Browse Prior Art Database

Location Sensitive Security Systems Disclosure Number: IPCOM000004601D
Original Publication Date: 2001-Feb-28
Included in the Prior Art Database: 2001-Feb-28
Document File: 2 page(s) / 26K

Publishing Venue


Related People

Luqing Wang: AUTHOR


Location Sensitive Security Systems

This text was extracted from a WORD97 document.
This is the abbreviated version, containing approximately 85% of the total text.

Location Sensitive Security Systems

Luqing Wang

Current Security System like Lojack uses location technology to locate a protected object when activated. The activation of the system is often done when the protected object has been stolen or been moved. This often results in delays in reporting the urgent event or situations where damage has been done even if the system is being protected.

This article proposes a new way of using the location technology to protect a movable object. The proposed method periodically scans the location and uses the location change as the triggering event to send alarm to the concerned party or parties.

How It Works

The system will contain a location detector, a two-way message device and an optionally location-activation event sensor. When the system is armed, it saves its initial location L0 as a reference and starts constantly checking the location periodically. If the difference between the current location L and the initial Location L0 exceeding a predefined threshold, i.e. (L-L0) Threshold, then the two-way message will send a message to the concerned party.

With an optional location-activation event sensor, such as shaking or pressure sensor which are widely available, the system can be made more energy efficient by only scanning the location signal when the system is location-activated.

The system is pictorially shown in state diagram of Figure 1 with location-activation event sensor provided.

Figure 1.

Arming the System

The system can be armed the same way as general security systems via a special radio signal or a manual switch. In addition, since the system has a two-way message device, the system should also be capable of being armed from a far distance via the two-way message device.

Location Detection

There are several mature location technologies that can be used for the system. In particular, GPS has been widely available and its accuracy for civilian use has got to the range of 10s of meters.

The system can use a GPS receiver as the location detection device. The GPS receiver periodically scans the GPS signal and calculates its current location. The location scanning time interval can be an adjustable parameter. Depends on the object to be protected, the interval can be made longer or shorter.

Location Activation Event

Periodically scanning the location signal costs a lot of battery. In certain situation, this may cause the battery to be changed very frequently. To solve this problem, the system can be made to only scanning the location signal when it receives an external event we call it location-activation event. This event can be a sudden shaking, or a sudden increase of temperature (like engineering heat), etc. To prevent the system from false alarm, the system can have a timeout parameter defined. If the protected object does not move within the timeout period, the sy...