WO2015155847A1 - デジタルロス・アクシデントデフェンスシステム、方法及びプログラム - Google Patents
デジタルロス・アクシデントデフェンスシステム、方法及びプログラム Download PDFInfo
- Publication number
- WO2015155847A1 WO2015155847A1 PCT/JP2014/060254 JP2014060254W WO2015155847A1 WO 2015155847 A1 WO2015155847 A1 WO 2015155847A1 JP 2014060254 W JP2014060254 W JP 2014060254W WO 2015155847 A1 WO2015155847 A1 WO 2015155847A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- person
- suspicious person
- suspicious
- information
- terminal device
- Prior art date
Links
Images
Classifications
-
- G—PHYSICS
- G08—SIGNALLING
- G08B—SIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
- G08B13/00—Burglar, theft or intruder alarms
- G08B13/18—Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength
- G08B13/189—Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength using passive radiation detection systems
- G08B13/194—Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength using passive radiation detection systems using image scanning and comparing systems
- G08B13/196—Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength using passive radiation detection systems using image scanning and comparing systems using television cameras
- G08B13/19654—Details concerning communication with a camera
- G08B13/1966—Wireless systems, other than telephone systems, used to communicate with a camera
-
- E—FIXED CONSTRUCTIONS
- E06—DOORS, WINDOWS, SHUTTERS, OR ROLLER BLINDS IN GENERAL; LADDERS
- E06B—FIXED OR MOVABLE CLOSURES FOR OPENINGS IN BUILDINGS, VEHICLES, FENCES OR LIKE ENCLOSURES IN GENERAL, e.g. DOORS, WINDOWS, BLINDS, GATES
- E06B11/00—Means for allowing passage through fences, barriers or the like, e.g. stiles
- E06B11/02—Gates; Doors
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06V—IMAGE OR VIDEO RECOGNITION OR UNDERSTANDING
- G06V20/00—Scenes; Scene-specific elements
- G06V20/50—Context or environment of the image
- G06V20/52—Surveillance or monitoring of activities, e.g. for recognising suspicious objects
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06V—IMAGE OR VIDEO RECOGNITION OR UNDERSTANDING
- G06V40/00—Recognition of biometric, human-related or animal-related patterns in image or video data
- G06V40/10—Human or animal bodies, e.g. vehicle occupants or pedestrians; Body parts, e.g. hands
- G06V40/16—Human faces, e.g. facial parts, sketches or expressions
- G06V40/172—Classification, e.g. identification
-
- G—PHYSICS
- G08—SIGNALLING
- G08B—SIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
- G08B25/00—Alarm systems in which the location of the alarm condition is signalled to a central station, e.g. fire or police telegraphic systems
- G08B25/005—Alarm destination chosen according to a hierarchy of available destinations, e.g. if hospital does not answer send to police station
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/06—Authentication
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/08—Access security
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W4/00—Services specially adapted for wireless communication networks; Facilities therefor
- H04W4/02—Services making use of location information
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W4/00—Services specially adapted for wireless communication networks; Facilities therefor
- H04W4/02—Services making use of location information
- H04W4/029—Location-based management or tracking services
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W4/00—Services specially adapted for wireless communication networks; Facilities therefor
- H04W4/12—Messaging; Mailboxes; Announcements
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W4/00—Services specially adapted for wireless communication networks; Facilities therefor
- H04W4/80—Services using short range communication, e.g. near-field communication [NFC], radio-frequency identification [RFID] or low energy communication
Definitions
- the present invention relates to a digital loss / accident defense system, method, and program for monitoring images taken by a surveillance camera to prevent unloading in a backyard of a commercial facility or the like.
- the cargo handling area, warehouse, rest room, office / money calculation room in the rear facility is not allowed to enter except for the person in charge.
- the merchandise supply in the commercial facility is performed by unloading the goods in the truck yard, inspecting the goods, temporarily stocking in the unloading yard until the goods are delivered to the warehouse, and the flow in which each person in charge of the goods delivers the goods to the warehouse as needed. It is temporarily placed in the cargo yard until the merchandise manager stores it in the warehouse.
- a method is employed in which a plurality of guards are stationed, but the guards have telephone contact and reception work other than guards, and it is difficult to monitor all of them due to physiological phenomena.
- the outside and the rear facility are opened and closed with a shutter.
- the shutter is opened during that time, and monitoring is not possible, and countermeasures against theft and loss are not sufficient.
- inspection workers, product handling personnel, and security guards are not stationed at the handling yard, and the truck yard and the handling yard face each other and are not always partitioned by walls or shutters. .
- a large amount of merchandise is lost in each cart, which is confused with the delivery company of the business partner, causing a great loss to the company as well as shoplifting.
- surveillance cameras and security guards guard it is not enough.
- Patent Document 1 a monitoring camera is provided at a gate, face information is acquired from a received image, face information stored in a storage device is searched, and a person corresponding to the face information is photographed Describes a shoplifting prevention system that displays a screen showing the position in the store taken.
- Patent Document 2 describes a face authentication application shoplifting detection system that informs store staff by an alarm that an intruder has come to the store through face recognition.
- An object of the present invention is to provide a digital loss / accident defense system, method, and program that can prevent burglary in advance by monitoring the behavior of a suspicious person in real time in a monitoring target area such as a rear facility. is there.
- the digital loss / accident defense system prevents an action by a suspicious person by monitoring a video taken by a surveillance camera installed so as to photograph a surveillance target area that is an unauthorized entry area other than those concerned.
- a position information acquisition unit that acquires position information of a mobile terminal device carried by each of a plurality of employees in the monitoring target area, and a face image that accumulates a face image of an authenticated person
- the result of verification by the storage means, the face authentication verification means for verifying the face image of the person photographed by the monitoring camera and the face image stored in the face image storage means, and the verification result by the face authentication verification means are authenticated.
- the person is determined to be a suspicious person, and the suspicious person is determined based on the position information acquired from the position information acquiring unit. Determining the location of the nearest the mobile terminal device, and a controlling means for transmitting information on the suspicious individual to the portable terminal device.
- the face image storage means further accumulates the suspicious person's face image, and the control means, when the collation result by the face authentication collation means matches the suspicious person's face image, the closest to the suspicious person.
- the control means By sending information about the suspicious person to the mobile terminal device, it is possible to immediately determine the suspicious person in the monitoring target area such as the back facility, and to monitor the suspicious person's behavior in real time to prevent theft etc. in advance can do.
- an RFID reader installed in the monitoring target area and an authentication card authenticated by the RFID reader are provided, and the control unit authenticates the authentication card possessed by a person in the monitoring target area by the RFID reader. If it is not established, it is determined that the person's face cannot be recognized in the monitoring target area such as a rear facility by determining that the person is a suspicious person and transmitting information related to the suspicious person to the portable terminal device closest to the suspicious person. It is possible to determine that the person is a suspicious person, and to monitor the behavior of the suspicious person in real time to prevent theft or the like in advance.
- control means determines whether the person who is authenticated in the monitoring target area is a specific place in the monitoring target area or access in a predetermined time zone, and the authenticated person If the person is not permitted to enter or exit at the specified location or the specified time zone, the person is determined to be a suspicious person. It is possible to monitor the entry / exit of a person who does not have permission during the time period, and to increase the security level of prevention of theft, foreign matter contamination, or information leakage.
- a vehicle stopper device that regulates the movement of the vehicle is provided, and the control unit operates the vehicle stopper device when the vehicle driven by the suspicious person tries to go out of the monitoring target area. Suspicious vehicles trying to escape from the monitored area such as a rear facility can be blocked, and theft and the like can be more strongly prevented.
- the control unit determines the position of the mobile terminal device next to the suspicious person, and stores information on the suspicious person in the mobile terminal device. Even if the employee who carries the portable terminal device located closest to the suspicious person cannot cope due to product outage or physiological reasons, the portable phone located next to the suspicious person Employees carrying terminal devices can respond quickly. An employee may go to a warehouse or go to a toilet and does not always stay in a prescribed position, so there may be a case where the employee cannot be notified. Such a situation can be dealt with.
- control means determines the position of the mobile terminal device next to the suspicious person when a predetermined time has elapsed since the information related to the suspicious person has been transmitted to the mobile terminal device, and the mobile terminal device By transmitting the information regarding the suspicious person to the suspicious person, even if the employee carrying the portable terminal device located closest to the suspicious person is not aware by the noise of the rear facility, the employee is positioned next to the next person. Employees carrying mobile terminal devices can respond quickly. Further, even when the suspicious person moves in the rear facility, it can be dealt with by cooperation of a plurality of employees.
- the information regarding the suspicious person includes information obtained by superimposing the position of the suspicious person and the position of the mobile terminal device that transmitted the information on the monitoring target area, so that the employee who has received the information
- the position of a suspicious person can be quickly recognized on site.
- the employee who has received the information can quickly identify the intruder or the like on the spot by looking at the face.
- the digital loss / accident defense security method of the present invention monitors an image taken by a surveillance camera installed so as to take an image of a monitored area that is an unauthorized entry area other than those concerned, and acts by a suspicious person.
- a digital loss / accident defense method for preventing a position information acquisition step of acquiring position information of portable terminal devices carried by each of a plurality of employees in the monitored area, and accumulating a face image of an authenticated person The face image storage step, the face authentication collation step for collating the face image of the person photographed by the monitoring camera with the face image accumulated in the face image storage step, and the collation result by the face authentication collation step are authenticated.
- the person is determined to be a suspicious person and acquired in the position information acquisition step. Based on the location information, wherein to determine the location of the nearest the mobile terminal device to a suspicious person, and a controlling step of transmitting information on the suspicious individual to the portable terminal device.
- the present invention is a digital loss / monitoring device that prevents an action by a suspicious person by monitoring a video taken by a surveillance camera installed so as to photograph a surveillance target area that is an unauthorized entry area other than those concerned.
- Accident defense system wherein the position information acquisition means for acquiring the position information of the mobile terminal device carried by each of the employees in the monitored area, and the face image storage means for storing the face image of the authenticated person
- a face authentication collating unit that collates a face image of a person photographed by the monitoring camera with a face image stored in the face image storage unit, and a face of the person whose collation result by the face authentication collating unit is authenticated If the image does not match, the portable terminal device is determined to be a suspicious person and is closest to the suspicious person based on the position information acquired from the position information acquisition unit Position is determined, a program to function as a digital Los accident de fence system comprising a control means for transmitting information on the suspicious individual to the portable terminal device.
- the behavior of a suspicious person can be monitored in real time in a monitoring target area such as a rear facility to prevent theft or the like in advance.
- FIG. 1 is a block diagram showing a configuration of a digital loss / accident defense system according to an embodiment of the present invention.
- the digital loss / accident defense system 1000 includes a plurality of surveillance cameras 11 installed on a ceiling or the like of a monitoring target area, and a rear facility that is an unauthorized entry area other than related persons including a truck yard.
- the digital loss / accident defense system 1000 monitors the video taken by the surveillance camera 11 installed so as to photograph the surveillance target area such as a rear facility that is an unauthorized entry area other than those concerned including the truck yard. It is a system that prevents theft, contamination by foreigners, or information leakage.
- the surveillance camera 11 is an authentication camera that photographs a person's face.
- Surveillance cameras 11 are installed at various locations in a monitoring target area such as a rear facility, which is an unauthorized entry area other than those concerned including a truck yard, and photograph a person's face.
- An image captured by the monitoring camera 11 is output to the monitoring device 100.
- the monitoring camera 11 may shoot a moving image at all times, or may shoot a single still image every certain time (for example, several seconds).
- the RFID reader 20 manages settlement of a product with an RF tag by detecting whether or not there is a response to transmission to an RF tag attached to the product. Note that the RF tag is removed or invalidated from an article that can be properly taken out of the store, for example, by purchase.
- the RFID reader 20 authenticates the authentication card 21 possessed by the employee. The RFID reader 20 captures the position of the employee carrying the authentication card 21 by authenticating the authentication card 21 possessed by the employee.
- the authentication card 21 is an example using an RFID authentication card that performs authentication with the RFID reader 20, but may be an authentication card by any authentication means. Further, the fact that the authentication card 21 has a card shape is merely called for convenience of explanation, and may not have a card shape such as an authentication tag.
- the mobile terminal device 30 is carried by each of a plurality of employees.
- the mobile terminal device 30 is, for example, a smartphone 30a, a tablet 30b, or a notebook computer 30c.
- the mobile terminal device 30 is a mobile phone, a PHS (Personal Handy-Phone System), a PDA (Personal Digital Assistants), or a dedicated terminal.
- the mobile terminal device 30 can be used by each employee at various locations (that is, the current location), and can display images including mail or video from the monitoring device 100 via a telephone line (not shown). It can be received.
