Method and device for pass-through control and/or singling-out of persons

ABSTRACT

A pass-through system ( 110 ) which is arranged between at least one freely accessible area ( 100 ) and at least one area which is only accessible to authorized people comprises: a pass-through ( 5 ) area which is marked on the floor and/or defined by mobile blocking devices ( 13 ); at least one image capturing device ( 7 ); at least one image processing device ( 8 ) and at least one alarm triggering device ( 9 ). At least one specific signal can be transmitted to the alarm triggering device ( 9 ) by the image processing device ( 8 ) when at least one person respects or violates the rules which govern access, passage or exit from the pass-through system ( 110 ) or if objects have been left behind in the pass-through system ( 110 ). The invention also relates to a method for pass-through control and/or singling-out of people through a pass-through system ( 110 ) between a freely accessible area ( 100 ) and at least one area which is only accessible to authorized people, said method comprising the following steps: the pass-through area ( 5 ) of the pass-through system ( 110 ) is monitored in order to automatically determine whether at least one person respects or violates the rules which govern access, passage or exit from the pass-through system ( 110 ) or if objects have been left behind in the pass-through system ( 110 ). An access limiting device ( 132, 133 ) of the pass-through system ( 110 ) for the singling-out of people is activated when at least one person respects or violates the rules which govern access, passage or exit from the pass-through system ( 110 ) or if objects have been left behind in the pass-through system ( 110 ).

TECHNICAL FIELD

The present invention concerns a method and a device for pass-through control and/or singling-out of persons. The present invention concerns in particular a method and a pass-through gate for pass-through control and/or singling-out of persons between a freely accessible area and at least one area that is only accessible to authorized people.

STATE OF THE ART

Different methods and devices from the state of the art for pass-through control have been described for example in the following patent documents:

Patent DE19527104 (“Device for monitoring a room”) claims a device for monitoring and determining the number of persons and the direction of movement within a room to be monitored, whereas access control devices are used for checking the access authorization of people. For this, sensors are used that are capable of measuring distances.

Patent DE19613178 (“Method for operating a door mechanism and door mechanism functioning according to this method”) claims a method for operating a door mechanism with automatically movable door elements in a pass-through gate for persons and vehicles, whereas sensors can control the door elements.

Patent EP0940775 (“Pass-through and method for operating such a pass-through”) claims a pass-through gate placed between rooms and consisting of an inner space and automatic doors, whereas an access control device regulates the access rights of persons and sensors control the automatic doors.

Patent DE2539779 (“Pass-through system for persons”) describes a control gate for persons, consisting of a transit booth that can accommodate only one person, and whereas a weighing device determines the weight of the person in the booth.

Patent DE3623792 (“Device for determining the number of people and the direction within a room to be monitored or a pass-through system”) describes a device for determining the number of people and the direction within a room to be monitored or within a pass-through gate, and infrared sensors capable of detecting the number of the passing people.

Patent DE3904840 (“Device for checking the isolation of persons at a gated passage”) describes a device for checking the singling-out of persons at a gated passage with a pass-reader.

Patent EP0828233 (“Apparatus for detecting the number of passers”) describes an apparatus for detecting the number of people passing by a specific area, whereas the apparatus consists of sensors measuring differences in distances.

EP1065521 (“Optoelectronic surveillance system”) claims an optoelectronic surveillance system for surveying a room area to be monitored with an image supplier and a device allowing a light pattern to be projected onto the area to be monitored.

GB1600858 (“Security installation”) describes a security gate with an entry door and one or several exit doors, and a device for automatically closing the doors when a person enters.

US2002067259 (“Portal intrusion detection apparatus and method”) claims a security system for singling-out persons with an access control device and devices for closing the doors.

U.S. Pat. No. 3,811,010 (“Intrusion detection apparatus”) describes a device consisting of two cameras for detecting people.

