Language selection

Search

Patent 2972429 Summary

Third-party information liability

Some of the information on this Web page has been provided by external sources. The Government of Canada is not responsible for the accuracy, reliability or currency of the information supplied by external sources. Users wishing to rely upon this information should consult directly with the source of the information. Content provided by external sources is not subject to official languages, privacy and accessibility requirements.

Claims and Abstract availability

Any discrepancies in the text and image of the Claims and Abstract are due to differing posting times. Text of the Claims and Abstract are posted:

  • At the time the application is open to public inspection;
  • At the time of issue of the patent (grant).
(12) Patent: (11) CA 2972429
(54) English Title: DUAL LEVEL HUMAN IDENTIFICATION AND LOCATION SYSTEM
(54) French Title: SYSTEME D'IDENTIFICATION ET DE LOCALISATION DE PERSONNES A DOUBLE NIVEAU
Status: Granted
Bibliographic Data
(51) International Patent Classification (IPC):
  • G07C 9/29 (2020.01)
(72) Inventors :
  • STRULOVITCH, TSAHI ZACK (United States of America)
  • COPELAND, RICHARD LOYD (United States of America)
  • SEQUEIRA, MELWYN F. (United States of America)
(73) Owners :
  • SENSORMATIC ELECTRONICS LLC (United States of America)
(71) Applicants :
  • TYCO FIRE & SECURITY GMBH (Switzerland)
(74) Agent: SMART & BIGGAR LP
(74) Associate agent:
(45) Issued: 2023-03-28
(86) PCT Filing Date: 2015-12-02
(87) Open to Public Inspection: 2016-06-09
Examination requested: 2020-09-22
Availability of licence: N/A
(25) Language of filing: English

Patent Cooperation Treaty (PCT): Yes
(86) PCT Filing Number: PCT/US2015/063542
(87) International Publication Number: WO2016/090053
(85) National Entry: 2017-06-27

(30) Application Priority Data:
Application No. Country/Territory Date
62/086,241 United States of America 2014-12-02
14/558,796 United States of America 2014-12-03
62/205,953 United States of America 2015-08-17

Abstracts

English Abstract

Systems and methods for controlling access to a Restricted Area ("RA"). The methods involve: determining whether a person desires to enter RA: checking whether the person is authorized to enter RA using a first unique identifier associated with a wearable access sensor being worn thereby; causing the person's Portable Communication Device ("PCD") to transmit a second unique identifier and location information useful in determining the PCD's location within a surrounding environment, when a determination is made that the person is authorized to enter RA; using the second unique identifier and location information to confirm that the person is currently located at an access point of RA; and causing actuation of a. mechanical actuator to enable the person's entrance into RA when it is determined that the person desires to enter RA, the person is authorized to enter RA, and the person is currently located at the access point of RA.


French Abstract

L'invention concerne des systèmes et des procédés pour contrôler l'accès à une zone à accès restreint (« RA »). Les procédés consistent à : déterminer si une personne souhaite entrer dans une zone RA ; vérifier si la personne est autorisée à entrer dans la zone RA à l'aide d'un premier identifiant unique associé à un capteur d'accès portable porté par cette personne ; faire transmettre par le dispositif de communication portable (« PCD ») de la personne un second identificateur unique et des informations de localisation permettant de déterminer la position du PCD dans un environnement proche, lorsqu'on a pu déterminer que la personne est autorisée à entrer dans la zone RA ; utiliser le second identifiant unique et les informations de localisation pour confirmer que la personne se trouve actuellement au niveau d'un point d'accès de la zone RA ; et provoquer l'actionnement d'un actionneur mécanique afin de permettre à la personne d'entrer dans la zone RA lorsqu'on a pu déterminer que la personne souhaite entrer dans la zone RA, que la personne est autorisée à entrer dans la zone RA et que la personne se trouve actuellement au niveau du point d'accès de la zone RA.

Claims

Note: Claims are shown in the official language in which they were submitted.


CLAIMS:
1. A method for controlling access to a restricted area, comprising:
determining, by a data processing system whether a person desires to enter the

restricted area based at least in part on one of:
(1) a directionality of a Wearable Access Sensor ("WAS") being worn by
the person, or
(2) a direction and speed of the person's motion;
checking whether the person is authorized to enter the restricted area using a
first
unique identifier associated with the WAS being worn by the person;
requesting, by the data processing system, a Portable Communication Device
("PCD") associated with the person to transmit a second unique identifier and
location
information useful in determining the PCD's location within a surrounding
environment,
when a reader detects a presence of the WAS in the restricted area and a
determination is
made that the person is authorized to enter the restricted area;
using, by the data processing system, the second unique identifier and
location
information to confirm that the person is currently located at an access point
of the
restricted area; and
causing actuation of a mechanical actuator to enable the person's entrance
into the
restricted area when it is determined that the person desires to enter the
restricted area, the
person is authorized to enter the restricted area, and the person is currently
located at the
access point of the restricted area.
2. The method according to claim 1, wherein a determination as to whether
or not the
person desires to enter the restricted area is made based on Received Signal
Strength
Indicator ("RSSI") measurement data specifying a power present in a signal
received from
a Wearable Access Sensor ("WAS") worn by the person.
3. The method according to claim 1, wherein a determination as to whether
or not the
person desires to enter the restricted area is made based on rate of change
data specifying a
rate of change of a charging voltage of an energy storage device used in an
electromagnetic field energy harvesting circuit disposed within the WAS.
21
Date Recue/Date Received 2022-01-28

4. The method according to claim 1, wherein the location information is
obtained by
the PCD using a Received Signal Strength Indicator ("RSSI") based technique.
5. The method according to claim 4, wherein the RSSI based technique
comprises:
performing operations by the PCD to survey an available networks' Media Access

Control ("MAC") addresses within range thereof; and
collecting RSSI levels for signals received from devices associated with the
available networks' MAC addresses.
6. The method according to claim 5, wherein the RSSI levels and known
locations of
the devices associated with the available networks' MAC addresses are used to
confirm
that the person is currently located at an access point of the restricted
area.
7. The method according to claim 1, further comprising determining whether
the PCD
is within a certain radius from the access point of the restricted area.
8. The method according to claim 7, wherein the mechanical actuator is
caused to
actuate when it is determined that the PCD is within a certain radius from the
access point
of the restricted area.
9. The method according to claim 1, further comprising logging information
indicating that the person entered the restriction area at a particular time,
subsequent to
causing actuation of the mechanical actuator.
10. The method according to claim 1, further comprising collecting energy
by an
energy harvesting circuit of the WAS from an electromagnetic field emitted
from access
control equipment disposed at an access point to one or more restricted areas.
11. A system, comprising:
a Wearable Access Sensor ("WAS") being worn by a person;
a Portable Communication Device ("PCD") in the person's possession;
a data processing system in communication with at least one of the WAS and the
PCD, where the data processing system is configured to:
determine whether the person desires to enter a restricted area based at least
in part on one of:
22
Date Recue/Date Received 2022-01-28

