Security control module and system

ABSTRACT

A security control module for controlling access through a passageway of a secure control area, comprising an ultra-wideband transceiver configured to establish an ultra-wideband transmission with a mobile device and a processing unit configured to determine a first distance between the security control module and the mobile device by processing signal properties of the ultra-wideband transmission. The security control module is configured to receive a second distance from a further security control module arranged at a spacing distance apart, the second distance being indicative of a distance between the further security control module and the mobile device. The processing unit is configured to determine the relative position of the mobile device with respect to the security control module based on the first and second distance.

PRIORITY CLAIM

The present application claims the priority of Swiss Patent ApplicationCH 00501/20.

FIELD OF THE INVENTION

The present invention relates to a security control module, a securitycontrol system and methods for operating thereof. Specifically, thepresent invention relates to a security control module, comprising anultra-wideband transceiver and a processing unit. Furthermore, thepresent invention relates to a computer program product comprisingcomputer-executable instructions which, when executed by a processingunit of a security control module or a security control system, causesthe security control module respectively system to carry out the methodfor access control. The present invention relates to a security controlsystem comprising a plurality of security control modules and a mobiledevice configured to establish a transmission with the security controlmodules.

BACKGROUND OF THE INVENTION

Keyless entry systems have become widely used in applications rangingfrom vehicle entry systems and vehicle access control systems tobuilding access control. For close-range applications, a radio-frequencyidentification (RFID) transponder (or tag) is often used, which hasmostly replaced earlier magnetic stripe cards. Other current solutionsuse infra-red systems or radio systems to transmit an authenticatingsignal from a user device to a vehicle security system or to a buildingaccess device. The authentication can be initiated either by the user,for instance by pressing a button on the user device, or from the accessdevice itself which periodically transmits request signals and awaits aresponse message.

As the communicating range between a user device and an access deviceincreases, the convenience and ease-of-use increases, because the userdevice does not need to be placed in very close range, such as less thanone centimeter. However, as the range increases, potential new securityissues also arise. In certain entry systems it is very important thatthe system can determine not only the proximity of a user but also itsrelative location with respect to an entry/exit direction. Several usecases exist where an entry system is configured/configurable as aone-way system, wherein a user is granted access/passage only from anentry side towards and exit side of a controlled gate whileaccess/passage is denied and/or restricted in the opposite direction,i.e. from the exit side towards the entry side. For example,boarding/check-in and passport control gates need to be configured suchthat access/passage is granted only in a predefined direction and isdenied/restricted in the opposite direction.

Close-proximity keyless systems, (i.e. between direct contact and athreshold of 1-2 centimeters), for example RFID based systems, allowdetermination of a user's position with respect to an entry respectivelyexit side of a gate by appropriate placement of a reader device on therespective side of the gate. However, as their name impliesclose-proximity keyless systems suffer from the disadvantage that theyrequire a very close proximity to the reader. This is disadvantageoussince users are required to identify the location of the reader devicewhich might be time consuming and often requires multiple user attempts.

In order to overcome the above disadvantages, mid-range keyless entrysystems have been proposed, in particular based on ultra-wideband UWBcommunication. Ultra-wideband UWB systems are advantageous since theyallow reliable mid-range communication without a user having toprecisely identify the reader device. Also, Ultra-wideband UWB systemsare advantageous since they allow precise measurement of a distancebetween a reader device and a mobile device.

However, presently known mid-range keyless entry systems only allowdetermination of an absolute distance of a user's mobile device, not hisrelative location with respect to a second section (entry side)respectively a first section (exit side) of an access controlled area(e.g. by means of an access gate). This poses a security risk in certainuse cases, in particular security control systems, requiring a one-wayentry system, since entry/passage may be inadvertently granted to a userin the opposite direction. Also, entry/passage may be inadvertentlygranted to an unauthorized user situated at a second section (entry sideof a gate), closely following an authorized user situated on the firstsection (exit side of the same gate) of the access controlled area.

SUMMARY OF THE INVENTION

It is an object of this invention to provide a security control module,a security control system and a method for operating a security controlmodule within a secure control area that overcomes one or more of thedisadvantages of known security control modules, security controlsystems and of known methods for access control of security controlmodules/systems, in particular the security risks associated withone-way security control modules/systems.

In particular, it is an object of the present invention to provide asecurity control module and a corresponding method for operating asecurity control module, ensuring that the relative location of a usercarrying a mobile device is determined with respect to the securitycontrol module.

According to the present invention, the above-mentioned objects areaddressed through the features of the independent claims. In addition,further advantageous embodiments follow from the dependent claims andthe description.

According to the present invention, the above-mentioned objects areparticularly addressed by a security control module for controllingaccess through a passageway of a secure control area, the securitycontrol module comprising: an ultra-wideband transceiver configured toestablish an ultra-wideband transmission with an ultra-widebandcommunication module of a mobile device and a processing unit configuredto determine a first distance between the security control module andthe mobile device by processing signal properties of the ultra-widebandtransmission. Ultra-wideband is a communications technology which usesradio waves for short-range, high-bandwidth communications over a largeportion of the radio spectrum. Information is transmitted by generatingradio wave pulses at specific time intervals, as opposed to conventionalradio systems which transmit information by varying a power level of theradio transmission, or modulating a frequency and/or phase of thetransmission. Information can also be modulated on ultra-widebandsignals by varying an amplitude, encoding a polarity, or usingorthogonal pulses.

The security control module is configured to receive a second distancefrom a further security control module arranged at a spacing distanceapart from the security control module, the second distance beingindicative of a distance between the further security control module andthe mobile device. The security control module is further configured totransmit the first distance to the further security control module. Assuch, the security control module and the further security controlmodule are set up to collaboratively exchange the first distance D1 andsecond distance D2. The processing unit of the security control moduleis configured to determine the relative position of the mobile devicewith respect to the security control module based on the first distanceand the second distance.

Determining the distance between the security control modules and themobile device by processing signal properties of ultra-wideband UWBtransmissions is particularly advantageous since it allows a reliableand precise determination of the distances.

The security control module is envisaged to be an integral part of or anadd-on to any installation that defines a passageway between sections ofa secure control area for the passage of persons. According to furtherembodiments, the security control system is arranged within the securecontrol area such as to define a passageway between the first sectionand the second section of the plurality of sections of the securecontrol area.