U.S. Pat. No. 4,654,872 (“System for recognizing three-dimensional objects”) describes a system for recognizing three-dimensional objects, consisting of cameras recording images from three different directions.

U.S. Pat. No. 4,993,049 (“Electronic management system employing radar type infrared emitter and sensor”) describes a device for recognizing at least one person in a room, consisting of an infrared light source and infrared sensors and analysis electronics.

U.S. Pat. No. 5,073,706 (“Procedure and apparatus for detecting objects moving at varying speeds within a certain area”) describes a system for detecting and counting moving objects.

U.S. Pat. No. 5,121,201 (“Method and apparatus for detecting the number of persons”) claims a method and an apparatus for detecting persons, whereas the detection is based on taking the difference of video images.

U.S. Pat. No. 5,387,768 (“Elevator passenger detector and door control system which masks portions of a hall image to determine motion and count passengers”) describes a detection of movement based on taking the difference of images, for controlling lift doors.

U.S. Pat. No. 5,581,625 (“Stereo vision system for counting items in a queue”) describes a method for counting objects in waiting queues by using stereo image processing.

U.S. Pat. No. 5,598,338 (“Device for detecting the existence of moving bodies in an image”) claims a system for measuring traffic flow and determining the movement path of vehicles with the aid of image processing.

U.S. Pat. No. 5,845,692 (“Rapid access”) claims a door system refusing access to a secured area and allowing access to a non-secured area to non-authorized persons.

U.S. Pat. No. 6,188,777 (“Method and apparatus for personnel detection and tracking”) claims a method for detecting and identifying persons, using two image recording devices as well as color segmentation and pattern recognition methods.

U.S. Pat. No. 6,195,121 (“System and method for detecting and analyzing a queue”) claims a method for detecting persons in waiting queues by using digital image processing.

U.S. Pat. No. 6,437,819 (“Automated video person tracking system”) claims a method for controlling positionable cameras with the aim of keeping moving persons in the camera's field of vision.

Patent WO0193230 (“Object-oriented control of information and advertisement supports”) describes a device for detecting and classifying objects.

Patent WO0211075 (“People counter”) claims a device for counting persons with the aid of sensors capable of measuring the distance of objects with the aid of radar or ultrasound waves.

Patent WO9723376 (“Automatic counting of people”) describes a pass-through system capable of detecting the presence and direction of movement of persons with the aid of pressure sensitive sensors and whose aim is to count persons.

Patent WO0229744 (“Ingress/egress control system for airport concourses and other access controlled areas”) claims a system for controlling the flow of persons and for preventing access of non-authorized or suspect people.

Patent DE19732153 (“Device for measuring passing persons and a system for operating system using it”) claims a device for measuring the number of passing persons, whereas a plurality of cameras are used whose optical axes are arranged in parallel one to another.

A considerable disadvantage of the pass-through control devices known from the prior art is that they are usually fixedly installed and that they can be used in existing buildings only with difficulty. This is in particular the case for devices for singling-out persons that require use of specific installations such as additional walls, automatic doors and/or turnstiles in order to ensure sufficient security against unauthorized passing-through. Such installations are usually complicated and expensive and must preferably be planed already when conceiving the room and/or building to be monitored. They thus have a considerable influence on the designing of the building to be monitored, in particular on its aesthetic aspect. Because of these complicated installations, such installations furthermore do not usually flow a large flow of people to pass through the monitored zone.

One aim of the invention is thus to propose a device and a method for pass-through control and singling-out of persons that can be easily used in an existing structure (for example in an existing building).

A further aim of the invention is to propose a device and a method for pass-through control and singling-out of persons that allow the users a fast and uncomplicated passage through the monitored area and simultaneously ensure a high security.

REPRESENTATION OF THE INVENTION

These aims are achieved with a pass-through gate and a method having the features of the corresponding claim.

