Login| Sign Up| Help| Contact|

Patent Searching and Data


Title:
MULTIFUNCTIONAL GATEWAY FOR SECURITY ACCESS
Document Type and Number:
WIPO Patent Application WO/2019/030786
Kind Code:
A1
Abstract:
The found system comprises entry and exit multifunctional gateways for active security control of the access of persons/animals/ things to/from public and private sensible areas. A plurality of hazard subsystems and peripherals, as well as external security, identification and data management systems can be associated to these gateways.

Inventors:
TARELLI, Riccardo (Via delle Milizie 76, ROME, 00192, IT)
Application Number:
IT2018/050147
Publication Date:
February 14, 2019
Filing Date:
August 06, 2018
Export Citation:
Click for automatic bibliography generation   Help
Assignee:
TARELLI, Riccardo (Via delle Milizie 76, ROME, 00192, IT)
International Classes:
G07C9/00
Domestic Patent References:
WO2004034347A12004-04-22
WO2009113078A22009-09-17
WO2016092072A12016-06-16
Foreign References:
US20040189471A12004-09-30
US20140075514A12014-03-13
US20080303708A12008-12-11
US9092962B12015-07-28
US20070122003A12007-05-31
Other References:
None
Download PDF:
Claims:
CLAIMS

A system characterized by multifunctional security control capabilities against diversified hazards, occurring both as single (i.e. metallic weapons) and combined ones (plastic shapes of weapons, plastic or metallic cans of constituents of explosives, radiations, soft-x rays detection of suspected hazards in general, etc.), to be detected in the subjects (person/animal/good) crossing the entry and exit gateways of public and private sensible areas, without prior undressing and opening thereof. The found system comprises at least (ref . Fig. 5) : one or more interoperable processing platform devices (5.1), wherein are contained: a) one or more couples of redundant CPUs (5.2), connected in master-slave mode, for the control of all the processes of the found system; b) suitable analog to digital input/output universal interface modules (5.3), to be connected with the plurality of hazard detection subsystems and peripherals included in the found system as follow: metal detector, ionizing radiation detector, detector of explosives constituents, detector of natural and synthetic drugs constituents, CCTV and infrared image detector, RFID / Bar-CODE code detector, detector of single (facial, fingerprints, iris, limbs, etc.) and combined (facial + iris, etc.) biometric data, soft-x rays detector (for the location addressed by the found system of threats in people / animals / things, after its elaboration of the received signals and possible threats), and with a plurality of external: management, supervision, identification and post-processing security systems than the found system, all of which are configurable according to the following three types of embodiments shown on Fig. 1 (only monitoring of the subject), Fig.2 (monitoring and blocking of transit of the subject) and Fig.3 (monitoring and blocking of the subject in armored cabin) , for the "indirect" acquisition of all of the types, status, alarms and failures signals coming from such said subsystems /peripherals and the external systems as well, all of them processed and combined by means of the interoperable methodology in claim 9) and transcoding methodology in claim 10) herein; c) suitable memory modules (5.4) for reading, reading/writing and decoding of graphic symbols (via Programmable Array Logic/Gate Array Logic), for transcoding and storing of the meta- infromation data according to the security Law rules on personal data protection, according to said claim 9) hereafter; d) suitable dedicated local (5.5) and remote (5.6) video cards, to be connected with the respective monitor/PDA display interfaces of the operators of the found system; e) a plurality of detection devices (5.8) for intrusion of persons/animals/things in access to the gateways of the found system; f) a plurality of optical/acoustic local and remote signaling devices (5.9) and delimiting protection devices as sliding doors (5.10) as per Fig. 2 and access to armored cabin (5.11) as per Fig. 3; g) a software module for Management and Diagnostics (ref . to Fig. 5.7) of the found system, which process all the detections of the subsystems, peripheral and external systems, to identify the afore mentioned diversified threats in terms of single and/or combined hazards, in order to show them on the transversal picture of the gateway and undertake the proper actions of protection of the case. Such a found system is always configured to form an embodiment with a closed computer network, including commercial racks for hosting of the other CPUs of the subsystems/peripherals included in the found system as detailed above, as shown on Fig.s 1), 2) and 3), and at least standard interconnection switches and modem/routers for interfacing of output signals of the found system with: telephone, intranet and internet facilities, according to the security standards of the sensible area to be protected.

A system according to claim 1), characterized by its capability to simultaneously manage all the real time signals of the said hazard detection subsystems and peripherals included in the found system, and the signals of the said external systems interfaced with the found system, used in the entry and exit control gateway of the sensible areas, which all of them are accomodated without any physical and electrical interference among them, according to the different embodiments of the found system of Fig. 1), Fig. 2) and Fig. 3), and the double coding of the respective signals thereof, the latter is implemented by means of a specific transcoding methodology (Fig.7), as per the next claim 10) herein.

3) System according to claims 1) and 2), wherein they are made compatible the simultaneous operations of the plurality of the said hazard detection subsystems/peripherals and external systems by a specific interoperability methodology (Fig.6), which provides the combinantion thereof without alterations of software and information contents of the respective signals (type, status, alarms and failures), to detect potential diversified threats of single and combined afore mentioned hazards, according to the functional and operating requirements stated by any manufacturers of the said subsystems/peripherals and external systems interfaced with the found system, and the copyright requirements of the software of any manufacturer .

4) System according to claims 1), 2) and 3), whereby are managed the said hazard detection subsystems/peripherals included in the found system and external systems, with the capability of generating a specific image of diversified threats and related single and/or combined hazards (i.e.: plastic-pistols, plastic white weapons, constituents of cartridges for plastic pistols, constituents of drugs and explosives, cans of ionizing radiations, cloning and/or overlaying of identity documents, false RFID/Bar-codes , soft-x rays identification of potential threat zones for person, animal and things [baggages, etc.], etc.), localized both on the subject and in the gateway as shown on Fig.4, wherein are included: a) pictorial view of the main cross section of the gateway controlled by the found system, with evidence therein of: the geographical zones of cross subdivision of the gateway and the location in the same zones of the graphic symbols corresponding to the status/alarms/failures detected from the said subsystems /peripherals and external systems and processed by the found system as per the transcoding methodology in clause 10) ; b) image of the identification card of the person/animal /thing accessing to the gateway, wherein they are found the identity data coming from the RFID/Bar-CODE subsystem, which is part of the found system, with the additional cross- verification of identity detected by the external systems linked to the found system, also in postprocessing from this one; c) photographic image both in clear and infrared of the person/animal /thing crossing the gateway, coming from the HD (High Definition) real-time videocameras of CCTV (Closed Circuit TV) subsystem, which is part of the found system. All of these images are diplayed on the respective monitor/PDA interfaces of the local and remote operators as shown in the example on Fig.4, by means of the dedicated video cards (5.5) and (5.6) of the found system, during the crossing of persons/animals/things in the gateway controlled by the found system.

5) System according to claims 1), 2), 3), and 4), whereby are managed the said hazard detetection subsystems/peripherals included in the found system and the said external systems, with the capability of associating the integrated images of pictorial view with graphic symbologies, identification data card and HD-CCTV videocamera photographic images altogether, and the identification data of persons/animals/things crossing the gateway, with a plurality of external identification security systems, for an in-depth post-processing verification of the identity of these persons/animals/things, in order to prevent fraudulent identity exchanges and forgeries.

6) System according to claims 1), 2), 3), 4) and 5), whereby are managed the said hazard detetection subsystems/peripherals included in the found system and the said external systems, with the capability of associating the integrated images of pictorial view with graphic symbologies of potential threats, identification data card and HD-CCTV videocamera photographic clear and infrared images of persons/animals/things crossing the gateway, for the said biometric single and combined recognizing, with: a) a plurality of optical/acoustic local and remote alarms (5.9), as shown in example on Fig.s 1) , 2) and 3) ; b) a plurality of delimiting protections either sliding doors (5.10) or access to armored cabin (5.11), as shown on corresponding Fig.s 2) and 3); c) a plurality of external security systems and sensible data management systems, linked through the universal interface (5.3), also in case of coercive actions brought by criminals and terrorists in general.

7) System according to claims 1), 2), 3), 4), 5) and 6), whereby are managed the said hazard detetection subsystems/peripherals included in the found system and the said external systems, with the capability of associating: the identification code data detected by the RFID/Bar-CODE subsystem, which is part of the found system, with a plurality of commercial data management systems, resulting from whatsoever electronic purchasing transactions of goods and services of any type, through a plurality of existing or new Credit /Debt /Fidelity Cards, to get commercial and marketing databases with high segmentation and aggregation of customer data.

8) System according to claims 1), 2), 3), 4), 5), 6) and 7), whereby are managed the said hazard detetection subsystems/peripherals included in the found system and the said external systems by means of a suitable proprietary software for management and diagnostic (5.7), whereby are comprised in an indicative but not limitative way all of the subsystems and peripherals devices of the typological embodiments in the Fig. 1, Fig. 2 and Fig. 3. These embodiments they can be as native with the found system or integrate the existing subsystems and peripherals of the gateway for any sensible area to protect, also in case of updating thereof.