According to embodiment(s) disclosed herein, the security control moduleis configured to transmit the first distance to the further securitycontrol module and to receive the second distance from the furthersecurity control module via an ultra-wideband transmission between theultra -wideband transceiver and an ultra -wideband transceiver of thefurther security control module.

According to embodiment(s) disclosed herein the security control moduleis further configured to deny, disregard and/or block authenticationrequests from the mobile device if the mobile device has been determinedto be positioned at distance greater than a threshold distance from thesecurity control module.

According to embodiment(s) disclosed herein, the ultra-widebandtransceiver is configured to determine the first distance by processingsignal properties of the ultra-wideband transmission including one ormore of: a propagation time; an amplitude variation; and/or a phasedifference.

Determining a distance based on the propagation time of anultra-wideband transmission comprises measuring the time required for asignal to travel from the ultra-wideband transceiver to theultra-wideband communication module of the mobile device; and/or thetime required for a signal to travel from the mobile device to theultra-wideband transceiver. In a particular embodiment, a timedifference is used as a basis for determining the distance, as it ismore secure against spoofing attacks, wherein a third party may use aradio relay device to gain unauthorized access to a location or systemin a so-called “relay-attack”. Depending on the embodiment, the timedifference is a “one-way time-of-flight” time difference between theultra-wideband transceiver sending the request value and the mobiledevice receiving the request value, or a “round-trip time-of-flight”time difference, in which a second transmission takes place from themobile device to the ultra-wideband transceiver either prior to, orafter, the first transmission of the request value. In the “one-waytime-of-flight” scenario, the ultra-wide-band transceiver and the mobiledevice need to be provided with tightly synchronized clocks foraccurately determining the distance. In the latter case of a “round-triptime-of-flight” calculation, there is stored, either in the mobiledevice or the ultra-wideband transceiver, an accurate representation ofthe processing time, i.e. the time it takes between the reception of anultra-wideband transmission and the sending of a response ultra-widebandtransmission, which processing time allows for accurately determiningthe distance. Measurement of a time required for the signal to travelfrom the ultra-wideband transceiver to the mobile device and back“round-trip time-of-flight” is advantageous as it does not require theprecise synchronization of clock signals of the ultra-widebandtransceiver and the mobile device.

Determining a distance based on amplitude difference, comprisesdetermining the difference in signal amplitude between the signaltransmitted by the ultra-wideband transceiver and the signal received bythe mobile device (or vice-versa). By taking into consideration theattenuation of the signal, the distance between the ultra-widebandtransceiver and the mobile device is calculated.

Determining a distance based on phase difference comprises detecting thedifference in signal phase between the signal transmitted by theultra-wideband transceiver and the signal received by the mobile device.By taking into consideration the change in signal phase, the distancebetween the ultra-wideband transceiver and the mobile device isdetermined. It is to be understood that for the amplitude difference andphase difference, alternatively, the signal may also be transmitted bythe mobile device and received by the ultra-wideband transceiver.

The above-identified objectives are further addressed by a securitycontrol system for controlling access through a passageway of a securecontrol area comprising a plurality of security control modules. Asecurity control module and a further security control module of theplurality of security control modules is located in a first section anda second section of the secure control area, respectively, thepassageway connecting said first section and said second section. Theprocessing units of the security control module and/or the furthersecurity control module are configured to determine the relativeposition of the mobile device further with respect to the first sectionand said second section of the secure control area.

The modular security control system of the present invention isparticularly advantageous since it is easily deployable and extendibleby additional security control module(s). The security control modulesbuild a sort of mesh network, wherein each module performs its distancemeasurements by itself. After the modules exchange distance data, eachmodule can independently determine whether it is responsible for furtherinteraction (e.g. access control) with the mobile device, a particularmodule being responsible e.g. if it is the nearest or at least in thesame section as the mobile device.

According to embodiments disclosed herein, the relative position (of themobile device with respect to a first section respectively a secondsection of the plurality of sections of the secure control area)comprises an indication whether the mobile device is located in thefirst section or the second section of secure control area.Additionally, or alternatively, the relative position (of the mobiledevice with respect to a first section respectively a second section ofthe plurality of sections of the secure control area) comprises anindication whether the corresponding security control module is theclosest to the mobile device (of the plurality of security controlmodules which exchanged distance data).

According to embodiment(s) disclosed herein, the spacing distancebetween any pair of the plurality of security control modules of thesecurity control system is greater than or equal to the sum of themeasurement precision of the ultra-wideband transceivers of saidplurality of security control modules.

While the measurement precision using ultra-wideband technology is onthe order of few centimetres, the spacing distance between theultra-wideband transceiver and the second ultra-wideband may be up to ameter or more.

According to embodiment(s) disclosed herein, the ultra-widebandtransceivers of the security control module and the further securitycontrol module of the plurality of security control modules are alignedessentially orthogonal to a border delimiting the first section from thesecond section of the secure control area. The processing units of thesecurity control module and/or the further security control module areconfigured to determine the relative position of the mobile devicefurther based on location data comprising transceiver distancesindicative of distances of the ultra-wideband transceivers from saidborder. Aligning the ultra-wideband transceiver and the ultra-widebandtransceiver of the further security control module essentiallyorthogonal to a border delimiting the first section from the secondsection of the secure control area allows determination of the positionof the mobile device with respect to the first section or second sectionby triangulation, using only two ultra-wideband transceivers, as it willbe described with reference to FIGS. 2B, 3B and 4B.

According to embodiment(s) disclosed herein, the security control moduleand/or the further security control module of the plurality of securitycontrol modules are further configured to execute an access controlprocess for the mobile device if the mobile device has been determinedto be positioned in said first section or said second section of thesecure control area, respectively.

According to embodiment(s) disclosed herein, a third security controlmodule of the plurality of security control modules of the securitycontrol system is arranged in the proximity of a further passagewayconnecting said first section and said second section adjacent to thepassageway. At least one of the processing units of the plurality ofsecurity control modules is configured to determine the relativeposition of the mobile device further with respect to each of theplurality of passageways, based on the first distance determined by therespective security control module and a plurality of distances receivedfrom the plurality of security control modules.

The above-identified objectives are further addressed by a computerimplemented method for operating a security control module according toone of the embodiments disclosed herein, the method comprising:establishing an ultra-wideband transmission between an ultra-widebandtransceiver of the security control module and an ultra-widebandcommunication module of a mobile device; determining—by a processingunit of the security control module—a first distance between thesecurity control module and the mobile device by processing signalproperties of the ultra-wideband transmission;

receiving a second distance from a further security control modulearranged at a spacing distance apart from the security control module,the second distance being indicative of a distance between the furthersecurity control module and the mobile device; transmitting the firstdistance from the security control module to the further securitycontrol module; and determining—by the processing unit of the securitycontrol module—the relative position of the mobile device with respectto the security control module based on the first distance and thesecond distance.

