WO2017073101A1 - デジタルスマートセフティシステム、方法及びプログラム - Google Patents
デジタルスマートセフティシステム、方法及びプログラム Download PDFInfo
- Publication number
- WO2017073101A1 WO2017073101A1 PCT/JP2016/064462 JP2016064462W WO2017073101A1 WO 2017073101 A1 WO2017073101 A1 WO 2017073101A1 JP 2016064462 W JP2016064462 W JP 2016064462W WO 2017073101 A1 WO2017073101 A1 WO 2017073101A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- smoke
- fire
- facility
- person
- evacuation
- Prior art date
Links
Images
Classifications
-
- G—PHYSICS
- G08—SIGNALLING
- G08B—SIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
- G08B7/00—Signalling systems according to more than one of groups G08B3/00 - G08B6/00; Personal calling systems according to more than one of groups G08B3/00 - G08B6/00
- G08B7/06—Signalling systems according to more than one of groups G08B3/00 - G08B6/00; Personal calling systems according to more than one of groups G08B3/00 - G08B6/00 using electric transmission, e.g. involving audible and visible signalling through the use of sound and light sources
- G08B7/066—Signalling systems according to more than one of groups G08B3/00 - G08B6/00; Personal calling systems according to more than one of groups G08B3/00 - G08B6/00 using electric transmission, e.g. involving audible and visible signalling through the use of sound and light sources guiding along a path, e.g. evacuation path lighting strip
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06V—IMAGE OR VIDEO RECOGNITION OR UNDERSTANDING
- G06V20/00—Scenes; Scene-specific elements
- G06V20/50—Context or environment of the image
- G06V20/52—Surveillance or monitoring of activities, e.g. for recognising suspicious objects
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06V—IMAGE OR VIDEO RECOGNITION OR UNDERSTANDING
- G06V40/00—Recognition of biometric, human-related or animal-related patterns in image or video data
- G06V40/10—Human or animal bodies, e.g. vehicle occupants or pedestrians; Body parts, e.g. hands
- G06V40/103—Static body considered as a whole, e.g. static pedestrian or occupant recognition
-
- G—PHYSICS
- G08—SIGNALLING
- G08B—SIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
- G08B13/00—Burglar, theft or intruder alarms
- G08B13/22—Electrical actuation
-
- G—PHYSICS
- G08—SIGNALLING
- G08B—SIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
- G08B17/00—Fire alarms; Alarms responsive to explosion
- G08B17/10—Actuation by presence of smoke or gases, e.g. automatic alarm devices for analysing flowing fluid materials by the use of optical means
-
- G—PHYSICS
- G08—SIGNALLING
- G08B—SIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
- G08B21/00—Alarms responsive to a single specified undesired or abnormal condition and not otherwise provided for
- G08B21/02—Alarms for ensuring the safety of persons
- G08B21/12—Alarms for ensuring the safety of persons responsive to undesired emission of substances, e.g. pollution alarms
-
- G—PHYSICS
- G08—SIGNALLING
- G08B—SIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
- G08B25/00—Alarm systems in which the location of the alarm condition is signalled to a central station, e.g. fire or police telegraphic systems
-
- G—PHYSICS
- G08—SIGNALLING
- G08B—SIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
- G08B27/00—Alarm systems in which the alarm condition is signalled from a central station to a plurality of substations
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06V—IMAGE OR VIDEO RECOGNITION OR UNDERSTANDING
- G06V40/00—Recognition of biometric, human-related or animal-related patterns in image or video data
- G06V40/10—Human or animal bodies, e.g. vehicle occupants or pedestrians; Body parts, e.g. hands
- G06V40/16—Human faces, e.g. facial parts, sketches or expressions
- G06V40/172—Classification, e.g. identification
Definitions
- the present invention relates to a digital smart safety system and method for taking in information from safety-related devices installed in a facility and monitoring the status of the facility, and safely evacuating persons concerned in the facility to the occurrence of a fire or a suspicious person And the program.
- Accident cases include intruders from outside and information leaks from insiders of the company.
- Security measures against intrusion from the outside include double locking, security cameras, security sensors, authentication passwords, and expansion of fingerprint authentication.
- Information management for internal parties includes introduction of an authentication camera, an RFID reader, a password, fingerprint authentication, and the like.
- Patent Document 1 when an evacuation guidance message is received, a map image that grasps an adjacent evacuation exit from the electronic map in the building based on the position in the building of the mobile communication terminal and guides it in the evacuation direction; A fire evacuation device linked with a mobile communication terminal including an evacuation guide that outputs evacuation voice is described. Since the direction opposite to the direction in which the smoke flows corresponds to the point where the fire has occurred, the evacuation guide unit guides the evacuation in the direction of the flow of smoke that escapes from the point where the fire has occurred.
- building facilities Conventional large-scale commercial facilities, hospitals, hotels, complex facilities, terminals, underground theaters, gathering halls and other special buildings (hereinafter referred to as building facilities) and ships, etc. are equipped with smoke and toxic gas from fire-fighting equipment.
- building facilities Conventional large-scale commercial facilities, hospitals, hotels, complex facilities, terminals, underground theaters, gathering halls and other special buildings (hereinafter referred to as building facilities) and ships, etc. are equipped with smoke and toxic gas from fire-fighting equipment.
- As a function of discharging to the outside there are mechanical smoke exhausting equipment and natural smoke exhausting of windows around the outside, and mechanical smoke exhausting is obligated particularly in large-scale and basement building facilities.
- the monitoring system for these facilities a system that prevents accidents, incidents, and fires in advance by notifying in real time the status of the location of the fire and the number of floors and location of the person who has escaped. Is still not enough.
- An object of the present invention is to provide a digital smart safety system, method, and program capable of safely and accurately evacuating a person in a facility from a smoke particularly when a fire occurs.
- a digital smart safety system includes a safety-related information storage unit that stores safety-related information including a layout of a facility, a plurality of smoke detection units that are installed in the facility and detect smoke due to a fire, Based on the smoke information detected by the smoke detection means, a smoke determination means for determining the direction, amount and speed of smoke flow, and based on the determination result of the smoke determination means, a safe place is designated and the facility And a control means for executing evacuation guidance control for evacuating the related parties.
- the direction, amount and speed of the smoke flow are detected and a safe place is specified and guided, so there is little smoke flow and high quality evacuation guidance that guides people in the slow direction. It can be realized, and the person in the facility can be safely and accurately evacuated in the event of a fire.
- the control means when detecting smoke due to fire Or, during the evacuation guidance, by driving the blower and diffusing smoke, the fire momentum is strong, the smoke fills the building facilities, preventing refugees from evacuating, preventing visual impairment, breathing disturbance,
- the blower changes the blowing direction, and the smoke is guided to the optimum exhaust outlet based on the direction, amount, and speed of the smoke flow that fills the building facility, and the smoke is discharged from the exhaust outlet to the outside.
- a fire door detection means for detecting that the fire door provided in the facility is not closed, Based on the detection result of the fire door detection means, the control means informs the person concerned in the facility that the fire door is not closed, so that the smoke is filled with the fire door opened.
- the fire door includes a fire shutter in this specification, and the fire shutter is installed for each section of the building facility within 3,000 m 2 .
- human detection means for detecting a person who has escaped, and the control means reports that the person who has escaped is present based on the detection result of the human detection means. Can be rescued or evacuated without fail.
- a digital smart safety method includes a safety-related information storage step for storing safety-related information including a layout of a facility, a smoke detection step for detecting smoke caused by a fire installed in the facility, and the smoke detection step. Based on the detected smoke information, a smoke judgment step for judging the direction, amount and speed of the smoke flow, and based on the judgment result of the smoke judgment step, a safe place is designated and the person concerned in the facility is evacuated. And a control step for executing evacuation guidance control to be guided.
- the present invention also includes a computer, a safety-related information storage unit that stores safety-related information including a facility layout, a plurality of smoke and gas detection units that are installed in the facility and detect smoke caused by a fire, Based on the smoke information detected by the smoke detection means, a smoke determination means for determining the direction, amount and speed of the smoke flow, and based on the determination result of the smoke determination means, a safe place is designated and the facility Is a program for functioning as a digital smart safety system including control means for executing evacuation guidance control for evacuating and guiding the related parties.
- a person in a facility can be safely secured based on the direction, amount, and speed of smoke flow caused by a fire that fills the facility in a complex manner at various speeds in response to a human life situation such as the occurrence of a fire. And it is possible to guide evacuation accurately.
- concentration of CO which is a toxic gas, is stipulated by laws and regulations to be 10 ppm or less in an office with ventilation equipment.
- FIG. 1 is a block diagram showing a configuration of a digital smart safety system according to an embodiment of the present invention.
- This embodiment is an example applied to a digital smart safety system that takes in information from safety-related devices installed in a facility, monitors the status of the facility, and transmits information to portable devices carried by persons concerned in the facility. is there. Incidents and accidents include a suspicious person in addition to a fire.
- Smoke is a type of aerosol that is a mass of air that contains particulates that result from incomplete combustion.
- Suspicious persons include intruders from outside the company, in-house personnel working outside of the time for which permission is obtained, and in-house personnel in areas outside the scope of work for which permission has been obtained.
- a digital smart safety system 1000 includes a monitoring device 100 that controls the entire system, and a plurality of various types installed in building facilities such as sales facilities, commercial facilities, business facilities, offices, research and development rooms, and factories.
- Safety-related device 200 and a portable device 300 carried by persons concerned such as business facilities, commercial facilities, business facilities, offices, research and development rooms, factories, and the like.
- the digital smart safety system 1000 captures information from safety-related devices installed in the facility, monitors the status of the facility, displays necessary information, and transmits information to portable devices carried by persons concerned in the facility System.
- the monitoring apparatus 100 is, for example, a PC server that is installed in a management room of a business facility and centrally manages the business facility, or a business PC server that promotes business.
- the monitoring device 100 may be installed as a functional unit responsible for digital smart safety control in the PC server or business PC server, or may be installed alone.
- the monitoring device 100 may be a general server computer, personal computer, or the like.