9) Interoperability Methodology (Fig.6) for all the said hazard detection subsystems/peripherals included in the found system and said external systems of management, identification and security interfaced with the found system, according to claims 1), 2), 3), 4), 5) 6) and 7) and 8), to: 9.1) detect and manage the respective video signals and information form these subsystems/peripherals and external systems without modifying in any manner the related software and informatic contents of signals thereof in the respect of Law on Copyright and privacy; 9.2) provide the corresponding visualization of the integrated image (graphic symbologies of the type of combined signals, status/alarms/failures from the said hazard detection subsystems/peripherals and external systems on the pictorial view of the cross section of the gateway, identification data card from the RFID/B-CODE subsystem and HD real-time photographic images from CCTV videocamera system of persons/animals/things crossing the gateway) on the monitor/PDA interfaces, through suitable dedicated local (5.5) and remote (5.6) video cards; 9.3) provide the activation, associated with such graphic simbologies of diversified threat of single or combined hazards, of: the respective optic/acoustics signalings (5.9) and the delimiting protections of sliding doors (5.10) or access of armored cabin (5.11) for blocking/unblocking of the persons/animals/things in the gateway of the found system, by comprising the following steps:

a. One or more interoperable processing platforms (5.1) with redundant CPUs (5.2) and universal interfaces (5.3) are associated with the gateway, the latter interfaces having a plurality of analog/digital inputs/outputs ;

b. A plurality of hazard detection subsystems/peripherals included in the found system as per claim 1) herein and external identification, supervision, security and management systems, they are associated with this gateway through the said universal analog/digital interfaces (5.3), according to the configuration diagrams of embodiments in Fig.s 1), 2) or 3) of the found system;

The information signals

(status/alarms/failures) coming from the said subsystems/peripherals as per claim 1) and external systems are associated with the corresponding graphic symbologies of type and zonal location of these information of diversified threats of single or combined hazards on the pictorial view of the cross section of the gateway, by means of the transcoding methodology (Fig.7), as per next claim 10);

In the dedicated video cards for the local (5.5) and remote (5.6) display interfaces they are associated by the redundant CPU (5.2) : the cross sectional pictorial view of the gateway and the related transcoded symbologies of type and localization of the polyfunctional hazard signals (type, status, alarms and failures) localized in such pictorial view, with the information of the identity identification of the persons/animals/things crossing in the gateway, displayed as in an indicative but not limitative example by the "Identification Data" card (Identity card) in Fig.4, automatically detected by the RFID/Bar-CODE subsystem, which is part of the found system, by means of commercial scanners equipped with a plurality of type of reading of codes as for example: bar-codes (1-D, 2-D, QR, etc.), tag RFID/NFC, etc., and assessed by the external identification systems in case of request by the operator of the found system; In the dedicated video cards for the local (5.5) and remote (5.6) display interfaces they are associated by the redundant CPU (5.2) : both the images detailed in the preceding steps (c.) and (d.), with the photographic images both in clear and infrared derived from the real-time HD videocameras of the CCTV subsystem, which is part of the found system, for every person/animal /thing crossing in the gateway, for the relevant said simple or combined biometric identification.

f . By the redundant CPU (5.2) all the graphic symbols of types, status, alarms and failures of the hazard detection subsystems/peripherals included in the found system and the said external systems, with the relevant identification data, they are all associated with: f.l) the corresponding optical/acoustic signaling (5.9); f.2) the routines of possible silencing selectable by Monitor/PDA interfaces of the local and remote operators of the found system, when the latter is in "Operation" mode (5.7.4); f.3) the safety delimiting protections (5.10) or (5.11) of the controlled gateway for blocking/unblocking of persons/animals/things crossing the gateway; all these activations are based on the typological configurations embodiments given in Fig.s 1), 2) and 3) of the found system;

g. By the redundant CPU (5.2) all the graphic symbols of types, status, alarms and failures of the combined hazard detection subsystems/peripherals included in the found system are associated with the analog/digital output interfaces (5.3), for addressing of a plurality of external systems, such as: security, identification and Data Base management systems, for temporary storing of the personal data of persons/animals/things crossing in the gateway, to be post-processed according to the security requirements of the sensible areas to be protected;

By the redundant CPU (5.2) all the graphic symbols of types, status, alarms and failures of the hazard detection subsystems/peripherals are associated with the analog/digital output interfaces (5.3), for external addressing of a commercial Event Data Recorder (EDR) module, for recording of: the operations of the found system, the possible anomalies of association of the received signals with the simbologies of the found system, and any failures of the subsystems/peripherals and those of the found system; 10) Transcoding methodology (Fig.7) of the signals of status/alarms/failures deriving from the hazard detection subsystems/peripherals included in the found system and the said external systems according to claims 1), 2), 3), 4), 5), 6) 7), 8), and 9), used to generate a plurality of graphic combined simbologies corresponding to such integrated signals of diversified threats of single or combined hazards, which are superimposed on the location zones of the pictorial view of the cross section of the gateway, to be integrated, by means of the interoperability methodology (Fig.6) as per preceding clause 9) herein, with the images of the identification cards of the identity of persons/animals/things crossing the gateway, which are deriving from RFID/B-CODE subsystem, part of the found system, and the HD photographic clear and infrared images of the CCTV subsystem, also part of the found system, comprising the following steps:

a. A plurality of the said hazard detection subsystems/peripherals included in the found system and a plurality of said external systems are associated with the gateway protected by the found system, and they are combined according to the typological layout of the configuration of embodiments in Fig.s 1), 2) or 3) of the found system, and to the Interoperability Methodology (Fig.6), as mentioned in the preceding claim 9) herein; Each address of the graphic simbology (5.7.3.2) resident in the memory (5.4) of the processing platform (5.1), it is associated with the corresponding combined signal and communication protocol of: type, status, alarm and failure, coming from the plurality of hazard detection subsystems /peripherals and the plurality of external systems mentioned in the preceding step, when the found system is set in the off-line process of encoding (Fig.5.7, block 5.7.3.1) during the configuration phase thereof (Learning mode 5.7.3), with the possibility of a normal step-by step coding (normal coding) of the signals from any interfaced subsystems/peripherals and external system, which are retrieved from those pre-stored in the diagnostic memory (5.7.2.3) during the "Testing" mode (5.7.2), and/or by means of an enhanced step-by-step coding (improved coding) of the signals directly detected from any interfaced subsystems/peripherals and external system, when stimulated in the configuration thereof, by generating in both cases ( normal / improved coding) a "raeta- information" (5.7.3.3), corresponding to each received signal and associated symbology and action code, which is stored in the suitable memory location (5.7.3.5) within the memory modules (5.4) of the found system, only after a confirmation of the correctness of this processed data is done by the assistance personnel of the found system during configuration, through a "Confirmation List" (5.7.3.4) routine for these signals to be stored;

In the on-line decoding process (5.7, block 5.7.4.1) the plurality of cobined signals coming from the said active subsystems/periherals and external systems are interfaced with the found system, so that they are associated with the meta-information (5.7.3.5) saved in the off-line coding process (Fig. 5.7, block 5.7.3.1) mentioned in the preceding step (b.), to provide for: c.l) recognizing of the received signals, c.2) activation of the corresponding graphic symbologies with the related opto-acoustic alarms /warnings (5.10) and the corresponding delimiting protections (5.11), c.3) their respective geographic localization of these combined symbologies of the threats and related hazards in the pictorial view of the cross section of the gateway; all of this to generate the said pictorial view of the gateway with the integrated graphic symbologies localizing the alarmed zones of the suspected hazards, which is fed by the redundant couple of CPU (5.2) to the dedicated local (5.5) and remote (5.6) video cards of the respective interfaces of the operators of the sensible area to be protected, as per the specific example given in the pictorial view on Fig. 4.

Description:
MULTIFUNCTIONAL GATEWAY FOR SECURITY ACCESS

The present invention relates to the field of the active control systems for the safety management of gateways for the access to public and private sensible areas. The term "sensible area" is for those areas wherein safety and integrity of the persons/animals/things is to be protected. In particular, the found system refers to those systems in the specific field of the "active safety", wherein the found system operates with advanced technology and methodologies for detection of threats of diversified hazards, the former occurring either as single or simultaneously. These hazards can be typologically : metallic weapons/bombs, non- metallic weapons /bombs , drugs (natural and artificial), radioactive substances, counterfeit of identification documents and tags, etc. The threats of these hazards can occur either individually or jointly when accessing to gateways of sensible areas. In any cases, each of these would cause issues for safeguard of people/animals/things present therein.

THE STATE OF THE ART

The theme of preserving the access to public and private "sensible areas" against the threats of diversified hazards caused by criminal and terrorists in general is increasing worldwide, as evident from daily news reports. The cases of violation of these areas with extreme consequences on safety for: people, animals and things, they are unfortunately growing throughout the world, for the desired returns by criminal and terrorist organizations in general. In addition, these threats are becoming even more diversified by type of hazard and are very often preceded by counterfeiting of identity of persons/animals/things, previously to the access in these gates.

Moreover, the current gateways are almost all equipped only with some of the hazard detection subsystems cited herein, so that scarcely ever they are able to cover immediate detection of all the hazards requested for defensing of the sensible areas. This lack of threat coverage is very often dependent on the level of perceived threat and not rather commensurate to the diversification and simultaneous occurrence thereof, leaving the gateways open to the possible penetration of those unperceived threats and therefore criminal and terroristic actions as well.

In addition, the counterfeiting and the shopliftings of brand objects in industrial sectors and trade are in strong growth, constituting considerable damage to the industrial system and to the global market, in the absence of a safe control that allows their effective detection not only at the origin, but also after the placing on the market as well.

Attempts to short all of these gaps for hazard detection coverage it is very difficult and never pursued so far extensively in brief times. This is due to issues caused by both the different technological implementations of each hazard detection subsystem and the technical compatibility among them. Therefore integration as well as multifunctional management thereof it is extremely difficult to achieve for the gateways of the sensible areas to be protected nowadays.