According to embodiment(s) disclosed herein, the computer implementedmethod for operating a security control module further comprises thestep of denying, disregarding and/or blocking authentication requestsfrom the mobile device if the mobile device has been determined to bepositioned at distance greater than a threshold distance from thesecurity control module/system.

According to embodiment(s) disclosed herein, determining the firstdistance between the ultra-wideband transceiver and the mobile devicecomprises transmitting a request message to the ultra-widebandcommunication module of the mobile device and processing a responsemessage received from the mobile device, referred to as gate initiatedtransmission. Gate initiated transmission is advantageous as the timingrespectively the frequency of the interrogation (transmitting a requestmessage to the mobile device) is solely in the control of the securitycontrol system.

Alternatively, or additionally, determining the first distance betweenthe ultra-wideband transceiver and a mobile device comprises receivingand processing a broadcast signal from the mobile device, referred to asmobile device initiated transmission. Mobile device initiatedtransmission is advantageous since it allows the mobile device tocontrol the timing/frequency of the broadcast signal(s) (to establishthe first respectively second ultra-wideband transmission), allowing themobile device to switch its respective radio communication module into astandby/low-power or off mode to thereby conserve energy.

The above-identified objectives are further addressed by a computerimplemented method for operating a security control system according toone of the embodiments disclosed herein, the method comprising:establishing an ultra-wideband transmission between each ultra-widebandtransceiver of the plurality of security control modules and anultra-wideband communication module of a mobile device; determining—bythe processing units of each security control module—a first distancebetween the security control modules and the mobile device by processingsignal properties of the ultra-wideband transmissions; at least onesecurity control module transmitting the first distance to the furthersecurity control modules; at least one security control module receivinga second distance from a further security control module arranged at aspacing distance apart, the second distance being indicative of adistance between the further security control modules and the mobiledevice; and determining—by at least one processing unit(s) of thesecurity control module(s)—the relative position of the mobile devicewith respect to the security control modules and relative to the firstsection and said second section of the secure control area based on thefirst distance and the second distance.

According to embodiment(s) disclosed herein, the computer implementedmethod for operating a security control system further comprises thestep of executing an access control process for the mobile device by thesecurity control module and/or the further security control module ofthe plurality of security control modules if the mobile device has beendetermined to be positioned in said first section or said second sectionof the secure control area, respectively.

According to embodiment(s) disclosed herein, executing access controlfor the mobile device comprises: requesting authentication data from themobile device; receiving authentication data from the mobile device;verifying said authentication data from the mobile device in order todetermine whether the mobile device is authorized; and granting accessfor the mobile device if the mobile device is authorized, particularlycomprising one or more of: opening a section separation panel(s);unlocking a door and/or allowing passage of a turnstile operativelyconnected to the security control system.

Authentication data, as used herein, comprises—but is not limited to—auser ID, a user name, a government- or institution-issued identificationnumber and/or identity verification data such as a secure ID, a personalidentification number PIN, an access key, and/or a password. Accordingto embodiments disclosed herein, the authentication data is transmittedby the mobile device to the security control system in an encryptedformat to prevent unauthorized access (eavesdropping) of saidauthentication data. In a subsequent step, the security control systemreceives authentication data from the mobile device. Alternatively, oradditionally, the authentication data is confirmed by biometric data,such as a fingerprint, retinal scan and/or voice pattern.

According to embodiments disclosed herein, the authentication data istransmitted from the mobile device to the security control system in thesame ultra-wideband frequency as the messages used for determining itsdistance and received by the ultra-wideband transceiver orultra-wideband transceiver of the further security control module.Alternatively, or additionally the authentication data is transmittedfrom the mobile device to the security control system using a wirelesscommunication module of the mobile device and a corresponding wirelesscommunication module of the security control system, using analternative communication technology (as compared to UWB) such as aBluetooth (BT), Bluetooth Low Energy (BLE), a Wireless Local AreaNetwork (WLAN), Zig Bee, Radio Frequency Identification (RFID), Z-Wave,and/or Near Field Communication (NFC).

Further disclosed herein is a computer program product comprisingcomputer-executable instructions which, when executed by a processingunit of a security control module, causes the security control module tocarry out the computer implemented method for operating a securitycontrol module according to one of the embodiments disclosed herein.

Further disclosed herein is a computer program product comprisingcomputer-executable instructions which, when executed by a processingunit of a plurality of security control modules of a security controlsystem, causes the security control system to carry out the computerimplemented method for operating a security control system according toone of the embodiments disclosed herein.

BRIEF DESCRIPTION OF THE DRAWINGS

The present invention will be explained in more detail, by way ofexample, with reference to the drawings in which:

FIG. 1 : shows a highly schematic perspective view of a first embodimentof the security control system according to the present invention;

FIG. 2A, 2B: show highly schematic top views of a first embodiment ofthe security control system according to the present invention,illustrating determining the relative location of a mobile devicesituated in a second section of the secure control area;

FIG. 3A, 3B: show highly schematic top views of a first embodiment ofthe security control system according to the present invention,illustrating determining the relative location of a mobile devicesituated in a first section of the secure control area;

FIG. 4A, 4B: show highly schematic top views of a further securitycontrol system according to the present invention, comprising threesecurity control modules arranged in a secure control area comprising aplurality of passageways;

FIG. 5 : shows a flow chart illustrating a sequence of steps fordetermining the relative position of the mobile device within the securecontrol area, according to embodiments of the present invention;

FIG. 6A: shows a flow chart illustrating a sequence of steps forestablishing the UWB transmissions, according to a first embodiment ofthe present invention;

FIG. 6B: shows a flow chart illustrating a sequence of steps forestablishing the UWB transmissions, according to a further embodiment ofthe present invention;

FIG. 7 : shows a flow chart illustrating a sequence of steps fordetermining the relative position of the mobile device within the securecontrol area as well as performing access control related to the mobiledevice according to a first embodiment of the present invention;

FIG. 8 : shows a flow chart illustrating a sequence of access controlsteps according to a first embodiment of the present invention; and

FIG. 9 : shows a flow chart illustrating a sequence of steps fordetermining the relative position of the mobile device within the securecontrol area with respect to a plurality of passageways according toembodiments of the present invention.