- the monitoring device 100 includes an external storage device (not shown) and is connected to a network (not shown). Information related to the business of the business PC server is backed up in an external storage device provided in the business PC server.
- the monitoring device 100 includes a control unit 110, an input unit 120, a storage unit 130, a safety related information storage database (DB) 135 (safety related information storage unit, corresponding mode storage unit), a display unit 140, and an output unit 150.
- the monitoring device 100 When it is detected that a person who is a suspicious person outside or inside the company described above appears in the store, the monitoring device 100 notifies the headquarters / head office and the security company system of the information of the person and the information of the store through the network.
- control unit 110 reads each program from the ROM as necessary, loads it into the RAM, and executes each function (described later).
- Each program may be stored in the storage unit 130 in advance, or may be taken into the monitoring apparatus 100 when necessary via another storage medium or communication medium.
- the control unit 110 is configured by a CPU (Central Processing Unit) or the like, and controls the entire monitoring apparatus 100 and executes a monitoring program to function as a digital smart safety system.
- the control unit 110 detects the detection by the related person position information acquisition unit 111 that acquires the position information of the portable device carried by each of the related persons, and the plurality of smoke detectors 234 installed in each place of the facility.
- Smoke determining means 112 for determining the direction, amount and speed of smoke flow based on the smoke information, fire door detecting means 113 for detecting that the fire door / fire shutter 228 provided in the facility is not closed, Control that executes evacuation guidance control that designates a safe place and evacuates relevant persons of the facility based on the determination result of the smoke detection means 112 based on the determination result of the person detection means 114 and the smoke determination means 112 when a fire breaks out Means 115 and a transmission control unit 116 are provided.
- the control means 115 drives the blower 235 (described later) to diffuse smoke when sensing smoke due to fire or evacuation guidance. Based on the detection result of the fire door detection means 113, the control means 115 notifies the person concerned in the facility that the fire door 228 (described later) is not closed. Based on the detection result of the human detection means, the control means 115 notifies a person who has escaped (using Wi-Fi • RFID. Details of Wi-Fi • RFID will be described later).
- the control means 115 broadcasts the evacuation guidance information to the evacuation site on the monitor 222, notifies the speaker 223, and transmits it to the portable device 300 of the person concerned.
- the control unit 115 transmits suspicious person information and / or safety-related information to the portable device 300 of the person concerned.
- the control means 115 is at least one of evacuation guidance among locking the equipment that the safety-related device 200 has for crime prevention, shutting down or powering off an information access device such as a PC server, and warning by image or sound. Execute control.
- the input unit 120 is an input device for a user of the monitoring device 100 to input an instruction or the like to the monitoring device 100, such as a keyboard, a mouse, a touch panel provided on the screen of the display unit 140, and a microphone 224.
- the storage unit 130 stores still images and moving images received from the monitoring camera 221, various data and programs used by the control unit 110.
- the safety related information storage DB 135 stores safety related information including the layout of the facility.
- the safety related information storage DB 135 stores the installation location of the smoke detector 234 (described later) together with the layout information.
- the safety related information storage DB 135 stores Wi-Fi authentication registration information and iBeacon (registered trademark) registration information.
- the safety related information storage DB 135 stores a plurality of response patterns corresponding to the severity as an n-order mode (n is an integer of 2 or more) for an emergency situation that may occur in a facility.
- the display unit 140 displays the operation status of the monitoring apparatus 100, an image received from the monitoring camera 221, a GUI (Graphical User Interface) for operating the monitoring apparatus 100, and the like.
- the output unit 150 is an audio interface, for example, and outputs an audio signal from the monitoring device 100 to the speaker 223 in the facility. Examples of the audio signal output from the monitoring device 100 to the speaker 223 include an audio signal input from an audio input device such as a microphone 224 provided in the input unit 120, or audio data (audio sample data) stored in the storage unit 130. ) May be an audio signal that the control unit 110 reads and reproduces.
- the speaker 223 includes an amplifier and a loudspeaker arranged in the facility, and broadcasts an audio signal input from the monitoring device 100 into the facility.
- the face information DB 160 stores face images (face information) of suspicious persons and facility personnel.
- the image processing unit 170 performs a predetermined process on the received image. Predetermined processing includes contour extraction, image resizing, resolution conversion processing, and the like.
- the image processing unit 170 performs image processing such as adding a red frame or a yellow frame to the face image transmitted to the portable device 300 of the person concerned.
- the I / F unit 180 connects each monitoring camera 221 and the monitoring device 100 arranged in the facility. Further, the I / F unit 180 connects each RFID (Radio Frequency Identification) reader 202 arranged in the facility, and an RFID tag (in this embodiment, the authentication card 31) possessed by a person close to the RFID reader 202. ) Is sent to the monitoring apparatus 100.
- the I / F unit 180 is connected to a headquarter / head office or a security company (not shown) via a network or a dedicated line.
- Basic data such as a person's face registered in the face information DB 160 is obtained from the headquarters / headquarters or security company (not shown) via the I / F unit 180, and the face information DB 160 is constructed.
- the face information DB can be updated to the latest face image (face information) by exchanging information with a headquarters / head office or a security company (not shown).
- the security company is not an essential component of the digital smart safety system 1000 according to the present embodiment.
- the communication unit 190 transmits / receives data to / from the mobile device 300 via the base station.
- the communication unit 190 receives the position information of each portable device 300 to the portable device 300 via the base station at regular intervals, and at the time of recognizing the suspicious person, information on the suspicious person (e-mail transmission, video) For example).
- the safety-related device 200 includes a Wi-Fi (Wireless Fidelity) terminal (hereinafter referred to as Wi-Fi handset) 201, an RFID reader 202, an i-beacon handset 203, a human sensor 211, a laser radar (Laser) installed in a business facility.
- Wi-Fi handset Wi-Fi terminal
- RFID reader 202 RFID reader
- i-beacon handset 203 a human sensor
- Human sensor 211 a laser radar (Laser) installed in a business facility.
- Laser laser radar
- a mechanical smoke exhaust port 232 may be further added at an arbitrary point between the mechanical smoke exhaust ports 232.
- the i-beacon handset 203 waits in the background by executing an application having an i-beacon function, and excites a predetermined action when approaching an i-beacon base unit 302 of the mobile device 300 described later.
- the position information of the i-beacon parent device 302 can be detected.
- the human sensor 211 is a sensor for detecting a human location. Infrared rays, ultrasonic waves, visible light, etc. are used.
- the laser radar 212 measures the size, position, and speed of an object and detects the intrusion / crossing of a suspicious person.
- the laser radar 212 is installed in an important security section such as an office, a design room, a research and development room, or a management room. Also, it is usually installed at the entrance of a building where people do not enter or exit.
- the monitor 222 may be a television screen or an LED display.
- the relay box 225 cuts off the power path to the electric lock 226, the PC server 241, the network hub 242, and the external storage device (not shown) by an OFF signal from the monitoring device 100.
- the electric lock 226 is installed in a desk, a data cabinet, a safe room, or the like.
- the repelling device 231 repels a suspicious person with a special high frequency or a large volume siren.
- the monitoring camera 221 is a PTZ camera having a PTZ (pan / tilt / zoom) function, and is remotely operated by the monitoring device 100.
- the monitoring cameras 221 are installed at various locations in the monitoring target area such as a rear facility that is an unauthorized entry area other than those concerned including the truck yard, and photograph the monitoring target area.
- the monitoring camera 221 is an authentication camera that captures a person's face. An image captured by the monitoring camera 221 is output to the monitoring device 100.
- the monitoring camera 221 may always shoot a moving image, or may shoot a single still image every certain time (for example, several seconds).
- the RFID reader 202 exchanges data with an RFID tag (authentication card 31) possessed by a related person in a non-contact manner by short-range wireless communication.
- the communicable distance with the RFID tag is, for example, 3 to 7 m.
- the RFID reader 202 is an RFID tag compatible handy terminal or reader / writer. Note that the RFID reader 202 generally manages settlement of products with an RF tag by detecting whether or not there is a response to transmission to an RF tag attached to the product. .
- the authentication card 31 is an example in which an RFID authentication card that performs authentication with the RFID reader 202 is used as an RFID tag.
- the authentication card 31 may be an authentication card by any authentication means. Further, the fact that the authentication card 31 has a card shape is merely called for convenience of explanation, and may not have a card shape.
- the fire door / fire shutter 228 is a kind of fire prevention equipment defined in the Building Standard Law. In the case of a shutter type, the fire door is also called a fire shutter. A fire shutter is installed in each section of the building facility within 3,000 m 2 .
- the fire door / fire shutter 228 is normally designed to allow passage of people but can prevent the penetration of a flame in the event of a fire. For this reason, it plays an important role in preventing fire damage.
- the fire door / fire shutter 228 is connected to the control unit 110 of the monitoring apparatus 100 (connection by serial transmission). As will be described later, the control unit 110 detects the open / closed state of the fire door / fire shutter 228 (in particular, the fire door is not closed).
- Smoke detectors 234 are installed at various locations in the facility and detect smoke from fire.
- the smoke sensor 234 may be either an ionization type smoke sensor that detects a change in the ionization state of air due to fire smoke, or a photoelectric smoke sensor that detects diffuse reflection or shading of light due to fire smoke. Also, a smoke detector that extracts a large number of features such as brightness, color, shape, and movement of smoke and performs image processing may be used.
- a plurality of smoke detectors 234 are installed along the main passage and the like. Each smoke detector 234 is connected to the control unit 110 of the monitoring device 100 (connection by serial transmission). As will be described later, the control unit 110 stores the installation location of each smoke detector 234 together with the layout information.
- the controller 110 can detect the direction, amount, and speed of the smoke flow based on the installation location information of each smoke detector 234 and the smoke information (whether smoke is detected and the amount of smoke) from each smoke detector 234. .
- the blower 235 may be a movable blower (see FIG. 7 to be described later) which is installed around the outside, in a smoke diffusion place including an opening such as a window or a smoke exhaust port, and the blowing direction can be changed (see FIG. 7 below), or the blowing direction is fixed.