Another issue, which obstacles the rapid implementation of a multi-functional system for the detection of diversified hazards in the gateways of access to sensible areas, it is the need to respect and integrate the pre-existing hazard detection subsystems and external systems of each client, so as to save the costs thereof for the said areas to be protected.

In addition, the system should also ensure compliance with the requirements of Law, both for the safe use toward persons/animals/things and the correct integration of the results of detection of all the subsystems/peripherals and external systems, without altering their software and the information contents of their signals, for the respect of their industrial property rights.

Therefore, it is unavoidable as well as urgent to get new and more sophisticated interoperable systems, with multifunctional control of the active safety of the access gateways in input and output of public and private sensible areas. This shall be implemented extensively in respect of the terms of the Law referred to above, in order to prevent threats to the people/animals/things caused by diversified hazards, brought in general by criminals and/or terrorists within the said sensible areas. DESCRIPTION OF THE FOUND SYSTEM

Introduction

The found system is based on the multifunctional active control of diversified threats in the access to the entry and exit gateways of public and private sensible areas. As shown indicatively but not limitative in the following figures, these entry/exit gateways permit the progressive control of the crossing of persons/animals/things, depending on three typological configurations of these gateways. These configurations are indicatively but not limitative shown as follows herein: 1) Control transit only (Fig.l), 2) Control with delimited transit by armored doors (Fig.2), 3) Control with delimited transit by armored hatches and cab (Fig.3) . In each gateway are integrated all the subsystems /peripheral for detection of each specific threats of hazards and the interfaces with the additional external systems for extension of the functionality the found system. All the detected signals coming from these said subsystem/peripherals and external systems they are recognized by the found system, so that a three stages composed image is generated by thereof, as indicatively shown in the example but not limitative on Fig.4. This composed image includes also those images coming from the HD (High Definition) video cameras of CCTV (Closed Circuit TV) subsystem and the identification data image from RFID/B-code subsystem. Both of these latter subsystems are part of the found system. Also the RFID/B-Code identification subsystem can be connected by the found system with other external subsystems, for extensive data identification as: retina/fingerprints, passport check, security tags and bar-codes (1-D, 2-D) checks, etc.

On the basis of the recognized signals, the found system is able to immediately activate these three stages composed images, as given in but not limited to the example on Fig.4, on the monitor/PDA interfaces of the local and remote operators, as well as the corresponding optical/acoustic signals in the gateway of the found system. In addition, by this recognization also the simultaneous control of the free transit is made by the found system as per Fig.l, or the block of either the armored doors as per Fig.2, or the entire armored cab as per Fig.3, in accordance with the corresponding configuration of the found system referred to as above. The main hardware architecture of the found system is shown in an indicative but not limitative example on Fig.5. The multifunctional control of security against threats is get by the software (Fig. 5.7) of the found system, by means of two innovative methodologies: one for interoperability (Fig. 6) and the other for transcoding (Fig. 7) .

The methodology of interoperability (Fig.6) allows the software (5.7) of the found system to acquire the signals from both the hazards detection subsystems/peripherals and the interfaced external systems, to activate the protections of the gateway without any alterations of the respective software and related information content thereof. By means of the recognization of these signals, the found system also activates: the views of the three stages composed images of threats resulted from the transcoding methodology (Fig.7), the corresponding optical/acoustic signals of each gateway and all the available protections for blocking or less of persons/animals/things wherein. The protections ensured by the found system are: blocking/unblocking of the armored doors as per Fig.2, or blocking/unblocking of the armored cab as per Fig.3, depending on the configuration of the found system installed in the gateway.

Moreover the interoperability of the found system is extended to its dialog with the interfaced external systems, such as: identity data (fingerprints/retina reading systems, passport checking, etc.), supervision and treatment of secure data and management of commercial data (secure tags and barcodes checks, Smart-cards checks, Debit/Credit cards checks, Fidelity cards checks, etc.) . All of these external systems are interfaced with the RFID/B-CODE subsystem of the found system, through secure links as: telephone, intranet and internet.

The methodology of transcoding (Fig. 7) allows the software of the found system to implement an encoding (process of coding 5.7.3.1) and a decoding (process of decoding 5.7.4.1) of the signals coming from the hazard detection subsystems/peripherals and external systems interfaced with the found system. In details these process are as follow: A) the process of encoding semi-automatically converts the received said signals into meta-informations during the configuration of the found system. Thence these meta-information are stored in the memory of the found system at completion of the configuration thereof, for being used by the found system when in the normal operation. This encoding process is implemented by the assistance personnel of the found system, during the off-line configuration thereof. B) The online decoding is done automatically by the software of the found system, when in the Operation mode. This decoding permits the found system to automatically associate the signals of states, alarms and failures, received from the hazard detection subsystem/peripherals and from external systems, with the meta-informations saved in the said configuration phase. This association generates suitable graphic symbols, which are super-imposed on a primary grid image of the virtual cross section of the gateway, in accordance with the location of the alerting sensors of the subsystem/peripherals configured in the gateway of the found system. Then this basic image is integrated with those coming from the identification card image, detected by the RFID subsystem/B-code and external systems, and the HD real-time video camera image of the CCTV subsystem. All of these images are integrated in a single one, with the outcome as shown indicatively but not limitatively in the example on Fig.4. Then such three stages composed image is sent by the found system to both the local and remote monitor/PDA interfaces thereof, to advise the respective operators upon the possible diversified threats of potential hazards brought by persons, animals and things, in transit in the said gateway controlled by the found system.

DESCRIPTION OF THE CONFIGURATION OF THE FOUND SYSTEM

As far as the functional point of view in terms of controlled gates, at least three possible configurations of the found system are given as follow :

A. Free transit gateway, protected by the safety functions: MBS, NRD, RFID/B—CODE, B&D and CCTV, (Fig.l)

In this case the found system allows the safety operators to check people/animals/things crossing the entry/exit gateways of the found system, wherein they are scanned by means of the hazard detection subsystem/peripherals supported by some other external systems, to acquire any signals (state/alarm/failures) thereof. The connections between the specific subsystems and the G&D (Management and Diagnostic) subsystem can be through all types of standard interfaces, given the universality of the interfaces of the acquisition of the G&D subsystem. The images of the persons/animals/things crossing each gateway are associated to those of the double High Definition (HD) video cameras of the CCTV subsystem, for a greater clarity of detection and redundancy. These CCTV images are then associated by the found system with the symbolism of the state/alarms/failures coming from the subsystem/peripherals and with the identification data image from the RFID/B-code subsystem. Then this integrated image is sent by the G&D subsystem to the monitor/PDA interfaces of the local and remote operators, for further control thereof. The corresponding optical/acoustic alarms are locally activated, depending on the type of signals detected by the found system. A suitable silencing utility for suppression of the local optical/acoustic alarms associated with these detected data is activable by the local or remote operator, by means of the respective monitor/PDA interfaces of the found system. Transmission interfaces are also provided by the found system for secure sending of the detected data via dedicated telephone, intranet and internet links. This allows a secure exporting of the detected data to the other external systems, if any, to be used by Security and Safety Bodies and Authorities as well.

C. Delimited transit gateway by armored doors, protected by the safety functions: MBS, NRD, RFID/B— CODE, B&D and CCTV (Fig.2)

In this case the found system allows the safety operators to check people/animals/things crossing the entry/exit gateways of the found system, wherein they are scanned by means of the hazard detection subsystem/peripherals supported by some other external systems, to acquire any signals (state/alarm/failures) thereof. The connections between the specific subsystems and the G&D (Management and Diagnostic) subsystem can be through all types of standard interfaces, given the universality of the interfaces of the acquisition of the G&D subsystem. The images of the persons/animals/things crossing each gateway are associated to those of the double High Definition (HD) video cameras of the CCTV subsystem, for a greater clarity of detection and redundancy. These CCTV images are then associated by the found system with the symbolism of the state/alarms/failures coming from the subsystem/peripherals and with the identification data image from the RFID/B-code subsystem. Then this integrated image is sent by the G&D subsystem to the monitor/PDA interfaces of the local and remote operators, for further control thereof. The corresponding optical/acoustic alarms are locally activated, depending on the type of signals detected by the found system. A suitable silencing utility for suppression of the local optical/acoustic alarms associated with these detected data is activable by the local or remote operator, by means of the respective monitor/PDA interfaces of the found system. In addition only for this configuration, some suitable armored doors are provided for partial blocking/unblocking of the person/animal /thing crossing the gateway, upon control by the found system. Transmission interfaces are also provided by the found system for secure sending of the detected data via dedicated telephone, intranet and internet links. This allows a secure exporting of the detected data to the other external systems, if any, to be used by Security and Safety Bodies and Authorities as well.