These aims are achieved in particular with a pass-through gate arranged between at least one freely accessible area and at least one area that is only accessible to authorized people, with:

a pass-through area which is marked on the floor and/or defined by mobile blocking devices,

at least one image capturing device,

at least one image processing device,

at least one alarm triggering device,

whereas at least a specific signal can be transmitted to the alarm triggering device by the image processing device when at least one person respects or violates the rules which govern access, passage and exit from the pass-through gate or if objects have been left behind in the pass-through gate.

These aims are achieved in particular also with a method for pass-through control and/or singling-out of persons through a pass-through gate between one freely accessible area and at least one area that is only accessible to authorized people, with the following steps:

monitoring a pass-through area of the pass-through gate for automatically determining whether at least one person respects or violates the rules which govern access, passage and exit from the pass-through gate or whether objects have been left behind in the pass-through gate,

activating an access limiting device of the pass-through gate for singling-out persons when at least one person respects or violates the rules which govern access, passage and exit from the pass-through gate or if objects have been left behind in the pass-through gate.

The invention is a pass-through gate that guarantees a maximum security of person singling-out and simultaneously influences only minimally the architectonic and aesthetic appearance of the areas to be monitored. For this purpose, the pass-through gate includes for example an area marked on the floor or defined by mobile blocking devices. The person pass-through gate must thus not be delimited by walls and can be installed in entrance halls, open areas or in open air. In order to guarantee a high security, the person pass-through gate of the invention preferably includes a buffer area that is delimited for example through walls and doors and that is only operated if certain rules for passing through the area marked on the floor or defined through mobile blocking devices have been violated.

SHORT DESCRIPTION OF THE FIGURES

The invention will be described in more detail with the aid of the attached figures, in which:

FIG. 1 shows the pass-through area of a person pass-through gate according to one embodiment of the invention,

FIG. 2 shows the pass-through area of a person pass-through gate according to another embodiment of the invention,

FIG. 3 shows the pass-through area of a person pass-through gate according to a further embodiment of the invention,

FIG. 4 shows a diagrammatic representation of an entrance hall with person pass-through gates according to an embodiment of the invention,

FIG. 5 shows a diagrammatic representation of a person pass-through gate of FIG. 4,

FIG. 6 shows the pass-through area of the person pass-through gate of FIG. 5.

Only the elements that are important for understanding the invention have been represented. The same elements in different figures have the same reference.

WAYS OF EXECUTING THE INVENTION

According to a preferred embodiment, the inventive device for pass-through control and/or singling-out of persons is a person pass-through gate having a pass-through area accessible for people that is delimited for example at least partially through markings on the floor and/or through mobile blocking devices. The person pass-through gate preferably includes also a buffer zone comprising preferably at least one access-restricting device.

As will be explained further below, the access-limiting device of the buffer zone preferably remains inactive or open as long as predetermined passage rules in the pass-through area are respected. A pass-through control is performed in this case for example only in the pass-through area. The control in the pass-through area can preferably be carried out quickly in order to make possible an optimal flow of people through the device. If a rule for passage in the pass-through area is not respected, the buffer zone is preferably put into operation or closed in order for example to perform a stricter pass-through control through singling-out of persons and/or in order to physically prevent unauthorized passages through the person pass-through gate of the invention.

One possible application for the person pass-through gate of the invention can be found for example in entrance areas of buildings with access control. The absence for example of walls and doors before person gates for limiting the pass-through area in which the pass-through control is normally performed represents an advantage for the architectonic designing of the entrance area. The free sight in the entrance area furthermore offers additional security.

In another possible application, a person pass-through gate according to the invention can for example be installed with mobile blocking devices for delimiting the pass-through area when an event takes place in a building where access control must be carried out. The mobile blocking devices can then be dismantled again after the event.

FIGS. 1, 2 and 3 show by way of example three different embodiments of pass-through areas of a device according to the invention, each with one image capturing device for the automatic pass-through control in the corresponding pass-through area.