- the smoke generated by the fire may be forcibly blown in a harmless direction as much as possible from the smoke outlet.
- the blower 235 installed in the vicinity of the emergency exit blows smoke generated by a fire outdoors. This spreads the smoke generated by the fire.
- the blowing direction may be determined according to the direction, amount, and speed of smoke flow based on the smoke information sensed by the smoke detector 234.
- the portable device 300 is carried by a plurality of parties.
- the mobile device 300 is, for example, a smartphone, a tablet, or a laptop computer.
- the mobile device 300 is a mobile phone, a PHS (Personal Handy-Phone System), a PDA (Personal Digital Assistants), or a dedicated terminal.
- the portable device 300 can be used by various parties at various places (that is, the current position), and receives video or the like including mail or video from the monitoring device 100 via a telephone line (not shown). Is possible.
- the mobile device 300 is assumed to be used with a smartphone or a tablet, and each individual can use the device at various locations (that is, the current location).
- One of the portable devices 300 is disposed at a headquarter / head office (not shown).
- the portable device 300 includes a Wi-Fi individual identification device (hereinafter referred to as Wi-Fi parent device) 301, an i-beacon parent device 302, and a GPS (Global Positioning System) 303.
- the Wi-Fi master device 301 receives and individually identifies the radio waves of the Wi-Fi slave device 201 installed in the business facility.
- the i-beacon base unit 302 stands by in the background by executing an application having an i-beacon function.
- the i-beacon parent device 302 transmits unique ID information when it comes close to the i-beacon child device 203 installed in the facility, and an application associated with the ID information reacts to obtain its position information. .
- the monitoring apparatus 100 accumulates the arrangement information of the i-beacon slave unit 203 installed in the facility in the safety related information storage DB 135. Therefore, when the i-beacon master device 302 comes close to the i-beacon slave device 203, the ID and position of the person carrying the mobile device 300 can be determined.
- the person concerned carries the RFID tag (authentication card 31) that the RFID reader 202 authenticates.
- the RFID reader 202 captures the position of the party carrying the authentication card 31 by authenticating the RFID tag (authentication card 31) possessed by the party.
- the communicable distance is 3 to 7 m.
- the specification which makes a communicable distance about 400 m is also possible by using the active tag which incorporates a battery.
- the related person includes a pressurizing security device 310 that detects an abdominal pressure of the wearer and determines an abnormality.
- the pressurizing security device 310 includes an abdominal pressure sensor (not shown) that detects expansion / extension of the user's abdomen and outputs an expansion / contraction signal (abdominal pressure signal), and the like when the user applies abdominal pressure. Send an emergency signal.
- the abdominal pressure signal obtained by the abdominal pressure sensor is transmitted to the portable device 300 by a wireless communication method using Bluetooth (registered trademark).
- GPS303 receives the radio wave of position information from a GPS satellite or the like.
- the GPS 303 calculates the current position information from the information received via the GPS antenna as three parameters of latitude, longitude, and altitude, and acquires the position information.
- the acquired position information is transmitted to the monitoring device 100 in a timely manner.
- GPS satellites as means for acquiring position information
- a system using a positional relationship with a base station other than GPS may be used.
- a base station and a mobile phone communication network (not shown) are used instead of or in combination with the GPS 303. It is also possible to send / receive information to / from the mobile phone company server and acquire the current location information of the terminal from the approach confirmation.
- the operation of the digital smart safety system 1000 configured as described above will be described.
- the digital smart safety system ensures the safety of the people involved in the building facilities by appropriately evacuating the people concerned in the event of a disaster.
- the accident case involves the intrusion of a suspicious person from the outside. From inside, there are accidents and incidents such as information leaks of internal personnel of the company.
- This digital smart safety system guides all people to a safe place in the event of a fire, and if there is a suspicious person or intruder, it notifies the relevant person in real time about the current situation, so that accidents and incidents can occur. To prevent.
- FIG. 2 is a flowchart showing the fire guidance control of the control unit 110 of the monitoring device 100 of the digital smart safety system.
- the CPU constituting the control unit 110 (see FIG. 1) is repeatedly executed at a predetermined timing (in ms units). Moreover, in view of the urgency and importance of fire guidance control, it is executed with priority over suspicious person / intruder determination control described later.
- the control unit 110 acquires smoke information (whether smoke is detected and the amount of smoke) from a plurality of smoke detectors 234 installed at various locations in the facility.
- step S102 the smoke determining means 112 (see FIG. 1) of the control unit 110 determines whether any one of the smoke detectors 234 has detected smoke.
- step S102: No the process of this flow is complete
- a lot of smoke detectors 234 are installed in the facility, but it is set so as not to detect abnormalities in smoke (for example, cigarette smoke) other than when a fire breaks out. The process ends.
- the smoke determination unit 112 of the control unit 110 detects the layout information of the facility and the smoke detector 234 in step S103. Based on the smoke information, the direction, amount and speed of the smoke flow are determined. In the safety related information storage DB 135 shown in FIG. 1, the installation location of the smoke detector 234 is stored together with the facility layout information. The controller 110 can detect the direction, amount, and speed of the smoke flow based on the installation location information of each smoke detector 234 and the smoke information (whether smoke is detected and the amount of smoke) from each smoke detector 234. .
- the smoke determination unit 112 determines smoke information of another smoke detector 234 near the smoke detector 234.
- the direction of smoke flow the direction from the smoke detector 234 having a large amount of smoke to the smoke detector 234 having a small amount of smoke
- the direction of smoke flow may vary.
- the direction in which the smoke flow is stronger or the direction in which the smoke flow is relatively weak can be determined. Therefore, high quality evacuation guidance such as guiding a person in the direction where the smoke flow is weak can be realized.
- the smoke determination means 112 determines the degree of fire, that is, the urgency urgency (the urgency is high when there are many smoke detectors 234 with a large amount of smoke) from the smoke amount of the smoke detector 234. In this embodiment, since the emergency level of evacuation can be determined from the amount of smoke, evacuation guidance according to the level of emergency can be realized.
- the smoke flow velocity is determined by comparing temporal changes in the smoke amount of each smoke detector 234. In addition to the same factors as the direction of smoke flow, the smoke flow speed may vary depending on fire prevention measures (using flame retardants). In this embodiment, it is possible to determine the direction in which the smoke flow speed is higher or the direction in which the smoke flow speed is relatively slow. Therefore, the person is guided in a direction where the smoke flow speed is slow, that is, the fire is weak. High quality evacuation guidance can be realized.
- the determination result of (1)-(3) above is comprehensively determined by the control unit 110 to realize accurate evacuation guidance.
- step S ⁇ b> 104 based on the determination result of the smoke determination unit 112, the control unit 115 executes evacuation guidance control that designates a safe place and evacuates the persons concerned in the facility.
- the fire door detection means 113 (see FIG. 1) of the control unit 110 detects whether or not the fire door / fire shutter 228 provided in the facility is not closed.
- the control means 115 based on the detection result of the fire door detection means 113, the control means 115 notifies the person concerned in the facility that the corresponding fire door / fire shutter 228 in the evacuation route is not closed. This notification may be any announcement, video, Wi-Fi / RFID of the person concerned.
- the person concerned can confirm the safety and close the fire door / fire shutter 228 that is not closed, so avoid the situation where the fire door / fire shutter 228 that must be closed is not closed. be able to. Further, even when the danger is imminent and the fire door / fire shutter 228 cannot be closed, it is possible to know in advance that the fire door / fire shutter 228 is not closed and evacuate safely.
- step S107 the person detection means 114 (see FIG. 1) of the control unit 110 determines whether or not there is a person who is late to escape when a fire occurs.
- the monitoring device 100 collects signals from each sensor (RFID, Wi-Fi, etc.) in order to detect customers and related parties who have been late. That is, the monitoring apparatus 100 does not determine a suspicious person using each sensor, but detects a person who has escaped. For example, a customer who has not registered the RFID reader 202 and the portable device 300 and other personnel who are running late are detected.
- step S108 the control means 115 (see FIG. 1) of the control unit 110 notifies the person who has escaped based on the detection result of the person detection means 114.
- the control means 115 In order to notify a person who has escaped, mail, a layout, an image, and a voice are transmitted to the portable device 300 of a person in the vicinity of the person who has escaped.
- the person concerned can express to the person who has escaped and can rescue and evacuate the person who has escaped.
- step S107 If there is no person who has escaped (step S107: No), the process skips to step S109.
- the control means 115 drives the blower 235 to detect the smoke from the fire or to guide the evacuation, so that the smoke travels outside and diffuses to an opening such as a window or a smoke outlet. By diffusing the smoke, smoke inhalation during evacuation can be reduced.
- FIG. 3A is a flowchart illustrating a person registration process of the control unit 110 of the monitoring device 100 of the digital smart safety system. This flow is executed by the control unit 110 of the monitoring apparatus 100.
- step S1 the control unit 110 registers face information such as an RFID authentication card issuer, a facility person concerned, and a person concerned person in the face information DB 160. Specifically, the control unit 110 acquires information (face information) representing features of a human face to be used for face authentication from the face area, and registers the information in the face information DB 160 in association with each image. In addition, the control unit 110 receives an image of a person transmitted from the headquarters (not shown) and registers it in the face information DB 160.
- step S ⁇ b> 2 the control unit 110 registers face information of a person other than the registrant who possesses the RFID tag (authentication card 31) authenticated by the RFID reader 202 in the face information DB 160.
- a person other than the registrant of the authentication card 31 is a suspicious person or a suspicious vehicle driver.
- These suspicious persons include suspicious behavior addicts. Suspicious behavior addicts are, for example, persons who often appear at theft sites or persons who have been contacted in advance as caution persons from the headquarters / head office or security company. In this embodiment, the suspicious behavior addict is set to a higher monitoring level.
- the registration of the person's face information may be an update of the face information DB 160 from the headquarters / head office or a security company.
- step S ⁇ b> 3 the control unit 110 registers the detailed information such as the issuer of the authentication card 31, the facility related person, and the related party person, the vehicle number, and related information.