(1) a directionality of a Wearable Access Sensor ("WAS") being
worn by the person, or
(2) a direction and speed of the person's motion;
check whether the person is authorized to enter the restricted area using a
first unique identifier associated with the WAS being worn by the person;
request the PCD to transmit a second unique identifier and location
information useful in determining the PCD's location within a surrounding
environment, when a reader detects a presence of the WAS in the restricted
area
and a determination is made that the person is authorized to enter the
restricted
area; and
use the second unique identifier and location information to confirm that
the person is currently located at an access point of the restricted area; and
a mechanical actuator that is actuated to enable the person's entrance into
the
restricted area when it is determined that the person desires to enter the
restricted area, the
person is authorized to enter the restricted area, and the person is currently
located at the
access point of the restricted area.
12. The system according to claim 11, wherein a determination as to whether
or not the
person desires to enter the restricted area is made based on Received Signal
Strength
Indicator ("RSSI") measurement data specifying a power present in a signal
received from
a Wearable Access Sensor ("WAS") worn by the person.
13. The system according to claim 11, wherein a determination as to whether
or not the
person desires to enter the restricted area is made based on rate of change
data specifying a
rate of change of a charging voltage of an energy storage device used in an
electromagnetic field energy harvesting circuit disposed within the WAS.
14. The system according to claim 11, wherein the location information is
obtained by
the PCD using a Received Signal Strength Indicator ("RSSI") based technique.
15. The system according to claim 14, wherein the RSSI based technique
comprises:
performing operations by the PCD to survey an available networks' Media Access

Control ("MAC") addresses within range thereof; and
collecting RSSI levels for signals received from devices associated with the
available networks' MAC addresses.
23
Date Recue/Date Received 2022-01-28

16. The system according to claim 15, wherein the RSSI levels and known
locations of
the devices associated with the available networks' MAC addresses are used to
confirm
that the person is currently located at an access point of the restricted
area.
17. The system according to claim 11, wherein the data processing system is
further
configured to determine whether the PCD is within a certain radius from the
access point
of the restricted area.
18. The system according to claim 17, wherein the mechanical actuator is
caused to
actuate when it is determined that the PCD is within a certain radius from the
access point
of the restricted area.
19. The system according to claim 11, wherein the data processing system is
further
configured to log information indicating that the person entered the
restriction area at a
particular time, subsequent to causing actuation of the mechanical actuator.
20. The system according to claim 11, wherein the WAS comprises an energy
harvesting circuit that collects energy from an electromagnetic field emitted
from access
control equipment disposed at an access point to one or more restricted areas.
24
Date Recue/Date Received 2022-01-28

Description

Note: Descriptions are shown in the official language in which they were submitted.


CA 02972429 2017-06-27
WO 2016/090053
PCT/US2015/063542
DUAL LEVEL HUMAN IDENTIFICATION AND LOCATION SYSTEM
BACKGROUND OF THE INVENTION
Statement of Technical Field
[0001] This document relates generally to Access Control Systems ("ACSs").
More
particularly, the present document concerns dual level human identification
and location
systems.
Description of the Related Art
10002] There are many A.CSs known in the art. One such ACS comprises a
plurality of
Access Control Readers ("ACR.s") mounted at exits and/or entries of restricted
areas. For
example, an ACR may be disposed adjacent to a doorway through which access to
a
restricted room is gained. A badge worn by a person is used to gain access to
a restricted
room via the ACR.. In this regard, the badge comprises a Low Frequency ("LF")
passive
Radio Frequency Identification ("RF1D").communication device disposed thereon
or therein.
The LF passive REID communication device typically operates at a frequency of
125 kHz.
The ACR is a near field device with a detection range of about 5 cm or less.
Throughout a
given time period, the ACS tracks which entries a given person passes through
for purposes
of entering a restricted area. However, the ACS does not track when the person
leaves each
visited restricted.area within the given time period.
10003] Another conventional ACS employs beacons and wireless communication
devices
(e.g., mobile phones) which communicate via Bluetooth technology. A personal
identifier is
stored on the wireless communication device, and communicated to the beacon
when the
person is in proximity thereto. In response to the reception of the personal
identifier, the
ACS would allow the person to have access to the restricted area.
SUMMARY OF 'THE INVENTION
10004] = The present disclosure relates to systems and methods for controlling
access to a
restricted area. The methods comprise determining, by an electronic circuit,
whether a person
desires to enter the restricted area. Tn some scenarios, this determination is
made based on (a)
Received Signal Strength Indicator ("R.SSI") measurement data specifying a
power present in
a signal received from a Wearable Access Sensor ("WAS") worn by the person
and/or (b)

CA 02972429 2017-06-27
WO 2016/090053 PCMJS2015/063542
=
rate of change data specifying a rate of change of a charging voltage of an
energy storage
. device used in an electromagnetic field energy harvesting circuit
disposed Within the WAS. .
After making such a determination, it is checked whether the person is
authorized to enter the
restricted area using a first unique identifier associated with the WAS.
[0005] When a determination is made that. the person is -authorized to
enter the restricted
area, the person's Portable Communication Device ('kPCD") is caused to
transmit a second
unique identifier and location information useful in determining the PCD's
location within a
surrounding environment. In some scenarios, the location information is
obtained by the
PCD using an R.SSI based technique. The RSSI technique comprises: performing
operations -
by the PCD to survey an available networks' Media. Access Control ("MAC")
addresses
within range thereof; and collecting RSSI levels for signals received from
devices associated
with the available networks' MAC addresses. The RSSI levels and known
locations of the .
devices associated with the available networks' MAC addresses are used to
confirm that the
person is currently, located at an access. point of the restricted area. =
10006] The second unique identifier and location information is used to
confirm that the =
person is currently located at an access point of the restricted area. A
mechanical actuator is
actuated to enable the person's entrance into the restricted area when it is
determined that the
person desires to enter the restricted area, the person is authorized to enter
the restricted area,
and/or the person is currently located at the access point of the restricted
area.
[0007] In some scenarios, the methods further involve determining whether
the PCD is
within a certain radius from the access point of the restricted area. The
mechanical actuator
is caused to actuate When it is determined that the PCD is within a certain
radius from the
access point of the restricted area. Additionally or alternatively, the
methods involve logging
information indicating that the person entered the restriction area at a
particular time,
subsequent to causing actuation of the Mechanical actuator.
=

84022525
[0007a] According to one aspect of the present invention, there is
provided a
method for controlling access to a restricted area, comprising: determining,
by a data
processing system whether a person desires to enter the restricted area based
at least in part
on one of: (1) a directionality of a Wearable Access Sensor ("WAS") being worn
by the
person, or (2) a direction and speed of the person's motion; checking whether
the person is
authorized to enter the restricted area using a first unique identifier
associated with the
WAS being worn by the person; requesting, by the data processing system, a
Portable
Communication Device ("PCD") associated with the person to transmit a second
unique
identifier and location information useful in determining the PCD's location
within a
surrounding environment, when a reader detects a presence of the WAS in the
restricted
area and a determination is made that the person is authorized to enter the
restricted area;
using, by the data processing system, the second unique identifier and
location information
to confirm that the person is currently located at an access point of the
restricted area; and
causing actuation of a mechanical actuator to enable the person's entrance
into the
restricted area when it is determined that the person desires to enter the
restricted area, the
person is authorized to enter the restricted area, and the person is currently
located at the
access point of the restricted area.
[0007b] According to another aspect of the present invention, there is
provided a
system, comprising: a Wearable Access Sensor ("WAS") being worn by a person; a