The pass-through area represented in FIG. 1 is for example an area 5 accessible for people, determined through delimiting markings 6 and access areas 1, 2, 3, 4. An image capturing device 7 comprises for example an analog or digital video camera that is preferably connected to an image processing device 8. The image processing device 8 comprises for example a computer with frame grabber for digitalizing, storing and processing image data from the image capturing device 7. An alarm triggering device 9, for example a programmable logic controller (PLC) represents the interface for example to acoustic alarm emitters 11 and/or to visual alarm display devices 12. The alarm triggering device 9 preferably represents also the interface for the buffer zone of the personal pass-through gate of the invention. The functionalities of the alarm triggering device 9 are in one embodiment of the invention implemented in the image processing device 8. A mobile wireless telecommunication terminal 10, such as for example a mobile telephone or a portable computer, preferably allow alarm signals to be notified to persons.

The pass-through area according to another embodiment of the invention represented in FIG. 2 is delimited through mobile blocking devices 13. It is thus possible to adapt for example the size of the pass-through area, the number and/or arrangement of the access areas 1, 2, 3, 4 to changing conditions.

The pass-through area 32 according to a further embodiment of the invention represented in FIG. 3 is delimited through walls and through markings 30, 31 on the floor.

FIG. 4 illustrates diagrammatically a possible application of person pass-through gates according to a preferred embodiment of the invention for pass-through control between a freely accessible area and one or several areas that are only accessible to authorized people. The freely accessible area is for example an entrance hall 100 with a main entrance 101 and a reception 102. The entrance hall 100 leads for example to further areas, not represented. Certain areas are for example freely accessible whilst access to the other areas is allowed only for authorized persons. A staircase 103 without particular control device leads for example to the freely accessible areas whilst for example three person pass-through gates 110 control access to the areas that are only accessible to authorized people.

One aim of the person pass-through gate according to an embodiment of the invention is for example to prevent access of non-authorized persons by determining whether only one person is in a defined part of the pass-through area 5 of the person pass-through gate. It can thus be guaranteed for example that the result of a person identification performed in the pass-through area can clearly be allocated to a person. As will be explained later, access control devices for example are used, that for example query identification numbers, read chip-cards or RFID tags and/or measure biometric characteristics.

Furthermore, the person pass-through gate 110 preferably makes it possible to detect rule violations that could compromise the security of a device. Examples for possible rules are: limiting the access direction, limiting the number of persons allowed to remain in the pass-through area 5 of the gate 110 and/or rules for the presence of objects in the person pass-through gate 110. If a rule is for example not respected, the buffer zone 13 is preferably activated (for example closed) to perform a stricter pass-through control in the gate 110.

FIG. 5 is a diagrammatic representation of a person pass-through gate 110 according to a preferred embodiment of the invention. The pass-through area 5 is for example divided in three cells 50 that are determined for example through markings on the floor and/or through mobile blocking devices. The pass-through area 5 preferably includes an identification system for identifying the persons passing through the pass-through area 5. The identification system includes for example a reader 51 for each cell 50, each reader 51 being capable of reading an identification of a person located in the corresponding cell. The readers 51 are for example chi-card and/or magnetic card readers, RFID readers, biometric readers and/or a keyboard for example for entering a secret. At the entrance and/or exit of each cell 50 of the pass-through area 5 is for example a signalization column 52 that emits signals for regulating the flow of people through the corresponding cell 50. Each signalization column bears for example a green and a red light to signal to the users when the corresponding cell can be entered resp. left.

As previously mentioned, the pass-through area 5 is monitored through an image capturing device 7 that includes for example one (or several) analog or digital video cameras. The image-capturing device 7 is connected to an image processing device. The buffer zone 13 is preferably also monitored through an image capturing device 130 that includes for example one (or several) analog or digital video cameras. The image-capturing device 130 of the buffer zone 13 is also connected to an image processing device that allows an automatic processing of the captured images. Both image capturing decides 7, 130 are for example connected to the same image processing device.