C. Delimited transit gateway by fully armored cabin, protected by the safety functions: MBS, NRD, RFID/B— CODE, B&D and CCTV (Fig.3)

In this case the found system allows the safety operators to check people/animals/things crossing the entry/exit gateways of the found system, wherein they are scanned by means of the hazard detection subsystem/peripherals supported by some other external systems, to acquire any signals (state/alarm/failures) thereof. The connections between the specific subsystems and the G&D (Management and Diagnostic) subsystem can be through all types of standard interfaces, given the universality of the interfaces of the acquisition of the G&D subsystem. The images of the persons/animals/things crossing each gateway are associated to those of the double High Definition (HD) video cameras of the CCTV subsystem, for a greater clarity of detection and redundancy. These CCTV images are then associated by the found system with the symbolism of the state/alarms/failures coming from the subsystem/peripherals and with the identification data image from the RFID/B-code subsystem. Then this integrated image is sent by the G&D subsystem to the monitor/PDA interfaces of the local and remote operators, for further control thereof. The corresponding optical/acoustic alarms are locally activated, depending on the type of signals detected by the found system. A suitable silencing utility for suppression of the local optical/acoustic alarms associated with these detected data is activable by the local or remote operator, by means of the respective monitor/PDA interfaces of the found system. In addition only for this configuration, a suitable armored cabin is provided for full blocking/unblocking of the person/animal /thing crossing the gateway, upon control by the found system. As given in but not limited to the example shown on Fig.3, the gateway is enclosed within a fully armored cab with a resistance against any deflagration at the choice of the user, in accordance with the international standards applicable to that type of sensible area to be protected. Another advantage of this configuration of the invention is to allow a minimal supervision by qualified personnel, with all the economic benefits that ensue, thanks to full inviolability of the armored cab. Transmission interfaces are also provided by the found system for secure sending of the detected data via dedicated telephone, intranet and internet links. This allows a secure exporting of the detected data to the other external systems, if any, to be used by Security and Safety Bodies and Authorities as well.

Regardless of each of these three configurations, the found system always allow a simultaneous reading of the signals of the states, alarms and failures, coming in an indicative but not limitative purpose from the aforesaid hazard detection subsystems /peripheral , for controlling of each person/animal /thing crossing through the entry/exit gateways of these areas. Each of these three configurations can be provided with a plurality of aforementioned hazard detection subsystems/peripherals with their respective sensors, the latters located in the gateways according to the scheme of installation for each specific configuration of the found system (see each layout in Fig. 1, 2 and 3 respectively) . This allows the found system to reduce the interferences among them to minimum and provide the maximum performance of coverage of the detection of potential threats of diversified hazards, which can occur simultaneously. In addition to the signals received from these hazard detection subsystems/peripherals, suitable analog/digital universal interfaces allow the dialog of the found system with some external systems, for additional security and management of the detected data. The connections to all of these are made through commercial standard switches and modem/routers, which provide the dedicated safe connections as: telephone, intranet and internet dedicated links, depending on the specifications required by the operators of the sensitive areas to be protected. This allows a secure exporting of the detected data to the other external systems, if any, to be used by Security and Safety Bodies and Authorities as well.

A commercial standard mini rack is also provided with the found system, which integrates all the aforementioned interfaces, switches and the modem/routers, so as to have a closed commercial standard compact architecture of the found system, for purposes of its complete industrialization. DESCRIPTION OF THE HARDWARE OF THE FOUND SYSTEM (FIG. 5)

A block diagram of the main hardware of the found system is shown on Fig.5, wherein all of these said subsystems/peripherals and external systems are associated with one or more processing platforms

(5.1) , via the universal analog/digital input/output module (5.3) thereof. The processing platform (5.1) operates with an interoperability methodology (ref . Fig.6), in order to interface all of these said subsystem/peripherals and external systems with the found system symultaneously and provide the necessary safety actions to the local and remote operators of the found system, depending on the type of detected signals thereof.

The processing platform (5.1) is equipped with two redundant master/slave Central Processing Unit (CPU)

(5.2) , some related input /output analog-digital market standards interface resources (5.3), suitable memory modules to: read only, read/write and decoding (PAL/GAL) (5.4), and standard video cards for local (5.5) and remote (5.6) visualization of the integrated images on the respective monitor/PDA of the operators of the found system. The processing platform (5.1) is driven by the software module (5.7) of the management and diagnostics (G&D) subsystem of the found system.

To the processing platform (5.1) are associated the suitable devices for: intrusivity detection (5.8), the optical/acoustic alarms (5.9) and those delimiting for partial (5.10) and full (5.11) blocking/unblocking of person/animal /thing in the entry and exit gateways. Partial or full blocking/unblocking is dependent on the respective configuration choosen as per Fig.2 or Fig.3 of the found system.

The CPU module (5.2) is redunded and connected in master/slave mode, in order to ensure the continuity of performances to the found system, even in case of failures of one of two CPU modules, by showing this degradation failure of the found system on both the local and remote monitor/PDA interfaces of the operators of the sensible area thereof.

In cases of degradation of the master CPU, the slave CPU provides to complete the required processes, by simultaneously alerting the operators for such occasional degradation (System Downgrade), on a suitable diagnostic multicolor spy-window, which checks for: System Go/Green, System Downgrade /Orange, System No-Go/Red. This spy-window is displayed by the dedicated local (5.5) and remote (5.6) video cards on the respective monitor/PDA interfaces of the found system. The interface resources (5.3) and the memories (5.4) of the processing platform (5.1) are even used by the CPU (5.2) for transcoding the signals coming from the hazard detection subsystem/peripherals and from external systems in an innovative way, i.e.: without modifying their softwares and information contents, thus fulfilling all the legal requirements for the reverse engineering thereof by Law.

The plurality of hazard detection subsystems/peripherals, which can be connected to the analog/digital interfaces (5.3) of the processing platform (5.1) of the found system, they can be in an indicative but not limiting manner:

• MBS (Metallic Bulk and/or Sheet) : Subsystem for identification of metallic materials of any shape/ size;

• NRD (Nuclear Radiation Detector) : Subsystem for identification of radioactive materials that are harmful to health; RFID/B-CODE (Radio Frequency ID/Bar-Code) : Subsystem for identification of codes of RFID tags and 1-D and 2-D Bar-Codes;

• B&D (Bombs and Drugs) : Subsystem for identification of non metallic munitions/explosives and both natural and synthetic drugs;

• CCTV (Closed Circuit Tele Video) : Subsystem for detection of HD video images in a closed circuit TV. In addition to the acquisition of the signals from these above hazard detection subsystems/peripherals, the analog/digital interfaces (5.3) of the found system allow its dialog with some external systems, for management and security of the acquired data, through dedicated safe connections via: telephone, intranet and internet links, as requested by the client of the sensible areas to be protected.

For the purposes of ensuring the interoperable control of processing, each input/output of the analog/digital interface (5.3) is controlled by the redundant CPU (5.2) of the found system, for the acquisition of each state, alarm and failure signal from the said hazard detection subsystems/peripherals and external systems, the control of the relative transcoding (Fig. 7) for viewing of the integrated images and the activation, where required, of: optical/acoustic signals (5.9) and the delimitating devices for partial (5.10) and full (5.11) blocking/unblocking of the transit of persons/animals/things in the gateway controlled by the found system, on the basis of the respective configuration thereof.

The integrated images are sent by the redundant CPU (5.2) to the dedicated local (5.5) and remote (5.6) video cards, to be displayed, in indicative but not limitative terms, on suitable commercial HD (High Definition) monitors and/or Personal Digital Assistant devices (PDAs), on the basis of the specific needs of the client for the sensible area to be protected.

These local and remote monitor/PDA interfaces allow the operators of the sensible area to control the access points and the crossing of persons/animals/things within the found system, via the keyboard of the respective interface, by setting at least the following operating modes of the software (5.7) on the G&D subsystem of the found system, to: STANDBY (waiting) (5.7.1), TESTS (Tests and diagnostics) (5.7.2), LEARNING (learning) (5.7.3) and OPERATION (operating) (5.7.4).

DESCRIPTION OF THE SOFTWARE OF THE FOUND SYSTEM

(Fig.5.7)

Introduction

At the software level all the hazard detection subsystems/peripherals have commercial characteristics, while the heart of the found system is constituted by the management and diagnostics (G&D) subsystem, wherein the software module (5.7) is resident. On the basis of the methodology of interoperability (Fig. 6) embedded in this software module (5.7), the found system activates the sequence of sampling of the above signals from the hazard detection subsystems/peripherals and from the external systems interfaced with the found system, once the presence of persons/animals/things it has detected by the double intrusivity sensors (5.8), which are located in the access points of the gateway of the found system.

These signals are acquired with the embedded methodology of interoperability (6), without any changing in the respective software and the information contents of these received signals. Thence the found system performs the recognization and the association of these signals with its graphic symbols, which are corresponding to: the type of signal (i.e. from which subsystem/peripheral or external system is received) , their received status (state, alarm, failure) and the physical location of the detecting sensors of the subsystem/peripheral or external system, by means of the transcoding methodology (Fig. 7) . This latter methodology generates images incorporating: graphic symbols corresponding to the type (metallic, bombs, etc.) and status (state, alarms, failures) of the signals, as well as location of the detecting sensors thereof, to be shown on a cross section of the virtual pictorial view of the gateway.

Thence these images are associated by the interoperability methodology (Fig.6) with the images of the identification data from the RFID/B-CODE subsystem and the real-time HD video images detected by the CCTV subsystem. Both of these latter subsystems are part of the found system.

The recognization of these above signals by the interoperability methodology (Fig.6), enables the software (5.7) to convey the said three stages composed images toward the local (5.5) and remote (5.6) video cards dedicated to the monitor/PDA interfaces of the found system, and toward the external systems of: supervision, safety and management of the information/sensitive data gathered by the found system.

