Method for detecting access to controlled areas and related system
First Claim
1. A method of detecting and limiting access of a person to a controlled area, comprising the steps of:
- assigning to said person a mobile terminal having an identification code associated with said person and providing said person with said mobile terminal;
configuring said controlled area as a location area of a cellular telecommunications system;
and characterised by the steps of;
detecting connections of said mobile terminals of other individuals to said location area by identifying the identification code of each mobile terminal; and
comparing with said cellular telecommunications system the identification code associated with said person with a list of identification codes authorized to access the controlled area; and
conditioned to a first result of said comparing, activating an alarm procedure so as to prevent access of said person to said controlled area.
1 Assignment
0 Petitions
Accused Products
Abstract
A controlled area (A) is configured as a telecommunications cellular system location area, connection of cellular system mobile terminals (T) to such location area (A) is checked. A detected connection indicates that the bearer of the terminal (T) accessed the controlled area, which information can thus be used both to prevent unauthorized access and to certify and document authorized access also by interrogation through the system. The fact that terminal (T) has been kept switched on inside the controlled area despite this being interdicted can also be detected and such behavior can be debited to the terminal (T) involved and/or the terminal can be inhibited by means of temporary deactivation of the terminal (T).
-
Citations
14 Claims
-
1. A method of detecting and limiting access of a person to a controlled area, comprising the steps of:
-
assigning to said person a mobile terminal having an identification code associated with said person and providing said person with said mobile terminal; configuring said controlled area as a location area of a cellular telecommunications system; and characterised by the steps of; detecting connections of said mobile terminals of other individuals to said location area by identifying the identification code of each mobile terminal; and comparing with said cellular telecommunications system the identification code associated with said person with a list of identification codes authorized to access the controlled area; and conditioned to a first result of said comparing, activating an alarm procedure so as to prevent access of said person to said controlled area. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14)
-
Specification