The buffer zone 13 preferably includes an access limiting device allowing it to physically close completely. The buffer zone 13 is for example partially delimited through walls 134 and can be closed with doors 132, 133 (such as for example sliding doors). Other access limiting devices are however also possible within the frame of the invention. The buffer zone 13 can include for example turnstiles etc. The access limiting device can preferably be deactivated by leaving for example the doors 132, 133 open in order to be able to cross the buffer zone 13 easily and fast.

The buffer zone 13 further preferably comprises an identification system in order to be able to identify a person in and/or in front of the buffer zone 13. The identification system of the buffer zone 13 is preferably similar to the identification system of the pass-through area 5. The identification system of the buffer zone 13 thus includes for example also a reader 131.

In normal operation, the access limiting device of the buffer zone 13 is preferably inactive. The doors 132, 133 remain thus for example open. The persons passing through the person pass-through gate 110 are for example only identified in the pass-through area 5 through the identification system. In one embodiment, each authorized person carries an electronic identification (for example a magnetic card, a chip-card, an RFID tag, etc.) that is read by the corresponding reader 51 when the person is in a cell 50 of the pass-through area 5. In another embodiment of the invention, each person that is in a cell 50 is invited to enter a secret in the reader 51 and/or to have biometric indications (such as e.g. fingerprints) read. The read identification is for example compared with data in a database (not represented) of the identification system in order to determine whether they correspond to an authorized identification. In the affirmative, the green light of the signalization column at the exit of the cell lights up to signal to the identified person that it is allowed to enter the area accessible only for authorized persons.

In one embodiment of the invention, the person in the cell 50 after being identified is also authenticated. An image of the person's face is for example recorded by the image capturing device and sent to the image processing device. The image is for example compared with a reference image (corresponding to the indicated identity). If this comparison is positive, the signalization column is e.g. switched to green to allow the person to access. Otherwise, the red light lights up in the column 52 to signal to the person that it is not allowed to enter the area accessible only for authorized persons. The authentication can also be performed through further biometric elements (such as fingerprints), whereas the identity of the person was read first from an electronic ID. Further combinations of identification and authentication methods are also possible within the frame of the invention.

Preferably, the image capturing device 7 records images of the pass-through area 5 continuously or at regular time intervals, in order to perform a pass-through control of the pass-through area 5. The recorded images are sent to the image processing device where they are preferably automatically analyzed in order to detect certain events. The image processing device is for example preferably capable of automatically determining whether there is more than one person in a cell 50, which could prevent these persons from being correctly identified and/or authenticated. The image processing can preferably also automatically determine whether a person passes in an unauthorized direction or too fast through the pass-through area 5, whether a person passes the pass-through area immediately after another person, whether an object has been thrown into or over the pass-through area 5, whether an object has been left in the pass-through area 5, whether a person that has not or only wrongly been identified has passed through the pass-through area 5, etc.

With the events determined through the image processing device, rules are defined that must be respected in the pass-through area. The rules are for example combinations of one or several events. In the simplest example, certain events are considered unauthorized. The rule is then that no such even may occur. If an unauthorized event is detected by the image processing device, the rule is considered to be violated. A signal is then sent for example to the alarm triggering device that for example triggers an alarm. In another example, certain combinations of events, repetitions of certain events within a certain time span, etc. are forbidden. The rules can preferably also be set with further events and/or parameters, such as for example the result of the identification and/or authentication of a person, the time of the clock, etc.

The rules can preferably be set dynamically. They are for example entered on the computer of the image processing device or of the alarm triggering device through a user interface. Preferably, the rules can be modified and/or completed even during the pass-through control.