Moreover, by means of the methodology of interoperability (6) embedded in the software (5.7), they are generated: the activations of the corresponding optical/acoustic signals (5.9) for confirmation of any emergency or correct transit, the activations of the commands to block/unblock the protection delimiters of transit, such as armored doors (5.10) and/or armoured cab (5.11), of the person/animal /thing in transit within the gateway controlled by the found system, depending on the specific configuration of Fig.2 or Fig.3 thereof. DESCRIPTION OF THE OPERATING MODES OF THE SOFTWARE

(Fig.5.7)

The software (Fig. 5.7) of the G&D subsystem has at least the following operating modes: Standby (waiting) (5.7.1), Tests (tests and diagnostics) (5.7.2), Learning (learning) (5.7.3) and Operation (operating) (5.7.4) . For indicative but not limitative purposes, the minimal functionality for each of these operating modes of the software (5.7) of the G&D subsystem are detailed below.

A. Stand-by mode (Fi.5.7, block 5.7.1)

In this case, after having carried out all the checks for startup and automatic diagnostic according to the boot-strap factory scheme of the processing platform (5.1) of the found system, the software (5.7.1) of the G&D subsystem is set to the "Steady" (5.7.1.1) routine, to allow the found system to ensure the minimal consumption of all the resources and the cyclic check of the correct vitality thereof. This energy saving allows the found system to extend the duration of the batteries for the memories of the CPU and holding the loading of the back-up power supply for emergency thereof. When in the "Steady" routine, any requests for checking of the vitality of all the subsystems /devices and interfaces of external resources are addressed cyclically by the CPU (5.2) to the "Cyclic Diagnostic" routine (5.7.2.1), which sets periodically the found system to "Test" mode (5.7.2) . The outcomes of these cyclic tests are addressed by the CPU (5.2) to the local (5.5) and remote (5.6) video cards of the interfaces monitor/PDA, to be displayed on suitable spy-windows for diagnostics monitoring of the status of the found system by the respective operators. In the event of intrusion of a person/animal/thing into the gateway, the software (5.7) activates the "Awakening" routine (5.7.1.2) by the dual proximity sensors (5.8) of the found system. These sensors are duplicated for reliability reasons, so that they can provide a pair of signals handled in parallel by the CPU (5.2), via the interfaces (5.3). The awakening routine provides interrupts at very high priority for each CPU (5.2), for switching the software (5.7) automatically in the "Operation" mode (5.7.4) . When in operation mode, the software (5.7) activates all the channels of the interfaces (5.3), to acquire all the possible signals from the on-line subsystems/peripherals and external systems connected with the found system.

B. TEST mode (Fig.5.7, block 5.7.2)

In this case the software (5.7.2) has a diagnostic capability, which can be diversified depending on the needs of the found system. In fact, by means of the "Cyclic Diagnostic" utility routine (5.7.2.1) the operator can access to the cyclic diagnostic of the found system, wherein a change can be set to Fast /Normal/Slow Rate cycles of diagnostic thereof. This changing is useful when the found system is in the low transit periods of persons/animals/things, or in case of maintenance of the system, or in case of failure of one of the two CPUs (5.2) thereof, which set automatically the found system to operate with the remaining one in downgrade mode. When in downgrade mode the found system accomplishes all the processes, until restoration of the new CPU. Other diagnostic utility routines can be activated in "Test" mode (5.7.2), such as: the "Selective Diagnostic" (5.7.2.2) . Such a selective diagnostic routine allows the found system a step-by-step acquisition of all states/alarms/failures (status of signals) and related communication protocols (type of signals), i.e.: [(A+B)*] logic data, from the online hazard detection subsystems/peripherals and the on-line external systems connected with the found system through the A/D interfaces (5.3) thereof. This utility permits a cross check to the operator or the assistance personnel upon validity of the diagnostic data. This cross check is displayed on both the separated monitor of the subsystem/peripheral or that of the external system, and the local monitor of the found system. These two images permit the assistance personnel to verify the correct correspondence of the signal shown on the diplay of the subsystem/peripheral and external system with the signal received by the found system, to be associated with the correct graphic sysmbol during configuration thereof. Such "Selective Diagnostic" utility routine (5.7.2.2) can be selected either by the operators of the found system or retrieved by the assistance personnel during configuration thereof. During the latter configuration, these diagnostic checks allow the assistance personnel a step-by-step viewing of the following types of information, gathered from each specific hazard detection subsystem/peripheral and external system, i.e.: the diagnosed state/alarm/failure function (A) and the relevant communication protocol (B) for each specific signal detected by the diagnostic software of the found system. The results of these diagnostic information are automatically stored by the software (5.7.2) in a diagnostic memory location (Diagnostic Memory 5.7.2.3) of the memory module (5.4) of the found system. This diagnostic memory (Diagnostic Memory 5.7.2.3) can be over-written after a new selective diagnostic is commanded by the assistance personnel of the found system or the operators thereof. Therefore an external Event Data Recorder (EDR) can optionally be provided with the found system, to register all the events/data during any operation thereof. This allows a continuous checking of the correct operation of the subsystems/peripherals and external systems to the found system, useful for preset warranty periods, or for legal purposes as well. In the latter case, the type of external chronological recorder of events (EDR) to be interfaced with the found system, it can be of a juridical nature (Juridical Data Recorder - JDR) . The diagnostic memory (5.7.2.3) can even be exploited during the configuration of the found system, by selecting the "Learning" menu (5.7.3) to get an assisted semi-automatic step-by-step encoding of these incoming data into the corresponding meta- information (5.7.3.3) by the assistance personnel. An "Update" utility routine (5.7.2.4) is also available in the "TEST" menu (5.7.2) of the software (5.7), to update this software from remote factory directly, according to a procedure of safe download. This procedure is based on a "double security key" access to the dedicated transmission links, operating simultaneously from the side of the client of the found system and the side of the assistance personnel thereof. This permits the simultaneous direct remote control to the factory and client of the correct transaction of the updating data packets from remote, for the secure download of all the data by the found system. This preserves the inviolability of the software (5.7) by any illicit attempts of illegal copies, attempted from portable drivers (pen-drives, DVD, etc.) and illegal intrusions as well.

C. Learning Mode (Fig. 5.7, block 5.7.3)

In this case the software (5.7.3) of the G&D subsystem allows the assistance personnel to set two possible process routines of "Coding" utility (5.7.3.1), under the full control of the found system. These encoding process routines are: the "Normal Coding" and the "Improved Coding". During the configuration of the found system by the assistance personnel, the selection of the "Normal Coding" routine enables a semi-automatic step-by- step retrieval of the signals (A*) and the protocols of communication (B*) from the aforementioned diagnostic memory support (5.7.2.3), and their association with the addresses (C*) of graphic symbols (5.7.3.2), depending on the status (state, alarm, failure) of the received signal. These graphic symbols are resident in the respective memory location (5.4) of the found system and updated by the factory personnel of the found system depending on the configuration choosen by the client. This association permits the found system to generate a meta-information (A+B+C) * (5.7.3.3) for every incoming signal. The process of "Improved Coding" allows the semi-automatic step-by-step acquisition of "sampled signals" (A#) and related communication protocols (B#), stimulated directly by the assistance personnel of the found system upon the various sensors of the on-line hazard detection subsystems/peripherals and external systems. These stimulated signals are associated to the addresses (C#) of the corresponding graphic symbols (5.7.3.2), to generate the additional meta-information (A+B+C) # (5.7.3.3) . These additional stimulations are essential when the communication protocol of the subsystems/peripherals and external systems is not completely known or fully accessible/compatible to the found system. In this case the encoded signals can be misleaded from the subsystems/peripherals or external systems, with possible consequences for safety. In both cases, the processes of "Normal Coding" and "Improved Coding" determine all the meta-information (A+B+C) (5.7.3.3), which are temporarily stored in a suitable memory location (5.4) by the software (5.7) when in the "Learning" mode (5.7.2) . Thence these meta-information are finally stored by the assisteance personnel by means of a "Confirmation List" utility routine (5.7.3.4) of the software (5.7), when in the "Learning" mode (5.7.2) . This routine (5.7.3.4) is retrieved by the assistance personnel, so that each meta-information is checked before its indexing with appropriate markers, so that the complete list of meta- information is acquired at all. This permits each meta-information, generated with the process of "normal coding" or "improved coding", to be confirmed or less, by setting the appropriate marker on the list by the assistance personnel, for the definitive saving in the resident memory [Meta- Information Memory - (A+B+C)*/#] (5.7.3.5), during the configuration of the found system.

In general, the usefulness of "Coding" (5.7.3.1) implements the off-line semi-automatic step-by-step process of encoding (5.7.3.1) of the methodology of transcoding (Fig. 7) . During the configuration of the found system the off-line process of encoding (5.7.3.1) allows the assistance personnel to associate step-by-step: the functions (A*/#) and their communication protocols (B*/#) of each state/alarm/failure signal of the subsystem/device and external system, retrieved from the diagnostic memory location (5.7.2.3), with the addresses (C*/#) of the specific graphic symbols (5.7.3.2), which are resident in the read-only memory locations (5.4) of the found system. This association permits the found system to generate the said corresponding meta- information [(A+B+C)*/#] (5.7.3.3). Given the wide versatility of application of the found system, the graphical symbols (5.7.3.2) are pre-stored and updated in this memory by the factory personnel of the found system. These graphic symbols can be retrieved by the assistance personnel upon installation of the found system, depending on the configuration of the gateway required by the client for that sensible area to be protected. With this process, every state, alarm and failure signal received by the software (5.7) of the found system it is encoded as meta-information [(A+B+C)*/#] (5.7.3.3) . By means of the said "Confirmation List" utility routine (5.7.3.4), the assistance personnel provides the saving of the confirmed (marked) metainformation within the specified memory location of the Meta-information Memory (5.7.3.5), dedicated for each encoded signal of the subsystem/peripheral or external system.