- FIG. 3B is a flowchart showing a Wi-Fi authentication registration process of the control unit 110 of the monitoring apparatus 100 of the digital smart safety system. This flow is executed by the control unit 110 of the monitoring apparatus 100.
- the control unit 110 connects the Wi-Fi slave device 201 and the Wi-Fi master device 301 installed in the business facility, and performs Wi-Fi authentication registration. Further, the position of the installed Wi-Fi slave device 201 is registered in the Wi-Fi master device 301.
- the Wi-Fi master device 301 of the portable device 300 of the participant confirms that the participant K3 is in the zone of the Wi-Fi slave device 201. Call and inform.
- the monitoring apparatus 100 determines permission / non-permission of related parties through Wi-Fi authentication described later.
- FIG. 3C is a flowchart illustrating i-beacon registration processing of the control unit 110 of the monitoring device 100 of the digital smart safety system. This flow is executed by the control unit 110 of the monitoring apparatus 100.
- the mobile device 300 of the person concerned is registered, and as an application of the mobile device 300, an i-beacon slave device having a radio wave identification range of about 10 cm to 5 m is provided.
- the control unit 110 connects the i-beacon slave device 203 and the i-beacon master device 302 installed in the business facility, and authenticates and registers the i-beacon.
- FIG. 3D is a flowchart illustrating an RFID authentication registration process of the control unit 110 of the monitoring device 100 of the digital smart safety system. This flow is executed by the control unit 110 of the monitoring apparatus 100.
- the control unit 110 connects the RFID reader 202 installed in the business facility and the RFID tag, and authenticates and registers the RFID.
- FIG. 4 is a flowchart showing the evacuation guidance control process of the monitoring device 100 of the digital smart safety system. This flow is mainly executed by the control unit 110 of the monitoring apparatus 100.
- the control unit 110 determines a suspicious person / intruder (hereinafter referred to as a suspicious person) candidate.
- the control part 110 acquires the positional information on the related person who adjoined the suspicious person by step S42.
- the control unit 110 determines the position of the portable device 300 of the party closest to the suspicious person based on the acquired position information.
- step S44 the control part 110 transmits the information regarding a suspicious person preferentially to the interested person nearest to the position of a suspicious person.
- the control unit 110 transmits voice / video / suspicious person location information (such as information marked on the facility layout) by e-mail.
- voice / video / suspicious person location information such as information marked on the facility layout
- information regarding the suspicious person may be transmitted to another mobile device 300.
- step S ⁇ b> 45 the control unit 110 waits for a response from the portable device 300 of the related party who has transmitted.
- the concerned person asks the suspicious person, the arson candidate (hereinafter, the same sentence), “How was it done?”, Etc., and if it is recognized as the suspicious person, the predetermined button operation (confirmation) of the portable device 300 is confirmed. Key touch). As a result, a response is returned to the monitoring apparatus 100.
- the control unit 110 in step S45 Then, the position of the portable device 300 next to the suspicious person whose matching result matches is determined, and information related to the suspicious person is transmitted to the portable device 300.
- step S46 the control unit 110 determines whether or not the person is a suspicious person according to the response result from the portable device 300. If it is not a suspicious person, this flow ends.
- step S47 the control unit 110 determines whether or not an emergency signal has been received from the pressure security device 310 of the portable device 300. If the emergency signal from the pressurizing security device 310 has not been received, it is determined that it is not a time-critical emergency, and in step S48, the control unit 110 notifies the portable device 300 of another party concerned. Send the voice / video / suspicious person's location information (e.g., information marked on the layout) by e-mail. Thereby, the other related persons can express to the spot where a suspicious person exists.
- voice / video / suspicious person's location information e.g., information marked on the layout
- the control unit 110 determines that an emergency has occurred, and in step S49, the control unit 110 determines that the monitor 222, the speaker 223, and other related parties have A message for evacuating and guiding the portable device 300 to the doorway farther away from the position of the suspicious person (for example, layout information indicating the movement route to the doorway and the situation) is transmitted. Thereby, the other related parties can evacuate a person (for example, a visitor) from the site where the suspicious person is located to an entrance far from the position of the suspicious person by referring to the message.
- a person for example, a visitor
- step S50 the control unit 110 pans, tilts, and zooms the surveillance camera 221 that captures the site of the suspicious person and photographs the suspicious person in the vicinity.
- step S51 the control part 110 collects the conversation which the suspicious person and the related person are talking from the microphone 224 installed in the vicinity of the suspicious person's site.
- step S52 the control unit 110 transmits the captured image of the suspicious person's situation (including a moving image) and the collected suspicious person's sound to the related person's portable device 300, the security related person, and the related organization by e-mail. .
- Other parties can confirm the status of the suspicious person in real time, and can prepare an express to the site and a warning associated therewith. In addition, it is possible to accurately report the status of suspicious persons to related organizations.
- step S53 the control unit 110 displays the image and sound of the suspicious person on the monitor 222 and ends this flow.
- the image and sound of the suspicious person may be displayed only on the monitor 222 at the place where the incident occurred (for example, the corresponding floor).
- Steps S50 to S53 are not essential and may be omitted. Further, as will be described later, it may be added appropriately as time elapses from the occurrence of an emergency or when an event occurs.
- FIG. 5 is a subroutine showing a suspicious person determination process of the monitoring device 100 of the digital smart safety system.
- This subroutine is a detailed flow of step S41 in FIG.
- the control unit 110 determines a suspicious person by the laser radar 212.
- a laser radar 212 for detecting a suspicious person is installed in an important security section such as an office, a design room, a research and development room, or a management room.
- the laser radar 212 is usually installed at the entrance of a building where people do not enter or exit. When the laser radar 212 is activated, it is determined (determined) as an intruder (suspicious person) without performing the following processing.
- the control unit 110 determines a suspicious candidate by face authentication. Specifically, the control unit 110 captures the video of the monitoring camera 221. When it is determined whether the face image of the person photographed by the monitoring camera 221 matches the face image of a related person such as a facility related person, an RFID authentication card registrant, or a related person related person. Determines that it is a suspicious person candidate and proceeds to step S66.
- a related person such as a facility related person, an RFID authentication card registrant, or a related person related person.
- step S63 the control unit 110 determines a suspicious person candidate by Wi-Fi authentication.
- the Wi-Fi master unit 301 for receiving and individually identifying the radio waves of the Wi-Fi slave unit 201 is registered for Wi-Fi authentication. Further, the position of the installed Wi-Fi slave device 201 is also registered in the Wi-Fi master device 301.
- the control unit 110 receives this radio wave and collates it to determine whether or not it is a permitted person. If it is a suspicious candidate, the process proceeds to step S66.
- the control unit 110 determines a suspicious candidate by i-beacon authentication.
- an i-beacon having a radio wave identification range of about 10 cm to 5 m is installed in a business facility.
- the monitoring device 100 registers portable devices of related persons in the business facility. When a related person passes or performs business at the location of the i-beacon, the portable device of the related person receives radio waves transmitted by the i-beacon. The mobile device of the related person transmits to the monitoring device 100 by radio waves that the i-beacon is located. The control unit 110 receives this radio wave and collates it to determine whether or not it is a permitted person. If it is a suspicious candidate, the process proceeds to step S66.
- step S65 the control unit 110 determines a suspicious candidate by RIFD authentication.
- an RFID reader 202 is installed in the business facility.
- An RFID tag (authentication card 31) is lent to a person who enters and leaves the business facility and a business partner who is permitted to do business.
- the rented RFID tag (authentication card 31) can enter and leave facilities such as aisles, areas, warehouses, business rooms, etc. within the permitted time (day of the week).
- the RFID tag of the mobile device 300 of the related party or business partner receives the radio wave transmitted by the RFID reader 202.
- the control unit 110 receives the radio wave of the RFID tag, and determines whether or not it is an authorized party or business partner by collating it and its position. If it is a suspicious candidate, the process proceeds to step S66.
- the suspicious person candidate determined in step S66 is recognized as a suspicious person, and the process returns to step S41 in FIG. If it is determined by the RIFD authentication that the person is not a suspicious person, the suspicious person candidate determined in step S67 is determined not to be a suspicious person, and the process returns to step S41 in FIG. Note that the execution order of the above steps S61 to S66 may not be this processing order. In addition, only a part of the authentications in steps S61 to S66 may be used.
- FIG. 6A is a flowchart illustrating a mode-compatible control process of the monitoring device 100 of the digital smart safety system. This flow is mainly executed by the control unit 110 of the monitoring apparatus 100.
- the control unit 110 determines whether or not an emergency has occurred. If it is not during an emergency, this flow ends.
- the occurrence of the above emergency situation is assumed to be an accident due to the occurrence of a fire or the intrusion of a suspicious person.
- a fire there is a signal from a weak current sensor that detects the smoke installed in the fire alarm, fire door, etc.
- the monitoring result by the monitoring camera 221 etc. is also included in the monitoring apparatus 100 side.
- step S72 the control unit 110 shifts to the n-th mode (n is an integer equal to or greater than 2), and executes processing according to the mode depending on the severity of the situation.
- the number of modes in the nth mode and the transition time from one mode to the next mode can be set depending on importance.
- the transition from the mode to the next mode may be triggered by an event regardless of time. For example, in the first mode, information on the suspicious person is sent by e-mail to the mobile device 300 of the person concerned, and if the user does not leave after 5 seconds, the mode is shifted to the second mode. 221 sets the direction and photographs the intruder.
- the mode is shifted to the third mode, the power source of the PC or the like is shut off to prevent the extraction of information on the business facility, and other parties are rushed to the site. Furthermore, if it does not leave after 10 seconds, it shifts to the fourth mode, and after warning by voice, it cooperates with the notification to related organizations.
- the first to fourth modes depending on the seriousness of the situation can raise the security specifications step by step, and appropriate security according to the situation can be realized.
- the security level is changed in the mode according to the severity of the situation, it is possible to avoid excessive security and worsening the situation and wasting time, but security is insufficient and effective. There is no risk of losing.
- control unit 110 of the monitoring device 100 executes the evacuation guidance control (see FIGS. 4 and 5) and the mode correspondence control (see FIG. 6) in parallel.
