the extent of the object 20 in the direction of the z-axis; however, the object 20 according to the technology described herein can also be a person (for persons, their size is usually specified). The height of the object 20 (person, animal, or robot) indicates a distance between the floor and a topmost point or region of the object 20. At the instant of determination (measurement instant), the object 20 is located on the floor, substantially in the passage region 42. The sensor unit 40 has a fixed and known distance from the floor (floor distance). In this situation, according to one embodiment, an object distance between the sensor unit 40 and the object 20 is determined. The height H of the object 20 results from a difference between the floor distance and the object distance.
[0051] In one embodiment, the sensor unit 40 comprises a 3D camera. The functioning of a 3D camera is described elsewhere in this description in connection with the sensor system 8.
[0052] The components mentioned (processor unit 54, recognition device 6, interface device 48, locking device 50) are arranged on the sliding door 2a and move along with the sliding door 2a. In one embodiment, the processor unit 54 is arranged in a region between the door leaves 32, for example, in the region of a rear face of the sliding door 2a opposite the end face. In one embodiment, the rear side of the sliding door 2a is not visible from the outside because the sliding door 2a can be wider than the passage region 42 and the rear face therefore remains in the wall shell region 30 when the sliding door 2a is in the closed position. The locking device 50 and the interface device 48 can also be arranged in said region. The electrical connections 52, 58 are accordingly arranged between the door leaves 32 and are not visible from the outside. However, the technology described herein is not restricted to this arrangement of the components, which is mentioned by way of example.
[0053] The storage device 26 is electrically connected to the control device 24. In the embodiment shown, the storage device 26 has a storage region for a database (DB) and a storage region for one or more computer programs (SW) for operating the sliding door system 2. In one embodiment, the operation of the sliding door system 2 comprises opening the sliding door 2a on the basis of the recognized object 20 and determining a height H of the object 20. The computer program can be executed by the control device 24.
[0054] The database stores a data record for the persons and the object 20 authorized to enter the restricted zone 36. The stored data record is also referred to below as a user profile. The user profile comprises data, e.g., name, information relating to credentials (key number, PIN code, access code, including biometric data) and any time restrictions for access (e.g., access from Monday to Friday, from 7:00 am to 8:00 pm). If a plurality of persons and objects are authorized to enter the restricted zone 36, the database stores a user profile for each person and object.
[0055] According to the technology described herein, each user profile also specifies the opening width W (see
[0056] These data can be organized in a table, as shown in the following table. The table shows four user profiles for four authorized objects or persons (human, cat, dog, robot). Each authorized object or person is assigned an identifier (ID) which is linked to the width W and the height H. For example, if the recognition device 6 recognizes the identifier ID = 78, then user profile no. 4 for a robot is accessed. In this case, the sliding door 2a is opened approx. 50 cm and the height determined using the sensor unit 40 is compared with the height H = 50 stored for the robot. The determined height must lie in a height range that matches the stored height of the robot, e.g., it must be plausible that it is actually the robot. Instead of a specific height H, in one embodiment, a height range can be specified in the table for one or more (all) authorized objects or persons. A person skilled in the art would recognize that the values given in the table are examples and can differ from real situations.
TABLE-US-00001 User profile no. Object ID W (cm) H (cm) 1 Name 12 70 185 2 Cat 34 12 30 3 Dog 56 25 50 4 Robot 78 50 50
[0057] With the aforementioned plausibility check, it can be recognized that if a height H of 180 cm is determined for a pet, for example, instead of an expected height H of 50 cm, then not only the pet but also a person is passing through the opened sliding door 2a. It could also be the case, for example, that an unauthorized person removes a pet’s credentials (e.g., RFID tag) in order to try to gain access in its place. Similarly, an expected height H of 170 cm does not match a determined height H of 100 cm. For example, this may happen if a child is using a parent’s credentials. Although the child is an authorized person, the parents potentially may not want the child to use the credentials under certain circumstances.
[0058] With an understanding of the basic system components described above and their functions, an example of a method for operating the access control system 1 based on the situations shown in
[0059] In a step S2, the recognition device 6 captures credentials for the object 20 that is located in the access zone Z3 in front of the sliding door 2a. The credentials are available, for example, as an access code that is transmitted using the radio device (e.g., via Bluetooth technology). In a step S3, the control device 24 checks whether a user profile has been created in the database in the storage device 26 for the credentials. If this check shows that the object 20 has access authorization, the method proceeds along the “yes” branch to a step S4. If, on the other hand, the object 20 does not have access authorization, the method proceeds along the “no” branch to the step S9 and ends there; the building door 2a remains locked and closed.
[0060] In the step S4, the sensor system 8 is activated, in particular to generate and evaluate image recordings. A person skilled in the art would recognize that the sensor system 8 can already be activated according to another embodiment. In this case, the step S4 can possibly be omitted. The sensor system 8 can be continuously activated for general monitoring purposes, for example, and can continuously evaluate image recordings. In another embodiment, the sensor system 8 can be activated when, for example, a movement is detected on the floor L0, L1, either by an external movement sensor or by the sensor system 8 itself, which system recognizes changes in image recordings as movement and responds thereto.