This process of "Coding" is repeated by the assistance personnel for every type of subsystem/peripheral and external system interfaced with the found system during the configuration thereof, as long as all types of state, alarm and failure signals for each of them are acquired and the meta-information corresponding (5.7.3.3) are saved in the appropriate memory locations (5.7.3.5) of the found system.

At any time the assistance personnel of the found system can retrieve the utility routines of "Coding" (5.7.3.1), to reconfigure the acquisitions of the signals from the specific subsystem/device or external system, on the basis of the updates implemented by the respective manufacturer thereof, or in cases of evidences of inconsistencies of viewing by the found system.

This allows the found system a high performance of adaptation as per a symbiotic approach, strongly required in the interfacing thereof with new or updated subsystems/peripherals and external systems. D. OPERATION MODE (Fig. 5.7, block 5.7.4)

In this case, as soon a person/animal/thing crosses the entrance in entry or exit the gateway of the found system and this one is set to STAND-BY mode (5.7.1), the software (5.7) of the G&D subsystem detects this intrusion by means of proximity sensors (5.8), which immediately activate the routine of "Awakening" (5.7.1.2) . This awakening routine can even be set at any detection of presence of person/animal /thing when in the Operation mode. Anyway, this routine generates very high priority interrupts to the redundant CPU (5.2), via the interface (5.3) . Thence the CPU (5.2) activates all the resources of the computing platform (5.1), to set the analog/digital interfaces (5.3) of the found system to "ready" to acquire the significant signals from the hazard detection subsystems/peripherals and from external systems as well. The CPU (5.2) acquires the said analog/digital input signals (A+B) by the embedded automatic routine of "decoding" (5.7.4.1), which are coming from the on-line subsystems/peripherals and external systems through the interface (5.3), and compares them with the meta-information [(A+B+C)*/#] resident in the highspeed dynamic memory location (5.7.3.5) . These meta- information were previously stored in the "Learning" mode (5.7.3) during the configuration of the found system. The informative response [ (A+B+C) - (A+B) =C] of each specific detected signal (C) is managed by the CPU (5.2), which addresses: a) the corresponding graphical symbologies (5.7.3.2) with the related zonal localization of the alarms within the cross section of the virtual pictorial image of the gateway, depending on the type of detected signal; b) the sending of this integrated image toward the video cards (5.5) and (5.6); c) the activations of the corresponding resources and devices, i.e.: optical/acoustic alarms (5.9), delimiting protections for partial (5.10) and full (5.11) blocking/unblocking by the processing platform

(5.1) ; d) the interface (5.3) with some external systems. The external systems are indicatively but not limitative those for additional external processing of the identification information and/or management of the data acquired by the found system. All of such graphic symbols are addressed by the CPU

(5.2) in the local (5.5) and remote (5.6) video cards, together with the images of the identification card coming from the RFID/B-Code subsystem and the images of the HD (High Definition) real-time video cameras of the CCTV subsystem, for each person/animal /thing crossing in the access point of the gateway of the found system. Hence the video cards feed the video signals of this three stages composed image as per the example in Fig.4, to the local and remote monitor/PDA interfaces of the operators of the found system, according to the configuration thereof.

This process of decoding is automatically executed by the "decoding" routine (5.7.4.1), in compliance with the methodology of transcoding (Fig.7) embedded in the software (5.7) of the GD subsystem of the found system.

When in the Operation mode, a "Silent" utility routine (5.7.4.2) can also be activated by the local or remote operators of the found system, with two possible options of setting: on demand (On-request silent) or permanent (Permanent Silent) silencing of the local optical/acoustic devices (5.9). This is helpful in case of detection of one or more threats by the found system, jointed with the need for the operators to give time enough to face as desired with these threats.

As it is visible in Fig. 5.7, Sheet 2/2, in order to avoid false alarms the input control cycle of the information acquired from the CPU is parallelized for the master and slave CPUs (5.2) and it is repeated at high speed by them at least five (5) times, before the final voting and the definitive activation by the CPU (5.2) of: the local (5.5) and remote (5.6) video cards for diplaying of the three stages composed image on the respective monitor/PDA interfaces of the operators; and the interfaces (5.3) of the connected external systems, such as: those for identity check (External Identification Check) and/or management of sensitive data (External Data Management) of person/animal/thing collected by the found system. In case of need of an optional deeper identity check of the person/animal/thing approaching the gateway of the found system, it is possible to set an "Identity Check" (5.7.4.3) utility routine in the "Operation" menu of the found system, with two possible options for the local and remote operators: either "Permament Id. Check" or "On-Request Id. Check", which both activate the process (External Identification Check) for the external extension of the verifications of the identity through the A/D interfaces (5.3) of the found system. This ensures the checking of the correspondence of the identity data gathered by the found system with those resident in the external identification systems, to assess the actual identity of the person/animal/thing approaching the found system.

As per an indicative but not limitative example, the found system can be interfaced with the compatible: passport and/or identity card checking, fingerprint and/or retina reading external systems, in cases of requests for higher safety levels by the operators of the sensitive area to be protected.

Also the data gatehered by the found system can be interfaced with the compatible external data management systems, by setting the "Export Data Facility" routine (5.7.4.4) in the "Operation" menu, for activating of the "External Data Management" process, for treatment of the sensitive data for commercial purposes, as in the case of populating commercial marketing Data Bases, targeted to increase customer loyalty as example.

Description of the Software Interoperability Methodology (Fig.6)

This interoperability methodology permits the software (5.7) to perform the simultaneous management of the hazard detection subsystems/peripherals and the supervision of the security external systems interfaced with the found system, to activate the defense devices of the found system and the further processing of the gathered data thereof by the external supervision, safety and mangement systems. These major functions are operated by the software (5.7) of the found system, by only picking-up the respective video information from all of them, without any changes in both the related software and the informative content of the signals thereof. In fact, through this methodology all the signals coming from the said subsystems/peripherals and external systems, as their states, alarms and failures, and the related communication protocols thereof, all are treated by the found system in full respect of the requirements of the manufacturers. Such a treatment of these signals is made by the found system without creating any interferences between them, through a filtering of these information according to a process of coding of the software (5.7), which is embedded in the innovative software transcoding methodology (Fig.7) detailed hereafter. By means of this transcoding methodology a priority index of sequence of acquisition is assigned by the assistance personnel to the found system during configuration thereof. This priority index is assigned to each signal on the basis of the specific location of the sensors of each hazard detection subsystem/device, installed in each gateway of the found system. By means of this feature, when the found system is set to "Operation" mode (5.7.4) in the interoperability methodology process, the software (5.7) of the G&D subsystem activates: 1) the devices for detecting of intrusivity (5.8); 2) the optical/acoustic alarm devices (5.9); 3) the devices for delimiting of the transit, as: partial blocking by armored doors (5.10), or complete blocking of the transit in the armored cab (5.11), depending on the configuration of the found system, as per Fig.2 or Fig.3; 4) the local (5.5) and remote (5.6) video boards for viewing of the three stages composed image (graphic symbols on pictorial view with the grided zonal alarms, identification data and HD CCTV images) of crossing persons/animals/things within the gateway, on the monitor/PDA interfaces of the respective operators; 5) the interfaces (5.3) with the external systems for performing of optional monitoring, identification and management of the additional control and isolating actions for the diversified threats detected by the found system.

This three stages integrated image can also be addressed by the software (5.7) of the G&D subsystem to additional external systems, through a high speed communication interface (5.3), for deeper monitoring, security, identification and Data Base population of the collected data. This also permits a further verification of identity and/or activations of higher levels of emergency, also in case of occurring of coercive actions, depending on the various levels of gravity provided by the client of the sensible area to be protected, or for commercial uses.

The optical/acoustic devices (5.9) are activated or less in the gateway controlled by the found system, according top the command of evidence or "silent" set by the local or remote operator in the suitable routines (on-request or permanent) available in the Operation mode of the software (5.7), in order to give them time enough for undertaking of the necessary actions of preserving the integrity of the sensible area being controlled.

Where failure conditions occur in the said subsystems/peripherals or external system, or failures occur in the signals thereof during the transit of persons, animals and/or things, the respective alarm of "UNDETECTION" is automatically decoded by the software (5.7), through the embedded transcoding methodology (Fig.7), when the found system is set to "Operation" mode (5.7.4) . This undetected signal is automatically processed by the preset transit sequence of the received signals, which is embedded in the transcoding methodology (Fig.7) of the software (5.7) . When a person/animal /thing is crossing the gateway controlled by the found system and a signal is loss in this transit sequence, an "UNDETECTION" is automatically decoded by the software (5.7) and sent by the CPU (5.2) to the local and remote dedicated video cards, to be displayed on the respective spy- windows of the monitor/PDA interfaces of the operators. This permits the found system to repeat the whole or partial checking of the person/animal /thing in transit within the gateway, depending on the specific type of failure, by resetting of: the registered CCTV image, and/or the virtual pictorial view of the gateway and the symbols generated by the CPU (5.2), and/or the RFID/B-Code identification image accordingly. This allows the found system to overcome any possible conditions of failures and false-occasional alarms of each of the related subsystems/peripherals, during transit of the person/animal /thing therein. In addition, the updating of the software (5.7) of the found system can be done from remote by means of an "Update" utility in the "TEST" mode (5.7.2). This utility routine initiates a procedure of updating based on a "dual key access protocol", between the client and the factory personnel of the found system, to implement a secure transaction via either telephone, intranet or internet links, wherein both of them exchange the secret proprietary codes of identification data of the purchased system. When the transaction of downloading of a new version of the software of the found system is completed from remote, the factory personnel releases a new virtual key to the client, for the new access of the found system, as new. This prevent the found system against fraudulent actions of copy from portable drivers or attempts of forbidden access thereof from the outside.