- evacuation guidance control see FIGS. 4 and 5
- mode correspondence control see FIG. 6
- the aspect which incorporates evacuation guidance control in mode corresponding control may be sufficient. In any case, it is preferable to give priority to the evacuation guidance control.
- FIG. 6B is a flowchart illustrating mode processing of the monitoring device 100 of the digital smart safety system. This subroutine is a detailed flow of step S72 in FIG. 6A.
- step S81 the control unit 110 of the monitoring apparatus 100 determines the type of emergency occurrence and the control target.
- step S82 the control unit 110 executes response control for each mode in order from the first mode in accordance with the type of emergency occurrence and the facility to be controlled.
- step S83 the control unit 110 determines whether or not to shift to the next mode due to the passage of time or the occurrence of an event. If the process does not shift to the next mode, the process returns to step S82.
- step S84 When shifting to the next mode, it is determined in step S84 whether or not the mode correspondence control is to be terminated. If the mode correspondence control is not terminated, the process returns to step S82. When the mode correspondence control is terminated, the process returns to step S72 in FIG. 6A.
- the digital smart safety system 1000 provides a system for grasping the occurrence of a fire in real time and evacuating an unspecified number of people staying in a building facility safely and without accidents. Stakeholders will be able to get accurate evacuation guidance, and visitors will be able to evacuate to the nearest stairs, evacuation facilities, and exits 02, in the opposite direction to the fire situation and fire location.
- FIG. 7 is a diagram showing an upper floor layout of a commercial facility when a fire occurs.
- this commercial facility there are stairs, special evacuation stairs, evacuation facilities, emergency ELV, etc., sales floors, passages, corners, accommodation rooms, offices, residences, etc. , Flame detector, heat detector (hereinafter referred to as fire alarm), CO detector 233, RFID reader 202, surveillance camera 221, monitor 222, human sensor 211, Doppler sensor (not shown), laser radar 212, speaker 223 , A smoke detector 234 (smoke detecting means) (see the asterisk), and a directional movable blower 235 (see the asterisk).
- the monitoring device 100 obtains smoke information (whether smoke is detected and the amount of smoke) from each of the smoke detectors SM1 to SM10 (see *), and detects the “direction, amount and speed” of the smoke flow to be safe. Specify and guide the location.
- the smoke flow velocity is such that the direction from the smoke detector SM3 toward the west (“the direction of smoke flow” A) is the direction from the smoke detector SM2 or SM1 toward the west (the “direction of smoke flow” B). , C). From these determination results, the monitoring apparatus 100 first determines a large smoke flow direction, ie, “smoke flow direction” A, “smoke flow direction” B, and “smoke flow direction” C. Next, from among the “smoke flow directions” A, B, and C, the magnitude of the smoke flow speed is compared to determine the final evacuation guidance direction. Here, the smoke speed of “smoke flow direction” A is the largest, and “smoke flow direction” B and C are in this order.
- the smoke speed of the “smoke flow direction” C is the smallest, the “smoke flow direction” C has the least influence of the smoke. Therefore, it is determined that the safe evacuation guidance place in this facility is the “front east side” at the northeast corner of the commercial facility shown in FIG. 7, and the evacuation is guided to the “front east side” with the least influence of smoke.
- the safe evacuation guidance place in this facility is the “front east side” at the northeast corner of the commercial facility shown in FIG. 7, and the evacuation is guided to the “front east side” with the least influence of smoke.
- the determination element not only the direction of smoke flow but also the speed of smoke is included in the determination element, so that fine (more safe) evacuation guidance is possible as described above.
- the smoke speed is also included in the determination element.
- the smoke direction cannot be distinguished from the direction of smoke flow A and B only from the smoke direction and amount without determining the smoke speed.
- the smoke flow speed is used in combination with the determination of the direction and amount of smoke flow, thereby enabling future evacuation guidance.
- by determining the smoke speed it is possible to improve control accuracy (specific example 1) and enable future evacuation guidance (specific example 2).
- FIG. 8 is a diagram showing an upper floor layout of a commercial facility when a fire occurs.
- the entire building facility is constructed as a LAN and connected to the digital smart safety system 1000.
- the monitoring device 100 stores the fire location and the distance between the stairs, special evacuation stairs, evacuation facilities, and entrance / exit.
- the monitoring device 100 identifies the location of the fire and transmits the stairs, evacuation facilities, and entrances in the reverse order of the fire location to the related person's portable device 300.
- the related person can instruct the related person to appropriately guide the store visitor and to rescue the store visitor who has been late.
- the monitoring apparatus 100 notifies the store visitor, the visitor, and the related person through the monitor 222 and the speaker 223, and guides each stairs, evacuation facility, and entrance in the reverse order from the fire position to the safe and evacuation direction.
- the directionally movable blower When the monitoring device 100 is filled with flames, smoke, and gas, particularly when it senses smoke that obstructs the field of view and CO toxic gas that harms the human body, the directionally movable blower operates. Visitors and people involved in building facilities who have reduced the concentration of smoke and CO can guide evacuation quickly and safely from evacuation stairs, evacuation facilities, special evacuation stairs, and emergency ELVs.
- the fire escape shutters and fire doors are open so that the evacuation stairs, evacuation facilities, fire prevention compartments, etc. of the building facilities can be used for business reasons. If a fire alarm is detected due to a fire, it will automatically close. When an emergency evacuation occurs due to a fire, there is a gap between the fire shutter and fire door, the floor, and even if the fire shutter and fire door are closed, there is a gap, smoke, gas in the evacuation stairs, evacuation facilities, and fire compartment In many cases, the fire fills up and is involved in fire accidents. If a weak current sensor (not shown) attached to a fire shutter or fire door senses and there is a gap, no current is passed.
- the monitoring device 100 captures the location of the fire by photographing the linked monitoring camera 221.
- the monitoring device 100 transmits the notation and image on the layout diagram of the corresponding location to the portable device 300 of the person concerned. Stakeholders can respond in real time.
- the blocks are divided into blocks Z1B, Z2B, Z3B, and Z250B (FIG. 9) of blocks X1, X2, and X3 to X7 on the horizontal axis, and Y1, Y2, and Y3 to Y9 on the vertical axis.
- the monitoring apparatus 100 stores distances such as evacuation stairs, special evacuation stairs, emergency ELVs, evacuation facilities, and passages of building facilities in the safety related information storage DB 135.
- the building facilities are designed so that anyone who visits the store and related parties can understand.
- the monitoring device 100 stores the external opening layout of the building facility, and stores the floor layout and name inside the building facility.
- the monitoring device 100 is arranged according to the number of floors, such as evacuation stairs S1 to S4, evacuation balconies B1 to B4, evacuation facilities E1 to E4, fire extinguishing equipment G1 to G4, fire alarms FS1 to FS80, etc.
- the fire alarm of the fire alarm FS8 senses.
- the surveillance camera 221 that senses the Z135 block as a sensing area works together to capture the direction of the fire.
- the monitoring apparatus 100 inputs these pieces of information into the safety related information storage DB 135.
- the distances of the east-side staircase S1, the south-side staircase S3, and the north-side staircase S4 (hereinafter also including evacuation balconies) that are safer and farther than the Z135 block are stored in advance. It is remembered.
- the monitoring device 100 executes processing according to the mode depending on the severity of the situation.
- the first mode (notification) is collated with the layout of the Z135 block of “the area of the west windows W3-4 of the 5th floor parking lot” by priority processing due to the nature of fire.
- the monitoring device 100 is the east side, which is a reverse staircase with a fire safety at the area and location of the FS8 fire alarm in the Z135 block, and the safety level with a greater distance from the Z135 block where the fire is occurring.
- the layout indicating the staircase S1, the south side staircase S3, the north side staircase S4, and the doorway is transmitted to the portable device 300 of the person concerned.
- the monitoring apparatus 100 transmits a fire motion video of A video that captures a fire and that is divided into two, A video that captures a wide area, and B video that captures a close image. Moreover, the monitoring apparatus 100 transmits the sound of the collected fire situation to the portable apparatus 300 of the person concerned by mail.
- the parties concerned can check in real time, express to the site, and report to related organizations. Stakeholders can report the occurrence of emergencies to security officials and related organizations, and many visitors can evacuate without any confusion, safety, and accidents.
- the first priority is a stair that the refugee can evacuate by himself / herself.
- the staircase transmits a layout specifying the east side staircase S1, the south side staircase S3, the north side staircase S4, and the first floor entrance.
- the evacuation direction is displayed with the A moving image in which the fire is photographed and divided into two, and a wide area is photographed, and the fire condition moving image of the fire position location Z135 block is displayed with the B moving image in which the close is photographed.
- the monitoring device 100 performs an emergency broadcast on the monitor 222 installed in the building facility. Visitors and related persons in the building facility can watch and listen to the in-house broadcast, and evacuees can clearly see the fire situation. You can evacuate safely to the evacuation stairs without any confusion such as falling, panic, and delay in escape. In the broadcast on the monitor 222, it is good to broadcast in which situation and in which direction the fire spreads and expands with the A moving image that captures a wide area and the B moving image that captures the close range. You can know the fire status of the fire location Z135 block. Furthermore, the monitoring device 100 notifies the speaker 223 by voice.
- Evacuees can see the exact fire situation, and by voice, go to evacuation directions with a high degree of safety, for example, from the stairs to the east side stairs S1 on the main entrance, the south stairs S3 on the south side of the bus stop, and the north stairs S4 on the station side. You can evacuate.
- the mode is shifted to the third mode.
- the third mode 10 seconds after the fire alarm of the fire alarm FS8 was detected, the fire expanded toward the Z50, Z10 and Z2 blocks, and the smoke detector (not shown) detected and issued the alarm.
- the monitoring device 100 receives the alarm signal from the fire alarm devices FS9 to FS12.
- the Z50, Z10, and Z2 blocks that are spread by the monitoring camera 221 are photographed and stored in the safety related information storage DB 135 of the monitoring device 100.