[0061] In a step S5, the sensor system 8 can, for example, evaluate image recordings of the access zone Z3 in order to determine whether a person 4 is in the access zone Z3. Devices and algorithms for evaluating image recordings, for example, in order to recognize, count, and possibly identify persons and/or objects, are known to a person skilled in the art. If this check shows that there is no person 4 there and the situation in front of the sliding door 2a is therefore considered secure, the method proceeds along the “no” branch to a step S6.
[0062] In the step S6 the object 20 is granted access. For this purpose, the locking device 50 is actuated in order to unlock and open the sliding door 2a. As explained above, the opening takes place automatically, without any action required from the object 20. In one embodiment, the sliding door 2a is only opened to the extent specified for the object 20 (robot) in the user profile.
[0063] If the check in the step S5 shows that a person 4 is in the access zone Z3, this situation in front of the sliding door 2a is considered unsecure. The person 4 present could pose a possible risk because they could enter the restricted zone 36 illegally through a sliding door 2a open for the object 20. Since the object 20 is not alone in front of the sliding door 2a, the method proceeds along the “yes” branch to a step S7.
[0064] In the step S7, an alarm signal is generated. The alarm signal is generated, for example, by the control device 24 when both the sliding door 2a for the object 20 having access authorization is to be opened and a person 4 present is detected.
[0065] In a step S8, access is disabled by the sliding door system 2. Disabling access takes place in response to the alarm signal received by the sliding door system 2. In one embodiment, the sliding door 2a remains locked and closed; this can be the case if the person 4 is detected before the sliding door 2a for the object 20 is opened. It can also happen that the person 4 enters the access zone Z3 and is only detected when the sliding door 2a has already been unlocked and is more or less open. In one embodiment, the opening can be stopped in this case and the sliding door 2a can be blocked against further opening. Disabling access may also comprise closing the sliding door 2a from a fully or partially open position. In another embodiment, the sliding door 2a can be moved entirely or partially into the closed position; the latter in particular when the object 20 is already located in the passage region 42 and is blocking the path of the sliding door 2a. In this case, an alarm can be triggered.
[0066] In the access control system 1, a set of rules can be specified which indicates whether and which action should be triggered after such an alarm. These actions can be situation-specific, e.g., depending on what time (day or night) and on what day (working day or weekend, vacation time) the alarm is generated. Examples of actions can include: an audible and/or visually perceptible alarm (siren, warning light); automatically notifying security personnel (police or private security service); and automatically notifying a person responsible for the restricted zone 36 (tenant, owner, building manager, etc.). A person skilled in the art would recognize that these actions can also be combined.
[0067] In the embodiment shown, the method proceeds from the step S8 to the step S9 and ends there.
[0068] Referring again to the positions of the sliding door 2a shown in
[0069] The sensor unit 40 is arranged on the end face. The arrangement is selected such that the electromagnetic radiation (light or radio waves) can propagate unhindered toward the passage region 42 during operation. The sensor unit 40 can, for example, be inserted into a recess in the end face and protected from damage and dirt by a radiation-permeable cover. The sensor unit 40 can also be arranged on the door frame. The electrical connection 58 (
[0070] The illustrated embodiment of the sliding door 2a is based on a principle that is similar to a principle known from EP 2876241 A1. Said document describes a sliding door system in which two opposing door surfaces are coupled to an actuator which moves the door surfaces toward or away from one another. In relation to the sliding door system 2 according to the technology described herein, this means that the two door leaves 32 have a leaf spacing d1 when the sliding door 2a is in the closed position. In this position, the sliding door 2a is locked. During the opening of the sliding door 2a, the two door leaves 32 are moved toward one another by means of an actuator 31 (
[0071] In one embodiment, the sliding door system 2 has a guide device on a door cross member, which guide device supports the sliding door 2a and guides it on its path between the closed position and the open position along a track. The sliding door 2a has a complementary apparatus on its upper edge. The guide device and the complementary apparatus interact when the locking device 50 causes the sliding door 2a to move by means of a drive unit and acts on the complementary apparatus; they can, for example, form a system having a telescopic extension. The drive unit can comprise, for example, a motorized or pneumatic sliding drive which acts on the telescopic extension.
[0072] In one embodiment, the two door leaves 32 are moved toward or away from one another by the actuator 31. The actuator 31 can comprise a spreading device which is activated mechanically, electrically, or electromechanically. The spreading device is configured to move the door leaves 32 toward one another when the sliding door 2a is to be opened, and to move them away from one another when the sliding door 2a is to be closed. A person skilled in the art would recognize that other spreading devices can also be provided instead; for example, cylinders actuated by a pressure medium.