Portable Communication Device ("PCD") in the person's possession; a data
processing
system in communication with at least one of the WAS and the PCD, where the
data
processing system is configured to: determine whether the person desires to
enter a
restricted area based at least in part on one of: (1) a directionality of a
Wearable Access
Sensor ("WAS") being worn by the person, or (2) a direction and speed of the
person's
motion; check whether the person is authorized to enter the restricted area
using a first
unique identifier associated with the WAS being worn by the person; request
the PCD to
transmit a second unique identifier and location information useful in
determining the
PCD's location within a surrounding environment, when a reader detects a
presence of the
WAS in the restricted area and a determination is made that the person is
authorized to
enter the restricted area; and use the second unique identifier and location
information to
confirm that the person is currently located at an access point of the
restricted area; and
2a
Date Recue/Date Received 2022-01-28

84022525
a mechanical actuator that is actuated to enable the person's entrance into
the restricted
area when it is determined that the person desires to enter the restricted
area, the person is
authorized to enter the restricted area, and the person is currently located
at the access
point of the restricted area.
2b
Date Recue/Date Received 2022-01-28

CA 02972429 2017-06-27
= WO 2016/090053 PCMJS2015/063542
=
= =
DESCRIPTION OF THE DRAWINGS
=
[0008] Embodiments will be described with reference to the following
drawing figures, in =
= which
like numerals represent like items throughout the figures, and in which: =
[0009] FIG. I is a perspective view of an exemplary ACS. =
[00101 FIG. 2 is a block diagram of an exemplary architecture for the WAS-
of FIG. 1.
[0011i FIGS. 3A-3B (collectively referred to as "FIG. 3") provide a flow
diagram of an
exemplary method for controlling access to a restricted area.
10012] FIGS. 4A-4B (collectively referred to as "FIG. 4") provide a flow
diagram of
another exemplary method for controlling access to a restricted area.
[0013] FIG. 5 is a graph illustrating the collection of energy by an energy
harvesting
device as it travels closer to an access point of a restricted area..
100141 FIG. 6 is an illustration of a four antenna system with three
defined paths.
=[0015] FIG. 7 is a graph showing received power from four antennas along a
first path.
100161 FIG. 8 is a graph showing received power from four antennas along a
second path, =
[0017] FIG. 9 is a graph showing received power from four antennas along a
third path.
DETAILED DESCRIPTION OF THE INVENTION
10018] It will be readily understood that the components of the embodiments
as generally
described herein and illustrated in the appended figures could be arranged and
designed in a
wide variety of different configurations. Thus, the following more detailed
description of
- various embodiments, as represented in the figures, is not intended to
limit the scope of the
present disclosure, but is merely representative of various embodiments. While
the various
aspects of the embodiments are presented in drawings, the drawings are not
necessarily
drawn to scale unless specifically indicated.
[0019] The present invention may be embodied in other-speeific forms
without departing
from its spirit or essential characteristics. The described embodiments are to
be considered in
3
=

CA 02972429 2017-06-27
WO 2016/090053
PCT/US2015/063542
=
=
all respects only as illustrative and not restrictive. The scope of the
invention is, therefore,
indicated by the appended claims rather than by this detailed description. All
changes which
come within the meaning and range of equivalency of the claims are to be
embraced within
their scope.
[0020] Reference throughout this specification to features, advantages, or
similar
language does not imply that all of the features and advantages that may be
realized with the
present invention should be or are in any single embodiment of the invention.
Rather;
language referring to the features and advantages is understood to mean that a
specific
feature, advantage, or characteristic described in connection with an
embodiment is included
in at least one embodiment of the present invention. Thus, discussions of the
features and
advantages, and similar language, throughout the specification May, but do not
necessarily, -
refer to the same embodiment.
100211 Furthermore, the described features, advantages and characteristics
of the
invention may be combined in any suitable manner in one or more embodiments.
One skilled
in the relevant art will recognize, in light of the description herein, that
the invention can be
practiced without .one or more of the specific features or advantages of a
particular
embodiment. In other instances, additional features and advantages may be
recognized in
certain embodiments that may not be present in all embodiments of the
invention..
100221 = Reference throughout this specification to "one embodiment", "an
embodiment",
or similar language means that a particular feature, structure, or
characteristic described in
connection with the indicated embodiment is included in at least one
embodiment of the
present invention. Thus, the phrases "in one embodiment", "in an embodiment",
and similar
language throughout this specification may, but do not necessarily, all refer
to the same
embodiment.
100231 As used in this document, the singular form "a", "an", and "the"
include plural
references unless the. context clearly dictates otherwise. *Unless defined
otherwise, all
technical and scientific. terms used herein have the same meanings as commonly
Understood
by one of ordinary skill in the art. As used in this document, the term
"comprising" means
"including, but not limited to".
100241 = A large and growing number of people own and carry smart phones with
them
throughout the workplace, school, or other environments where Wi-Fi network
infrastructures
4-
=

84022525
already exists. The smart phone has an identity which is directly associated
with the owner's
name and can serve as a reliable credential for identification. The Wi-Ei
network in a
building consists of many routers. The routers have known addresses, as well
as locations
that are spatially distributed to allow adequate coverage throughout the
building.
[0025] Software applications allow a smart phone to measure the received
signal strength
or RSS1-from each router within reach of the smart phone. This information can
then be sent
to the cloud. At the cloud, the RSSI information and router, spatial position
information are
used to compute the smart phone's position in the building. The smart phone's
position is
then reported directly to the building network. The software application can
be turned on as
soon as it picks up the building Wi-Fi upon entering the building. Thereafter,
the software
application runs an update on location based on predetermined time intervals.
When the
smart phone is not moving (e.g., determined based on phone motion sensor
output
information), the update is discontinued until motion resumes.
[0026] U.S. Patent Application No. 14/558,796 to Copeland et al. ("the
'796 patent
application") describes an access control system using a body wearable sensor
and a
reader, The reader .uses either Received Signal Strength Indication ("RSSI")
information
from an Ultra High Frequency ("UHF") RFID sensor or a UHF energy harvesting
sensor
with transceiver radio communications and energy harvesting electronics. The
UHF approach
allows for longer range detection of the sensor with detection distances of
typically 1-2 meters
from the interrogation antenna.
[0027] While die '796 patent application is an improvement over existing
access control,
it is still a single credential security system. Using both the body WAS as
described in the
'796 patent application along with a .PCD unique identifier (e.g., a MAC
address of a cellular
phone) and current location within a facility, a dual level identification and
location system is
achieved. Having two independent identification means has a much higher degree
of security
than any one method. Algorithms can be adjusted to weigh on the use of each
signal by itself
or in combination. For example, if someone does not enter an access point with
a PCD but is
wearing a WAS, there is a certain degree of security identification. With both
the WAS and
the PCD (e.g., a smart phone or a smartwatch), there is a dual and much higher
degree of
security.
Date Recue/Date Received 2022-01-28