If a predetermined rule is violated, a corresponding signal is then sent to the alarm triggering device. The signal preferably contains information about the violated rule and/or about the criticality of the violation. Each rule corresponds for example to a level of criticality that determines the kind of reaction in case of a violation. The image processing device transmits for example at least one specific signal to the alarm triggering device when one or several persons enter or leave the pass-through gate 110 through the pass-through area 5 or when one, more than one or a defined number of persons are in the pass-through gate or when one or several persons enter or leave the pass-through gate at places not provided therefore, or when at least one person enters or leaves the person gate at a particular time of the day.

When the alarm triggering device receives a signal corresponding to a rule violation, it for example triggers a corresponding alarm. The alarm is for example a visual and/or textual and/or acoustic and/or voice signal and/or signals to mobile or stationary telecommunication terminals, for persons inside or outside the pass-through gate 110 or to inform the surveillance personal or impart instructions. In a preferred embodiment, from a predetermined level of criticality of the rule violation, the access limiting device of the buffer zone 13 is activated, or example to prevent an unidentified person from running through the person pass-through gate 110 and from reaching an area accessible only for authorized persons.

Preferably, information about each specific alarm or about a defined sub-set of specific alarms is stored in a storage medium. The information includes for example the kind of alarm, the level of criticality of the rule violation, an image (a snapshot) of the pass-through area 5 at the time the rule was violated, an image of the rule violator, the date and the time of the clock of the vents that have triggered the alarms, etc. This information is for example stored on the hard disk of a computer (for example of the image processing device's server).

When at least certain rules have been violated, the image of at least one person (located in the pass-through gate, or entering or leaving the pass-through gate) is recorded and stored. The image record is then for example triggered through a specific signal of the image processing device or through at least one sensor that detects the presence or movement of at least one person. The pass-through gate 110 of the invention then has for example at least one additional image capturing device (not represented) that serves for recording, representing and storing images of persons or objects inside or outside of the pass-through gate.

Preferably, the digitalized images of at least one of the image capturing devices and the information about the alarms are stored together with the date and the time of the clock of the rule violation in a storage medium. The temporal or causal relation between the images in the image data files and the alarm information is then established for example through references in the form of data paths or through hyperlinks.

When the access limiting device of the buffer zone 13 is active, for example after a certain rule violation, a singling-out of persons is preferably performed in the buffer zone 13. For example, only one person at a time is let through the first door 133 of the buffer zone 13 before the latter being closed again. The person in the buffer zone 13 is identified and/or authenticated. If the identified and/or authenticated person is authorized to enter the area accessible only for authorized persons, the second door 132 is then opened. Otherwise, the first door 133 is for example opened again until the person leaves the buffer zone 13 and for example a new person enters the buffer zone.

The identification and/or authentication of the person in the buffer zone 13 preferably occurs in similar fashion as in the pass-through area 5 with the aid of the image capturing device 130 and of the reader 131 that is connected with the identification system of the buffer zone 13.

FIG. 5 shows a cell 50 of a pass-through area 5, whereas the cell 50 is for example included in the sight area of a camera 70, the camera 70 belonging to the image capturing device of the person pass-through gate of the invention. In this embodiment, each cell 50 has only one signalization column 52, for example with a red light if the person in the cell 50 has to remain standing to allow identification and/or authentication for example. If for example the light is green, the person can leave the cell 50. In this embodiment, the camera 70 is placed vertically above the cell 50. An automatic monitoring of the cell 50 is thus possible without the recorded persons being recognizable. The pass-through gate then optimally includes a further camera oriented for example in such a way that the face of a person in or next to the cell 50 can be recorded. The face can for example be recorded if a rule is violated and an alarm or any specific signal is triggered by the alarm triggering device and/or by the image processing device.

In a further embodiment of the invention, no identification and/or authentication of the individual persons is performed in the pass-through area 5. Only whether all predefined rules have been respected is controlled with the image processing device. If a rule is violated, the access limiting device of the buffer zone 13 is then activated to perform an identification and/or authentication of the persons that have violated the corresponding rule.

