Technology for access control
to social institutions

Center of Innovative
Wireless Technologies
Abstract
The technology controls personnel, student and visitor
movement at educational and social institutions. It implies
sensor network deployment on the base of Bluetooth 4.0
BLE technology.
Special application installed on a visitor's smartphone registers
movement across the given territory and allows to get automated
access to specific services (access to enclosed space, literature
from the library, lunch, etc.).
Original network protocols involve bootstrapping modules considering
network topology, distance to the nearest node and device operating
mode.
Management system structure
and the principles of operation
The server processes
the requests received
from transmitters in the
access cell. Afterwards
the application calculates
the zone radii where
the identification objects
are located at a given
time, and recognizes
them according
to hardware addresses
(MAC-addresses).
Management system structure
and the principles of operation
SDS
Objects data
collection

Device data
transfer

Positioning server

Defining device
position

TCP-client

Web-application
client
Content request
from web-server
and regular
checks for
updates

Content
transfer

Update
request

Web-application
server
Content generation
on the base
of the positioning
server data

The addresses are
registered when
the mobile is firstly
occurred in the cell
and are stored
in a database
server for some
time.
Location determination algorithm
1. Each stationary Bluetooth device searches for Bluetoothactive mobile customers with a given frequency.
2.

As the client accesses the area of a base unit it connects
with the unit by Bluetooth and server receives the device
address and data.

3.

The server part of the program complex processes the data
received and checks the address according to a proper
permission.

4.

In case your mobile device has not passed the registration
procedure upon the entrance to the access zone,
MAC-address is filtered and device will not be permitted
to transfer control actions and to implement various
management scenarios.
Location determination algorithm
5.

After identification the program analyzes the data received
and compares it with the data of specific access areas
defined by the relevant range.

6.

Afterwards the application determines the approximate
location of a particular mobile device relative to
a stationary base unit.

7.

After the initial locating determination, during its movement
within the stationary base zone, the zone boundaries
are shifted by a predefined step depending on the way
the signal level changes.
Contacts
Centre for Innovative Wireless Technologies
Ulyanovsk, Russia

Center of Innovative
Wireless Technologies

Vitaly Dementiev, chief executive
+7-951-098-65-14
E-mail: dve@ulntc.ru

Ulyanovsk Centre for Technologies
Transfer
Phone, fax: (8422) 77-81-92
E-mail: ctt@ulstu.ru, http://ctt.ulstu.ru
32, Severny Venets st., Ulyanovsk, Russia,
432027.

More Related Content

PPTX
Distance-bounding facing both mafia and distance frauds
PPT
Criminal identification system
PPTX
Contact Ministry
PPT
Safety hazard-identification-on-construction-projects
PPTX
Protective locks and key control
PPTX
Drive test using tems investation 16.1
PPS
Security Training Incident Investigation And Report Writing.Ppt
PPTX
Barriers of Communication
Distance-bounding facing both mafia and distance frauds
Criminal identification system
Contact Ministry
Safety hazard-identification-on-construction-projects
Protective locks and key control
Drive test using tems investation 16.1
Security Training Incident Investigation And Report Writing.Ppt
Barriers of Communication

Similar to CIWT_CeBIT (20)

PPTX
Pppppppppttttttttttttttttttttt
PDF
The proposed System for Indoor Location Tracking
PDF
Cell Site Surveying V4
PDF
Wi-Fi Offloading.PDF
PDF
Cell Site Surveying Case Study V1
PDF
Pedestrain Monitoring System using Wi-Fi Technology And RSSI Based Localization
PDF
mumble: Framework for Seamless Message Transfer on Smartphones
PDF
40120130405021
PDF
Hybridised_Positioning_Algorithms_in_Location_Based_Services
DOCX
Resume
PDF
Intelligent GIS-Based Road Accident Analysis and Real-Time Monitoring Automat...
PDF
Gsm Counter Surveillance V1
PPTX
Mobile meetup
PPTX
20121129 lte basic procedures (2)
PPTX
Indoor navigation system
PDF
Live Matches , Streaming , Scores
PDF
IoT-Unit111111111111111111111111111_1.pdf
PDF
Keynote Talk on Recent Advances in Mobile Grid and Cloud Computing
PPTX
Wi fi security dedicated architectures
PDF
4 (mobile computing)
Pppppppppttttttttttttttttttttt
The proposed System for Indoor Location Tracking
Cell Site Surveying V4
Wi-Fi Offloading.PDF
Cell Site Surveying Case Study V1
Pedestrain Monitoring System using Wi-Fi Technology And RSSI Based Localization
mumble: Framework for Seamless Message Transfer on Smartphones
40120130405021
Hybridised_Positioning_Algorithms_in_Location_Based_Services
Resume
Intelligent GIS-Based Road Accident Analysis and Real-Time Monitoring Automat...
Gsm Counter Surveillance V1
Mobile meetup
20121129 lte basic procedures (2)
Indoor navigation system
Live Matches , Streaming , Scores
IoT-Unit111111111111111111111111111_1.pdf
Keynote Talk on Recent Advances in Mobile Grid and Cloud Computing
Wi fi security dedicated architectures
4 (mobile computing)
Ad