CA 02972429 2017-06-27
WO 2016/090053
PCMJS2015/063542
=
[00281 This disclosure concerns systems and methods for implementing
a secondlayer of
security using persbnal\corporate PCDs to confirm peoples identities a.t
monitored entry
points in addition to the techniques described in the '796 patent application.
In this regard, a
PCD, a PCD application, and a remote database\service ("cloud") are implanted
in each
system. Each user of the system is required to: install the PCD application on
his(her) PCD; = .
and use his(her) personal/corporate credentials in order to register his(her)
PCD within the
system. From that point on, the PCD application stays passive in a sense that
it does not =
communicate back to the cloud unless requested (e.g., for energy conservation
purposes).
Alternatively, the PCD periodically reports to the cloud for tracking and
logging purposes.
[0029] During operation, the cloud sends a request for identification
and location
= = information to the PCD subsequent to or concurrent with the WAS based
identification/authentication operations of the '796 patent application. in
response to the
request, the PCD obtains information specifying its current location within a
secured area.
This location information can be obtained using at least one of the following
techniques: a
Global Positioning System ("GPS") based technique; an RSST. based technique;
and a beacon= .
based technique. The RSSI based technique will be explained in detail below.
However, the
GPS and beacon based techniques are well known in the art, and therefore will
not be.
described herein. Next, the PCD sends its unique identifier (e.g., a MAC
address) and
location information to the cloud. At the cloud, this information is used to
confirm or verify
that the user is actually located at a given exit/entry (2nd layer security).
100301 Referring now to 'FIG. I, there is provided an exemplary ACS
100 configured for
controlling access to restricted areas. As shown in FIG. I, ACS 100 is
generally configured
to manage the entrance and exit of people through at least one secure area
118. In this regard,
each secure area is entered and exited via an access point, such as a doorway
102. Exit and
entrance antennas 106, 108 are disposed on front and back surfaces of the same
structural
wall or different structural walls located adjacent to the access point 102.
For example, the
entrance antenna 108 is disposed on a front sidewall surface 1.30 ofn
structural wall 132
located adjacent to the doorway 102. In contrast, the exit antenna 106 is
disposed on a back
sidewall surface (not shown in FIG: 1) of a structural wall 134 located
adjacent to the
doorway 102. The antennas 106, 108 are also communicatively coupled to a
reader 104. The
reader 104 is communicatively coupled to a Data Processing System ("IPS") 112
via a
network 110 (e.g., an Intranet and/or an Internet).
6 -
=

CA 02972429 2017-06-27
WO 2016/090053 - PCT/US2015/063542
=
[0031] A WAS 114 is assigned to each individual authorized for accessing
restricted
areas of a business entity. The WAS 114 comprises a wearable communications
device that
can be worn by the person 116 to which it is assigned. As shown in FIG. 1, WAS
114
comprises a wrist band with internal sensor circuitry (not shown in FIG. 1.).
The present
invention is not limited in this regard. WAS 114 can include any other type of
wearable item,
= such as a watch, necklace, hat or clip-on item which can be worn on
a:person or on a person's
clothing at a location offset from the person's center axis. In all scenarios,
the WAS 114
facilitates the entrance and exit or th.e authorized person through the secure
area 118.
[0032] A schematic illustration of an exemplary architecture for the sensor
circuitry of
WAS 114 is provided FIG. 2. As shown in FIG. 2, the sensor circuitry comprises
an energy
= harvesting circuit 220 for deriving energy from an external source to
power other electronic
components 204, 206, 208, 260 internal to WAS 114. The energy is collected
from an
electromagnetic field emitted within a surrounding environment from equipment
disposed at
an access point of a restricted area. The energy is stored in an energy
storage device 222 =
(e.g., a capacitor) for later use in electronic components 204, 206, 208, 260.
= [0033] A graph 502 is provided in FIG. 5 that illustrates the
collection of energy by the
energy harvesting circuit 220 as the person travels closer to an access point
of a,restricted
area. FIG. 5 also includes a graph 504 illustrating the supply of power to a
processor of the
WAS 114.. When the processor is supplied power, the WAS 114 begins collecting
data
specifying the rate of energy storage by the energy storage device 222.
100341. Referring again to FIG. 2, the antenna 202 of WAS 114 may comprise
a
directional antenna arranged to point away from the person's body when the WAS
114 is
being worn thereby. The antenna 202 is coupled to a Short Range Communication
("SRC")
=
device 212 implementing SRC technology. The SRC technology includes, but is
not limited
to, RFID technology which uses radio-frequency electromagnetic fields to
identify persons
and/or objects when they come close to the reader 104. Accordingly, the SRC
device 212
facilitates communication of a unique identifier 210 to the reader 104 via SRC
reply signals
in response to interrogation signals sent from reader 104. The unique'
identifier 210 is then
used by the reader 104 and/or DPS 112 to automatically identify the person 116
which is in
proximity to the access point 1.02 and/or whether the person is authorized to
access the
= restricted area.
7
=
=

CA 02972429 2017-06-27
WO 2016/090053 =
PCMJS2015/063542
= [0035] At the access point 1.02, the reader 104 determines
the directionality of the WAS
114 emitting the SRC reply signal. This determination is made based on RSSI
measurements
of the power present in the SRC reply signal received by an antenna 106 or 108
from the
WAS 114. The RSSI measurements specify the signal strength of the SR.0 reply
signal
received at antenna 106 or antenna 108, and whether the signal strength is
increasing or
decreasing during a given period of time. If the signal strength of the SRC
reply signal is
increasing during the given period of time, then the WAS 114 is deemed to be
traveling
towards the respective antenna 106 or 1.08. In contrast, if the signal
strength of the SRC reply
signal is decreasing during the given period of time,,then the WAS 114 is
deemed to be
traveling away from the respective antenna 106 or 108.
[0036] However, such determinations are not sufficient to detect
whether the person is
atternpting to enter or exit the restricted area. Accordingly, additional
motion sensors 1.20,
1.22 are employed herein. The motion sensors may be provided at the access
point 102. A
first motion sensor 122 is disposed on the front sidewall surface 130 of the
structural wall 132 '-
located adjacent to the access point 102. In contrast, a second motion sensor
120 is disposed
on a back sideWall surface (not shown in FIG. I) of the structural wall 134
located adjacent to
the access point 102. The motion sensors 120, 122 are used to determine the
direction and/or
speed velocity of travel of the person 116 in proximity to the access point
102. Information
specifying the person's direction and/or speed/velocity of travel is provided
from the motion
sensors 120, 122 to the reader 104.
[0037] Notably, the present invention is not limited to the motion
sensor configuration
shown in FIG. 1. Additionally or alternatively, the motion sensors provided in
PCDs (e.g.,
mobile phones or smart phones) can be used to detect the direction and/or
velocity of the
person's motion.
[0038] in turn, the reader 104 forwards the information received from
the motion
sensor(s) 120, 122 to the DPS 112 via network 110. Similarly, reader 104
communicates
information to the DPS 112 indicating the directionality of the WAS 114 (i.e.,
whether the
WAS 114 is traveling towards or away from the antenna 106 or 1.08). The DPS
11.2 may be
located in the same facility as the reader 104 or in a different facility
remote from the facility
=
in which the reader 104 is disposed. As such, the network 110 may comprise an
Intranet
= and/or the Internet. Additionally, each exit and/or entrance to a
restricted area in each facility
8
=