After a certain time and/or after other conditions have been fulfilled, the access limiting device of the buffer zone 13 is de-activated again to allow again an optimal flow of people through the device.

In the variant embodiment of the invention described above, images of the pass-through area are recorded and analyzed continuously or at regular time intervals. In another embodiment, the pass-through gate 110 has at least one access control device located outside or inside the pass-through area 5 and that transmits a specific signal to the alarm triggering device when at least one person that has no access authorization for the corresponding area accessible only for authorized persons (for example because that person was not identified) enters or leave the pass-through gate. 

1. Pass-through gate arranged between at least one freely accessible area and at least one area that is only accessible to authorized people, with: a pass-through area which is marked on the floor and/or defined by mobile blocking devices, at least one image capturing device, at least one image processing device, at least one alarm triggering device, an access limiting device for singling-out persons, whereas at least a specific signal can be transmitted to the alarm triggering device by said image processing device and whereas a specific signal for activating the access limiting device is triggered by the alarm triggering device when at least one person respects or violates the rules which govern access, passage and exit from the pass-through gate or if objects have been left behind in the pass-through gate, wherein it includes a buffer zone that is at least partly delimited by walls and can be closed by the access limiting device, and wherein said buffer zone includes an identification system for identifying and/or authenticating a person that is in said buffer zone.
 2. Pass-through gate according to claim 1, with an image capturing device for monitoring said buffer zone.
 3. Pass-through gate according to claim 1, said identification system of the buffer zone including a reader.
 4. Pass-through gate according to claim 1, said pass-through area being capable of being monitored through said image capturing device and said image processing device.
 5. Pass-through gate according to claim 1, with at least one access control device for determining whether one person respects or violates the rules which govern access, passage or exit from the pass-through gate.
 6. Pass-through gate according to claim 1, said pass-through area being delimited only through markings on the floor and/or through mobile blocking device.
 7. Pass-through gate according to claim 1, with an identification system for identifying at least one person that is in said pass-through area.
 8. Pass-through gate according to claim 7, said identification system including readers for reading electronic identifications.
 9. Pass-through gate according to claim 7, said identification system including readers for reading biometric data of said at least one person that is in said pass-through area.
 10. Method for pass-through control and/or singling-out of persons through a pass-through gate between one freely accessible area and at least one area that is only accessible to authorized people, with the following steps: monitoring a pass-through area of the pass-through gate for automatically determining whether at least one person respects or violates the rules which govern access, passage and exit from the pass-through gate or whether objects have been left behind in the pass-through gate, activating an access limiting device of said pass-through gate for singling-out persons when at least one person respects or violates the rules which govern access, passage and exit from the pass-through gate or if objects have been left behind in the pass-through gate, closing off a buffer zone through said access limiting device when at least one person respects or violates the rules which govern access, passage and exit from the pass-through gate or if objects have been left behind in the pass-through gate, identifying and/or authenticating a person that is in said buffer zone when at least one person respects or violates the rules which govern access, passage and exit from the pass-through gate or if objects have been left behind in the pass-through gate.
 11. Method according to claim 10, with the following additional step: recording and storing an image of said pass-through area when at least one person respects or violates the rules which govern access, passage and exit from the pass-through gate or if objects have been left behind in the pass-through gate.
 12. Method according to claim 10, said monitoring being performed with the aid of an image capturing device and an image processing device, the images recorded by said image capturing device being processed by said image processing device for automatically determining whether the rules which govern access, passage and exit from the pass-through gate have been respected or violated.
 13. Method according to claim 10, said monitoring being performed with the aid of at least one access control device that is outside or inside said pass-through area.
 14. Method according to claim 10, said identification and/or authentication of a person that is in said buffer zone being performed with the aid of an image capturing device.
 15. Method according to claim 11, said identification and/or authentication of a person that is in said buffer zone being performed with the aid of a reader. 