DETAILED DESCRIPTION OF EMBODIMENTS

FIG. 1 depicts a security control system 1 according to the presentinvention as arranged in a secure control area A. The secure controlarea A has a first section I and a second section O delimited by aborder B (shown with dotted-dashed lines on the Figures). According to aparticular embodiment disclosed herein, the first section I is aso-called inside or secure section while the second section O is aso-called outside section or non-secure section. Such embodimentcorresponds to a use case where the security control system 1 isinstalled for example at an airport, wherein the first section I of thesecure control area A corresponds to an area of the airport reserved forpassengers with a valid boarding card, while the second section O isopen to any person. Alternatively, or additionally the secure controlarea A may comprise a further section reserved for passengers possessinga valid passport, in particular a passport issued by a defined group ofcountries.

As illustrated in the highly schematic perspective view of FIG. 1 , afirst embodiment of the security control system 1 according to thepresent disclosure comprises a first sidewall 2 and second sidewall 3defining a passageway 4 for persons to pass. The security control system1 is arranged within the secure control area A such as to define apassageway 4 between the first section I and the second section O of theplurality of sections I, O of the secure control area A.

Depending on the specific safety provisions, the first sidewall 2 andsecond sidewall 3 are waist, shoulder or even floor-to-ceiling high andprovide appropriate structural stability/strength to contain aperson(s). The passageway 4 is actually not necessarily a structuralelement of the security control system 1, rather a gap defined by thefirst sidewall 2 and second sidewall 3 of the security control system 1.Alternatively, the passageway 4 may comprise a floor and/or ceilingportion(s) (not shown) linking the first sidewall 2 and second sidewall3.

According to further embodiments, the security control system 1 isprovided as an add-on to existing access control systems (e.g. gates,doors) comprising their own sidewalls and/or section separation panels,the security control system 1 being configured to control sectionseparation panel(s) 5 of existing access control system.

As will be described in more detail in the following paragraphs, thesecurity control system 1 according to the present disclosure comprisesmeans for surveillance of presence around the security control system 1,in particular within said passageway 4. According to further embodimentsdisclosed herein, the security control system 1 further comprises meansfor controlling passage of persons through said passageway 4. In anembodiment shown in FIG. 1 , the means for controlling passage ofpersons through said passageway 4 comprises a section separationpanel(s) 5. Alternatively, or additionally, the means for controllingpassage of persons through said passageway 4 comprises a door, turnstileor other suitable means for preventing passage of a person through apassageway.

Means for surveillance of presence around the security control system—inparticular within said passageway 4—comprise a security control module10 and a further security control module 20. As shown in FIG. 1 , thesecurity control module 10 and further security control module 20 arearranged a spacing distance D apart, the spacing distance D beinggreater than or equal to their measurement precision. According tofurther embodiments disclosed herein, the spacing distance D is greaterthan or equal to the sum of a first measurement precision of thesecurity control module 10 and a second measurement precision of thefurther security control module 20. According to a particular embodimentof the security control system 1, the security control module 10 andfurther security control module 20 are arranged at opposite ends of thefirst sidewall 2 or second sidewall 3, the security control module 10being arranged within the first section I while the further securitycontrol module 20 being arranged in the second section O of the securecontrol area A. Furthermore, as illustrated in FIGS. 1 to 3 , thesecurity control module 10 and the further security control module 20are aligned essentially orthogonal to a border B delimiting the firstsection I from the second section O of the secure control area A.

In FIGS. 1 to 3 , reference numeral 100 refers to a mobile device. Themobile device 100 is a portable electronic system such as a smart phone,smart watch, tablet, laptop, or similar device. The mobile device 100contains a processor (not shown) and an ultra-wideband communicationmodule 102. The ultra-wideband communication module 102 is configuredfor establishing an ultra-wideband transmission with a security controlmodule 10 or further security control module 20 of the security controlsystem 1. According to further embodiments disclosed herein, the mobiledevice 100 further comprises a wireless communication module for datatransmission using an alternative communication technology (as comparedto UWB) such as Bluetooth Low Energy (BLE), a Wireless Local AreaNetwork (WLAN), Zig Bee, Radio Frequency Identification (RFID), Z-Wave,and/or Near Field Communication (NFC). According to further embodimentsdisclosed herein, the mobile device 100 also contains provisions forwired communication via a socket such as USB, Micro-USB, USB-C,Lightning, or 3.5 mm jack, for use in a wired communication using anappropriate protocol for wired transmission.

FIGS. 2A and 2B show highly schematic top views of a first embodiment ofthe security control system 1 according to the present disclosurecomprising a pair of security control modules 10, 20, illustratingdetermining the relative location of a mobile device 100 situated in thesecond section O of the secure control area A. As shown on FIGS. 2A and2B, each security control module 10, 20 comprises an ultra-widebandtransceiver 12, 22 configured to establish an ultra-widebandtransmission with an ultra-wideband communication module 102 of a mobiledevice 100. Furthermore, each security control module 10, 20 comprises aprocessing unit 14, 24 configured to determine a distance D1, D2 betweenthe security control module 10, 20 and the mobile device 100 byprocessing signal properties of the ultra-wideband transmission.

As illustratively shown in FIG. 2A, the security control module 10 isconfigured to determine a first distance D1 between the security controlmodule 10 and the mobile device 100. Analogously, the further securitycontrol module 20 is configured to determine a second distance D2between the further security control module 20 and the mobile device100.

As illustrated in FIG. 2B, the relative position of the mobile device100 with respect to a first section I respectively a second section O ofthe plurality of sections I, O of the secure control area A isdetermined (by the processing units 14, 24) based on the first distanceD1 and the second distance D2.

According to particular embodiments, the relative position of the mobiledevice 100 with respect to a first section I respectively a secondsection O is further determined based on location data indicative of theabsolute position of the security control module 10, respectively thefurther security control module 20 with respect to said first section Iand second section O, the location data comprising a first transceiverdistance a1 indicative of a distance of the security control module 10from said border B and a second transceiver distance a2 indicative of adistance of the further security control module 20 from said border B.As illustrated in FIG. 2B, the absolute location of the ultra-widebandcommunication module 102 can be determined to be at one of the twointersection points (shown with an ‘X’ and with the reference 102) oftwo circles having their centre at the security control module 10 and aradius equal to the first distance D1 (shown with a dotted-line arch)respectively having their centre at the security control module 10 and aradius equal to the second distance D2 (shown with a solid-line arch).Since the security control module 10 and the further security controlmodule 20 are aligned essentially orthogonal to a border B delimitingthe first section I from the second section O of the secure control areaA, both intersection points (shown with an ‘X’ and with the reference102) lay either in the first section I or the second section O of thesecure control area A. Therefore, the relative position of the mobiledevice 100 with respect to the first section I respectively the secondsection O can be determined by the processing unit 14, 24 with absolutecertainty.