CA 02972429 2017-06-27
WO 2016/090053
PCMJS2015/063542
of a business entity may have access control sensory systems 104408, 120, 122
disposed
thereat so as to define a distributed network of access control sensor
systems.
100391 At the DPS 112, the information is used to determine whether or not
the person is
attempting to enter or exit the access point 102. For example, if the
information indicates that
the WAS 114 is traveling towards the entrance antenna 1.08 and the person is
moving in
direction 124, then a determination is made that the person desires to enter
the restricted area
.via access point 102: In contrast, if the information indicates that the WAS
114 is traveling
towards antenna 106 and the person is moving in direction 126, then a
determination is made
that the person desires to exit the restricted area via the access point 102.
Ti. the information
indicates that the WAS 114 is traveling away from the antenna 108, then a
determination is
made that the person is not trying to enter the restricted area. Similarly, if
the information
indicates that the WAS 11.4 is traveling away from the antenna 106, then a
determination is
made that the person is not trying to exit the restricted area.
[0040] The DPS 112 may also analyze patterns of motion defined by the
information to
determine Whether or not the person desires to enter or exit the.access point
102. For
example, if the information indicates that the person 116 is traveling in a
direction 124, 136
or 138 towards the access point 102 during a first period of time and then
travels in a
direction 126, 136 or 138 away from the access point 102 during an immediately
following
second period of time, then a determination is made. that the person does not
want to gain
access to the restricted area, but is simply passing by the access point. In
contrast, if the
information indicates that the person 116 is traveling at a first speed in a
direction 124, 136 or
138 towards the access point 102 during a first period of time and then slows
down as (s)he
approaches the access point, a determination is made that the person does want
to gain access
to the restricted area. Similarly, if the information indicates that the
person 1.1.6 is traveling at
a first speed in a direction 124, 136 or 138 towards the access point 102 -
during a first period
of time and stops upon reaching the access point, a determination is made that
the person
does want to gain access to the restricted area.
=
[0041] Upon determining that the person does not want. to enter or exit the
restricted area,
the DPS 112 simply logs the unique identifier, the directionality information,
the motion
direction information, the speed/velocity information, and/or the results of
the information
analysis in a data store (not shown in FIG. I) for later use. Upon determining
that the person
does want to enter the restricted area, the DPS 112 compares the unique
identifier 21.0 to a
9
=

CA 02972429 2017-06-27
WO 2016/090053
PCMJS2015/063542
=
. .
plurality of unique identifiers stored in the data store to check whether the
person is -
authorized to enter the restricted area..11 the person is authorized to enter
the restricted area,
the DPS 112 causes a request for identification and location information to
be. sent to a PCD
150 in the person's possession. = =
100421 In response to the request, the PCD 150 performs operations to
determine its
Current location within a surrounding environment. In some Scenarios, an RSSI
based
technique is used to determine the PCD's current location. The RSSI based
technique =
involves using the PCD's Wi-Fi radio to survey all the available networks' MAC
addresses
within range. After collecting all the available networks' MAC addresses and
the RSSI
levels, the PCD 150 relays the MAC address and RSSI information back to a
cloud 154 via
wireless communication link 152. The cloud '154 then estimates the location of
the PCD 00 =
based on the-MAC addresses, RSSI levels, and known locations of each of the
devices =
associated with the MAC addresses. A learning algorithm may be used to
correlate between
the two types of listed information.
[00431 In the case that the estimated location of the PCD 150 is within a
certain radius
from the original monitored door, the cloud 154 relays an open command to the
door so as to
cause a door opening actuator 128 tobe actuated (e.g., for .unlocking a lock).
In order to
reduce the delay between scanning a WAS and a door opening, the PCD 150
continually
surveys Wi-Fi networks and has survey data ready for when a request is
received thereat.
=
[0044) The cloud 154 and/or DPS 112 also log results of the information
analysis and/or
information specifying that access to the restricted area was provided to the
person at a
particular time. 'Upon determining that the person wants to exit the
restricted area, the DPS
112 causes a door opening actuator 128 to be actuated, and also logs results
of the
information analysis and/or information specifying that the person exited the
restricted area at .
a particular time.
= [00451 The data
logging allows the cloud 154 and/or DPS 112 to track the access points =
through which the person enters and exits, and the time of such entering and
exiting. This
historical information is useful for a variety of reasons. For example, the
historical
information can be used to determine when employees arrive at and/or leave
work., whereby
the need for conventional employee time-attendance systems requiring each
employee to
=
manually clock-in upon arrival at work and clock-out upon leaving work is no
longer
=

CA 02972429 2017-06-27
WO 2016/090053 PCMJS2015/063542
=
=
=
necessary. The historical information can also be used to identify individuals
who gained
access to a restricted area when a possible theft occurred or when equipment
was removed
=
from the=restricted area:
100461 Notably, the-above described access control system overcomes
certain drawbacks
of conventional access control systems. For example, in the present invention,
authorized
individuals do not need to take any manual actions (e.g., swiping a card) to
gain access to
restricted areas. In effect, the need for certain access control equipment
(e.g., card readers)
has been eliminated, thereby reducing the overall cost of implementing the
present access
control .system 100.
[0047] In other scenarios, the WAS 1.14 operates in both an energy
harvesting mode and
communications mode. In the energy harvesting mode, the energy harvesting
circuit 220
collects energy every time WAS 114 passes by an access point. The collected
energy is
stored in the energy storage device 222 (e.g., a capacitor). Once the energy
storage device
222 is Charged to an operating voltage level of the SRC device 212, the mode
of the WAS
114 is changed from the energy harvesting mode to the communications mode.
Thereafter,
an SRC identifier signal is sent to the reader 1.04 via antenna 202 at the
access point 102. The
SRC identifier Signal comprises the unique identifier 210. Information 214
indicating the rate
of change of the charging voltage of the energy storage device 222 (e.g., a
capacitor) may
also be sent from the WAS 114 to the reader 104 via the SRC identifier signal.
The rate of
. change information 214 specifies directionality of the WAS 1.1.4: At a later
time, the reader
104 communicates the unique identifier 210 and/or rate of change information
214 to the
=
.DPS 112.
100481 Notably, the motion sensors 120, 122 are also employed along with
the multi-
mode WAS 114 (i.e., the WAS configured to operate in both an energy harvesting
mode and
a communications mode). The motion sensors 1.20, 122 are used to determine the
direction
= andlor speed/velocity of travel of the person 116 in proximity to the
access point 102. =
Information specifying the person's direction and/or speed/velocity of travel
is provided from
the motion sensors 120, 122 to the reader 104.
= =
[0049] At the DPS 112, a determination is made as to whether the person is
authorized to
access the restricted area based on the unique identifier 210 and/or whether
the person is
=
attempting to enter or exit the restricted area based on the rate of change
information 214. If
1.1

CA 02972429 2017-06-27
WO 2016/090053 PCMJS2015/063542
the person is attempting to enter the. restricted .area and is not authorized
to access the
restricted area, then the DPS 112 simply logs information indicating that the
person was in. =
proximity of the access point at a particular time. In contrast, if the person
is attempting to
enter the restricted area and is authorized to access the restricted area,
then the DPS 1.1.2
=
causes a request for identification and location information to be sent to a
PCD 1.50 in the
person's possession.
100501 In response to the request, the PCD 150 performs operations to
determine its
current location within a surrounding environment. In some scenarios, an RSSI
based
technique is used to determine=the PCD's current location. The RSSI based
technique
involves using the PCD's radio to survey all the available networks' MAC
addresses
within range. After collecting all the available networks' MAC addresses
ancIthe .RSSI
levels, the PCD 150 relays the MAC address and RSSI information back to a
cloud. 1.54 via
wireless communication link 152. The cloud 1.54 then estimates the location of
the PCD 1.50
= based on the MAC addresses, RSSI levels, and known locations of each of
the devices
a.ssociated_with the MAC addresses. A learning algorithm may be used to
correlate between
the two types of listed information.
[0051] In the case that the estimated location of the PCD 150 is within a
certain radius,
from the original monitored door, the cloud 154 relays an open command to the
door so as to
cause a door opening actuator 128 to be actuated (e.g., for Unlocking a lock).
In order to
reduce the delay between scanning a WAS and a door opening, the PCD 150
continually
surveys Wi-Fi nehvorks and has survey data. ready for when a. request is
received thereat.
The cloud 154 'and/or DPS-112 also logs information specifying that access to
the restricted
area was provided to the person at a particular time.
[0052] In this scenario, the reader 104 is simply an edge connect module
that controls the
door opening actuator. .As a result, the need for an interrogation reader
(e.g., an REID reader)
is eliminated, thereby reducing the overall cost required to implement system
100.
[00531 Referring now to FIGS. 3A-3B, there is provided a flow diagram of an
exemplary
method 300 for controlling access to a restricted area. As shown in FIG. 3A,
method 300
begins with step 302 and continues with step 304 where an interrogation signal
is transmitted
from a. reader (e.g., reader 104 of FIG. 1) of an ACS (e.g., ACS 100 of FIG.
1). In response
to the interrogation signal, an SRC reply signal is transmitted from a WAS
(e.g., WAS 114 of =
12
=
=