- the portable terminal device 30 assumes utilization of the smart phone 30a and the tablet 30b, and each individual can be used in various places (namely, present position).
- One of the portable terminal devices 30 is arranged at a headquarter / head office (not shown).
- the mobile terminal device 30 may be configured to include the GPS 40 that captures the position of the employee.
- the mobile terminal device 30 sets in advance that it is impossible to respond to information transmitted from the control unit 110 (see FIG. 2) of the monitoring device 100 described later. )).
- the portable terminal device 30 returns a response indicating that the response is not possible when the control unit 110 of the monitoring device 100 transmits information when the response disabled setting unit sets the response disabled.
- the GPS 40 receives a position information radio wave from a GPS satellite or the like.
- the GPS 40 obtains position information by calculating current position information as three parameters of latitude, longitude, and altitude from information received via the GPS antenna.
- the acquired position information is transmitted to the monitoring device 100 in a timely manner.
- an example using GPS satellites as means for acquiring position information has been shown, but a system using a positional relationship with a base station other than GPS may be used.
- a system using a positional relationship with a base station other than GPS may be used.
- an Android (registered trademark) smartphone or a high-performance mobile phone with a camera is used as the mobile terminal device 30 that is a mobile terminal
- a base station and a mobile phone communication network are used instead of or in combination with the GPS 40.
- position information acquisition by Wi-Fi positioning that is, position information acquisition using a Wi-Fi access point and a predetermined position information service may be used.
- the vehicle stopper device 50 is a vehicle stopper function unit made up of a flap or a bar-like member that rises from the road surface in accordance with a control signal from the monitoring device 100.
- the vehicle stopper device 50 is activated by the monitoring device 100 when a person who is recognized as a suspicious vehicle driver tries to go out of the monitoring area, and has a function of preventing the suspicious vehicle from escaping from the field.
- the flap and the rod-shaped member may be connected to or interlocked with a chain or a gate.
- the monitoring device 100 is installed in a management room of a store, for example, and centrally manages monitoring target areas in the store.
- the monitoring device 100 may be a general server computer, personal computer, or the like.
- the monitoring device 100 includes a control unit 110 (control unit), an input unit 120, a storage unit 130, a display unit 140, an output unit 150, a face information database (DB) 160 (face image storage unit), an image A processing unit 170, an interface (I / F) unit 180, and a communication unit 190 are provided, and each unit is connected by a bus 195.
- the monitoring device 100 When it is detected that a person who is a suspicious person (hereinafter, referred to as “specific person” as appropriate) appears in the store, the monitoring device 100 sends the information of the person and the store information to the headquarters / head office or security company through the network. Notify the system.
- control section 110 reads each program from the ROM as necessary, loads it into the RAM, and executes each function (described later).
- Each program may be stored in the storage unit 130 in advance, or may be taken into the monitoring apparatus 100 when necessary via another storage medium or communication medium.
- the control unit 110 is configured by a CPU (Central Processing Unit) or the like, controls the entire monitoring apparatus 100, and executes a monitoring program to function as a digital loss / accident defense system.
- the detailed configuration of the control unit 110 will be described later.
- the input unit 120 is an input device for a user of the monitoring device 100 to input an instruction or the like to the monitoring device 100, such as a keyboard, a mouse, a touch panel provided on the screen of the display unit 140, or a microphone.
- the storage unit 130 stores still images and moving images received from the monitoring camera 11, various data and programs used by the control unit 110, and the like.
- the display unit 140 displays an operation status of the monitoring apparatus 100, an image received from the monitoring camera 11, a GUI (Graphical User Interface) for operating the monitoring apparatus 100, and the like.
- GUI Graphic User Interface
- the output unit 150 is an audio interface, for example, and outputs an audio signal from the monitoring device 100 to the acoustic system 158 in the store.
- an audio signal output from the monitoring apparatus 100 to the acoustic system 158 for example, an audio signal input from an audio input device such as a microphone provided in the input unit 120, or music data stored in the storage unit 130 is used as the control unit 110. May be a reproduced audio signal.
- the acoustic system 158 includes an amplifier and a plurality of speakers arranged in the store, and broadcasts an audio signal input from the monitoring device 100 into the store.
- the face information DB 160 accumulates face images (face information) of suspicious persons and store personnel.
- the image processing unit 170 performs a predetermined process on the received image. Predetermined processing includes contour extraction, image resizing, resolution conversion processing, and the like.
- the image processing unit 170 performs image processing such as adding a red frame or a yellow frame to the face image transmitted to the employee's mobile terminal device 30.
- the I / F unit 180 connects each monitoring camera 11 arranged in the monitoring target area and the monitoring device 100. In addition, the I / F unit 180 connects each RFID reader 20 arranged in the monitoring target area, and sends the authentication result of the authentication card 21 possessed by the employee close to the RFID reader 20 to the monitoring device 100. To do.
- the I / F unit 180 is connected to a headquarter / head office or a security company (not shown) via a network or a dedicated line.
- Basic data such as a person's face registered in the face information DB 160 is obtained from the headquarters / headquarters or security company (not shown) via the I / F unit 180, and the face information DB 160 is constructed.
- the face information DB can be updated to the latest face image (face information) by exchanging information with a headquarters / head office or a security company (not shown).
- the security company is not an essential component of the digital loss / accident defense system according to the present embodiment.
- the communication unit 190 transmits and receives data to and from the mobile terminal device 30 via the base station.
- the communication unit 190 receives the position information of each mobile terminal device 30 for each fixed period to the mobile terminal device 30 via the base station, and at the time of recognition of the suspicious person (information transmitted by e-mail). , Video containing video, etc.).
- FIG. 2 is a block diagram of the control unit 110 of the monitoring device 100 of the digital loss / accident defense system according to the embodiment of the present invention.
- the control unit 110 includes a face authentication function unit 111 (face authentication verification unit), a suspicious person / suspicious vehicle driver determination function unit 112 that determines a suspicious person or a suspicious vehicle driver, and a suspicious person.
- a position determination unit 113 position information acquisition means that determines the position of the employee, a layout information storage unit 114 that stores layout information of the monitoring target area, an authorized person tracking unit 115 that tracks authorized persons,
- a transmission control unit 116 that preferentially transmits information about the suspicious person to the mobile terminal device 30 closest to the suspicious person based on the acquired position information.
- the control unit 110 is based on the position information acquired from the position determination unit 113. Then, the position of the mobile terminal device 30 closest to the suspicious person whose matching result is matched is determined, and information related to the suspicious person is transmitted to the mobile terminal device 30.
- the control unit 110 matches the suspicious person with the matching result.
- the position of the mobile terminal device 30 next to is determined, and information related to the suspicious person is transmitted to the mobile terminal device 30.
- the information regarding the suspicious person includes information obtained by superimposing the position of the suspicious person and the position of the employee on the monitoring target area.
- the information regarding a suspicious person contains the face image of a suspicious person in the monitoring object area.
- the face authentication function unit 111 performs face authentication to determine whether the face of a person included in the image received from the monitoring camera 11 is a face of a person registered in the face information DB 160. Face authentication can be performed based on the similarity between the face information extracted from the received image and the face information registered in the face information DB 160. Specifically, when the face information includes a template image, the correlation degree between the template images can be obtained. Also, the face authentication function unit 111 acquires information (face information) representing the characteristics of a human face for use in face authentication from the face area, and associates it with each image in the face information database (DB) 160. sign up. Further, the face authentication function unit 111 receives an image of a person transmitted from a headquarter (not shown) and registers it in the face information DB 160.
- the face authentication function unit 111 registers the following face information and related information. ⁇ Registration of RFID authentication card issuers ⁇ Registration of store related parties ⁇ Registration of employee related parties etc. ⁇ Registration of persons other than those who have registered with RFID authentication cards ⁇ Registration of faces of suspicious persons or suspicious vehicle drivers
- the face authentication function unit 111 registers the face image of a person who is authenticated in a monitoring target area such as a back facility.
- This Digital Loss Accident Defense System monitors suspicious persons entering and exiting in monitored areas such as rear facilities. Although face information of suspicious persons and suspicious vehicle drivers can be accumulated in advance to some extent, it is difficult to accumulate face information of all suspicious persons. If a mode in which only the suspicious person's face information is authenticated and verified is taken, the theft of the suspicious person who has been overlooked cannot be prevented, and the digital loss / accident defense system cannot be effectively implemented.
- a face image of a person (RFID authentication card issuer, store official, employee employee, etc.) authenticated in a monitoring target area such as a back facility is registered, and a monitoring target area such as a back facility is registered. If the face image of the person entering / exiting does not match the face image of the registered person, the person is determined to be a suspicious person.
- the face authentication function unit 111 also performs registration of a suspicious person's face image, and in this case, the face image of the suspicious person can be authenticated and collated to immediately determine the suspicious person.
- the suspicious person / suspicious vehicle driver determination function unit 112 has entered a monitoring target area such as a rear facility that is an unauthorized entry area other than a person who does not have the authentication card 21 or a vehicle driver other than a person including a truck yard. In this case, it is determined that the person is a suspicious person or a suspicious vehicle driver. Specifically, the suspicious person / suspicious vehicle driver determination function unit 112 registers the issuer of the authentication card 21 (RFID authentication card), and selects a person or vehicle driver other than the registrant of the authentication card 21 (RFID authentication card). If detected within the monitored area, it is determined that the person is a suspicious person or a suspicious vehicle driver.
- RFID authentication card the issuer of the authentication card 21
- RFID authentication card the authentication card 21 (RFID authentication card) registration, there are registrations of employees, shop staff, and the like.
- the suspicious person / suspicious vehicle driver determination function unit 112 can make a detailed determination according to such work purpose.
- the suspicious person / suspicious vehicle driver determination function unit 112 passes the determination process to the face authentication function unit 111 when the room entry management that sets the person in and out is set. In this case, the face authentication function unit 111 recognizes whether or not the person is permitted to enter or exit a specific area or the like by face recognition. If the person does not have permission, the face authentication function unit 111 performs a process similar to a suspicious person.
- the suspicious person / suspicious vehicle driver determination function unit 112 can make a detailed determination according to such a work schedule or the like.
- the suspicious person / suspicious vehicle driver determination function unit 112 passes the determination process to the face authentication function unit 111 when it is outside the work schedule.
- the face authentication function unit 111 recognizes whether or not a person who is permitted to enter and leave outside the hours is recognized by face recognition, and performs processing as if it is a person who does not have permission, according to a suspicious person.
- the suspicious person / suspicious vehicle driver determination function unit 112 can determine the suspicious vehicle itself in combination with the suspicious vehicle driver instead of the suspicious vehicle driver. In this case, the suspicious person / suspicious vehicle driver determination function unit 112 performs collation based on whether or not the license plate of the vehicle is a license plate of a vehicle registered in advance.
- the position determination unit 113 acquires the position information of the employee in the monitoring target area by using the GPS position information or the RFID reader 20. Specifically, the position determination unit 113 acquires employee position information in the monitoring target area by authenticating an authentication tag carried by the employee by a plurality of RFID readers 20 installed in the monitoring target area. In this case, when the employee approaches each RFID reader 20, the position determination unit 113 detects that the employee is close to the corresponding RFID reader 20 by authentication of each RFID reader 20 of the authentication card 21 possessed by the employee. Is determined. Since the installation position of the RFID reader 20 is registered in the layout information storage unit 114 in advance, the position of the employee can be determined. In addition, the position determination unit 113 acquires position information from the GPS function unit included in the mobile terminal device 30.
- the layout information storage unit 114 registers monitoring area layout information in advance from the position of the monitoring camera 11, the installation position of the RFID reader 20, the area name, and the like.
- the authorized person tracking unit 115 tracks and detects a person who is recognized as a suspicious person by using a plurality of surveillance cameras 11, and confirms a movement history in the monitored area.
- the authorized person tracking unit 115 tracks the movement of the suspicious person, and when the suspicious person is away from the position of the nearest mobile terminal device 30 by a predetermined distance, transmits information on the suspicious person to the other mobile terminal devices 30. To do.
- ⁇ Transmission control unit 116> When the collation result by the face authentication function unit 111 matches (does not match the authenticated person's face image or matches the suspicious person's face image), the transmission control unit 116 is based on the position information acquired from the position determination unit 113. Then, the position of the mobile terminal device 30 closest to the suspicious person whose matching result matches is determined, and information related to the suspicious person is transmitted to the mobile terminal device 30. Although details will be described later, the transmission control unit 116 transmits the voice / video / suspicious person position information (information marked on the layout) by e-mail to the employee closest to the position of the suspicious person. In the case of a facility with multiple floors, the proximity is determined for each floor.
- suspicious behavior addicts are transmitted in red, for example, and mere suspicious persons are transmitted in yellow, for example. If there is no answer back signal even after a predetermined time (for example, 5 seconds) has elapsed from the employee who transmitted, the transmission control unit 116 selects a second employee-related person and performs retransmission.