FIGS. 3A and 3B show highly schematic top views of a first embodiment ofthe security control system 1 according to the present disclosure,illustrating determining the relative location of a mobile device 100situated in the first section I of the secure control area A. Asillustratively shown in FIG. 3A, the security control module 10 isconfigured to determine a first distance D1 between the security controlmodule 10 and the mobile device 100. Analogously, the further securitycontrol module 20 is configured to determine a second distance D2between the further security control module 20 and the mobile device100.

As illustrated in FIG. 3B, the relative position of the mobile device100 with respect to a first section I respectively a second section O ofthe plurality of sections I, O of the secure control area A isdetermined (by the processing units 14, 24) based on the first distanceD1 and the second distance D2.

According to particular embodiments, the relative position of the mobiledevice 100 with respect to a first section I respectively a secondsection O is further determined based on location data indicative of theabsolute position of the security control module 10, respectively thefurther security control module 20 with respect to said first section Iand second section O, the location data comprising a first transceiverdistance a1 indicative of a distance of the security control module 10from said border B and a second transceiver distance a2 indicative of adistance of the further security control module 20 from said border B.As illustrated in FIG. 3B, the absolute location of the ultra-widebandcommunication module 102 can be determined to be at one of the twointersection points (shown with an ‘X’ and with the reference 102) oftwo circles having their centre at the security control module 10 and aradius equal to the first distance D1 (shown with a dotted-line arch)respectively having their centre at the security control module 10 and aradius equal to the second distance D2 (shown with a solid-line arch).Since the security control module 10 and the further security controlmodule 20 are aligned essentially orthogonal to a border B delimitingthe first section I from the second section O of the secure control areaA, both intersection points (shown with an ‘X’ and with the reference102) lay either in the first section I or the second section O of thesecure control area A. Therefore, the relative position of the mobiledevice 100 with respect to the first section I respectively the secondsection O can be determined by the processing units 14, 24 with absolutecertainty. The term relative position of the mobile device 100 withrespect to the first section I respectively the second section O as usedherein comprises (but is not limited to) an indication whether themobile device 100 is located in the first section I or the secondsection O of the secure control area A, for example as a logical value(true/false with respect to I and O).

FIGS. 4A and 4B show highly schematic top views of a security controlsystem 1 according to the present disclosure, wherein a third securitycontrol module 10′ of the plurality of security control modules 10, 20,10′ is arranged in the proximity of a further passageway 4′ connectingsaid first section I and said second section O adjacent to thepassageway 4. As illustrated on FIG. 4A, respective pairs of adjacentpassageways 4, 4′ share a common further security control module 20.

As illustrated in FIG. 4B, in addition to the first distance D1 and thesecond distance D2, the relative position of the mobile device 100 withrespect to a first section I, a second section O of the plurality ofsections I, O and with respect to each of the plurality of passageways4, 4′ is determined by at least one of the processing units 14, 14′ and24 of the plurality of security control modules 10, 20, 10′, based onthe first distance D1 determined by the corresponding security controlmodule 10 and a plurality of distances D2, D1′ received from the othersecurity control modules 20, 10′. In other words, the security controlmodules 10, 20, 10′ collaboratively determine the relative position ofthe mobile device 100 by determining its distance from each securitycontrol module 10, 20, 10′ and exchanging the distances D1, D2, D1′between each other.

According to further embodiments, the relative position of the mobiledevice 100 is determined further based on location data indicative ofthe absolute position of the security control module 10, the furthersecurity control module 20 as well as location data indicative of theabsolute position of the adjacent security control module 10′ withrespect to said first section I, second section O, the passageway 4 andwith respect to the adjacent passageway 4′.

In a particular embodiment of the present invention, the location dataindicative of the absolute position of the adjacent security controlmodule 10′ comprises a first adjacent transceiver distance a 1′indicative of a distance of the adjacent security control module 10′from said border B.

As illustrated in FIG. 4B, the absolute location of the ultra-widebandcommunication module 102 of the mobile device 100 can be determined tobe the single intersection point (shown with the reference 102) of threecircles:

-   the first circle having its centre at the security control module 10    and a radius equal to the first distance D1 (shown with a    dotted-line arch),-   the second circle having its centre at the further security control    module 20 and a radius equal to the second distance D2 (shown with a    solid-line arch), and-   the third circle having its centre at the adjacent security control    module 10′ of the adjacent passageway 4′ and a radius equal to the    first adjacent distance D1′ (shown with a dotted-dashed-line arch)

In order to be able to not only determine the relative position of themobile device 100 with respect to the first section I and O of thesecure control area A, but also with respect to the plurality ofpassageways 4, 4′, the processing unit(s) 14, 14′, 24 needs to processthe first adjacent distance D1′ from the adjacent security controlmodule 10′ of the adjacent passageway 4′ (third circle in FIG. 4B). Theterm relative position of the mobile device 100 with respect to thefirst section I, the second section O and the plurality of 113passageways 4, 4′ as used herein comprises (but is not limited to) anindication whether the mobile device 100 is located in the first sectionI or the second section O of the secure control area A within aparticular passageway 4, 4′ for example as a logical value (true/falsewith respect to I and O and each passageway 4, 4′).

Turning now to FIGS. 5 to 7 , embodiments of the herein disclosedcomputer implemented method for operating a security control module 10and a security control system 1 in a secure control area A shall bedescribed with reference to illustrative flowcharts.

FIG. 5 shows a simplified flow chart illustrating a sequence of stepsfor determining the relative position of the mobile device, according toa first embodiment.

In a step S10, a first distance D1 between the security control module10 and a mobile device 100 is determined by the security control module10. In a first substep S12 of step S10, the ultra-wideband transceiver12 of the security control module 10 and an ultra-wideband communicationmodule 102 of the mobile device 100 jointly establish a firstultra-wideband transmission. Thereafter, in a second substep S14 of stepS10, signal properties of the first ultra-wideband transmission betweenthe security control module 10 and the ultra-wideband communicationmodule 102 of the mobile device 100 are processed by the processing unit14 to thereby determine the first distance D1 between the securitycontrol module 10 and a mobile device 100.