CA 02972429 2017-06-27
. WO 2016/090053
PCT/US2015/063542
=
=
FIG. 1), as shoWn by step 306. The SRC reply signal comprises a unique
identifier (e.g.,
unique identifier 210 of FIG. 2). In next step 308, the SRC reply signal is
received at an
antenna (e.g., antenna 106 or 108 of FIG. 1) coupled to the reader.
[00541 At the reader, actions are performed to obtain RSSI measurement
data specifying
= the power present in the SRC reply signal over a given period of time, as
shown by step 310.
The RSSI measurement data is used by the reader to determine if the signal
strength of the
SRC rely message is increasing. Notably, this determination can alternatively
be performed
by a DPS (e.g., DPS 1.12 of FIG. 1). In this ease, method 300 can be' amended
accordingly.
Such changes are understood by persons skilled in the art.
=
[0055] If the signal strength of the SRC reply signal is decreasing
[31.2:NO.1, then step
314 is performed where first information is generated indicating that the WAS
is traveling
away from the antenna. In contrast, if the signal strength. of the SRC reply
signal is
increasing [312:YES], then step 316 is performed where second information is
generated
indicating that. the WAS is traveling towards.the antenna.
[0056] Upon completing step 314 or 316, the method 300 continues with
step 318. Step
- 318 involves detecting .the-direction and/or speed/velocity of motion of the
person (e.g.,
person 116 of FIG. ) wearing the WAS. One or more motion sensors (e.g.,
sensors 120
and/or 122 of FIG. 1) can be used in step 31.8 for said detection. Thereafter
in step 320, third
= information is communicated to the reader specifying the detected
direction and/or
speed/velocity of the person's motion. The reader then communicates the
following
information to the DPS: the unique identifier; a time stamp; the first
information; the second
information; and/or the third information, as shown by step322.
100571 At the DPS, operations are performed in step 324 to determine
whether or not the
person is attempting to enter or exit the restricted area using the
information received in =
previous step 322. For example, if the received information indicates that the
WAS is
traveling towards an. entrance antenna (e.g., antenna 108 of FIG. 1) and the
person is moving
in kfirst direction (e.g., direction 124 of FIG. 1), then a determination is
made that the person
desires to enter the restricted area via an access point (e.g., access point
102 of FIG. 1). In
contrast, if the received information indicates that the WAS is traveling
towards an exit
antenna (e.g.., antenna. 106 of FIG. 1) and the person is moving in a
direction opposite the first
direction (e.g., direction 126 of FIG. 1). then a determination is made that
the person desires.
= 13 =

CA 02972429 2017-06-27
WO 2016/090053 = PCMJS2015/063542
=
to exit the restricted area via the access point. .If the received information
indicates that the =
WAS is traveling away from the entrance antenna, then a determination is made
that the
person is not trying to enter the restricted area. Similarly, if the received
information =
. indicates that the WAS is traveling away from the exit antenna, then a
determination is made
that the person is not trying to exit the restricted area. The present
invention is not-limited to
the particulars of these examples. In this regard, it should be understood
that the DPS
additionally or alternatively analyzes patterns of motion defined by the
received information
to determine 'whether or not the person desires to enter or exit the access
point.
[0058] . After completing step 324, method 300 continues with decision Step
326 of FIG.
3B. If it is determined that the person does not want to enter or exit-the
restricted area
[326:N0], then step 328 is performed Where the following information is logged
in a data '
store: the unique identifier; a time stamp; the first or second information;
the third
information; and/or the fourth information indicating the results of the
operations performed
in previous step 324, Subsequently, step 350 is performed where method 300
ends or other
processing is performed.
[0059] Ifit is determined that the person does want to enter or exit the
restricted area
[326:YES], then optional step 332 is performed. Optional step 332 is performed
when the
person is attempting to enter the restricted area, and therefore involves
comparing the unique
identifier with a plurality of unique identifiers stored in a data store to
check whether the
person is authorized to enter the restricted area. When a person is attempting
to exit the
restricted area or an authorized person is attempting to enter the restricted
area, the DPS
causes a request for identification and location information to be sent to a
POD (e.g., POD
150 of F.T.C. 1) in the person's possession, as shown by step 334.
[0060] In response to the request, the POD performs Operations in step 336
to obtain =
information useful for determining its current location within a surrounding
environment. = In
some scenarios, an RSSI based technique is used to determine the PCD's current
location.
The R.SSI based technique involves using the PCD's Wi-Fi radio to survey all
the available
networks' MAC addresses within range. After collecting all.the available
networks' MAC
addresses and the RSSI levels, the POD relays the MAC address and RSSI
information back
to a cloud (e.g., cloud 154 of FIG. 1) via wireless communication link (e.g.,
wireless
communication link 152 of FIG. 1), as shown by step 338. The cloud then
performs
=
operations in step 340 to estimate the location.of the PCD. The location
estimate can be =
1.4
=
=

CA 02972429 2017-06-27
WO 2016/090053 PCMJS2015/063542
= =
= determined based on the MAC addresses, RSSI levels, and known locations
of each of the -
devices associated with the MAC addresses. A learning algorithm may be used to
correlate
between the two types of listed information..
[00611 in the case that the estimated location of the PCD is within a
certain radius from
the original monitored door, the cloud relays an open command to the door so
as to cause a
door opening actuator (e.g., actuator 128 of Ha 1) to be actuated (e.g., for
unlocking a lock),
=
as shown by step 342. Upon completing step 342, steps 344-346 are performed to
log the
following information: the unique identifier; the time stamp; the first or
second information;
= the third information; the fourth information; and/or fifth information
indicating that the
= person entered or exited the restricted area at a particular time. The
logged information can
optionally be used in step 348 to perform a historical analysis of the
person's movement =
through a facility. Thereafter, step 350 is performed where method 300 ends or
other
processing is performed. =
1.0062] Referring now to:FIGS. 4A-4B, there is provided a flow diagram of
another
exemplary method 400 for controlling access to a restricted area. As shown in
FIG. 4A,
method 400 begins with step 402 and continues with step 404 where an energy
harvesting
circuit (e.g., circuit 220 of FIG. 2) of a. WAS (e.g., WAS 114 of FIG. 1)
collects energy. The
collected energy is then stored in an energy storage device (e.g., device 222
of FIG. 2) of the
= WAS. When the energy storage device charges to an operating voltage level
of an SRC
=
device (e.g., SR.0 device 212 of FIG. 2) of the WAS [408:ITS], step 410 is
performed where'
the WAS is transitioned from its energy harvesting mode to its communication
Mode. In its
communication mode, step 412 is performed. Step 412 involves transmitting an
SRC
identifier signal from the WAS. The SRC identifier signal comprises a unique
identifier
and/or first information indicating a rate of change of the charging voltage
of the energy
storage device. The SRC identifier signal is then received in step 414 at an
antenna (e.g.,
antenna 196 or 108 of FIG. I) coupled to the reader. . =
=
[0063] In a next step 416, the direction and/or speed/velocity of motion
of the person
wearing the WAS is detected. One or more motion sensors (e.g.., sensors 120
and/or 122 of
FIG. 1) can be used in step 416 for said detection. Thereafter in step 418,
second information
is communicated to the reader specifying the detected direction and/or
speed/velocity of the
= person's motion. The reader then communicates the following information
to the DPS: the