- the monitoring device 100 transmits the layout of the south stairs S3, the north stairs S4, and the first floor entrance of the evacuation facility safe in the reverse direction to the fire to the portable device 300 of the person concerned.
- the fire of the Z50, Z10, and Z2 blocks from the fire position location Z135 block by the evacuation direction with the A video that shoots the fire in two divided areas and the B video of the close-up shot. Send a video of the situation.
- the monitoring device 100 performs an emergency broadcast on the monitor 222 installed in the building facility. Visitors and related persons in the building facility can evacuate safely without any confusion such as falling down, panicking, delaying escape, etc.
- the circulator 229 is installed in an evacuation staircase, an evacuation balcony, the front of an emergency elevator, and an evacuation passage that can be fixed or movable.
- the movable blower is detected by the A fire alarm and the B fire alarm. For example, in conjunction with the A fire alarm, the monitoring camera 221, the projector, and the blower are directed toward the A fire alarm.
- the monitoring apparatus 100 stores in the database the positions of evacuation stairs, evacuation balconies, emergency elevators, and the like that can be safely evacuated by the evacuees in the building facility, the positions of the smoke detectors, and the separation distances thereof.
- the building facility is divided into blocks Z1 to Z250.
- the blower operates in the direction of the exhaust port of the smoke exhaust facility, and discharges smoke and CO to the outdoors. If the fire is strong and the irritating odor such as smoke or CO spreads from another block direction and smoke or CO flows toward the evacuation stairs, evacuation balcony or emergency elevator, the monitoring device 100 The signals of the smoke sensors SM1 to SM10 and the CO sensors CO1 to CO100 are detected, and the blower of the block is operated. This diffuses smoke and CO toward the front of the evacuation stairs, evacuation balcony, and emergency elevator. It can open the field of vision, remove irritating odors, and support evacuees to evacuate safely.
- the monitoring device 100 executes processing according to the mode depending on the severity of the situation.
- the digital smart safety system 1000 installs the Wi-Fi handset 201, the RFID reader 202, the i-beacon handset 203, and the human sensor 211 in the building facility, lends RFID tags to the parties concerned,
- the apparatus 300 is carried.
- the Wi-Fi slave device 201, the RFID reader 202, the human sensor 211, and the i-beacon slave device 203 are always operating to increase the security level and perform thorough business.
- the human sensor 211 is normally turned off in order to hinder customer traffic and shopping.
- the fire alarm senses, and the monitoring device 100 is guided by the monitor 222 and the speaker 223 as soon as possible, for example, within 5 minutes. It is important to evacuate customers and other related parties safely outside. If most of the customers and related persons in the business facility can evacuate within 5 minutes after the occurrence, the human sensor 211 that senses where the person is is not operated to prevent panic and accidents. It is possible to prevent congestion of processing at the time of evacuation guidance control and to concentrate on guiding and evacuating customers reliably.
- the fire alarm detects and after 5 minutes, finds customers and related parties who have escaped.
- Customers and related parties evacuate most of the building facilities, but it is also assumed that they may be involved in flames, smoke, toxic gases, etc. and be delayed.
- the monitoring device 100 collects signals from each sensor (RFID, Wi-Fi, etc.) in order to detect customers and related parties who have been late. That is, the monitoring apparatus 100 does not determine a suspicious person using each sensor, but detects a person who has escaped. For example, a customer who has not registered the RFID reader 202 and the portable device 300 and other personnel who are running late are detected.
- Wi-Fi senses where the smoke detectors SM1 to SM10 in the Z1 block to Z250 block of the building facility are late to escape.
- the human sensor 211 detects that there is a person in the human sensor 211 of the Z30 block.
- the monitoring device 100 transmits a mail, a layout, an image, and a voice to the portable device 300 of a person in the vicinity of Z30. The person concerned can rush to the manager Z30 and rescue and evacuate those who are late.
- the digital smart safety system 1000 is controlled for customers who are late. After 10 to 15 minutes have passed since the fire alarm was detected, it is assumed that the person staying in the business facility or business facility of the building facility is a customer who has been escaping from the management and related parties. In particular, those who are late to the sales facility, the managers will rescue in cooperation with the relevant organizations. In the unlikely event that personnel, managers, and related agencies are filled with flames, smoke, and toxic gases, and the evacuation passages, stairs, and entrances are unknown, the monitoring device 100 is estimated to have some people who have been delayed.
- the surveillance camera 221 is linked to the sensors of the Z120 block to Z125 block.
- the monitoring device 100 transmits the layout of the Z120 block to the Z125 block to the portable device 300 of the outside party in the building facility.
- the heat-resistant protective clothing that can withstand flames, smoke, and toxic gases, and those who are fully equipped with oxygen masks, related officials, etc. have some people who have escaped while considering secondary damage. Search, and can support evacuation guidance and rescue quickly and reliably.
- the monitoring apparatus 100 broadcasts that the evacuation stairs, facilities, and entrances are provided from the speaker 223, which is installed in front of the evacuation stairs, evacuation facilities, and entrances, and the evacuation stairs, evacuation facilities, evacuation passages, and entrances are arranged. . If the person concerned, the manager, or the person concerned concerned is filled with flames, smoke, or toxic gas and the evacuation passage, stairs, or entrance is not obstructed, the voice can be used to guide the building survivor. However, if the source of the fire or the fire is intense and the fire alarm or toxic gas is full, the broadcast guidance will not be given by the speaker. This is to prevent the danger that the danger will increase by evacuation according to the guidance of the voice in an imminent situation.
- the digital smart safety system 1000 includes commercial, office, complex facilities, server facilities, financial facilities, factories, underground malls, stations, air terminals, stadiums, ship facilities, etc. (hereinafter referred to as building facilities) for various uses.
- building facilities commercial, office, complex facilities, server facilities, financial facilities, factories, underground malls, stations, air terminals, stadiums, ship facilities, etc.
- FIG. 9 is a diagram showing a first floor layout of a commercial facility as a business facility. As shown in FIG. 9, this commercial facility has entrances and exits, important sales floors, passages, corners, etc., and Wi-Fi handset 201, RFID reader 202, i-beacon handset 203, monitoring Safety-related devices 200 such as a camera 221, a monitor 222, a human sensor 211, a laser radar 212, and a speaker 223 are provided.
- the functional range of the safety-related apparatus 200 is one block, for example, divided into 1 block to 70 blocks.
- the safety related information storage DB 135 of the monitoring device 100 stores the distance between each block, the first floor entrance / exit of the evacuation facility, the upper floors of the upper floors such as the 2nd to 28th floors, the evacuation elevator (ELV), and the like. This is so that visitors, visitors, and related parties can evacuate directly.
- the monitoring device 100 monitors the presence / absence of abnormalities in the entrance / exit, the gate, the sales floor, etc. of the important area of the building facility and the entire building facility in the general area and the off-limits area.
- the monitoring device 100 monitors a behavior suspicious person, a suspicious cautionary person, an annoying act, an accident, a case action, and the like.
- the monitoring device 100 transmits mail, sound, and an image to the portable device 300 of the person concerned. Stakeholders can respond in real time. Also, it is possible to improve security by preventing fraud and criminal acts in advance. In addition, it is preferable that the monitoring apparatus 100 monitors a business facility at the time of business, closing, and closing for 24 hours
- Wi-Fi Business-related persons K1 to K150 register and possess the portable device 300.
- the positions of the installed Wi-Fi slave devices 1 to 200 (not shown) are registered in the Wi-Fi master device 301.
- the party K3 passes or works through the radio area of the Wi-Fi slave device, the party K3 receives the radio wave of the portable device 300 of the party K3, and the portable device 300 of the party K3 sends the Wi-Fi master device 301 to the Wi-Fi master unit 301.
- a radio wave is transmitted to indicate that the mobile device 201 is in the area.
- the monitoring apparatus 100 determines whether a person existing in the area is permitted or not.
- a portable device 300 of a company officer / employee associated with a company is registered in the business facility in the safety-related information storage DB 135 of the monitoring device 100.
- an i-beacon handset 203 having a radio wave identification range of about 10 cm to 5 m is installed in a business facility. Connection to a router having a LAN configuration can be wired or wireless. The router is connected to the monitoring device 100.
- the party K8 passes or works at the location of the i-beacon slave unit 203, the radio wave transmitted from the i-beacon base unit 302 of the portable device 300 of the party K8 is received.
- the portable device 300 of the party K8 transmits a radio wave to the monitoring device 100 to notify that the i-beacon slave device 203 is located.
- the monitoring device 100 refers to the safety related information storage DB 135 to determine whether the related person K8 is permitted or not.
- the monitoring apparatus 100 stores the place where the RFID reader 202 is installed, the work area, the room name, the day of the week, the time, and the like in the safety related information storage DB 135. Persons who are allowed to enter and leave the business facility and are allowed to work are lent to the RFID reader 202 with an RFID tag (authentication card 31) that allows regular access. Business persons and business partners can enter and exit permitted passages, areas, warehouses, business rooms, etc. and carry out business by carrying the lent RFID tags.
- the person who carries the RFID tag and the business partner are allowed to enter, leave, and work on a determined day of the week and time, but if the user performs an action other than that permitted, the monitoring apparatus 100 will carry the person concerned.
- Mail, sound, and images are transmitted to the device 300 and transmitted. Stakeholders can respond in real time.
- the monitoring device 100 refers to the database and extracts the number of floors, areas, and layouts where the corresponding RFID reader 202 is installed. To do. In addition, the monitoring apparatus 100 captures a person with the monitoring camera 221 close to the corresponding RFID reader 202. And the monitoring apparatus 100 performs the process according to the mode by the seriousness degree of a situation.
- the first mode is a case where the person stops and stops after 2 seconds. In this case, it is possible to prevent confusion for a large number of parties in the business facility and evacuate safely and without accidents.
- the second mode after warning by voice, if the suspicious person does not leave after 5 seconds, the position of the corresponding position where the suspicious person is located is determined by the monitoring camera 221 and the suspicious person is photographed. It is possible to ensure the safety of the parties involved in the business facility.