- the second employees are (1) the second closest employee to the suspicious person, (2) the security guard, the store manager, the store manager representative, and (3) the headquarters / head office.
- the facility behind the commercial facility is guarded by inspection personnel and about 2-3 security guards. Since it is a personal security guard, it can be monitored during a patrol, but cannot be monitored if it is not patrol. In addition, there is a limit to guarding the warehouses, loading yard, and truck yard of each department with a limited number of personnel, and it is currently unknown even if a third party invades. In order to prevent theft, it is important that no person other than the person in charge of the department or the authorized personnel can enter or leave.
- the office also has a counting room that handles money. The counting room usually has employees but is not in the counting room for some reason. Even if there are employees, intruders may enter from outside and theft may occur. There are also cases where theft occurs during the opening of the store. This Digital Loss Accident Defense System catches and prevents intrusion into the counting room that handles money in advance.
- FIG. 3 is a flowchart showing a person registration process of the control unit 110 of the monitoring apparatus 100 of the digital loss / accident defense system. This flow is executed by the control unit 110 (FIG. 2) of the monitoring apparatus 100.
- step S1 the face authentication function unit 111 of the control unit 110 registers face information of an RFID authentication card issuer, a store related person, an employee related person, etc. in the face information DB 160. Specifically, the face authentication function unit 111 acquires information (face information) representing features of a human face for use in face authentication from the face area, and registers the information in the face information DB 160 in association with each image. To do. In addition, the face authentication function unit 111 receives a person image transmitted from the headquarters (not shown) and registers it in the face information DB 160.
- step S ⁇ b> 2 the face authentication function unit 111 of the control unit 110 registers face information of a person other than the registrant who has the authentication card 21 to be authenticated by the RFID reader 20 in the face information DB 160.
- a person other than the registrant of the authentication card 21 is a suspicious person or a suspicious vehicle driver.
- These suspicious persons include suspicious behavior addicts. Suspicious behavior addicts are, for example, persons who often appear at theft sites or persons who have been contacted in advance as caution persons from the headquarters / head office or security company. In this embodiment, the suspicious behavior addict is set to a higher monitoring level.
- the registration of the face information of the person may be an update of the face information DB from the headquarters / head office or security company.
- the control unit 110 registers detailed information such as an RFID authentication card issuer, a store-related person, and an employee-related person, a vehicle number, and related information.
- FIG. 4 is a flowchart showing a registration process of the rear facility layout (monitoring target area) of the control unit 110 of the monitoring device 100 of the digital loss / accident defense system. This flow is executed by the control unit 110 (FIG. 2) of the monitoring apparatus 100.
- the layout information storage unit 114 of the control unit 110 registers the monitoring target area such as a rear facility that is an unauthorized entry prohibition area other than related persons including the arrangement position of each monitoring camera 11 and the track yard.
- step S ⁇ b> 12 the layout information storage unit 114 of the control unit 110 registers the monitoring target area such as a rear facility that is an unauthorized entry prohibition area other than related persons including the installation position of each RFID reader 20 and the track yard.
- the rear facilities are, for example, “truck yard entrance”, “unloading / inspection yard, cargo handling yard, each warehouse, refrigerated freezer”, “office, monetary counting room”.
- the rear facility layout can be arbitrarily set (step S13).
- FIG. 6 is a flow following the connection terminal of FIG. This flow is mainly executed by the control unit 110 (FIG. 2) of the monitoring apparatus 100.
- step S ⁇ b> 21 the control unit 110 captures the video of the monitoring camera 11.
- step S ⁇ b> 22 the control unit 110 determines whether a person, a vehicle driver, or a vehicle is on the basis of an image captured by the monitoring camera 11 in a monitoring target area such as a rear facility that is an unauthorized entry area other than those involved including the truck yard. It is determined whether or not a monitored area such as a rear facility has been entered. “Entering the monitoring target area” means a case where a person, a vehicle driver, or a vehicle newly enters this time after the previous determination processing has been performed. Various people and vehicles enter and leave the area to be monitored such as the back facilities.
- Persons and vehicles that have already been authenticated and determined by this flow are excluded from the determination process.
- a monitoring target area such as a rear facility
- the suspicious person / suspicious vehicle driver determination function unit 112 determines whether the person holding the authentication card 21 It is determined whether the vehicle driver is a vehicle.
- An RFID reader 20 is installed along with the monitoring camera 11 at each location in the rear facility such as a truck yard. The installation location of each RFID reader 20 is registered in advance as rear facility layout information in the same manner as the installation location of the monitoring camera 11.
- the suspicious person / suspicious vehicle driver determination function unit 112 starts an authentication process between the RFID reader 20 and the authentication card 21.
- the authentication it is determined that a person in the vicinity of the RFID reader 20 is a person registered in advance, in this case, a store-related person, a delivery company, or a driver thereof. If the person or vehicle driver does not have the authentication card 21 to be authenticated by the RFID reader 20, the authentication is not established, so that the suspicious person and the suspicious vehicle driver are identified by the RFID reader 20 disposed at each location of the rear facility. Can be determined. When a person, a vehicle driver, or a vehicle enters a monitoring target area such as a rear facility and authentication is established between the RFID reader 20 and the authentication card 21, it is determined that there is no possibility of a suspicious person in the monitoring target area. Proceed to step S25.
- the face authentication function unit 111 of the control unit 110 is registered in advance as a face image of the person photographed by the monitoring camera 11 in step S24. Face authentication is performed by comparing face images of employees such as store-related persons, RFID authentication card registrants, and employee-related persons.
- the face authentication function unit 111 registers the face of the suspicious person / suspicious vehicle driver in the face information DB 160, the face image of the photographed person, the face image of the suspicious person / suspicious vehicle driver, Is verified.
- the suspicious person or the like can be clearly or quickly registered at the rear facility by registering the face image of the suspicious person as a suspicious behavior addict and collating them. It can be determined that an intrusion has occurred. However, it is often considered that it is difficult or insufficient to register the face image of the suspicious person / suspicious vehicle driver in advance.
- the face image of the person photographed by the monitoring camera 11 in the monitoring target area such as the back facility is the face image of an employee such as a store-related person, an RFID authentication card registrant, or an employee-related person. It is determined whether or not they match, and if they do not match, a mode is adopted in which it is uniformly determined that the person is a suspicious person at this time. Also in this case, if the face image of the suspicious person / suspicious vehicle driver is registered in advance, it can be immediately determined that the person is a suspicious person / suspicious vehicle driver. Further, the control unit 110 collates whether or not the license plate number of the photographed image is a pre-registered license plate number of the vehicle, so that the vehicle is monitored by the suspicious vehicle driver in the monitoring target area such as the rear facility. Determine that the vehicle.
- step S24 if the face image of the photographed person matches the face image of the employee registered in advance (in the case of face recognition matching), it is determined that the person in the monitoring target area is an appropriate person. Determine and proceed to step S25. On the other hand, when the face image of the photographed person does not match the face image of the employee registered in advance (when the face recognition collation does not match), it is determined that the person is a suspicious person in the monitoring target area, and the process proceeds to step S32.
- the suspicious person / suspicious vehicle driver determination function unit 112 determines whether or not more detailed access information is set in the rear facility. That is, here, it is determined by the determination processing in steps S21 to S24 that the person in the rear facility such as a truck yard is not a suspicious person, a suspicious driver, or a suspicious vehicle. However, even if you are not a suspicious person, you may want to prevent admission in certain departments or at certain times of the facility for administrative purposes.
- the entry / exit parties are determined according to the purpose of each workplace, office, each room, the type of work, and the level of information, so that only authorized parties can enter and exit. Further, as a time factor, according to a work schedule such as a predetermined day of the week, time, etc., a related person can enter and exit only during a certain time period.
- the suspicious person / suspicious vehicle driver determination function unit 112 is a person who can enter and exit at a specific place or time zone of the rear facility in step S26. It is determined whether or not. If it is a person who can enter / exit in a specific department or time zone of the rear facility, or if entry / exit permission information is not set in step S25, the suspicious person / suspicious vehicle driver determination function unit 112 in step S27 It is determined that the person is not a suspicious person but a permitted person. Next, in step S28, the control unit 110 cancels the monitoring control and ends the flow.
- step S30 the control unit 110 issues a message such as “Please continue to obtain” or “Check the schedule” to the unauthorized person, for example, by voice or display on the display panel. To do.
- step S31 the control unit 110 determines whether or not the unauthorized person has taken an action in response to the message (including an entry / exit avoidance action or the like). If the unauthorized person takes an action in response to the message, the process proceeds to step S28 to cancel the monitoring. If the unauthorized person does not take action in response to the message, the process proceeds to step S32.
- Step S32 is also entered when the confirmation by face authentication is not obtained in step S24.
- the authentication card 21 cannot be confirmed by the RFID reader 20 even though a person, a vehicle driver, or a vehicle is in a rear facility such as a truck yard (step S23: No). This is a case where confirmation by face authentication could not be obtained (step S24: No).
- it is not a suspicious person but a non-permitted person and a person who did not follow the instructions of the Digital Loss Accident Defense System. is there.
- step S32 the suspicious person / suspicious vehicle driver determination function unit 112 determines that the suspicious person is a suspicious person, and proceeds to step S33 (FIG. 6).
- the control part 110 acquires the positional information on the employee who adjoined the suspicious person from the position determination part 113 by step S33.
- step S34 the control unit 110 determines the position of the mobile terminal device 30 closest to the suspicious person based on the acquired position information.
- step S35 the authorized person tracking unit 115 of the control unit 110 tracks the movement of the suspicious person.
- step S36 the transmission control unit 116 of the control unit 110 transmits information related to the suspicious person preferentially to the employee closest to the position of the suspicious person.
- the transmission control unit 116 transmits voice / video / suspicious person location information (information marked on the rear facility layout) by e-mail.
- voice / video / suspicious person location information information marked on the rear facility layout
- information regarding the suspicious person may be transmitted to the other mobile terminal device 30.
- FIG. 7 is a diagram showing information on a suspicious person transmitted to an employee at the nearest position and a rear facility layout 200 (monitoring target area).
- the suspicious person “ ⁇ (black circle)”, the employee A “ ⁇ (double circle)” closest to the suspicious person, and other employees B including the next closest employee
- This is information in which “O (white circle)” is plotted over the rear facility layout 200 (monitoring target area).
- the suspicious behavior addict may be color-coded, for example, a red “ ⁇ ” mark, and the suspicious person may be colored, for example, a yellow “ ⁇ ” mark. In this way, the suspicious behavior addict is a suspicious behavior addict or just a suspicious person. It can be judged immediately.
- voice and moving image together with images it is possible to know information that cannot be represented by images alone, and employees can take more appropriate actions.
- the aspect which can select whether to emit a sound according to a situation may be sufficient as an audio
- more detailed information may be transmitted to the employee A “ ⁇ (double circle)” in the closest position in order to monitor the suspicious person “ ⁇ (black circle)”. More detailed information includes, for example, detailed information of the rear facility layout 200 such as a floor name, a rear facility name, and a corner name, excerpt information of a suspicious person's history, and action guidelines that an employee should take. Further, as shown in FIG. 7B, more detailed information includes information obtained by enlarging the suspicious person's “face” and suspicious person detailed information “ ⁇ ”. In this case, the face frame of the suspicious behavior addict may be color-coded, for example, red, and the mere suspicious person's face frame, for example, yellow. By transmitting the detailed information, there is an effect of further enhancing monitoring omission and prevention of misidentification.
- step S ⁇ b> 37 the transmission control unit 116 has passed a predetermined time (for example, 5 seconds) after transmitting information about the suspicious person to the employee's portable terminal device 30 at the closest position. It is also determined whether there is no answer back signal (positive response: ACK) or whether a response (negative response: NCK) that cannot be handled is returned from the mobile terminal device 30. If there is no positive response ACK even after a predetermined time (for example, 5 seconds) has elapsed from the mobile terminal device 30 or a negative response NCK is returned from the mobile terminal device 30, the transmission control unit 116 in step S38. Determines the position of the mobile terminal device 30 next to the suspicious person whose matching result matches, and transmits information regarding the suspicious person to the mobile terminal device 30.
- a predetermined time for example, 5 seconds
- the response executed by the employee specifically refers to the mobile terminal device 30 (smart phone) within a preset time (for example, 5 seconds) when information on the suspicious person transmitted from the monitoring device 100 is received.
- a preset time for example, 5 seconds
- a predetermined button for example, a “response” button.
- the mobile terminal device 30 has received the suspicious person's information transmission to the monitoring device 100, determines that the employee has performed a confirmation operation, and returns a response (an answerback signal).
- the second employee Select personnel and re-send.