CA 02972429 2017-06-27
WO 2016/090053
PCT/US2015/063542
=
unique identifier; a time stamp; the first information; and/or the second
information, as shown
by step 420. After completing Step 420; method 400 continues with step 422 of
FIG. 4B.
100641 At the DPS, operations are performed in step 422 to determine
whether or not the
=
person is attempting to enter or exit the restricted area using the
information received in =
=
previous step 420. For example, if the received =information indicates that
the WAS is
traveling towards an entrance antenna (e.g., antenna 108 of FIG. 1) and the
person is moving
in a first direction (e.g., direction 124 of FIG. 1), then a determination is
made that the person
desires to enter the restricted area via an access point (e.g., access point
1.02 of FIG. I). Tn
contrast, if the received information indicates that the WAS is traveling
towards an exit
antenna (e.g., antenna 106 of FIG. 1) and the person is moving in a direction
opposite the first
direction (e.g., direction 126 of FIG. 1), then a determination is made that
the person desires
- to exit the restricted area Via the access point. If the received
information indicates that the
WAS is traveling away from the entrance antenna, then a determination is made
that the
person is not trying to enterthe restricted area. Similarly, if the received
information
indicates that the WAS is traveling away from the exit antenna, then a
determination is made
that the person is not. trying to .ekit the restricted area. The present
invention is not limited to
the particulars of these examples. In this regard, it should be understood
that the DPS
= additionally or alternatively analyzes patterns of motion defined by the
received information
to determine whether or riot the person desires to enter or exit the access
point.
[00651 After completing step 422, method 400 continues with decision step
424 of FIG.
4B. If it is determined that the=person does not want to enter or exit the
restricted area
[424:N% then step 426 is performed where the following information is logged
in a data
store: the unique identifier; a time stamp; the first information; the second
information;
and/or the third information indicating the results of the operations
performed in previous
step 422. Subsequently, step 444 is performed where method 400 ends or other
processing is
performed. =
[0066] If it is determined that the person does want to enter or exit the
restricted area
[424:YES], then optional step 427 is performed. Optional. step 427 is
performed when the
person is attempting to enter the restricted area, and therefore involves
comparing the unique.
identifier with a plurality of unique identifiers stored in a data store to
check whether the
person is authorized to enter the restricted area. When a person is attempting
to exit the
restricted area or an authorized person is attempting to enter the restricted
area, the DPS
16 =
=
=
=

CA 02972429 2017-06-27
WO 2016/090053
PCMJS2015/063542
=
causes a request for identification and location information to be sent to a
PCD (e.g., PCD
150 of FIG. 1) in the person's possession, as shown by step 428.
[0067] In response to the request, the PCD performs operations in step
430 to obtain
information useful for determining its current location within a surrounding
environment. In
some scenarios, an RSSI based technique is used to determine the PCD's current
location.
The RSSI based technique involves using the PCD's=Wi-Fi radio to survey all
the available
networks' MAC addresses within range. After collecting all the available
networks' MAC
addresses and the RSSI levels, the PCD relays the MAC address and RSSI
information back
to a cloud (e.g., cloud 1.54 of FIG. 1) via wireless communication link (e.g.,
wireless
communication link 152 of FIG. 1), as shown by step 432.= The cloud then
performs
operations in step 434 to estimate the location of the PCD. The location
estimate. can be
determined based on the MAC addresses, RSST. levels, and known locations of
each of the
devices associated with the MAC addresses. A learning algorithm may be used to
correlate
between the two types. of listed information,
= [0068] In the case that the estimated location of the PCD is
within a certain radius from
the original monitored door, the cloud relays an open command to the door so
as to cause a
door opening actuator (e.g., actuator 128 of FIG. 1) to be actuated (e.g., for
unlocking a lock), =
as shown by step 434. 'Upon completing step 434, steps 436440 are performed to
log the
following information: the unique identifier; the time stamp; the first
information; the second
information; the third information; and/or the fourth information indicating
that the person
entered or exited the restricted area at a particular time. The logged
information can
optionally be used in step 442 to perform a historical analysis .of the
person's movement
through a facility. Thereafter, step 444 is performed where method 400 ends or
other
processing is performed.
[0069] Additionally, in some scenarios, the WAS may detect no rate of
change when the
wearer is standing near the access point of a restricted area. For example,
let's assume that a
person travels towards the access point whereby the WAS detects a rate of
change of the
energy collected by the energy harvesting circuit thereof. When the person
arrives at the
access point, (s)he is stopped by another person for a discussion. At this
time, the WAS
detects no rate of change of the energy collected by the energy harvesting
circuit thereof In
response to such a detection, the WAS communicates a signal to the reader
(e.g., reader 1.04
of FIG. 1) indicating that there is currently no change in the rate at which
the energy
17

CA 02972429 2017-06-27
, WO 2016/090053 PCT/US2015/063542
=
harvesting circuit is collecting energy. In turn, the reader performs
operations to cause
termination of the emission of an electromagnetic field from the :entrance
antenna (e.g.,
antenna 108 of FIG. 1) The electromagnetic field is once again entitled upon
the expiration
of a pre-defined period of lime (e.g., 2 minutes). In this way, the person may
still obtain
access to the restricted area after finishing said discussion with the other
person. =
100701 The following discussion explains an exemplary mathematical
algorithm for
estimating the location of a PCD within a building. For. a high frequency
transmitter and
receiver antenna, the well-known Friis transmission equation_ is given below.
This assumes
free spaceenVirethment and no polarization loss between the receive and
transmit antennas
nor absorption of signal from the PCD by a perSon holding it.
=
PtGtGrc2
Pr= _______
(4rd? f)2 . =
where Pr is the received power (PCD), Pt is the transmitter power (Wi Fi
antenna), Gt is the
transmitter antenna gain, Gr is the receiver gain, R is the Vector between the
transmit and
receive anteimas,f is the operating frequency, and c is the speed of light.
Taking the LOG of
both sides produces thefollowirig mathematical equation.
Pr = Pt + Gt + Gr + 20LOG( ) =
47TR
where Pr and Pt are in units of dBm. Gt and-Gr are in units of dB, A is in
units of meters, and
R is in units of meters.
10071] FIG. 6 provides an illustration sliowing a symmetrical array of four
(4) WiFi
transmit antennas 602, 604, 606, 608. The transmit antennas 602-608 are
mounted at the
ceiling leVel (e.g., about 4 meters above the floor) of a building. The three
paths 1, 2, 3 are
also shown where a PCT) (e.g., about 1 meter above the floor) moves. The .PCD
travels along
path 1 which is symmetrical and paths 2, 3 which are not syinMetrical. The
coordinate
system origin is shown in the center of the antennas.
[0072] In FIG-. 6, the grid or step size is one (1) in Each path is defined
in one (I) m
steps. The=transmit antenna Pt is assumed to be twenty-eight (28) dBm,-the
transmit antenna
gain Gt is five (5) dB, the receiver antenna gain Gr is negative two (¨ 2) dB,
and the
frequency f is two point four (2.4) GHz. =
18