In a step S20, a second distance D2 between the ultra-widebandtransceiver 22 of the further security control module 20 and the mobiledevice 100 is determined by the ultra-wideband transceiver 22 of thefurther security control module 20. In a first substep S22 of step S20,the further security control module 20 and an ultra-widebandcommunication module 102 of the mobile device 100 jointly establish asecond ultra-wideband transmission. Thereafter, in a second substep S24of step S20, signal properties of the second ultra-wideband transmissionbetween the further security control module 20 and the ultra-widebandcommunication module 102 of the mobile device 100 are processed tothereby determine the second distance D2 between the ultra-widebandtransceiver 22 and the mobile device 100.

It shall be noted that, according to particular embodiments disclosedherein, the steps S10 and S20 are analogous or even identical stepsperformed by different security control modules 10, 20 of a plurality ofsecurity control modules 10, 20 of a security control system 1.

According to embodiments disclosed herein, the security control module10 and/or the further security control module 20 are configured todetermine the first distance D1 respectively the second distance D2 byprocessing signal properties of the ultra-wideband transmissionsincluding one or more of: a propagation time; an amplitude variation;and/or a phase difference.

Determining the first distance D1 respectively second distance D2 basedon the propagation time of the ultra-wideband transmissions comprisingmeasuring the time required for a signal to travel from theultra-wideband transceiver 12, 22 to the ultra-wideband communicationmodule 102 of the mobile device 100; and/or the time required for asignal to travel from the ultra-wideband communication module 102 of themobile device 100 to the ultra-wideband transceiver. In a particularembodiment, a time difference is used as a basis for determining thefirst distance D1 respectively second distance D2, as it is more secureagainst spoofing attacks, wherein a third party may use a radio relaydevice to gain unauthorized access to a location or system in aso-called “relay-attack”. Depending on the embodiment, the timedifference is a “one-way time-of-flight” time difference between theultra-wideband transceiver 12, 22 sending the request value and themobile device 100 receiving the request value, or a “round-triptime-of-flight” time difference, in which a second transmission takesplace from 102 of the mobile device 100 to the ultra-widebandtransceiver 12, 22 either prior to, or after, the first transmission ofthe request value. In the “one-way time-of-flight” scenario, theultra-wide-band transceiver 10, 12 and the ultra-wideband communicationmodule 102 of the 100 need to be provided with tightly synchronizedclocks for accurately determining the distance D1, D2. In the lattercase of a “round-trip time-of-flight” calculation, there is stored,either in the mobile device 100 or the ultra-wideband transceiver 12,22, an accurate representation of the processing time, i.e. the time ittakes between the reception of an ultra-wideband transmission and thesending of a response ultra-wideband transmission, which processing timeallows for accurately determining the distance D1, D2. Measurement of atime required for the signal to travel from the ultra-widebandtransceiver 12, 22 to the ultra-wideband communication module 102 of themobile device 100 and back “round-trip time-of-flight” is advantageousas it does not require the precise synchronization of clock signals ofthe ultra-wideband transceiver 12, 22 and the mobile device 100.

Determining the distance D1, D2 based on amplitude difference, comprisesdetermining the difference in signal amplitude between the signaltransmitted by the ultra-wideband transceiver 12, 22 and the signalreceived by the ultra-wideband communication module 102 of the mobiledevice 100 (or vice-versa). By taking into consideration the attenuationof the signal, the distance D1, D2 between the ultra-widebandtransceiver 12, 22 and the mobile device 100 is calculated.

Determining a distance D1, D2 based on phase difference comprisesdetecting the difference in signal phase between the signal transmittedby the ultra-wideband transceiver 12, 22 and the signal received by theultra-wideband communication module 102 of the mobile device 100. Bytaking into consideration the change in signal phase, the distance D1,D2 between the ultra-wideband transceiver 12, 22 and the ultra-widebandcommunication module 102 of the mobile device 100 is determined. It isto be understood that for the amplitude difference and phase difference,alternatively, the signal may also be transmitted by the ultra-widebandcommunication module 102 of the mobile device 100 and received by theultra-wideband transceiver 12, 22.

In a subsequent step S30, the relative position of the mobile device 100with respect to the security control module 10, 20 is determined by theprocessing unit(s) 14, 24, as described above in detail with referenceto FIGS. 2B and 3B. In a first substep S32, the security control module10 and further security control module 20 exchange data indicative ofthe first distance D1 and second distance D2, while in a subsequentsubstep S34 of step S30, at least one of the security control modules10, 20 determines the relative position of the mobile device 100 withrespect to the security control module 10, 20.

According to embodiments disclosed herein, the relative position of themobile device 100 with respect to the security control module 10comprises (but is not limited to) an indication whether the mobiledevice 100 is within a defined proximity range of the security controlmodule 10.

According to further embodiments, within step S30, the processing units14, 24 determine the relative position of the mobile device 100 furtherwith respect to the first section I and the second section O of theplurality of sections I, O of the secure control area A.

According to further embodiments, within step S30, location dataindicative of the absolute position of the security control module 10,respectively the further security control module 20 with respect to saidfirst section I and second section O is made available to the processingunit(s) 14, 24. According to embodiments disclosed herein, the data isretrieved by the processing unit(s) 14, 24 from a storage unit, such asan internal memory and/or a database. Alternatively, or additionally,the data is transmitted to the processing unit(s) 14, 24 from anexternal storage, such as an external database, a remote server or fromthe security control module 10 or further security control module 20.According to a particular embodiment of the present invention, saidlocation data indicative of the absolute position of the of the securitycontrol module 10 comprises a first transceiver distance a1 indicativeof a distance of the security control module 10 from said border B and asecond transceiver distance a2 indicative of a distance of the furthersecurity control module 20 from said border B.

FIG. 6A shows a flow chart illustrating a sequence of steps forestablishing the UWB transmissions, according to a first embodiment ofthe present invention, referred to as gate initiated transmission.According to gate initiated transmission, the substeps S12 and/or S22comprise transmitting a request message to the ultra-widebandcommunication module 102 of the mobile device 100 by the securitycontrol module 10 and further security control module 20 and processingthe response messages received from the mobile device 100. Gateinitiated transmission is advantageous as the timing respectively thefrequency of the interrogation (transmitting a request message to themobile device) is solely in the control of the security control module10, 20.