- the third mode after further warning by voice, if the suspicious person does not leave after 10 seconds, for example, the relevant organization is notified. Prevents the extraction of business facility information, prevents the accuracy of suspicious person information, and prevents misunderstandings. Note that the number of modes and the time in the first mode to the third mode can be arbitrarily set depending on importance.
- the monitoring device 100 transmits the first floor entrance / exit, evacuation stairs, and passages that are safer and far apart from the location of R3 where the suspicious person is located by e-mail from the portable device 300 of the person concerned. .
- the person concerned can evacuate the store directly to the first floor entrance / exit and the escape stairs, which have high safety and are separated from the suspicious person.
- the monitoring device 100 broadcasts on the monitor 222 installed in the business facility. It can be safely handled with high accuracy.
- FIG. 10 is a diagram showing an office and a research and development room. As shown in FIG. 10, the office and the research and development room have work areas such as a break room, a public room, a business room, a research and development room, a design room, a data room, and a customer information room.
- work areas such as a break room, a public room, a business room, a research and development room, a design room, a data room, and a customer information room.
- the monitoring apparatus 100 stores a permitted area, a room name, a day of the week, a time, and the like, which are permitted contents, in a database.
- the authorized party R10 (not shown) can generally act and work in the public, such as the whole building and a break room.
- the authorized personnel R11 has the business room in the R & D room, the design room, the data room, the customer information room, etc. it can.
- the monitoring apparatus 100 automatically alerts the speaker 223 near the RFID reader 202 at the location of the person with voice. In this case, a delay time is set to prevent misidentification.
- the monitoring device 100 sends the first floor entrance, evacuation stairs, and passage with safety and separation distance from the location of R3 where the suspicious person is located, by e-mail from the portable device 300 of the person concerned. .
- the person concerned can evacuate the store directly to the first floor entrance / exit and the escape stairs, which have high safety and are separated from the suspicious person.
- the monitoring device 100 broadcasts on the monitor 222 installed in the business facility. It can be safely handled with high accuracy.
- the monitoring device 100 refers to the safety-related information storage DB 135 if the RFID reader 202 does not have a compatible radio wave or does not have an RFID tag. The number of floors, areas, and layouts where the corresponding RFID reader 202 is installed are extracted. In addition, the monitoring apparatus 100 captures a person with the monitoring camera 221 close to the corresponding RFID reader 202. And the monitoring apparatus 100 performs the process according to the mode by the seriousness degree of a situation.
- the first mode when the person stops and stops after 2 seconds, a warning is given by voice. In this case, it is possible to prevent confusion for a large number of parties in the business facility and evacuate safely and without accidents.
- the second mode after warning by voice, if the suspicious person does not leave after 5 seconds, the position of the corresponding position where the suspicious person is located is determined by the monitoring camera 221 and the suspicious person is photographed. It is possible to ensure the safety of the parties involved in the business facility.
- the third mode after further warning by voice, if the suspicious person does not leave after 10 seconds, for example, the relevant organization is notified. Prevents the extraction of business facility information, prevents the accuracy of suspicious person information, and prevents misunderstandings. Note that the number of modes and the time in the first mode to the third mode can be arbitrarily set depending on importance.
- K5 which transmits a non-conforming radio wave of K5, stops at the location of the i-beacon slave unit 203, and three seconds later.
- the monitoring device 100 shuts off the power by turning off the switch of the PC relay box 225 that can access the confidential data. K5 cannot access this PC. It is possible to prevent unauthorized information extraction by K3 being used improperly and prevent information leakage and the like.
- the monitoring apparatus 100 may turn on the electric lock 226 such as the K3 desk and the material cabinet to lock the desk and the material cabinet.
- the relay box 225 of the electric lock 226 of the entrance / exit door of an important room such as a server room, a customer information room, or a research and development room may be turned on so that K5 cannot enter the corresponding room. Extraction, copying, etc. of K3 material for K5 fraud can be prevented in real time.
- the location where K5 is located is photographed by the monitoring camera 221 and K5 (intruder) is photographed. It is possible to more reliably prevent K5 fraud in business facilities.
- the layout image of the corresponding location is transmitted to the related organizations to cooperate with the related organizations. It is possible to ensure the safety of the parties involved in the business facility, prevent misperception, and perform accurate information transmission.
- a guidance passage is provided in order to allow direct evacuation to the first floor entrance / exit stairs, which is safer and farther away from the location of K5 where the intruder is located. Broadcast on the monitor 222 installed in the network. It can respond safely with high accuracy.
- the number of modes and the time in the first mode to the fourth mode can be arbitrarily set depending on the importance.
- the digital smart safety system 1000 can be applied to the following tasks by connecting to a LAN.
- a business of K1 the head of business, the department head K2, the group head K3, and the persons in charge K4 to K200. If the person in charge is performing a substitute job when the employee is unable to work due to an urgent reason such as sick leave, the digital smart safety system 1000 can connect to the network that constitutes the LAN, and information leakage, sampling, copying, etc. Realize prevention.
- the monitoring device 100 is connected to the configured LAN.
- the business contents of K1 to K200 are input to the database of the monitoring apparatus 100.
- the digital smart safety system 1000 is connected to the external network and storage device necessary for business, the destination, the business content, and the connection to the site for the related person K3 and the K3 PC according to the permitted items. Is stipulated. For example, if the K2 business is to be continued as soon as possible due to reasons such as sickness or a business trip, the monitoring device 100 can obtain the approval of the management supervisor K1 and permit the management authority ZK. Registration is permitted to the management PC of K3. Note that the monitoring device 100 in this case may be installed as a functional unit responsible for digital smart safety control in the overall business management PC. Also, person verification is performed by the mobile device 300 of K2. Moreover, it inputs into the monitoring apparatus 100, such as an unauthorized act and information copy leakage.
- the mobile device 300 of K2 receives the radio wave transmitted by the i-beacon at the location of K3, and the monitoring device 100 is permitted to use the location of K3 and the PC, desk, and data cabinet of K3. To do.
- the mobile device 300 possessed by K2 receives the radio wave transmitted by the i-beacon at the location i3.
- the monitoring device 100 photographs the monitoring camera 221 so as to follow the action of K2.
- K3 opens the PC screen, the desk, and the material cabinet, takes out the material and zooms in on the situation such as browsing.
- the monitoring device 100 confirms that K2 has worked at the location of K3, such as date, day of the week, time, K3 PC desktop, my document, file, mail, Internet, USB memory, FAX, etc.
- the monitoring device 100 collates all the records and determines permission or disapproval.
- the monitoring device 100 executes processing according to the mode depending on the severity of the situation.
- a warning is displayed on the screen two seconds after the monitoring apparatus 100 sends a signal. Since the monitoring device 100 transmits a non-permission signal and displays the elapsed time on the warning screen in units of seconds after caution, it is possible to prevent erroneous information due to a PC operation error or the like and to prompt accurate information input.
- the monitoring device 100 sends a non-permission signal and warns on the corresponding PC screen three seconds later. If the unauthorized fraud is still being operated, the mobile device 300 of K2 receives the radio wave of the i-beacon i3 of K3, which is the location of K2. Monitoring device 100 determines to KPC that K2 is operating an unauthorized action at the location of K3. The monitoring device 100 provides a warning by voice with the speaker 223 installed, thereby ensuring the safety of the parties in the business facility. The monitoring device 100 transmits the layout image of the location where K2 is located to the administrator's portable device 300 by mail. It is possible to ensure the safety of the parties involved in the business facility, prevent misperception, and transmit accurate information. The administrator can check in real time with mail, images, and layout, and can express to the location where K2 is located to prevent fraud. Note that the warning by voice can be canceled and the manager can rush to secure K2 and listen to the situation.
- the monitoring device 100 sends a non-permission signal and warns on the corresponding PC screen three seconds later. If the unauthorized operation is still operated, a warning is given if there is access to the external storage device, and the PC is turned off by turning off the relay box 225 one or two seconds after the warning setting. Similarly, the monitoring device 100 warns if there is unauthorized access to the network, and turns off the power of the network hub 242 that is the network information entry / exit by turning off the switch of the relay box 225 one or two seconds after the warning setting. Shut off. Unauthorized access to the external storage device and the network can be prevented, and information leakage and copying can be prevented.
- the unauthorized PC or K2 will send a signal via the LAN as the PC server 241 corresponding to the conviction. Send a shutdown signal to.
- the PC server 241 can be forcibly closed to prevent illegal acts such as information leakage, extraction, and copying.
- the monitoring device 100 transmits a non-permission signal, and after 4 seconds, the switch of the relay box 225 of the power supply device of the electric lock 226 installed in the desk and material cabinet of K3 is turned on, and the desk, material cabinet, etc. Is locked.
- an electric lock 226 is installed at an entrance door of an important room such as a server room, a customer information room, or a research and development room.
- the switch of the relay box 225 of the electric lock 226 is turned ON, and the electric lock 226 is locked, so that K5 or the suspicious person cannot enter the corresponding room. Can be prevented.
- the monitoring device 100 sends a non-permission signal, and K2 or another suspicious person is at the location of K3 after 5 seconds after the PC server 241 is shut down, and unauthorized access to the network, external storage device, etc. If the operation is not canceled, an OFF signal is sent to the switch of the relay box 225 connected to the power source of the corresponding PC server 241 to forcibly cut off the power source of the PC server 241. All fraudulent acts such as information leakage, extraction, and copying of the PC server 241 can be prevented. Note that the time after the shutdown may be arbitrarily set arbitrarily.
- the PC server 241 since all the information of the corresponding PC server 241 is input and stored in the monitoring device 100, even if the power is forcibly shut down, the contents of the work performed by K3 and the unauthorized operation of K2 are all stored. ing. Forcibly shutting off the power will not cause any problems. Depending on the usage status of the business operator, the PC server 241 is warned of unauthorized acts on the external storage device and the network. For example, the PC server 241 is shut down after 1 second, and the PC power supply is shut off after 2 to 3 seconds. May be.
- the monitoring device 100 determines that the mobile device 300 owned by K2 has escaped from the location of K2 by receiving the radio wave transmitted by the K2 i-beacon.