- the second group of employees is (1) the second closest employee to the suspicious person, (2) the security guard, the store manager, the store manager, and (3) the headquarters / head office relationship.
- the transmission control unit 116 transmits information regarding the suspicious person to the mobile terminal device 30 of the headquarters / head office or the security company.
- control unit 110 determines whether or not a person who is recognized as a suspicious vehicle driver is going out of the monitoring area.
- step S41 the control unit 110 activates the vehicle stopper device 50 to prevent the suspicious vehicle from escaping from the field and ends this flow. . If the suspicious vehicle driver is not going out of the monitoring area, the flow is terminated.
- FIG. 8 is a flowchart showing the monitoring control process of the mobile terminal device 30 of the digital loss / accident defense system. This flow is executed by a control unit (not shown) of the mobile terminal device 30.
- the control unit of the mobile terminal device 30 determines whether or not the monitoring control processing routine is activated. If the monitoring control processing routine is not activated, the flow ends.
- the control unit of the mobile terminal device 30 determines whether or not the suspicious person information transmitted from the monitoring device 100 has been received in step S52. If the information on the suspicious person has not been received, the flow ends. If the information on the suspicious person is received, is the correspondence disabling setting unit of the mobile terminal device 30 set in step S53 the correspondence disabling setting flag indicating that the response cannot be made to the information transmitted from the monitoring device 100? Determine whether or not.
- the correspondence disabling setting flag may be set by pressing and holding a predetermined button for the start of the monitoring control processing routine, and may be canceled by pressing and holding the predetermined button again after the setting is completed.
- step S54 the incompatibility setting unit of the mobile terminal device 30 immediately returns a response NAC incapable of response to the monitoring device 100, and ends this flow.
- step S55 the control unit of the mobile terminal device 30 waits for a predetermined button (eg, “response” button) operation from an employee carrying the mobile terminal device 30.
- a predetermined button eg, “response” button
- the control unit of the mobile terminal device 30 transmits an answer back signal (positive response: ACK) to the monitoring device 100 in step S56 and ends this flow.
- ACK answer back signal
- FIG. 9A and FIG. 9B are diagrams showing an example of the rear facility layout of the digital loss / accident defense system.
- the monitoring apparatus 100 stores rear facility layout position information, position information of the RFID reader 20 of the rear facility layout 200, and employee position information acquired by the RFID reader 20.
- a surveillance camera 11 and an RFID reader 20 are installed in the rear facility.
- the radio wave of GPS is not constant and the radio wave does not reach, the position information can be acquired by the RFID reader 20.
- the monitoring device 100 recognizes the suspicious person with the monitoring camera 11, the monitoring apparatus 100 displays on the rear facility layout of the display unit 140 where the suspicious person is in the floor number, the entrance, the name of the rear facility, and the name of the corner (see FIG. 7). .
- the monitoring device 100 recognizes the location information of the suspicious person coming to the store by the monitoring camera 11. And the monitoring apparatus 100 recognizes the positional information of a back facility manager, a guard, and a store manager by the GPS function or the RFID reader 20. Then, the monitoring apparatus 100 determines which employee is close to the suspicious person, and sends the information of the suspicious person (position information, captured image, face image, etc.) to the employee closest to the suspicious person by e-mail, video , Send in real time with the back facility layout. Employees who are close to the suspicious person can expressly respond appropriately in advance and prevent theft.
- the monitoring device 100 transmits the information of the suspicious person (position information, captured image, face image, etc.) to the employee closest to the suspicious person in real time together with the mail, video, and rear facility layout, and then as necessary.
- Simple information may be transmitted not only to the employee but also to nearby doorways, rear facility corners, the same floor number or guards, and store managers.
- the monitoring apparatus 100 may transmit more detailed information to the nearest employee. More detailed information includes, for example, information obtained by superimposing the location information of the intruder and the employee on the floor name, rear facility name, corner name layout diagram, and information expanding the “face” of the intruder. . This has the effect of preventing omission of monitoring and misidentification. Buildings that can receive GPS radio waves use the GPS function to obtain employee location information. In a building or a rear facility that cannot receive GPS radio waves, the RFID reader 20 obtains employee position information. It is preferable to install a plurality of monitoring cameras 11 in a passage or the like where the employee viewpoint is weak.
- the monitoring device 100 stores in advance the position information by the monitoring camera 11 and the range in which the monitoring camera 11 can authenticate the corresponding floor number, rear facility, floor, entrance / exit, search target recognizer, and intruder.
- the monitoring device 100 stores a floor name, a rear facility name, a corner name, and a rear facility layout. Employees may rush to the location of the suspicious person.
- the monitoring device 100 recognizes the suspicious person other than the above as the suspicious person, and displays the layout information in which the position of the suspicious person is described as the portable terminal device 30 of the employee closest to the suspicious person (smartphone 30a, tablet 30b, laptop computer 30c). Send to.
- the employee to whom the information is transmitted can rush to the site of the rear facility and prevent theft or the like in advance.
- the monitoring device 100 When the suspicious person leaves the rear facility, the monitoring device 100 similarly transmits information indicating that the suspicious person has left to the related employee.
- the monitoring device 100 activates the vehicle stopper device 50 when a person who is recognized as a suspicious vehicle driver is going out of the monitoring area. Prevent suspicious vehicles from escaping and prevent theft by vehicles.
- FIG. 9B when a person approaches the first floor fresh fish warehouse entrance to the third floor miscellaneous goods warehouse entrance, an employee who has the authentication card 21 to authenticate with the RFID reader 20 can enter and exit.
- a person who does not have the authentication card 21 is recognized as a suspicious person, and the position of the suspicious person is written in real time on the mobile terminal device 30 (smartphone 30a, tablet 30b, notebook computer 30c) of the employee closest to the suspicious person.
- Send layout information Suspicious persons can be monitored in the same way for back facilities such as offices and money collection rooms.
- the employees who have the authentication card 21 to authenticate with the RFID reader 20 are permitted areas. You can go in and out. For those who have not obtained permission, the layout information indicating the position is transmitted in real time. In this case, an alarm may be issued, or the door may be locked so that it cannot enter and exit. Locking and unlocking are managed by a security guard, an employee, or a PC password holder in the security room.
- a person who arrives at the vehicle in the backyard enters the cargo handling area / inspection area and tries to deliver it. If the person is a suspicious person who does not have the authentication card 21 or whose face image is not registered, the monitoring apparatus 100 includes information on the suspicious person (including a video), the number of floors, the cargo handling area, and the warehouse name.
- the rear facility layout information indicating the room name and the suspicious person is transmitted in real time to the security room PC, the tablet, and the mobile terminal device 30 (smart phone 30a, tablet 30b, notebook computer 30c) of the related employee.
- the person is a person who is permitted to enter or leave each room or warehouse in the rear facility and possesses the authentication card 21 or an employee who is registered for face authentication by the monitoring camera 11 (for example, store manager) If you are a store manager, floor manager, fresh food manager, apparel manager, household miscellaneous goods manager, home living manager, security officer, department manager, office manager, cash counter manager, inspection manager), you can go in and out. In this case, it is preferable to make it possible to enter and exit according to permission of entry and exit for each business.
- the departments and rooms that can be entered and exited are preferably limited so that only authorized departments can enter and exit in the case of delivery by responsibility, department in charge, or outsider.
- the monitoring apparatus 100 determines that the person is a suspicious person and transmits it to the related employees as described above. In addition, if a suspicious person tries to enter / exit each room or warehouse, the door of the entrance / exit can be locked to prevent entry / exit.
- the monitoring device 100 When a supplier who has delivered goods tries to go in and out of a warehouse other than permission, the monitoring device 100 does not have the authentication card 21 to be authenticated by the RFID reader 20, or cannot perform face authentication by the monitoring camera 11. Information on suspicious persons is transmitted in real time to the mobile devices of security guards and related employees at the inspection site. In this case, the monitoring device 100 sounds an alarm device at an outdoor doorway. Moreover, the monitoring apparatus 100 operates the vehicle stopper device 50 so as not to take the suspicious person's vehicle out of the rear facility. In the present embodiment, the transmission level of information regarding a suspicious person can be set in advance. For example, it is possible to set whether to transmit to the area headquarters, the manager in charge of the head office, or the person in charge.
- the digital loss / accident defense system displays information on the suspicious person on the rear facility layout by an email including a video. First, it sends it to the employees who are close to this suspicious person, and then sends it to each responsible person.
- e-mail the next closest person in charge Send.
- the security officer and the store manager who have received the e-mail can respond to the instructions by more specialized / higher-level judgment.
- the positions of the store manager, the store manager's agent, the security officer, the rear facility manager, and the corner manager are stored in advance by the digital loss / accident defense system using the GPS or RFID reader 20.
- FIG. 10 is a diagram illustrating an example of a rear facility layout of the digital loss / accident defense system.
- FIG. 10A is a layout diagram of the first floor rear facility plane layout and monitoring camera 11 by GPS
- FIG. 10B is a layout diagram of the first floor rear facility plane layout and monitoring camera by the RFID reader “ ⁇ mark”. The layout of the rear facilities on the other floors is almost the same.
- a surveillance camera 11 is installed at the entrance / exit of a warehouse, a cargo handling area, an inspection hall, and a refrigerated freezer in the rear facility. Face images of persons photographed by the surveillance camera 11 are related to stores, RFID certification card registrants, It is determined whether or not the face image of an employee such as an employee is the same, and if it does not match, it is determined that the person is a suspicious person. And the information (refer FIG. 7A) of a suspicious person is transmitted to the portable terminal device 30 (smart phone 30a, tablet 30b, notebook computer 30c) which the employee " ⁇ (double circle)" nearest to the suspicious person carries.
- the portable terminal device 30 smartt phone 30a, tablet 30b, notebook computer 30c
- the information on the suspicious person is superimposed on the rear facility layout 200. If the suspicious person is a suspicious behavior addict, it is indicated by a red “ ⁇ mark”.
- the employee “ ⁇ (double circle)” closest to the suspicious person can move to the surveillance action from the beginning of the most important visit to the store, and the initial action of the suspicious person “ ⁇ (black circle)” is checked and stolen. It is possible to protect against actions.
- the RFID reader 20 when the RFID reader 20 is installed in the track yard of the rear facility, and the person is authenticated as a suspicious person who does not have the authentication card 21 to be authenticated by the RFID reader 20, the person is track yard.
- the corresponding place name is written on the rear facility layout and transmitted to the employee “ ⁇ (double circle)” closest to the suspicious person along with the location information of the suspicious person.
- the rear facility layout includes the number of floors, departmental warehouse name, cargo yard, truck yard, refrigerated freezer name, inspection site, etc., and related employees can immediately rush to the scene to guard.
- Suspicious behavior addict is a person who has been recorded after theft or similar acts
- a suspicious person is a person who has entered or departed from a rear facility without entry, such as an inspection facility, a cargo handling area, each warehouse, a refrigerated freezer, etc. It is.
- these persons enter the back facility, they send information about the suspicious person to the smart mobile device of the employee closest to the suspicious person as the suspicious person. Furthermore, it may be transmitted to the security room PC and the smart mobile device of the responsible employee concerned. As a result, theft, foreign matter contamination, and leakage of corporate information can be prevented in real time.
- This Digital Loss Accident Defense System can determine the person who enters and leaves the room according to the purpose of each workplace, office, room, type of work, and level of information. Even if you have an authentication card 21, only authorized parties can go in and out. When other unauthorized parties or outsiders try to enter or leave, information is sent to the nearest employee as if it were treated as a suspicious person. As a result, related employees and guards can be dispatched.
- the Digital Loss Accident Defense System is installed in each room and warehouse even if unauthorized suspicious persons enter the workplace, office, warehouse, refrigerated refrigerator, etc. without permission.
- the surveillance camera 11 is operated in conjunction with it, and the rear facility layout information indicating the number of floors, each room name, and each warehouse name is transmitted in real time to the portable device of the nearest related employee. This can prevent theft, foreign matter contamination, and information leakage.
- each factory, each warehouse, each workplace, and each room in the building facility is operated by a predetermined number of personnel who are permitted to enter and exit according to work schedules such as days of the week and working hours.
- this digital loss / accident defense system uses the RFID reader 20 and the monitoring camera 11 to detect entry / exit without permission. Those who have been judged and who have not obtained permission will be shown the suspicious person's image (video) on the mobile terminal device 30 (smart phone 30a, tablet 30b, notebook computer 30c) of the security officer who is closest to the person in question in real time. Including the name of the room, number of floors, workshop, factory name, etc. This allows related employees to rush to the site and report to the police station in charge. However, when an emergency request requires entry / exit, an administrator, security guard, or the like may contact the related party to cancel this monitoring control and allow entry / exit as an exception.