FIG. 6B shows a flow chart illustrating a sequence of steps forestablishing the UWB transmissions, according to a further embodiment ofthe present invention, referred to as mobile device initiatedtransmission. According to mobile device initiated transmission, thesubsteps S12 and/or S22 comprise the mobile device 100 broadcasting aUWB signal (by its ultra-wideband communication module 102), thesecurity control module 10 and further security control module 20receiving said broadcast UWB signals. Mobile device 100 initiatedtransmission is advantageous since it allows the mobile device 100 tocontrol the timing/frequency of the broadcast signal(s), allowing themobile device 100 to switch its respective radio communication module102 into a standby/low-power or off mode to thereby conserve energy.

As illustrated in FIG. 7 , according to further embodiments disclosedherein, the computer implemented method for operating a security controlsystem 1 further comprises executing an access control process for themobile device 100 by the security control module 10 and/or the furthersecurity control module 20 of the plurality of security control modules10, 20 if the mobile device 100 has been determined to be positioned insaid first section I or said second section O of the secure control areaA, respectively. In other words, the security control module 10, 20nearest to the mobile device 100 is the one which handles access controlfor the mobile device 100.

Alternatively, or additionally, step S40 comprises surveillance actionscomprising, logging said relative position of the mobile device 100 ontoan internal data storage, transmitting said relative position of themobile device 100 to an external data storage, raising an alarm ifcertain conditions are met with respect to the relative position and/orthe mobile device 100 itself.

As illustrated in FIG. 8 , according to embodiments disclosed herein,executing access control for the mobile device 100 comprises:

-   Substep S42: requesting authentication data from the mobile device    100;-   Substep S44: receiving authentication data from the mobile device    100;-   Substep S46: verifying said authentication data from mobile device    100 against a set of authorized users/mobile devices and/or    validating a digital signature in order to determine whether the    mobile device 100 (respectively its holder) is authorized;-   Substep S48: granting access for a holder of the mobile device 100    if the mobile device 100 is authorized, particularly comprising one    or more of: opening a section separation panel(s) 5, unlocking a    door and/or allowing passage of a turnstile; and-   Substep S49: denying access for the holder of the mobile device 100    if the mobile device 100 not authorized, particularly comprising one    or more of: closing/locking a section separation panel(s) 5, locking    a door and/or denying passage of a turnstile.

Turning now to FIG. 9 , a sequence of steps of a computer implementedmethod for operating a security control system 1 for determining therelative position of the mobile device 100 within the secure controlarea A with respect to a plurality of passageways 4, 4′ shall bedescribed. In a step S10, a first distance D1 between the securitycontrol module 10 and a mobile device 100 is determined by the securitycontrol module 10. In a step S20, a second distance D2 between thefurther security control module 20 and the mobile device 100 isdetermined by further security control module 20. In a step S10′, afirst adjacent distance D1′ between an adjacent security control module10′ of an adjacent passageway 4′ and the mobile device 100 is determinedby the adjacent security control module 10′.

In a subsequent step S30, at least one of the processing units 14, 14′and 24 of the plurality of security control modules 10, 20, 10′determines the relative position of the mobile device 100 with respectto each of the plurality of passageways 4, 4′. In a first substep S32 ofstep S30, the security control modules 10, 20 and 10′ exchange thedistances D1, D2, D1′ between themselves (each security control moduletransmits the distance D1 itself determined and receives the distancesD1′, D2 determined by the “other” security control modules).

Having exchanged distance data D1, D1′ and D2, at least one of theprocessing units 14, 14′ and 24 of the plurality of security controlmodules 10, 20, 10′ determines the relative position of the mobiledevice 100 based on the first distance D1 determined by itself and thedistances D2, D1′ received from the other of security control modules10, 20, 10′.

According to further embodiments, within step 30, location dataindicative of the absolute position of the security control module 10,the security control module 10′, and the further security control module20 with respect to said first section I, the second section O and withrespect to the passageway 4 and the adjacent passageway 4′ is madeavailable to the processing unit(s) 14, 24, 14′. According toembodiments disclosed herein, the data is retrieved by the processingunit(s) 14, 24, 14′ from a storage unit, such as an internal memoryand/or a database. Alternatively, or additionally, the data istransmitted to the processing unit(s) 14, 24, 14′ from an externalstorage, such as an external database, a remote server. According to aparticular embodiment of the present invention, said location dataindicative of the absolute position of the of the security controlmodule 10 comprises a first transceiver distance al indicative of adistance of the security control module 10 from said border B, a firstadjacent transceiver distance a1′ indicative of a distance of theadjacent security control module 10′ from said border B and a secondtransceiver distance a2 indicative of a distance of the further securitycontrol module 20 from said border B.

It should be noted that, in the description, the computer program codehas been associated with specific processors and the sequence of thesteps has been presented in a specific order, one skilled in the artwill understand, however, that the computer program code may bestructured differently and that the order of at least some of the stepscould be altered, without deviating from the scope of the invention. Forexample, one skilled in the art will understand that at least some ofthe functions and operations described above can be implemented andperformed on the computer system.

Further disclosed and proposed are:

-   A data processing apparatus/device/network/system comprising means    for carrying out one or more method steps according to embodiments    of a method disclosed herein.-   A data processing apparatus/device/network/system comprising a    processor for carrying out one or more method steps according to    embodiments of a method disclosed herein.-   A computer program product comprising computer-executable    instructions which, when executed by a data processing    apparatus/device/network/system, cause the data processing    apparatus/device/network/system to carry out one or more method    steps according to embodiments of a method disclosed herein.-   Computer-readable media, comprising volatile and/or non-volatile    storage media (such as a data carrier) and/or transmission media    (such as a data carrier signal), comprising computer-executable    instructions which, when executed by a data processing    apparatus/device/network/system, cause the data processing    apparatus/device/network/system to carry out one or more method    steps according to embodiments of a method disclosed herein.-   A computer readable data structure comprising computer-executable    instructions which, when executed by a data processing    apparatus/device/network/system, cause the data processing    apparatus/device/network/system to carry out one or more method    steps according to embodiments of a method disclosed herein.