CA 02972429 2017-06-27
WO 2016/090053 PCT/US2015/063542
=
= 100731 FIG. 7 provides a graph showing the simulation results
for symmetrical path 1.
where the .PCD travels down the centerline of the antenna system. As expected,
a very
symmetrical set.of graphs meeting at the center Where the PCD is directly in
the middle of the =
antenna system. There is a mirl-or symmetry in the received power from the
antenna pair
604/606 and antenna pair 602/608.
100741 FIG. 8 provides a graph showing the simulation results for
asymmetrical path 2.
Path 2 starts off down the centerline, but cuts over at 8 m along the path
between antenna 604
and antenna 602. Path 2 is closer by 2 m to antenna 604 than antenna 602. At
the 8th step
where the PCD starts to break away from the centerline toward antenna 604 and
antenna 602
(but 2 m closer to antenna 604), the signal is about 1 dBm higher after the
next step. So a 2
in step along the breakaway point corresponds to a 2.5 dBm signal change
between antennas
604 and 606.
100751 FIG. 9 provides a graph showing the simulation results for
asymmetrical path 3.
Path 3 is another asymmetrical path where the PCD travels parallel to the
centerline but 2 m
closer to antenna 604 and then breaks away toward antennas 606, 608 (but 2 m
closer to
antenna 608).
100761 Using simple linear interpolation of differences in the four
antenna signals is the
first consideration in estimating the location along a known path. The
estimated position
,y) can be expressed by the following mathematical equation.
Cl(STx3 -Sra)clx CZ(Srx4-Srx1)ax C3(Srxi -S7x2)ay C4{S7.x4- Srx3)ay
where CI, C2, C3 and C4 are coefficients, the Srxl, to Srx4 are the signal
strengths, and ax and
Y are the x and y unit vectors. 'fhe above mathematical equation can be
written in linear
= matrix form as shown below.
cl(srv3- sr 2) 3(S1 TST .2) Ct
" x p(x,v) = f .. X X.1
C 3 - sra) C4 (5Tõ - Srg [ay]
Using one or more of the paths to determine the coefficients and the
simplification that CI =
C2 and C3 - C4, one can show that the predicted path. P(x,y) can be accurate
to less than one
meter.
=
19
=
=

CA 02972429 2017-06-27
WO 2016/090053
PCT/US2015/063542
[0077] All of the apparatus, methods, and algorithms disclosed and claimed
herein can be
made and executed without undue experimentation in light of the present
disclosure. While
the invention has been described in terms of preferred embodiments, it will be
apparent to .
those having ordinary skill in the art that variations may he applied to the
apparatus, methods
and sequence of steps of the method without departing from the concept, spirit
and scope of
the invention. .More specifically, it will be apparent that certain components
may be added
to, combined with, or substituted for the components described herein while
the same or
= - similar results would be achieved. All such similar substitutes and
modifications apparent to -
those having ordinary skill in the art are deemed to be within the spirit,
scope and concept of
the invention as defined.
[00781 The features and functions disclosed above, as well as alternatives,
may be
combined into many other different systems or applications. Various presently
unforeseen or
unanticipated alternatives, modifications, variations or improvements may be
made by those
skilled in the art, each of which is also intended to be encompassed by the
disclosed
embodiments.
=

Representative Drawing
A single figure which represents the drawing illustrating the invention.
Administrative Status

For a clearer understanding of the status of the application/patent presented on this page, the site Disclaimer , as well as the definitions for Patent , Administrative Status , Maintenance Fee  and Payment History  should be consulted.

Administrative Status

Title Date
Forecasted Issue Date 2023-03-28
(86) PCT Filing Date 2015-12-02
(87) PCT Publication Date 2016-06-09
(85) National Entry 2017-06-27
Examination Requested 2020-09-22
(45) Issued 2023-03-28

Abandonment History

There is no abandonment history.

Maintenance Fee

Last Payment of $210.51 was received on 2023-11-21


 Upcoming maintenance fee amounts

Description Date Amount
Next Payment if standard fee 2024-12-02 $277.00
Next Payment if small entity fee 2024-12-02 $100.00

Note : If the full payment has not been received on or before the date indicated, a further fee may be required which may be one of the following

  • the reinstatement fee;
  • the late payment fee; or
  • additional fee to reverse deemed expiry.

Patent fees are adjusted on the 1st of January every year. The amounts above are the current amounts if received by December 31 of the current year.
Please refer to the CIPO Patent Fees web page to see all current fee amounts.

Payment History

Fee Type Anniversary Year Due Date Amount Paid Paid Date
Reinstatement of rights $200.00 2017-06-27
Application Fee $400.00 2017-06-27
Maintenance Fee - Application - New Act 2 2017-12-04 $100.00 2017-11-20
Maintenance Fee - Application - New Act 3 2018-12-03 $100.00 2018-11-22
Registration of a document - section 124 $100.00 2018-12-12
Maintenance Fee - Application - New Act 4 2019-12-02 $100.00 2019-11-22
Request for Examination 2020-12-02 $800.00 2020-09-22
Maintenance Fee - Application - New Act 5 2020-12-02 $200.00 2020-11-30
Maintenance Fee - Application - New Act 6 2021-12-02 $204.00 2021-11-29
Maintenance Fee - Application - New Act 7 2022-12-02 $203.59 2022-11-18
Final Fee 2023-01-23 $306.00 2023-01-23
Maintenance Fee - Patent - New Act 8 2023-12-04 $210.51 2023-11-21
Owners on Record

Note: Records showing the ownership history in alphabetical order.

Current Owners on Record
SENSORMATIC ELECTRONICS LLC
Past Owners on Record
TYCO FIRE & SECURITY GMBH
Past Owners that do not appear in the "Owners on Record" listing will appear in other documentation within the application.
Documents

To view selected files, please enter reCAPTCHA code :



To view images, click a link in the Document Description column. To download the documents, select one or more checkboxes in the first column and then click the "Download Selected in PDF format (Zip Archive)" or the "Download Selected as Single PDF" button.

List of published and non-published patent-specific documents on the CPD .

If you have any difficulty accessing content, you can call the Client Service Centre at 1-866-997-1936 or send them an e-mail at CIPO Client Service Centre.


Document
Description 
Date
(yyyy-mm-dd) 
Number of pages   Size of Image (KB) 
Request for Examination 2020-09-22 5 132
Examiner Requisition 2021-09-28 5 243
Amendment 2022-01-28 19 820
Claims 2022-01-28 4 169
Description 2022-01-28 22 1,153
Final Fee 2023-01-23 5 145
Representative Drawing 2023-03-08 1 24
Cover Page 2023-03-08 1 61
Electronic Grant Certificate 2023-03-28 1 2,527
Abstract 2017-06-27 1 81
Claims 2017-06-27 4 219
Drawings 2017-06-27 9 653
Description 2017-06-27 20 1,096
Representative Drawing 2017-06-27 1 46
Patent Cooperation Treaty (PCT) 2017-06-27 1 72
International Preliminary Report Received 2017-06-27 7 233
International Search Report 2017-06-27 3 93
National Entry Request 2017-06-27 3 66
Cover Page 2017-08-14 2 70