- a suspicious person who is not registered in face authentication with the monitoring camera 11 or a person who does not have the authentication card 21 authenticated by the RFID reader 20 and a suspicious behavior addict. For example, a suspicious person is displayed in a yellow frame, and a suspicious behavior addict is displayed in a red frame.
- the digital loss / accident defense system 1000 includes the mobile terminal device 30 carried by a plurality of employees in the monitoring target area such as the back facility, and the monitoring target area.
- the face determination unit 113 that acquires the position information of the plurality of mobile terminal devices 30 in the camera, the face image of the person photographed by the monitoring camera 11 and the face image of the suspicious person stored in the face information DB 160
- the collation result between the authentication function unit 111 and the face authentication function unit 111 matches (does not match the face image of the authenticated person or matches the face image of the suspicious person)
- a control unit 110 that determines the position of the mobile terminal device 30 closest to the suspicious person and transmits information about the suspicious person to the mobile terminal device 30.
- the behavior of a suspicious person can be monitored in real time in a monitored area such as a rear facility to prevent theft or the like in advance.
- the mobile terminal device 30 includes a correspondence disabling setting unit that sets in advance that a response cannot be made to information transmitted from the control unit 110. If the monitoring device 100 transmits information, the response indicating that the response is not possible is returned. Therefore, the monitoring device 100 can transmit the information to the next closest employee or responsible person without waiting for a response from the mobile terminal device 30 for a predetermined time (for example, 5 seconds).
- a predetermined time for example, 5 seconds.
- the theft is instant, and the effect of being able to receive the support of the next closest employee or responsible person without waiting for a predetermined time (for example, 5 seconds) is great. That is, the digital loss / accident defense system 1000 can cope with a situation in which the monitoring device 100 and the mobile terminal device 30 collaborate for a moment.
- the person authenticated in the monitoring target area such as the back facility is determined whether it is a specific place in the monitoring target area, or entry / exit of a predetermined time zone, It is possible to monitor the entry and exit of a person who is not a suspicious person in the monitored area but who does not have permission at a specific place or at a pre-designated time zone, and has a security level to prevent theft, foreign object contamination, or information leakage. Can be increased.
- the vehicle stopper device 50 that restricts the movement of the vehicle is provided, and when the suspicious vehicle driver tries to go out of the rear facility, the vehicle stopper device 50 is operated to Suspicious vehicles trying to escape from the monitored area can be blocked, and theft or the like can be more strongly prevented.
- a telephone line is used as a public line
- the present invention is not limited to this case, and for example, a wireless communication line, the Internet, or a LAN is used as the public line. May be.
- a transceiver may be used as a communication terminal device when the public line is wireless communication
- a personal computer or palmtop computer may be used as a communication terminal device when the public line is the Internet or a LAN. Good.
- the use of the digital loss / accident defense system can be expanded and the construction cost of the digital loss / accident defense system can be reduced. Can be suppressed.
- the name “digital loss / accident defense system and method” is used. However, this is for convenience of explanation, and may be digital smart security, security system, security method, and the like. Furthermore, the detection of abnormal situations includes everything known. For example, in an abnormal situation, there is an intrusion or approach of a suspicious person. Further, the report is not limited to e-mail and may be anything.
- the digital loss / accident defense system and method of the present invention can also be realized by a program for causing a computer to function as the digital loss / accident defense system or method.
- This program may be stored in a computer-readable recording medium.
- the recording medium on which this program is recorded may be the ROM itself of this digital loss / accident defense system, or a program reading device such as a CD-ROM drive is provided as an external storage device. It may be a CD-ROM or the like that can be read by insertion.
- the recording medium may be a magnetic tape, a cassette tape, a flexible disk, a hard disk, an MO / MD / DVD, or a semiconductor memory.
- the digital loss / accident defense system, method, and program according to the present invention can be used in real time in corporations / commercial facilities, offices, etc., and prevent the loss of property, life, and economy before they are used.
- DESCRIPTION OF SYMBOLS 11 Surveillance camera 20 RFID reader 21 Authentication card 30 Portable terminal device 40 GPS DESCRIPTION OF SYMBOLS 50 Vehicle stopper apparatus 100 Monitoring apparatus 110 Control part (control means) 111 Face Authentication Function Unit (Face Authentication Verification Unit) 112 Suspicious person / suspicious vehicle driver determination function unit 113 Position determination unit (position information acquisition means) 114 layout information storage unit 115 authorized person tracking unit 116 transmission control unit 120 input unit 130 storage unit 140 display unit 150 output unit 160 face information database (DB) (face image storage unit) 170 Image processing unit 180 Interface (I / F) unit 190 Communication unit 200 Rear facility layout (monitoring target area) 1000 Digital Loss Accident Defense System
Landscapes
- Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computer Security & Cryptography (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Health & Medical Sciences (AREA)
- Multimedia (AREA)
- Business, Economics & Management (AREA)
- Emergency Management (AREA)
- Theoretical Computer Science (AREA)
- Public Health (AREA)
- Civil Engineering (AREA)
- Structural Engineering (AREA)
- Human Computer Interaction (AREA)
- Oral & Maxillofacial Surgery (AREA)
- General Health & Medical Sciences (AREA)
- Alarm Systems (AREA)
- Burglar Alarm Systems (AREA)
- Automation & Control Theory (AREA)
- Electromagnetism (AREA)
Abstract
Description
商業施設は、顧客の導入数の増加と売上頻度を高めるために品揃えアイテム、品質、プライス、ボリューム等、種々な創意工夫と競合店対策等の方策と増収増益の熾烈な努力と競争を強いられている。
後方施設の荷捌場、倉庫、休憩室、事務室・金銭計算室は、担当者以外は入室禁止である。しかし、責任者又は警備員が常時、すべてを監視することは通常の業務においては、困難である。納品業者の担当、パートタイマー、閉店後の商品品出しのアルバイト等が多数行動しているのが現状である。後方施設での禁止ゾーンへの立入禁止の管理と立入った場合の対処手段は未だ充分ではない。その観点から、リアルタイムに当人への警告と警備員、責任者へ通報する等のセキュリティシステムが必要である。
また、検品従事者、商品捌き要員、警備員が荷捌きヤードに常駐していない場合も多く、トラックヤードと荷捌きヤードは面して、壁やシャッター等で常時区画はされていない場合も多い。この場合、取引先の納品業者に紛れて商品を大量にカートごとに、盗品する被害が発生して、万引き同様に企業に多大な損失を与えている。監視カメラや警備要員が警備するものの、未だ十分ではない。
以上の金銭的なロスとは別に、社会的な不安材料も懸念されている。例えば、企業の作業場の異物混入や生産現場の情報管理について挙げられる。
企業で発生する人的行為による情報漏洩、盗難、異物混入等に対して、外部より部外者が侵入防止することは上記の種々な手法等により厳重に管理されているが、企業内で発生する人的行為による情報漏洩、盗難、異物混入等は、外部からの侵入とは異なり、許可された者が出入りすることができることから管理は難しい。内部での管理はリアルタイムに管理はされてはいないのが実情である。そのため、企業内での情報漏洩、盗難、異物混入等の事故は、発生してから後日に何等かの事情で判明してから調査することになる。しかし、誰が、何時、接触したかの確たる事実は明確ではなく、事故発生時、又は事故が発生する前のセキュリティ管理は充分ではない。