LIST OF REFERENCE NUMERALS

-   security control system 1-   first sidewall 2-   second sidewall 3-   passageway 4, 4′-   section separation panel (s) 5-   security control module 10, 20, 10′-   ultra-wideband transceiver 12, 22, 12′-   processing unit 14, 14′, 24-   mobile device 100-   ultra-wideband communication module (of the mobile device) 102-   first distance D1, D1′-   second distance D2-   transceiver distance a1, a2, a1′-   secure control area A-   first section (of secure control area) I-   second section (of secure control area) O-   border (between sections of the secure control area) B

1. A security control module for controlling access through a passagewayof a secure control area, the security control module comprising: anultra-wideband transceiver configured to establish an ultra-widebandtransmission with an ultra-wideband communication module of a mobiledevice; and a processing unit configured to determine a first distancebetween the security control module and the mobile device by processingsignal properties of the ultra-wideband transmission, the securitycontrol module being configured to receive a second distance from afurther security control module arranged at a spacing distance apartfrom the security control module, the second distance being indicativeof a distance between the further security control module and the mobiledevice, the security control module being further configured to transmitthe first distance to the further security control module, and theprocessing unit being configured to determine the relative position ofthe mobile device with respect to the security control module based onthe first distance and the second distance.
 2. The security controlmodule according to claim 1, wherein the security control module isconfigured to transmit the first distance to the further securitycontrol module and to receive the second distance from the furthersecurity control module via an ultra-wideband transmission between theultra-wideband transceiver and an ultra-wideband transceiver of thefurther security control module.
 3. The security control moduleaccording to claim 1, wherein the security control module is furtherconfigured to deny, disregard and/or block authentication requests fromthe mobile device if the mobile device has been determined to bepositioned at distance greater than a threshold distance from thesecurity control module and/or if the first distance has been determinedto be greater than the second distance received from the furthersecurity control module.
 4. The security control module according toclaim 1, wherein the ultra-wideband transceiver is configured todetermine the first distance by processing signal properties of theultra-wideband transmission including one or more of: a propagationtime; an amplitude variation; and/or a phase difference.
 5. A securitycontrol system for controlling access through a passageway of a securecontrol area comprising a plurality of security control modulesaccording to one of the preceding claims, wherein a security controlmodule and a further security control module of the plurality ofsecurity control modules is located in a first section and a secondsection of the secure control area, respectively, the passagewayconnecting said first section and said second section, the processingunits of the security control module and/or the further security controlmodule being configured to determine the relative position of the mobiledevice further with respect to the first section and said second sectionof the secure control area.
 6. The security control system according toclaim 5, wherein the spacing distance between any pair of the pluralityof security control modules is greater than or equal to the sum of themeasurement precision of the ultra-wideband transceivers of said pair ofsecurity control modules.
 7. The security control system according toclaim 5, wherein the ultra-wideband transceivers of the security controlmodule and the further security control module of the plurality ofsecurity control modules are aligned essentially orthogonal to a borderdelimiting the first section from the second section of the securecontrol area, wherein the processing units of the security controlmodule and/or the further security control module are configured todetermine the relative position of the mobile device further based onlocation data comprising a transceiver distance indicative of a distanceof the ultra-wideband transceivers from said border.
 8. The securitycontrol system according to claim 5, wherein the security control moduleand/or the further security control module of the plurality of securitycontrol modules are further configured to execute an access controlprocess for the mobile device if the mobile device has been determinedto be positioned in said first section or said second section of thesecure control area, respectively.
 9. The security control systemaccording to claim 5, wherein: a third security control module of theplurality of security control modules is arranged in the proximity of afurther passageway connecting said first section and said second sectionadjacent to the passageway; at least one of the processing units of theplurality of security control modules is configured to determine therelative position of the mobile device further with respect to each ofthe plurality of passageways, based on the first distance determined bythe corresponding security control module and a plurality of distancesreceived from the plurality of security control modules.
 10. A computerimplemented method for operating a security control module according toclaim 1 in a secure control area, the method comprising: establishing anultra-wideband transmission between an ultra-wideband transceiver of thesecurity control module and an ultra-wideband communication module of amobile device; determining—by a processing unit of the security controlmodule—a first distance between the security control module and themobile device by processing signal properties of the ultra-widebandtransmission; receiving a second distance from a further securitycontrol module arranged at a spacing distance apart from the securitycontrol module, the second distance being indicative of a distancebetween the further security control module and the mobile device;transmitting the first distance from the security control module to thefurther security control module; and determining—by the processing unitof the security control module—the relative position of the mobiledevice with respect to the security control module based on the firstdistance and the second distance.
 11. The method of claim 10, furthercomprising the step of denying, disregarding and/or blockingauthentication requests from the mobile device if the mobile device hasbeen determined to be positioned at a distance greater than a thresholddistance from the security control module.
 12. The method of claim 10,wherein determining the first distance between the ultra-widebandtransceiver and the mobile device comprises: transmitting a requestmessage to the ultra-wideband communication module of the mobile deviceand processing a response message received from the mobile device;and/or receiving and processing a broadcast UWB signal from the mobiledevice.
 13. A computer implemented method for operating a securitycontrol system according to claim 5 in a secure control area, the methodcomprising: establishing an ultra-wideband transmission between eachultra-wideband transceiver of the plurality of security control modulesand an ultra-wideband communication module of a mobile device;determining—by the processing units of each security control module—afirst distance between the security control modules and the mobiledevice by processing signal properties of the ultra-widebandtransmissions; at least one security control module transmitting thefirst distance to the further security control modules; at least onesecurity control module receiving a second distance from a furthersecurity control module arranged at a spacing distance apart, the seconddistance being indicative of distances between the further securitycontrol modules and the mobile device; and determining—by at least oneprocessing unit of the security control module—the relative position ofthe mobile device with respect to the security control modules.
 14. Themethod of claim 13, further comprising the step of executing an accesscontrol process for the mobile device by the security control moduleand/or the further security control module of the plurality of securitycontrol modules if the mobile device has been determined to bepositioned in said first section or said second section of the securecontrol area, respectively.
 15. The method of claim 14, whereinexecuting access control for the mobile device comprises: requestingauthentication data from the mobile device; receiving authenticationdata from the mobile device; verifying said authentication data from themobile device in order to determine whether the mobile device isauthorized; and granting access for the mobile device if the mobiledevice is authorized, particularly comprising one or more of: opening asection separation panel; unlocking a door and/or allowing passage of aturnstile operatively connected to the security control system.
 16. Acomputer program product comprising computer-executable instructionswhich, when executed by a processing unit of a security control module,causes the security control module to carry out the method according toclaim
 10. 17. A computer program product comprising computer-executableinstructions which, when executed by a processing unit of a plurality ofsecurity control modules of a security control system, causes thesecurity control system to carry out the method according to claim 13.