Description of Software Transcoding Methodology (Fig.7)

The methodology of transcoding (Fig.7) is part of the software (5.7), wherein a double process of coding and decoding is undertaken by the GD subsystem as follows. In the off-line encoding (Coding, Fig.5.7, block 5.7.3.1), a semi-automatic assisted step-by-step process is undertaken by the assistance personnel of the found system during the configuration thereof, for coding of all the significant signals from subsystems/peripherals and external systems into suitable metainformation when the found system is set to Learning mode. In the online decoding (Decoding, Fig.5.7, block 5.7.4.1), each received signal is automatically associated to the related metainformation, which automatically address the corresponding graphic symbol and actions to be undertaken by the found system during the Operation mode thereof.

These different off-line/on-line processes permit the software (5.7) to recognize the signals as: states, alarms and failures from the said subsystems/peripherals and external systems, in order to select the corresponding graphic symbols and undertake the related activation of the related protections by the found system. These symbologies are pre-stored in the suitable memory locations of the memory module (5.4) by the factory personnel of the found system before the delivery. When selected by the abovesaid recognization, such symbologies are set in the corresponding alerting zone of the pictorial view of the virtual cross section of the gateway controlled by the found system .

Thence this image composed by the symbols and virtual pictorial view of the gateway is integrated with those coming from the RFID/B-CODE and the CCTV subsystems, both of the latters are part of the found system, in the local (5.5) and remote (5.6) dedicated video cards, to be shown on the respective monitor/PDA interfaces of the operators, as per the example on Fig.4. This permits a full control of each person/animal /thing crossing within the gateway controlled by the found system. The two embedded processes constituting the transcoding methodology (Fig.7) are given as follows.

A. The Process of Coding (Fig.5.7, block 5.7.3.1)

The encoding process is performed during the configuration of the found system by the technical assistance personnel thereof, by activating the "Coding" routine when the software (5.7) of the G&D subsystem is set to "Learning" mode (5.7.3) . This starts an off-line step-by-step acquisition of the significant signals from the subsystems/peripherals and external systems interfaced with the found system. This process allows to generate the meta- information (5.7.3.3) of addressing of the associated graphic symbols (5.7.3.2), useful in the on-line decoding process when in the "Operation" mode (5.7.4) . These graphic symbols are pre-stored in the memory locations (5.4) by the factory personnel of the found system.

In particular, the off-line process of coding (Fig. 5.7.3.1) allows the found system to generate the Data Base of the meta-information (5.7.3.3), when the found system is st to "Learning" mode (5.7.3) . In this case the signals received from the subsystems/peripherals and external systems are associated with the addresses of the graphical symbols (5.7.3.2), to be stored as below.

These meta-information are stored with a special utility routines (5.7.3.4) in the memory of the meta-information (5.7.3.5), with dedicated locations depending on the subsystem/peripheral or external system being configured and each type of signal to be saved, i.e.: state, alarm and failure thereof. Furthermore by setting of the "Normal Coding" routine in the Learning mode (5.7.3), the process of software encoding (5.7.3.1) of the G&D subsystem allows the found system to acquire the diagnostic results previously stored in the "Diagnostic Memory" (5.7.2.2) during the Test mode (5.7.2) . Whereas, by setting the "Improved Coding" routine in the Learning mode (5.7.3), the process of software encoding (5.7.3.1) of the G&D subsystem allows the found system to acquire as necessary/possible the results of the "sampled stimuli" caused by the assistance personnel of the found system during the configuration, in order to complete the association of the signals with the corresponding graphic symbols (5.7.3.2) resident in the read-only memories (5.4) thereof and generating the requested additional "meta-information" (5.7.3.3) for completion of the configuration of the found system. All of these meta-information are saved in the meta- information memory locations (5.7.3.5) through the "Confirmation List" (5.7.3.4) routine, which is activated by the assistance personnel during the configuration of the found system, when the G&D subsystem is set to the "Learning" mode (5.7.3) . The meta-information (5.7.3.5) is stored in the read/write memory locations of the memory module (5.4), which are dedicated for each hazard detection subsystem/peripheral and external system to be controlled by the found system. Given the presence of multiple subsystems/peripherals and therefore signals to be stored, with possibility of interference thereof, an index of transit sequence of priority for receiving of the signals it is assigned by assistance personnel of the found system during the configuration thereof, according to the physical location of the sensors of the subsystems/peripherals resident in each specific configuration of the gateway.

This avoids that asynchronous or delayed signals by the said subsystems/peripherals and external systems, may interfere in the mode of "Learning" (5.7.3) with the encoding process of meta- information in progress, in particular with the allocation of the memory locations (5.7.3.5) wherein the encoded meta-information dedicated for each subsystem/device shall be stored.

The process of encoding (5.7.3.1) also allows the assistance personnel to assess with a step-by-step cross-check the correct association of signals from subsystems/peripherals and external systems with the meta-information generated, by displaying the graphic symbols corresponding to each simulation on both the pictorial image sample shown on the interface of local display (5.5), and on the dedicated visual interface of the subsystem/peripheral and external system interfaced with the found system.

After completion of the encoding of the signals of each concerned subsystem/peripheral and external system, the encoding process (Coding) in the menu "Learning" allows the overall saving of the generated meta-information by means of a "Configuration List" (5.7.3.4) utility routine. The latter routine is activated by the assistance personnel of the found system during configuration, which shows a list of configured signals for each single confirmation/exclusion by manually marking or less the acquired data, for a last recheck before their final storage in the location of the dedicated memory (5.7.3.5) of the found system. This coding process (5.7.3.1) is completely set under control by the software (5.7), when the "Learning" mode (5.7.3) of the G&D subsystem is selected by the assistance personnel of the found system.

B. The Decoding Process (Fig.5.7, block 5.7.4.1)

This process of online decoding is done by the software (5.7) in the "Operation" mode (5.7.4) of the G&D subsystem. The process allows the found system to automatically recognize the signals (state/alarm/failure) received from the subsystems/peripherals and external systems, when on-line and interfaced with the found system, by comparing them with the meta-information (5.7.3.3) previously stored (5.7.3.5) in the off-line encoding (Fig.5.7, block 5.7.3.1) process. This permits a real-time addressing of the corresponding graphic symbols (5.7.3.2) within the zones of detections of the possible alarms, which are located in the virtual cross sectional pictorial image of the gateway controlled by the found system. This integrated image (symbols and pictorial view of the gateway), is then fed by the software (5.7) in the dedicated local (5.5) and remote (5.6) video cards, to be displayed on the respective monitor/PDA interfaces of the operators of the found system. This pictorial image is integrated with those of: the identification card of identity data detected by the RFID/B-Code subsystem and the HD photographic image from the HD video cameras of CCTV subsystem, both of these subsystems are part of the found system .

Morevover, the decoding also allows the software (5.7) of the subsystem G&D to activate contiguously all the optical/acoustic devices (5.9) and the protection delimiters (5.10) and (5.11) of the access to the found system, as well as to activate the interfaces (5.3) toward the external systems for management and security puposes or further processing required by the client of the sensible area to be protected.

The decoding process is performed automatically by the software (5.7) of the G&D subsystem when in "Operation" mode (5.7.4) and it allows the found system to recognize any state, alarm, malfunction of the signals received from each on-line hazard detection subsystem/peripheral and external system, when all of these are interfaced with the found system and set to on-line. This recognization is done by comparison of these signals with the meta- information previously stored (5.7.3.5) by the assistance personnel in the "Learning" mode (5.7.3), during the configuration of the found system.

After done each on-line automatic comparison of the signals received from the subsystems/peripherals and the external systems with the afore mentioned pre- stored meta-information (5.7.3.5), the graphic symbols of type and location of the corresponding threats in the gateway, together with the pictorial image of the virtual cross section thereof, are directed at high speed by the CPU (5.2) in the local (5.5) and remote (5.6) video cards, wherein the HD photo images from the CCTV subsystem and the identification data image detected by the RFID/B- Code subsystem are also acquired. All of these images are conveyed from the software (5.7) to the local (5.5) and remote (5.6) video cards dedicated to the related monitor/PDA visual interfaces, for the appropriate actions by their respective operators .

The overlap of the graphic symbols on the virtual pictorial image of the cross section of the gateway controlled by the found system, it takes place according to the scheme of geographical location of the sensors of the hazard detection subsystems/peripherals installed in the gateway of the found system. This scheme also preset the automatic transit sequence routine of the signals received from the subsystems/peripherals and the external systems interfaced with the found system. Any loss of signals from these said on-line subsystems/peripherals and external systems is automatically routed by this transit sequence ruoutine into a high priority interrupt of "UNDETECTION" signaling to the CPU (5.2), along with the advice of the failed subsystem/peripheral and/or the external system. Thence the CPU (5.2) provides the corresponding alarms to be shown on the respective monitor/PDA interfaces of the operators. This alarm also permits these operators to reset the related image and repeat the detection for that specific fault subsystem/peripheral and/or external system. If the fail is still present, the operator can proceed to diversify the transit of the person/animal /thing in the other gateway, for completion of the secure transit thereof.