Recently uploaded (20)

PPTX
Final SEM Unit 1 for mit wpu at pune .pptx
PDF
Taming the Chaos: How to Turn Unstructured Data into Decisions
PDF
sbt 2.0: go big (Scala Days 2025 edition)
PPTX
Modernising the Digital Integration Hub
PDF
Abstractive summarization using multilingual text-to-text transfer transforme...
PDF
OpenACC and Open Hackathons Monthly Highlights July 2025
PDF
From MVP to Full-Scale Product A Startup’s Software Journey.pdf
PDF
STKI Israel Market Study 2025 version august
PPTX
The various Industrial Revolutions .pptx
PDF
Architecture types and enterprise applications.pdf
PDF
Getting started with AI Agents and Multi-Agent Systems
PPTX
AI IN MARKETING- PRESENTED BY ANWAR KABIR 1st June 2025.pptx
PDF
A proposed approach for plagiarism detection in Myanmar Unicode text
PPT
Geologic Time for studying geology for geologist
PDF
sustainability-14-14877-v2.pddhzftheheeeee
PDF
A comparative study of natural language inference in Swahili using monolingua...
PPTX
Benefits of Physical activity for teenagers.pptx
PDF
A review of recent deep learning applications in wood surface defect identifi...
PDF
Produktkatalog für HOBO Datenlogger, Wetterstationen, Sensoren, Software und ...
PDF
CloudStack 4.21: First Look Webinar slides
Final SEM Unit 1 for mit wpu at pune .pptx
Taming the Chaos: How to Turn Unstructured Data into Decisions
sbt 2.0: go big (Scala Days 2025 edition)
Modernising the Digital Integration Hub
Abstractive summarization using multilingual text-to-text transfer transforme...
OpenACC and Open Hackathons Monthly Highlights July 2025
From MVP to Full-Scale Product A Startup’s Software Journey.pdf
STKI Israel Market Study 2025 version august
The various Industrial Revolutions .pptx
Architecture types and enterprise applications.pdf
Getting started with AI Agents and Multi-Agent Systems
AI IN MARKETING- PRESENTED BY ANWAR KABIR 1st June 2025.pptx
A proposed approach for plagiarism detection in Myanmar Unicode text
Geologic Time for studying geology for geologist
sustainability-14-14877-v2.pddhzftheheeeee
A comparative study of natural language inference in Swahili using monolingua...
Benefits of Physical activity for teenagers.pptx
A review of recent deep learning applications in wood surface defect identifi...
Produktkatalog für HOBO Datenlogger, Wetterstationen, Sensoren, Software und ...
CloudStack 4.21: First Look Webinar slides
Ad

CIWT_CeBIT

  • 1. Technology for access control to social institutions Center of Innovative Wireless Technologies
  • 2. Abstract The technology controls personnel, student and visitor movement at educational and social institutions. It implies sensor network deployment on the base of Bluetooth 4.0 BLE technology. Special application installed on a visitor's smartphone registers movement across the given territory and allows to get automated access to specific services (access to enclosed space, literature from the library, lunch, etc.). Original network protocols involve bootstrapping modules considering network topology, distance to the nearest node and device operating mode.
  • 3. Management system structure and the principles of operation The server processes the requests received from transmitters in the access cell. Afterwards the application calculates the zone radii where the identification objects are located at a given time, and recognizes them according to hardware addresses (MAC-addresses).
  • 4. Management system structure and the principles of operation SDS Objects data collection Device data transfer Positioning server Defining device position TCP-client Web-application client Content request from web-server and regular checks for updates Content transfer Update request Web-application server Content generation on the base of the positioning server data The addresses are registered when the mobile is firstly occurred in the cell and are stored in a database server for some time.
  • 5. Location determination algorithm 1. Each stationary Bluetooth device searches for Bluetoothactive mobile customers with a given frequency. 2. As the client accesses the area of a base unit it connects with the unit by Bluetooth and server receives the device address and data. 3. The server part of the program complex processes the data received and checks the address according to a proper permission. 4. In case your mobile device has not passed the registration procedure upon the entrance to the access zone, MAC-address is filtered and device will not be permitted to transfer control actions and to implement various management scenarios.
  • 6. Location determination algorithm 5. After identification the program analyzes the data received and compares it with the data of specific access areas defined by the relevant range. 6. Afterwards the application determines the approximate location of a particular mobile device relative to a stationary base unit. 7. After the initial locating determination, during its movement within the stationary base zone, the zone boundaries are shifted by a predefined step depending on the way the signal level changes.
  • 7. Contacts Centre for Innovative Wireless Technologies Ulyanovsk, Russia Center of Innovative Wireless Technologies Vitaly Dementiev, chief executive +7-951-098-65-14 E-mail: dve@ulntc.ru Ulyanovsk Centre for Technologies Transfer Phone, fax: (8422) 77-81-92 E-mail: ctt@ulstu.ru, http://ctt.ulstu.ru 32, Severny Venets st., Ulyanovsk, Russia, 432027.