例えば、商業施設の後方には多数大量の商品が開店前から、トラックヤードに納品の車両が出入りして、荷下ろし、検品、納品、荷捌場での、商品ごとに倉庫に納品される。また、商品を納品した空のカートは該当の納品業者が搬出する等の業務が多種、多岐のために常時、後方施設を監視することは不可能である。また、商業施設の従業員は、売上、利益を確保するために商品発注、売場での顧客の接客、売場への商品品出し、陳列業務等で忙殺され、商品の納品、売場への品出し陳列等の売場業務のため、後方施設の管理は、手薄となり無人の状態の時間が多く、その間に、盗難等が発生している。
(実施の形態)
図1は、本発明の実施の形態に係るデジタルロス・アクシデントデフェンスシステムの構成を示すブロック図である。
図1に示すように、デジタルロス・アクシデントデフェンスシステム1000は、監視対象エリアの天井等に設置された複数の監視カメラ11と、トラックヤードを含む関係者以外無断立入禁止エリアである後方施設などの監視対象エリアに設置された複数のRFID(Radio Frequency IDentification)リーダ20と、従業員等関係者(以下、「従業員」とも言う)が携帯しRFIDリーダ20が認証する認証カード21と、従業員が携帯する携帯端末装置30と、監視対象エリアにおける従業員の位置を捕捉するGPS(Global Positioning System)40と、車両ストッパ装置50と、システム全体を制御する監視装置100と、を備える。
デジタルロス・アクシデントデフェンスシステム1000は、トラックヤードを含む関係者以外無断立入禁止エリアである後方施設などの監視対象エリアを撮影するように設置された監視カメラ11で撮影された映像を監視し、不審者による盗難、異物混入、又は情報の漏洩行為を防止するシステムである。
監視カメラ11は、人物の顔を撮影する認証用のカメラである。監視カメラ11は、トラックヤードを含む関係者以外無断立入禁止エリアである後方施設などの監視対象エリアの各所に設置され、人物の顔を撮影する。監視カメラ11が撮影した画像は、監視装置100に出力される。監視カメラ11は、動画像を常時撮影していても、一定時間(例えば数秒)おきに1枚の静止画を撮影してもよい。
RFIDリーダ20は、一般には、商品に取り付けられたRFタグへの送信に対して応答があるかないかを検出することで、RFタグが付された商品の決済などを管理するものである。なお、RFタグは、購入するなどして店舗から正当に持ち出しできる状態になった物品からは除去されるか無効化される。
本実施形態では、RFIDリーダ20は、従業員が所持する認証カード21の認証を行う。RFIDリーダ20は、従業員が所持する認証カード21の認証により、認証カード21を携帯する従業員の位置を捕捉する。
なお、本実施形態では、認証カード21は、RFIDリーダ20との間で認証を行うRFID認証カードを用いた例であるが、どのような認証手段による認証カードであってもよい。また、認証カード21が、カード形状であることは説明の便宜上から呼称しているに過ぎず、認証タグなどカード形状でなくてもよい。
携帯端末装置30は、複数の従業員がそれぞれ携帯する。携帯端末装置30は、例えばスマートフォン30a、タブレット30b、ノートパソコン30cである。携帯端末装置30は、このほか、携帯電話、PHS(Personal Handy-Phone System)、PDA(Personal Digital Assistants)、専用端末である。本実施の形態では、携帯端末装置30は、各従業員が様々な場所(すなわち現在位置)で使用可能であり、図示しない電話回線を介して監視装置100からのメール又は動画を含む映像等を受信可能である。
携帯端末装置30は、従業員の位置を捕捉するGPS40を備える構成であってもよい。
また、携帯端末装置30は、後記する監視装置100の制御部110(図2参照)から送信される情報に対して応答ができないことを予め設定する対応不可設定部(対応不可設定手段、図示せず)を有する。携帯端末装置30は、対応不可設定部により対応不可が設定されている場合、監視装置100の制御部110から情報に対する送信があると、当該対応不可の応答を返す。
GPS40は、位置情報の電波をGPS衛星等から受信する。GPS40は、GPSアンテナを介して受信した情報より、現在位置情報を、緯度・経度・高度の3つのパラメータとして算出して位置情報を取得する。取得した位置情報は、適時、監視装置100に送信される。
また、Wi-Fi測位による位置情報取得、すなわちWi-Fiアクセスポイントと所定の位置情報サービスを利用した位置情報取得を用いてもよい。
車両ストッパ装置50は、監視装置100からの制御信号に従って路面から立ち上がるフラップや棒状部材からなる車両ストッパ機能部である。車両ストッパ装置50は、不審車両運転者と認定された者が監視エリア外に出ようとした場合、監視装置100によって作動し、不審車両の場外逃亡を阻止する機能を有する。また、上記フラップや棒状部材は、チェーンやゲートに連結・連動するものでもよい。
監視装置100は、例えば店舗の管理室に設置され、店舗内の監視対象エリアを集中管理する。監視装置100は、一般的なサーバ計算機、パーソナルコンピュータ等であってよい。
監視装置100は、制御部110(制御手段)と、入力部120と、記憶部130と、表示部140と、出力部150と、顔情報データベース(DB)160(顔画像記憶手段)と、画像処理部170と、インタフェース(I/F)部180と、通信部190と、を備え、各部はバス195により接続される。
監視装置100は、不審者である人物(以下適宜、「特定者」と言う)が店舗に現れたことが検出された場合、この人物の情報と店舗の情報をネットワークを通して本部・本社や警備会社システムに通知する。
入力部120は、キーボード、マウス、表示部140の画面上に設けられたタッチパネル、マイクなど、監視装置100のユーザが監視装置100に指示などを入力するための入力機器である。
記憶部130は、監視カメラ11から受信した静止画や動画、制御部110が用いる各種データ、プログラムなどを記憶する。
表示部140は、監視装置100の動作状況をはじめ、監視カメラ11から受信した画像、監視装置100を操作するためのGUI(Graphical User Interface)などを表示する。
出力部150は、例えばオーディオインタフェースであり、店舗内の音響システム158に対して監視装置100からの音声信号を出力する。監視装置100から音響システム158へ出力する音声信号としては、例えば入力部120に設けられたマイクなどの音声入力装置から入力された音声信号や、記憶部130に記憶された音楽データを制御部110が再生した音声信号であってよい。音響システム158は、アンプや店舗内に配置された複数のスピーカを備え、監視装置100から入力された音声信号を店舗内に放送する。
画像処理部170は、受信した画像に対して予め定められた処理を行う。予め定められた処理には、輪郭抽出、画像のリサイズ、解像度変換処理などがある。
また、画像処理部170は、従業員の携帯端末装置30に送信する顔画像に、赤枠や黄色枠を付すなどの画像処理を行う。
図2は、本発明の実施の形態に係るデジタルロス・アクシデントデフェンスシステムの監視装置100の制御部110のブロック図である。
図2に示すように、制御部110は、顔認証機能部111(顔認証照合手段)と、不審者や不審車両運転者を判定する不審者/不審車両運転者判定機能部112と、不審者及び従業員の位置を判定する位置判定部113(位置情報取得手段)と、監視対象エリアのレイアウト情報を記憶するレイアウト情報記憶部114と、認定された者を追跡する認定者追跡部115と、取得した位置情報に基づいて不審者に最も近い携帯端末装置30に優先的に不審者に関する情報を送信する送信制御部116と、を備える。
制御部110は、携帯端末装置30に不審者に関する情報を送信してから所定時間が経過した場合、又は、対応不可設定部から対応不可の応答が返された場合、照合結果が一致した不審者に次に近い携帯端末装置30の位置を判定し、当該携帯端末装置30に不審者に関する情報を送信する。
ここで、不審者に関する情報は、監視対象エリア上に不審者の位置と従業員の位置を重ねた情報を含む。また、不審者に関する情報は、監視対象エリアにいる不審者の顔画像を含む。
顔認証機能部111は、監視カメラ11から受信した画像に含まれる人物の顔が、顔情報DB160に登録されている人物の顔であるかどうかを判定する顔認証を行う。顔認証は、受信画像から抽出した顔情報と顔情報DB160に登録されている顔情報との類似度に基づいて行うことができる。具体的には、顔情報がテンプレート画像を含む場合、テンプレート画像同士の相関度を求めることができる。
また、顔認証機能部111は、顔領域から、顔認証に用いるための、人間の顔の特徴を表す情報(顔情報)を取得し、個々の画像と関連付けて顔情報データベース(DB)160に登録する。また、顔認証機能部111は、図示しない本部から送信される人物の画像を受信し、顔情報DB160に登録する。
・RFID認証カード発行者の登録
・店舗関係者等の登録
・従業員関係者等の登録
また、場合により、
・RFID認証カード登録者以外の人物の登録
・不審者又は不審車両運転者の顔を登録
(監視対象エリア)
不審者/不審車両運転者判定機能部112は、認証カード21を所持していない人物や車両運転者がトラックヤードを含む関係者以外無断立入禁止エリアである後方施設などの監視対象エリアに入った場合、不審者又は不審車両運転者であると判定する。具体的には、不審者/不審車両運転者判定機能部112は、認証カード21(RFID認証カード)発行者を登録し、認証カード21(RFID認証カード)登録者以外の人物又は車両運転者を監視対象エリア内で検知した場合、不審者又は不審車両運転者であると判定する。ここで、認証カード21(RFID認証カード)登録には、従業員や店舗関係者等の登録がある。
また、不審者ではない、すなわち認証カード21を所持している人物であっても、各作業場、事務室、各室の目的や作業の種類、情報の程度によっては該当監視対象エリアに出入関係者を定めて、許可する関係者だけが出入できるようにしたい場合がある。不審者/不審車両運転者判定機能部112は、このような作業目的等に応じた詳細な判定を行うことができる。不審者/不審車両運転者判定機能部112は、出入関係者を定めた入室管理が設定されている場合、顔認証機能部111に判定処理を渡す。この場合、顔認証機能部111は、顔認識により特定のエリア等に出入りが許可されている人物かどうかを認識し、許可を得ていない人物であれば不審者に準ずるものとして処理を行う。
また、不審者ではない、すなわち認証カード21を所持している人物であっても、予め定められた曜日、時間等の作業スケジュールに従い、ある時間帯だけ関係者が出入できるようにしたい場合がある。不審者/不審車両運転者判定機能部112は、このような作業スケジュール等に応じた詳細な判定を行うことができる。不審者/不審車両運転者判定機能部112は、作業スケジュール外の場合、顔認証機能部111に判定処理を渡す。この場合、顔認証機能部111は、顔認識により時間外の出入りが許可を得ている人物かどうかを認識し、許可を得ていない人物であれば不審者に準ずるものとして処理を行う。
位置判定部113は、監視対象エリア内における従業員の位置情報をGPS位置情報やRFIDリーダ20により取得する。具体的には、位置判定部113は、監視対象エリアに設置された複数のRFIDリーダ20による従業員が携帯する認証タグの認証により監視対象エリアにおける従業員の位置情報を取得する。この場合、位置判定部113は、従業員が各RFIDリーダ20に近接した場合、従業員が所持する認証カード21の各RFIDリーダ20の認証により、従業員が該当RFIDリーダ20に近接していると判定する。RFIDリーダ20の設置位置は、レイアウト情報記憶部114に予め登録されているので、従業員の位置を判定することができる。
また、位置判定部113は、携帯端末装置30が備えるGPS機能部からの位置情報を取得する。
レイアウト情報記憶部114は、監視カメラ11の位置、RFIDリーダ20の設置位置、エリア名称等から監視エリアレイアウト情報を予め登録する。
認定者追跡部115は、不審者と認定された者を複数の監視カメラ11で追跡して検知し、監視対象エリア内での移動履歴を確認する。認定者追跡部115は、不審者の移動を追跡し、不審者が、最も近い携帯端末装置30の位置から所定距離離れた場合、他の携帯端末装置30に対して、不審者に関する情報を送信する。
送信制御部116は、顔認証機能部111による照合結果が一致(認証された人物の顔画像と不一致、また不審者の顔画像と一致)した場合、位置判定部113から取得した位置情報に基づいて、照合結果が一致した不審者に最も近い携帯端末装置30の位置を判定し、当該携帯端末装置30に不審者に関する情報を送信する。
詳細は後記するが、送信制御部116は、不審者の位置に最も近い従業員に、メールにて音声・動画・不審者の位置情報(レイアウト上に印を付した情報)を送信する。複数のフロアの施設の場合、近さはフロアごとに判定する。また、不審行動常習者は例えば赤色表示、単なる不審者は例えば黄色表示と区別して送信する。
送信制御部116は、送信した従業員から所定時間(例えば5秒間)経過してもアンサーバック信号がない場合、第2の従業員関係者を選定し、再送信を行う。第2の従業員関係者は、(1) 不審者に2番目に近い従業員等関係者、(2)警備員、店長、店長代行、(3)本部・本社等である。
まず、デジタルロス・アクシデントデフェンスシステムの基本的な考え方について述べる。
本デジタルロス・アクシデントデフェンスシステムは、後方施設への不審者の出入り及び不審者の行動をリアルタイムに監視して盗難行為を事前に防止する。
また、事務室には金銭を取り扱う集計室がある。集計室には、通常、従業員がいるが何等かの事情で集計室にいない場合や、従業員がいても外部より侵入者が侵入し盗難が発生する場合もある。さらに、開店中に盗難が発生するケースもある。
本デジタルロス・アクシデントデフェンスシステムは、金銭を取り扱う集計室への侵入を事前にキャッチして防御する。
本デジタルロス・アクシデントデフェンスシステムは、後方施設全体を通常の業務に支障を発生せず、各部門の関係者外は出入りを監視して盗難等を防止する。
[登録処理]
まず、デジタルロス・アクシデントデフェンスシステムの各種情報の登録処理について説明する。
ステップS3では、制御部110は、RFID認証カード発行者、店舗関係者、及び従業員関係者等の詳細情報、車両ナンバー、関連情報の登録を行う。
図4は、デジタルロス・アクシデントデフェンスシステムの監視装置100の制御部110の後方施設レイアウト(監視対象エリア)の登録処理を示すフローチャートである。本フローは、監視装置100の制御部110(図2)により実行される。
ステップS11では、制御部110のレイアウト情報記憶部114は、各監視カメラ11の配置位置とトラックヤードを含む関係者以外無断立入禁止エリアである後方施設などの監視対象エリアを登録する。
後方施設は、例えば「トラックヤード出入口」「荷下ろし、検品場、荷捌場、各倉庫、冷蔵冷凍庫」「事務室、金銭集計室」である。後方施設レイアウトは、任意で設定可能である(ステップS13)。
図5及び図6は、デジタルロス・アクシデントデフェンスシステムの監視装置100の監視制御処理を示すフローチャートである。図6は、図5の連結端子に続くフローである。本フローは、主に監視装置100の制御部110(図2)により実行される。
ステップS22では、制御部110は、トラックヤードを含む関係者以外無断立入禁止エリアである後方施設などの監視対象エリアの監視カメラ11により撮影された映像に基づいて、人物や車両運転者、車両が後方施設などの監視対象エリアに入ったか否かを判定する。「監視対象エリアに入った」とは、前回の判定処理がなされた後に、今回新たに人物や車両運転者、車両が入った場合を言う。後方施設などの監視対象エリアには、様々な人物や車両が進入・退出、行き来する。既に本フローにより認証及び判定処理が済んだ人物や車両については、本判定処理から除外する。ここで、以前に撮影した画像と現在の画像を比較するパターン認識処理を実行することで、後方施設などの監視対象エリアに車両が入ったことを判定することができる。人物や車両運転者、車両が後方施設などの監視対象エリアに入っていない場合は、本フローを終了する。
ある人物や車両運転者、車両が後方施設などの監視対象エリアに入り、RFIDリーダ20と認証カード21との間で認証成立した場合、監視対象エリアにおいて不審者の可能性がないと判断してステップS25に進む。
後方施設の特定部署又は時間帯等に出入できる該当者である場合、あるいは上記ステップS25で出入の許可情報が設定されていない場合は、ステップS27で不審者/不審車両運転者判定機能部112は、不審者ではなく許可された人物であると判定する。次いで、ステップS28で制御部110は、本監視制御を解除して本フローを終了する。
次いで、ステップS30で制御部110は、この許可されていない人物に対して、例えば音声や表示パネルによる表示により、「出入手続をとって下さい」「スケジュールを確認して下さい」等のメッセージを発行する。
ステップS31で制御部110は、上記許可されていない人物が、メッセージに応えた行動をとった(出入回避行動等も含む)か否かを判定する。上記許可されていない人物が、メッセージに応えた行動をとった場合は、上記ステップS28に進んで監視解除を行う。上記許可されていない人物が、メッセージに応えた行動をとらなかった場合は、ステップS32に進む。
上記ステップS32で不審者と判定した場合、ステップS33で、制御部110は、位置判定部113から不審者に近接した従業員の位置情報を取得する。
ステップS34では、制御部110は、取得した位置情報に基づいて、不審者に最も近い携帯端末装置30の位置を判定する。