The identification data of people/animals/things are detected by the RFID/B-Code subsystem of the found system, by scanning of the respective identity documents (bar-code 1-D, 2-D, RFID/NFC tags, etc.) of persons/animals/things, which is done by a scanner located before the entrance in the gateway of the found system. These identification data are sent to the local (5.5) and remote (5.6) video cards, for integration with the above mentioned images of the CCTV and the virtual cross section with graphic symbols, so as to complete the decoding process and the overall scanning of that person/animal /thing in transit within the gateway, as requested by the security requirements of the client of the area to be protected.

The decoding of the signals from the subsystems/peripherals and external systems, also allows the software (5.7) of the G&D subsystem to activate all of the optical/acoustic devices (5.9) and the protection delimiters (5.10) or (5.11) in the gateway controlled by the found system, as well as to activate the interfaces (5.3) for export of the gathered data toward external systems for management and security and/or for further processing required by the client of the sensible area to be protected. This embedded decoding process (5.7.4.1) is completely controlled by the software (5.7), when the "Operation" mode (5.7.4) of the G&D subsystem is selected by the operator of the found system.

TECHNICAL CHARACTERISTICS OF THE FOUND SYSTEM

Technical Compatibility

In terms of technical compatibility, the found system ensures the interoperability among all the hazard detection subsystems/peripherals and external systems with the found system, by means of the methodology of interoperability (Fig. 6) thereof. This alllows the found system to provide the multifunctional sensing capability for each gateway of security at the various levels of protections against the threat, depending on the configuration of the found system. By means of this methodology of interoperability (Fig. 6), the found system operates mainly in "reverse engineering", in respect of the hazards detection subsystems/peripherals and the external systems interfaced with thereof. In this case the found system detects all the significant signals associated with the respective communication protocols of the said subsystems/peripherals and external systems, without altering the respective informative content and related software thereof. The non-intrusiveness of hardware and software among the various hazard detection subsystems/peripherals it is implemented by means of the specified layout and physical arrangement of the sensors thereof in the gateway of the found system. All of these are arranged in each gateway, depending on the type of configuration selected by the client of the sensible area to be protected. Furthermore, the signals coming from such subsystems/peripherals are filtered with the methodology of transcoding (Fig.7), both to avoid false alarms and to decode these signals in a transparent manner than the subsystems/peripherals and external systems interfaced with the found system. The technical compatibility between the signals from these hazard detection subsystems /peripheral and external systems, with the corresponding symbolism of representation of these signals, it is guaranteed by the methodology of transcoding (Fig. 7) thereof.

Operational capacity, modularity and expandability

In terms of functionality, modularity and expandability, the software of the found system for its nature can have all the features mentioned herein as native, or it can associate them evolutionally, in congiunction with the progressive needs of the client of the sensible area to be protected. Also these functions of the found system may be implemented ex-novo with new subsystems/peripherals acquired by the client of the sensible area to be protected, and/or integrated with the existing hazard detection subsystems/peripherals, security management and control external systems of such clients, as per a symbiotic approach of integration, assured by the found system. This allows the client to achieve anyway the minimum required security target for that sensible area to be protected. The main functional capabilities guaranteed by the software of the found system, they are mentioned but not limited to the following subsystems/peripherals :

1. Detection of the hazardous metal objects (metal sidearms and firing weapons), or propedeutic to fraudulent behavior toward commercial sites (e.g. shielding metal sheets or similars) (MBS subsystem); 2. Detection of materials or foods having ionizing radiation harmful to the health of persons (NRD subsystem) ;

3. Detection of documents with 1-D and 2-D bar codes reading and RFID tags, for fraudulent counterfeits of documents or shoplifting of objects within the monitored sensible area (RFID/B-Code subsystem) ;

4. Detection of explosives in not metal containers as well as natural and artificial drugs (B&D subsystem) ;

5. Detection of HD (High Definition) images by video cameras in the CCTV (Closed Circuit TV) subsystem. All the alarm and/or emergency conditions are categorized by the software (5.7) of the found system, on the basis of a scale of gravity potentially relevant for the safety of persons, animals and/or things. The software (5.7) of the found system can associate the type of detected threat and its location within the virtual cross- sectional image of the controlled gateway, together with the images of the person/animal/thing recorded by the CCTV subsystem and that of the identification card of the identity data scanned by the RFID/B-Code subsystem, with the outcome of a three stages composed image as given but not limited in the example shown on Fig.4.

In terms of the ability of recognition, the software (5.7) of the found system provides not only the localization of the threats as above, but also diversified performances of identification thereof, depending on by the safety targets of the client of the area to be protected from one hand and the type of subject engaging the gateway from the other hand. This is useful as for example in the case of handicapped people, elderly people, or people with walking difficulties and prosthesis, that are sometimes forced to the assistance of accompanying personnel, or by other occasional companions, to cross the controlled gateway and then with very high potential of false alarms detected by thereof.

In terms of quality of the identification of the subject crossing the gateway, which can be useful for all public (airports, post office, banks, hospitals, churches, shopping centers, etc.) and private (companies, barracks, etc.) areas to be protected against threats, the found system permits an in depth checking of the identification of the person/animal /thing crossing the gateway, by sending both the images gathered by the CCTV subsystems and identity data scanned by the RFID/B-Code subsystem, to external security systems for further processing by thereof. This external in-depth checking of the identity of the subject is done by the found system through an "Identity Check" utility, which can be activated by the operator in the "Operation" mode (5.7.4) of the found system. This permits the found system to convey the sensible data thereof to the related external systems, as for example: retina and/or fingerprint readers, passport checks, identity documents checks, etc., via protected telephone, intranet and internet links, for a thorough check of the correct identity of the person/animal /thing in transit in the gateway. Also the found system can get an immediate feedback from all of these external systems, when the latter are equipped with a prompt reply capability of comparison of the data scanned from the found system and those stored in the memory of that external identification system.

In terms of expandability, the software (5.7) of the found system can optionally allow to store these sensible data in an external Data Base. This Data Base can be with massive data storage capability, as that for registering of the jointed scanned codes of goods or services and the payments thereof by the related smart-cards or credit/debit cards of the users in general. This permits the clients of these sensible areas to profile the purchases by these users off-line, in order to create dedicated conditions of purchase and discount for them. This permits the found system to implement a loyalty business model expecially tailored for that client, for enhancing the commercial business thereof.

Versatility of use

in terms of versatility of use, the found system can be used to protect the access of areas of public (banks, offices, Postal, airports, etc.), private (industries, etc.) and confidential nature (barracks, areas of customs control, police stations, etc.), as well as commercial (shopping centers, retail outlets, etc.) . This can be done by integrating any sizes and types of subsystem/peripheral and external security system, for a single multifunctional management of all the threats detected by thereof and the setting of the prompt actions of protections against any attempts of illicit actions in the entry and exit gateways of the found system by malicious persons/animals/things .

This is because the software (5.7) can detect not only the hazards detected by the said subsystems/peripherals and external systems interfaced with the found system, but also possible counterfeits and anomalies of identification in the existing primary security systems, through the scanning of the suitable RFID/NSC tags and 1-D and 2-D bar codes of the products/goods by the RFID/B- Code subsystem. This scanning permits the found system to intervene in association with the primary security system of the operator, in the case of attempts to more sophisticated shopliftings, as for example: reuse of tags previously extinguished by the primary system of the operator but fraudulently applied on new products, control of metal sheets hidden in entry and exit gateways of the area, etc. Ability to Industrialization

Industrialization of the found system can be made in dependence of the characteristics and peculiarities of integration of the said detailed hardware and software of the found system, as well as by the specific configurations thereof, as per Fig.l, or 2 or 3. These configurations allow a full replication of the typical layouts of the entry and exit gateways of each found system, according to the application required by the client of the sensible area to be protected. The details of these characteristics of industrialization are reported in this document, for completion of the practicability of manufacturing for the found system.

The found system thus described allows to drastically reduce the hazards for the sensible areas, facilitating the fast transit of persons/animals/things within them and the reduction of the times of local and remote control by the respective operators, for its applicational versatility .

The found system is highly competitive with respect to current subsystems, thanks to the use of commercial technologies and materials, easily available and known in the market.

The found system thus conceived is susceptible of numerous modifications and variations, all of which are within the scope of the inventive concept. All the details may also be replaced with other technically equivalent elements, without any prejudice or limitation in the validity and application of this invention.

In practice the materials used, as well as the sizes and dimensions of the found system, they may be any according to the requirements of the clients, provided that they are consistent with the purpose of embodiment, identified in the present found system .

Compliance with the requirements of the Law

The lawfulness of the found system is completely defined by the requirements of the laws in force at national, EU and international level for the protection of the existing gateways by security systems. The integration of information coming from the subsystems/peripherals, with single or multiple types of threat detection, does not change the hardware, the informative content and the software of the manufacturers and/or suppliers of the said subsystems/peripherals and complies with the requirements of law for the reverse engineering thereof . Also for the purposes of the protection of the privacy, associations of alarms with the CCTV images of persons/animals/things crossing in the gateway have the characteristic of not being violated by the external entities of threat. Moreover the identity associated with these images of the found system they have a Data Base accessible only with encrypted access keys, also for its remote updating via secure connections, in compliance with the safety standards of data protection, in force at national, EU and international level.

The protection of the marketing data gathered by the software (5.7) of the found system, by associating the purchases with the related smart-card or credit/debit cards, as well as their processing in the Data Base dedicated to each commercial client, it is tailored according to the statutory national, EU and international regulations for the safeguard of the privacy data.