ステップS35では、制御部110の認定者追跡部115は、不審者の移動を追跡する。
ステップS36では、制御部110の送信制御部116は、不審者の位置に最も近い従業員に優先的に、不審者に関する情報を送信する。例えば、送信制御部116は、メールにて音声・動画・不審者の位置情報(後方施設レイアウト上に印を付した情報)を送信する。
この場合、不審者が、最も近い携帯端末装置30の位置から所定距離離れた場合、他の携帯端末装置30に対して、不審者に関する情報を送信するようにしてもよい。
当該携帯端末装置30から所定時間(例えば5秒間)経過しても肯定的応答ACKがないか、又は、当該携帯端末装置30から否定的応答NCKが返された場合、ステップS38で送信制御部116は、照合結果が一致した不審者に次に近い携帯端末装置30の位置を判定し、当該携帯端末装置30に不審者に関する情報を送信する。
ステップS39では、送信制御部116は、本部・本社や警備会社の携帯端末装置30に不審者に関する情報を送信する。
ステップS40では、制御部110は、不審車両運転者と認定された者が監視エリア外に出ようとしているか否かを判定する。
不審車両運転者と認定された者が監視エリア外に出ようとしている場合、ステップS41で制御部110は、車両ストッパ装置50を作動させ、不審車両の場外逃亡を阻止して本フローを終了する。不審車両運転者が監視エリア外に出ようとしていない場合、そのまま本フローを終了する。
図8は、デジタルロス・アクシデントデフェンスシステムの携帯端末装置30の監視制御処理を示すフローチャートである。本フローは、携帯端末装置30の制御部(図示省略)により実行される。
まず、ステップS51で携帯端末装置30の制御部は、本監視制御処理ルーチンが起動しているか否かを判別し、本監視制御処理ルーチンが起動していない場合は、そのまま本フローを終了する。
前記不審者の情報を受信していない場合、そのまま本フローを終了する。
前記不審者の情報を受信した場合、ステップS53で携帯端末装置30の対応不可設定部は、監視装置100から送信される情報に対して応答ができないことを示す対応不可設定フラグが設定されているか否かを判別する。なお、この対応不可設定フラグは、例えば本監視制御処理ルーチン起動に所定ボタンの長押しで設定完了、設定完了後の再度の所定ボタンの長押しで設定解除としてもよい。
対応不可設定フラグが設定されていない場合、ステップS55で携帯端末装置30の制御部は、この携帯端末装置30を携帯する従業員からの所定ボタン(例えば「応答」ボタン)操作を待つ。
前記ボタン操作がある場合、ステップS56で携帯端末装置30の制御部は、監視装置100にアンサーバック信号(肯定的応答:ACK)を送信して本フローを終了する。なお、所定時間が経過してもボタン操作がない場合、ステップS57で携帯端末装置30の制御部は、タイムアウトを行って本フローを終了する。
商業施設の後方施設の場合において、デジタルロス・アクシデントデフェンスシステム1000の後方施設構成について説明する。
図9A、図9Bは、デジタルロス・アクシデントデフェンスシステムの後方施設レイアウトの一例を示す図である。
デジタルロス・アクシデントデフェンスシステム1000は、監視装置100が、後方施設レイアウト位置情報と、後方施設レイアウト200のRFIDリーダ20の位置情報と、RFIDリーダ20によって取得した従業員位置情報とを記憶する。
監視装置100は、不審者を監視カメラ11で認識した場合、不審者が階数、入口、後方施設名、コーナー(図7参照)名のどこにいるかを、表示部140の後方施設レイアウト上に表示する。
GPSの電波が受信できる建物は、GPS機能を用いて従業員の位置情報を得る。GPSの電波が受信できない建物や後方施設等では、RFIDリーダ20により従業員の位置情報を得る。
監視カメラ11は、従業員視点が弱いところ、通路等に複数台設置することが好ましい。
監視装置100は、上記以外を不審者として認定し、不審者の位置が表記されたレイアウト情報を、この不審者に最も近い従業員の携帯端末装置30(スマートフォン30a、タブレット30b、ノートパソコン30c)に送信する。情報が送信された従業員は、後方施設の現場に急行し、事前に盗難等を防止することができる。
事務室、金銭集計室等の後方施設についても同様に、不審者を監視することができる。
また、商業施設以外の他の、工場研究所、オフイス等も建物外部周辺の出入口に人が接近すると、RFIDリーダ20によって認証する認証カード21を所持する従業員は、許可されたエリアであるので出入ができる。許可を得てない者については、位置が表記されたレイアウト情報をリアルタイムで送信する。この場合、警報を発する、またドアを施錠して出入ができないようにしてもよい。なお、施錠及び開錠は、警備員、従業員、警備室でのPCパスワード所持者により管理される。
バックヤードに車両を到着させた人が、荷捌場・検品場などに入り、納品しようとする。
その人が、認証カード21を所持していない、又は顔画像が登録されていない不審者であると、監視装置100は、不審者に関する情報(動画を含む)と、階数、荷捌場、倉庫名、室名、不審者を表記した後方施設レイアウト情報を、警備室PC、タブレット、関係従業員の携帯端末装置30(スマートフォン30a、タブレット30b、ノートパソコン30c)にリアルタイムで送信する。
許可を得ない者が出入しようとすると、監視装置100は、その人が不審者であると判定して上記の通りに関係従業員に送信する。また、不審者が各室、各倉庫に出入しようとすれば、出入口のドアを施錠して出入ができないようにすることも可能である。
本実施形態では、不審者に関する情報の送信レベルを予め設定しておくことができる。例えば、エリア本部、本社の管理担当者、責任者に送信をするかどうかを設定できる。
図10は、デジタルロス・アクシデントデフェンスシステムの後方施設レイアウトの一例を示す図である。図10Aは、GPSによる1階後方施設平面レイアウトと監視カメラ11の配置図、図10Bは、RFIDリーダ「△印」による1階後方施設平面レイアウトと監視カメラの配置図である。なお、他の各階の後方施設レイアウトもほぼ同様である。
さらに、異常事態の検出には、公知のすべてが含まれる。例えば異常事態には、不審者の侵入又は接近がある。また、通報は、メールに限らずどのようなものでもよい。
このプログラムを記録した記録媒体は、本デジタルロス・アクシデントデフェンスシステムのROMそのものであってもよいし、また、外部記憶装置としてCD-ROMドライブ等のプログラム読取装置が設けられ、そこに記録媒体を挿入することで読み取り可能なCD-ROM等であってもよい。
20 RFIDリーダ
21 認証カード
30 携帯端末装置
40 GPS
50 車両ストッパ装置
100 監視装置
110 制御部(制御手段)
111 顔認証機能部(顔認証照合手段)
112 不審者/不審車両運転者判定機能部
113 位置判定部(位置情報取得手段)
114 レイアウト情報記憶部
115 認定者追跡部
116 送信制御部
120 入力部
130 記憶部
140 表示部
150 出力部
160 顔情報データベース(DB)(顔画像記憶手段)
170 画像処理部
180 インタフェース(I/F)部
190 通信部
200 後方施設レイアウト(監視対象エリア)
1000 デジタルロス・アクシデントデフェンスシステム
Claims (10)
- 関係者以外無断立入禁止エリアである監視対象エリアを撮影するように設置された監視カメラで撮影された映像を監視して不審者による行為を防止するデジタルロス・アクシデントデフェンスシステムであって、
前記監視対象エリアにおいて複数の従業員がそれぞれ携帯する携帯端末装置の位置情報を取得する位置情報取得手段と、
認証された人物の顔画像を蓄積する顔画像記憶手段と、
前記監視カメラで撮影された人物の顔画像と、前記顔画像記憶手段に蓄積された顔画像とを照合する顔認証照合手段と、
前記顔認証照合手段による照合結果が認証された人物の顔画像と不一致の場合、不審者と判定し、前記位置情報取得手段から取得した位置情報に基づいて、前記不審者に最も近い前記携帯端末装置の位置を判定し、当該携帯端末装置に前記不審者に関する情報を送信する制御手段と
を備えることを特徴とするデジタルロス・アクシデントデフェンスシステム。 - 前記顔画像記憶手段は、更に不審者の顔画像を蓄積し、
前記制御手段は、前記顔認証照合手段による照合結果が不審者の顔画像と一致した場合、前記不審者に最も近い前記携帯端末装置に前記不審者に関する情報を送信することを特徴とする請求項1記載のデジタルロス・アクシデントデフェンスシステム。 - 前記監視対象エリアに設置されたRFIDリーダと、当該RFIDリーダが認証する認証カードとを備え、
前記制御手段は、前記RFIDリーダによる前記監視対象エリアにおける人物が所持する前記認証カードの認証が不成立の場合、不審者と判定し、前記不審者に最も近い前記携帯端末装置に前記不審者に関する情報を送信することを特徴とする請求項1記載のデジタルロス・アクシデントデフェンスシステム。 - 前記制御手段は、前記監視対象エリアにおいて認証された人物が、当該監視対象エリアの中の特定場所、又は予め指定された時間帯の出入であるかを判定し、
前記認証された人物が、前記特定場所、又は前記指定時間帯に出入許可されていない場合、当該人物を不審者と判定することを特徴とする請求項1乃至3いずれかに記載のデジタルロス・アクシデントデフェンスシステム。 - 車両の動きを規制する車両ストッパ装置を備え、
前記制御手段は、前記不審者が運転する車両が前記監視対象エリアの外に出ようとした場合、前記車両ストッパ装置を作動させることを特徴とする請求項1乃至3いずれかに記載のデジタルロス・アクシデントデフェンスシステム。 - 前記制御手段は、前記携帯端末装置から対応不可の応答が返された場合、前記不審者に次に近い前記携帯端末装置の位置を判定し、当該携帯端末装置に前記不審者に関する情報を送信することを特徴とすることを特徴とする請求項1乃至4いずれかに記載のデジタルロス・アクシデントデフェンスシステム。
- 前記制御手段は、前記携帯端末装置に前記不審者に関する情報を送信してから所定時間が経過した場合、前記不審者に次に近い前記携帯端末装置の位置を判定し、当該携帯端末装置に前記不審者に関する情報を送信することを特徴とすることを特徴とする請求項1乃至4いずれかに記載のデジタルロス・アクシデントデフェンスシステム。
- 前記不審者に関する情報は、前記監視対象エリア上に前記不審者の位置と該情報を送信した携帯端末装置の位置とを重ねた情報を含むことを特徴とすることを特徴とする請求項1乃至4いずれかに記載のデジタルロス・アクシデントデフェンスシステム。
- 関係者以外無断立入禁止エリアである監視対象エリアを撮影するように設置された監視カメラで撮影された映像を監視して不審者による行為を防止するデジタルロス・アクシデントデフェンス方法であって、
前記監視対象エリアにおいて複数の従業員がそれぞれ携帯する携帯端末装置の位置情報を取得する位置情報取得ステップと、
認証された人物の顔画像を蓄積する顔画像記憶ステップと、
前記監視カメラで撮影された人物の顔画像と、前記顔画像記憶ステップで蓄積された顔画像とを照合する顔認証照合ステップと、
前記顔認証照合ステップによる照合結果が認証された人物の顔画像と不一致の場合、不審者と判定し、前記位置情報取得ステップで取得した位置情報に基づいて、前記不審者に最も近い前記携帯端末装置の位置を判定し、当該携帯端末装置に前記不審者に関する情報を送信する制御ステップと
を備えることを特徴とするデジタルロス・アクシデントデフェンス方法。 - コンピュータを、
関係者以外無断立入禁止エリアである監視対象エリアを撮影するように設置された監視カメラで撮影された映像を監視して不審者による行為を防止するデジタルロス・アクシデントデフェンスシステムであって、前記監視対象エリアにおいて複数の従業員がそれぞれ携帯する携帯端末装置の位置情報を取得する位置情報取得手段と、認証された人物の顔画像を蓄積する顔画像記憶手段と、前記監視カメラで撮影された人物の顔画像と、前記顔画像記憶手段に蓄積された顔画像とを照合する顔認証照合手段と、前記顔認証照合手段による照合結果が認証された人物の顔画像と不一致の場合、不審者と判定し、前記位置情報取得手段から取得した位置情報に基づいて、前記不審者に最も近い前記携帯端末装置の位置を判定し、当該携帯端末装置に前記不審者に関する情報を送信する制御手段とを備えるデジタルロス・アクシデントデフェンスシステム
として機能させるためのプログラム。
Priority Applications (5)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201480077818.1A CN106164994A (zh) | 2014-04-09 | 2014-04-09 | 数字损失/事故防御***、方法和程序 |
JP2014536008A JP5780570B1 (ja) | 2014-04-09 | 2014-04-09 | デジタルロス・アクシデントデフェンスシステム、方法及びプログラム |
PCT/JP2014/060254 WO2015155847A1 (ja) | 2014-04-09 | 2014-04-09 | デジタルロス・アクシデントデフェンスシステム、方法及びプログラム |
EP14888940.5A EP3131076B1 (en) | 2014-04-09 | 2014-04-09 | Digital loss/accident defense system, method, and program |
US15/302,943 US20170294089A1 (en) | 2014-04-09 | 2016-04-09 | Digital loss/accident defense system, method, and program |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
PCT/JP2014/060254 WO2015155847A1 (ja) | 2014-04-09 | 2014-04-09 | デジタルロス・アクシデントデフェンスシステム、方法及びプログラム |
Publications (1)
Publication Number | Publication Date |
---|---|
WO2015155847A1 true WO2015155847A1 (ja) | 2015-10-15 |
Family
ID=54192815
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/JP2014/060254 WO2015155847A1 (ja) | 2014-04-09 | 2014-04-09 | デジタルロス・アクシデントデフェンスシステム、方法及びプログラム |
Country Status (5)
Country | Link |
---|---|
US (1) | US20170294089A1 (ja) |
EP (1) | EP3131076B1 (ja) |
JP (1) | JP5780570B1 (ja) |
CN (1) | CN106164994A (ja) |
WO (1) | WO2015155847A1 (ja) |
Cited By (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP2018137690A (ja) * | 2017-02-23 | 2018-08-30 | セコム株式会社 | 監視システム、及び監視方法 |
JP2020021431A (ja) * | 2018-08-03 | 2020-02-06 | 光水 佃 | 賃貸用店舗構造および店舗管理システム |
JP2020141427A (ja) * | 2020-06-15 | 2020-09-03 | 日本電気株式会社 | 情報処理システム、情報処理方法及びプログラム |
JP2022169345A (ja) * | 2021-04-27 | 2022-11-09 | 高千穂交易株式会社 | 情報処理システム、情報処理装置、情報処理装置の制御方法及びプログラム |
Families Citing this family (21)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP6833354B2 (ja) * | 2016-06-10 | 2021-02-24 | キヤノン株式会社 | 情報処理装置、情報処理方法及びプログラム |
US10587624B2 (en) * | 2016-09-20 | 2020-03-10 | Tnb Growth Corporation | Networking application for controlled-access-establishment |
US10380880B1 (en) * | 2016-11-14 | 2019-08-13 | Instant Care, Inc. | Methods of and devices for filtering triggered alarm signals |
CN108205681A (zh) * | 2016-12-16 | 2018-06-26 | 北京迪科达科技有限公司 | 一种校园食品安全智能监控管理*** |
WO2018128015A1 (ja) * | 2017-01-05 | 2018-07-12 | 日本電気株式会社 | 不審度推定モデル生成装置 |
CN110291516A (zh) * | 2017-02-22 | 2019-09-27 | 索尼公司 | 信息处理设备、信息处理方法和程序 |
CN107038784B (zh) * | 2017-04-14 | 2019-07-16 | 北京百度网讯科技有限公司 | 安全验证方法和装置 |
CN107341880A (zh) * | 2017-06-23 | 2017-11-10 | 深圳市盛路物联通讯技术有限公司 | 一种家居安防方法及*** |
CN107393246A (zh) * | 2017-08-12 | 2017-11-24 | 宋彦震 | 物联网智能家居监控*** |
CN108082478B (zh) * | 2017-12-16 | 2021-11-16 | 深圳市翼飞鸿天无人机科技有限公司 | 一种预警型无人机监视侦查*** |
CN108376415B (zh) * | 2018-02-13 | 2022-01-21 | 中国联合网络通信集团有限公司 | 一种轨迹填充的方法及装置 |
CN108762179A (zh) * | 2018-08-13 | 2018-11-06 | 广州市君望机器人自动化有限公司 | 一种巡检机器人 |
US11062578B2 (en) * | 2019-01-21 | 2021-07-13 | Panasonic I-Pro Sensing Solutions Co., Ltd. | Information processing device and determination method |
EP3951726A4 (en) * | 2019-03-29 | 2022-11-16 | NEC Corporation | MONITORING SYSTEM, MONITORING DEVICE, MONITORING METHOD AND NON-TRANSITORY COMPUTER READABLE MEDIA |
CN110232799A (zh) * | 2019-06-24 | 2019-09-13 | 秒针信息技术有限公司 | 追踪丢失对象的方法及装置 |
US11270129B2 (en) * | 2019-06-25 | 2022-03-08 | William Holloway Petrey, JR. | System and method for correlating electronic device identifiers and vehicle information |
US11861895B2 (en) * | 2020-07-16 | 2024-01-02 | Goodrich Corporation | Helicopter search light and method for detection and tracking of anomalous or suspicious behaviour |
US11983963B2 (en) * | 2020-07-24 | 2024-05-14 | Alarm.Com Incorporated | Anti-spoofing visual authentication |
CN112381053B (zh) * | 2020-12-01 | 2021-11-19 | 连云港豪瑞生物技术有限公司 | 具有图像跟踪功能的环保监测*** |
JP2022106150A (ja) * | 2021-01-06 | 2022-07-19 | i-PRO株式会社 | 監視エリア設定装置、監視エリア設定プログラム、監視エリア設定方法、アラート通知プログラムおよびアラート通知方法 |
JP2022187290A (ja) * | 2021-06-07 | 2022-12-19 | コニカミノルタ株式会社 | 監視装置、監視システム、監視方法及びコンピュータープログラム |
Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP2002230654A (ja) * | 2001-02-01 | 2002-08-16 | Nishi Mikawa Tsushin:Kk | 遠隔監視システム |
JP2009245078A (ja) * | 2008-03-31 | 2009-10-22 | Mitsubishi Heavy Ind Ltd | 出入車管理システム |
JP2011018094A (ja) * | 2009-07-07 | 2011-01-27 | Nec Corp | 巡回警備支援システム、方法及びプログラム |
JP2011227619A (ja) * | 2010-04-16 | 2011-11-10 | Chugoku Electric Power Co Inc:The | 領域管理システム |
JP2013210927A (ja) * | 2012-03-30 | 2013-10-10 | Sogo Keibi Hosho Co Ltd | 警備装置、及び警備方法 |
Family Cites Families (17)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP4177598B2 (ja) * | 2001-05-25 | 2008-11-05 | 株式会社東芝 | 顔画像記録装置、情報管理システム、顔画像記録方法、及び情報管理方法 |
JP4622301B2 (ja) * | 2004-05-07 | 2011-02-02 | オムロン株式会社 | 監視システム、および監視カメラ |
CN1725250A (zh) * | 2005-06-13 | 2006-01-25 | 施俊 | 自动识别身份并判断非法侵入的安防报警*** |
JP2007300572A (ja) * | 2006-05-08 | 2007-11-15 | Hitachi Ltd | センサネットシステム、センサネット位置特定方法 |
US10078693B2 (en) * | 2006-06-16 | 2018-09-18 | International Business Machines Corporation | People searches by multisensor event correlation |
JP2008079841A (ja) * | 2006-09-27 | 2008-04-10 | Aruze Corp | 遊技機 |
JP4891113B2 (ja) * | 2007-02-16 | 2012-03-07 | 有限会社ジュピターネット | 緊急通報機能、緊急対応機能を備えた緊急通報システム |
US8577498B2 (en) * | 2007-05-21 | 2013-11-05 | Panasonic Corporation | Automatic transfer method, transfer robot, and automatic transfer system |
JP2009188689A (ja) * | 2008-02-06 | 2009-08-20 | Nec Access Technica Ltd | セキュリティシステム及びその通報方法並びにそれに用いるセキュリィティ装置 |
CN102117524A (zh) * | 2009-12-31 | 2011-07-06 | 北京谊安医疗***股份有限公司 | 呼叫信息的处理方法、装置及*** |
WO2011140993A1 (zh) * | 2010-05-12 | 2011-11-17 | 北京星河易达科技有限公司 | 基于综合状态检测的智能交通安全***及其决策方法 |
JP5435740B2 (ja) * | 2010-11-12 | 2014-03-05 | オムロン株式会社 | 監視システム、および監視サーバ |
US20130204651A1 (en) * | 2011-09-30 | 2013-08-08 | Gokhan Gulec | Automated Hotel Bell Desk Queuing System |
JP2013196043A (ja) * | 2012-03-15 | 2013-09-30 | Glory Ltd | 特定人物監視システム |
CN102843547B (zh) * | 2012-08-01 | 2014-01-08 | 安科智慧城市技术(中国)有限公司 | 一种嫌疑目标智能追踪方法和*** |
CN103246869B (zh) * | 2013-04-19 | 2016-07-06 | 福建亿榕信息技术有限公司 | 基于人脸识别和行为语音识别的犯罪监控方法 |
JP6011833B1 (ja) * | 2015-09-14 | 2016-10-19 | パナソニックIpマネジメント株式会社 | ウェアラブルカメラシステム及び人物報知方法 |
-
2014
- 2014-04-09 WO PCT/JP2014/060254 patent/WO2015155847A1/ja active Application Filing
- 2014-04-09 CN CN201480077818.1A patent/CN106164994A/zh active Pending
- 2014-04-09 EP EP14888940.5A patent/EP3131076B1/en not_active Not-in-force
- 2014-04-09 JP JP2014536008A patent/JP5780570B1/ja active Active
-
2016
- 2016-04-09 US US15/302,943 patent/US20170294089A1/en not_active Abandoned
Patent Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP2002230654A (ja) * | 2001-02-01 | 2002-08-16 | Nishi Mikawa Tsushin:Kk | 遠隔監視システム |
JP2009245078A (ja) * | 2008-03-31 | 2009-10-22 | Mitsubishi Heavy Ind Ltd | 出入車管理システム |
JP2011018094A (ja) * | 2009-07-07 | 2011-01-27 | Nec Corp | 巡回警備支援システム、方法及びプログラム |
JP2011227619A (ja) * | 2010-04-16 | 2011-11-10 | Chugoku Electric Power Co Inc:The | 領域管理システム |
JP2013210927A (ja) * | 2012-03-30 | 2013-10-10 | Sogo Keibi Hosho Co Ltd | 警備装置、及び警備方法 |
Non-Patent Citations (1)
Title |
---|
See also references of EP3131076A4 * |
Cited By (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP2018137690A (ja) * | 2017-02-23 | 2018-08-30 | セコム株式会社 | 監視システム、及び監視方法 |
JP2020021431A (ja) * | 2018-08-03 | 2020-02-06 | 光水 佃 | 賃貸用店舗構造および店舗管理システム |
JP2020141427A (ja) * | 2020-06-15 | 2020-09-03 | 日本電気株式会社 | 情報処理システム、情報処理方法及びプログラム |
JP7036153B2 (ja) | 2020-06-15 | 2022-03-15 | 日本電気株式会社 | 情報処理システム、情報処理方法及びプログラム |
JP2022169345A (ja) * | 2021-04-27 | 2022-11-09 | 高千穂交易株式会社 | 情報処理システム、情報処理装置、情報処理装置の制御方法及びプログラム |
JP7186823B2 (ja) | 2021-04-27 | 2022-12-09 | 高千穂交易株式会社 | 情報処理システム、情報処理装置、情報処理装置の制御方法及びプログラム |
Also Published As
Publication number | Publication date |
---|---|
CN106164994A (zh) | 2016-11-23 |
EP3131076B1 (en) | 2018-12-19 |
JPWO2015155847A1 (ja) | 2017-04-13 |
EP3131076A1 (en) | 2017-02-15 |
JP5780570B1 (ja) | 2015-09-16 |
EP3131076A4 (en) | 2018-02-28 |
US20170294089A1 (en) | 2017-10-12 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
JP5780570B1 (ja) | デジタルロス・アクシデントデフェンスシステム、方法及びプログラム | |
JP5794599B1 (ja) | デジタルファインドセキュリティシステム、方法及びプログラム | |
US8825535B2 (en) | Management and control system for a designated functional space having at least one portal | |
US8831970B2 (en) | Virtual attendant system and parking management system | |
JP5871296B1 (ja) | スマートセキュリティ・デジタルシステム、方法及びプログラム | |
US7388481B1 (en) | Method and apparatus for asset management in an open environment | |
US11704955B2 (en) | Radio frequency antenna and system for presence sensing and monitoring | |
JP5780569B1 (ja) | デジタルロス・デフェンスセキュリティシステム、方法及びプログラム | |
WO2012173655A1 (en) | Management and control system for a designated functional space having at least one portal | |
JP3690368B2 (ja) | セキュリティ管理システム | |
JPWO2018198376A1 (ja) | デジタルスマートセキュリティシステム、方法及びプログラム | |
US10134255B2 (en) | Digital future now security system, method, and program | |
US11790713B2 (en) | Security entry and delivery system and method of using same | |
KR20140119368A (ko) | 매장 관리 및 출입 통제 시스템 | |
JPWO2018198385A1 (ja) | デジタルレジスタセキュリティシステム、方法及びプログラム | |
US11303856B1 (en) | Security entry and delivery system and method of using same | |
EP4040412A1 (en) | Monitoring system and unmanned ground vehicle | |
JP2002092766A (ja) | ホテル内セキュリティ監視システム | |
Slotnick | Integrated Physical Security Systems |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
ENP | Entry into the national phase |
Ref document number: 2014536008 Country of ref document: JP Kind code of ref document: A |
|
121 | Ep: the epo has been informed by wipo that ep was designated in this application |
Ref document number: 14888940 Country of ref document: EP Kind code of ref document: A1 |
|
WWE | Wipo information: entry into national phase |
Ref document number: 15302943 Country of ref document: US |
|
NENP | Non-entry into the national phase |
Ref country code: DE |
|
REEP | Request for entry into the european phase |
Ref document number: 2014888940 Country of ref document: EP |
|
WWE | Wipo information: entry into national phase |
Ref document number: 2014888940 Country of ref document: EP |