- the monitoring camera 221 at the position and location of K ⁇ b> 2 captures K ⁇ b> 2, and transmits an image, a location and layout, and the like to the portable device 300 of the person concerned.
- a person concerned can rush to secure K2 or a suspicious person.
- K2 or the suspicious person discards the RFID tag or the portable device 300 for tracking the escape, the human sensor 211 installed in the facility senses, and the monitoring device 100 detects the behavior of the K2 or the suspicious person.
- the suspicious person may also send a message that the RFID tag or the portable device 300 is abandoned.
- a person concerned can rush to secure K2 or a suspicious person more quickly.
- a suspicious person or K2 escapes in the direction of K4 to K5
- the radio wave of i-beacon or the corresponding sensor installed is activated.
- the monitoring device 100 operates the monitoring camera 221 in the direction of the next escape direction, that is, K5 to K6, and performs imaging.
- the monitoring device 100 transmits the layouts K5 to K6 to the portable device 300 of the person concerned. Stakeholders can respond appropriately.
- the radio waves of the i-beacon and the mobile device 300 installed in a business facility usually transmit and receive about 10 cm to 5 m. The following is performed for each distance that the portable device receives the radio wave transmitted by the i-beacon.
- a number is assigned to the i-beacon master unit 302, and the i-beacon master unit 302 is installed in a business room, an important department, or a location where related parties work.
- the monitoring apparatus 100 stores in the safety related information storage DB 135 the layout diagram of the corresponding business facility, the location where all the parties K1 to K200 work, and the telephone numbers of the portable devices 300 of the parties K1 to K200.
- the portable device 300 receives the radio wave of the K3i beacon, and the monitoring device 100 inputs and collates it. As an appropriate radio wave, the radio wave of the i3i beacon is K6.
- the monitoring apparatus 100 warns with a suspicious person's location, a sound, a layout, and an image. Communicating with the portable device 300 of the person concerned, the person concerned can respond in real time, and theft, information extraction, information extraction, etc. can be prevented in advance.
- the relay box 225 of the PC power supply device is turned off to shut off the PC power.
- the monitoring camera 221 takes a picture of the position of the suspicious person. It is possible to ensure the safety of the parties involved in the business facility.
- the monitoring apparatus 100 transmits a layout image showing R3 of the corresponding position to the business person and cooperates with related organizations. To do. Prevents the extraction of business facility information and prevents the accuracy and misidentification of suspicious person information.
- evacuation guidance control (see FIGS. 4 and 5) can be executed.
- evacuation guidance control passages are marked and installed in business facilities so that they can evacuate directly to the first floor entrance and exit stairs, which is safer and far away from the location of R3 where the suspicious person is located. Aired on the monitor 222. It can be safely handled with high accuracy.
- the RFID reader 202 installed in a business facility can be used together. The RFID reader 202 of the business facility detects a metric space of about several meters to 20 meters and the i-beacon about 10 cm to 5 meters, and can determine whether the person in the metric space is appropriate or abnormal.
- the horizontal axis X1, X2, X3 to X7, the vertical axis Y1, Y2, and Y3 to Y9 blocks are divided into Z1B, Z2B, Z3B to Z250B.
- the location where the intruder is present is sensed by, for example, the human sensor 211 and photographed by the surveillance camera 221.
- the voice is automatically warned in real time, and the layout image of the location where the intruder is located is transmitted to the mobile device 300 of the related person near the intruder. Numerous visitors and related persons can evacuate without confusion, safety, and accidents.
- the corresponding location is indicated on the layout and transmitted to the portable device 300 of the security related person. While watching the transmitted image, the security personnel notify the relevant organization of the exact situation of the intruder and rush to the corresponding location.
- the third mode if the intruder does not leave 5 seconds after the warning, the installed projector and sprayer are operated, the corresponding location is indicated on the layout, and transmitted to the portable device 300 of the security personnel. Security officials can report the status of intruders accurately while viewing images to relevant agencies.
- the location of the intruder and the location of the sensor that detected the intruder are determined from the rear area.
- the monitoring device 100 outputs an optimal route from the route information stored in advance in the safety related information storage DB 135.
- the monitoring device 100 includes the entrance / exit, stairs, evacuation facilities, etc., the positions of the human sensors 211 installed in the rooms, rooms, and passages of each block and the arrangement information of the entrance / exit, stairs, evacuation facilities, etc.
- the traffic line distance when a person moves is stored in the safety related information storage DB 135.
- the monitoring apparatus 100 determines the position of the human sensor 211 that senses the position where the intruder is located. Evacuees can evacuate in an emergency.
- the monitoring device 100 performs evacuation guidance control in a place where the safety is high and there is a separation distance from the position place R20 where the intruder is present. For example, the evacuation is guided to the entrances 1 to 12, the stairs 1 to 12, and the evacuation facilities 1 to 8 on the opposite side and away from the location R20 where the intruder is present.
- the monitoring apparatus 100 transmits a safe layout that can be evacuated to the outdoors and an intruder image to the portable apparatus 300 of the person concerned.
- the persons concerned in the rear area can evacuate safely, and the persons concerned can appropriately evacuate visitors.
- the monitoring device 100 broadcasts the contents (such as an evacuation route) on the monitor 222 installed in the rear area. By broadcasting the monitor 222, the related parties can be evacuated more safely.
- the digital smart safety system 1000 ensures the security of business areas such as commercial facilities, complex facilities, underground malls, station buildings, terminal facilities, financial facilities, stadiums, and ship facilities.
- business areas such as commercial facilities, complex facilities, underground malls, station buildings, terminal facilities, financial facilities, stadiums, and ship facilities.
- By reporting the detailed situation to the security officials and related organizations in the unlikely event that an accident or incident occurs at the relevant facility, safer evacuation guidance for visitors, visitors, or related parties, Follow-up of discovery and action becomes more effective. In addition, more detailed information can be reported to security officials and related organizations.
- Wi-Fi slave unit 201 For this purpose, Wi-Fi slave unit 201, RFID reader 202, i-beacon slave unit 203, human sensor 211, Doppler sensor (not shown), laser radar 212, monitoring camera 221, monitor 222, microphone 224, Install loudspeakers, floodlights, sprayers, etc.
- the person who carries the portable device 300 is caused to wear the pressurized security device 310. If there are sales floors, sales corners, valuables sales floors, passages, stairs, evacuation facilities, ELVs, entrances, etc.
- the blocks Y1, Y2, Y3 to Y9 are divided into Z1B, Z2B, Z3B, and Z250B.
- a monitoring camera 221 capable of recognizing a person is installed at the entrance / exit of a business facility, a passage, a stairs top / bottom entrance, an elevator (ELV) entrance / exit, a sales floor, a sales corner, a valuable sales floor, and the like. Detect irregular behaviors that pass through the same sales floors and passages of sales facilities many times, and watch out for those who have caused shoplifting or accidents in the past at the company or facility.
- the monitoring device 100 captures the suspicious person with the monitoring camera 221 when the cautionary person and the suspicious person A visit the business facility where the related persons K1 to K200 are performing business operations and visit the store many times. And determine the suspicious person. For example, the monitoring device 100 sends the floor number, the sales floor name, the layout of the sales floor corner, and the like of the position location of the suspicious person A to the portable device 300 of the person concerned by mail. The person K7, who is close to the location of the suspicious person A, waits for customers. Accidents such as shoplifting can be prevented.
- the surveillance camera 221 installed in the Z3 block valuables sales floor on the third floor is operated, the criminals B, C, and D are photographed, and the microphone 224 collects information that the criminals and the related parties are talking.
- the monitoring device 100 transmits the layout, image, and sound indicating the third floor, the Z3 block valuables section to the portable devices 300 of other parties by mail. Other parties can report the occurrence of an emergency to security personnel and related organizations. Many visitors can evacuate without confusion, safety, and accidents.
- Mode response control in an emergency situation is as follows.
- the pressurized security device 310 is operated to send a signal, and after 5 seconds, the image is broadcast on the monitor 222 installed in the third floor, Z3 block valuables sales floor, where the incident occurred.
- the monitoring device 100 transmits the images and sounds of the criminals B, C, and D to the portable device 300 of the person concerned.
- the monitoring apparatus 100 performs the following control. From the intruder's location Z3 block, there is a measurement, input, and separation distance in the reverse direction Z4 to Z7 blocks, and a high level of safety.
- the A moving image in which the criminals B, C, and D are photographed and divided in two and the wide area is photographed is displayed.
- the B moving image in which the close-up is photographed is a moving image of the situation of the intruder at the intrusion position location Z3 block.
- the collected intruder's voice is sent to the portable device 300 of the person concerned by voice and image. The parties concerned can check in real time, express to the site, and report to related organizations.
- the monitoring apparatus 100 also sends a similar image to the screens of the PC servers of the parties K1 to K200 who have the RFID reader 202. It is possible to safely and promptly guide the customers who are in the vicinity to the relevant parties.
- the surveillance camera 221 (in this case, the second floor) of the escape direction of the criminals B, C, D who escaped from the Z3 block valuables section on the third floor, 20 seconds after the signal of the pressure security device 310 is transmitted.
- the surveillance camera 221 of the escape direction of the criminals B, C, D who escaped 25 seconds after the signal transmission of the pressurization security device 310 (here, the Z2 block position of the stairs direction on the second floor)
- the surveillance camera 221) photographs the criminals B, C, and D.
- the stairs and entrances in the direction opposite to the criminals of B, C, and D at the Z2 block position are laid out and the passage is broadcast on the monitor 222.
- the video of the criminal is displayed on the PC screen at the location of the parties K1 to K200 possessing the RFID reader. It is possible to safely and promptly guide the customers who are in the vicinity to the relevant parties.
- related persons can evacuate quickly, safely, without accidents, to stairs, entrances, and safe outdoors where there is a measurement separation distance in the opposite direction from the criminals B, C, D at the Z2 block position.
- the monitoring device 100 broadcasts an image of a layout diagram that specifies the stairs and entrances of an evacuation facility that is spaced apart from the criminals B, C, and D and has a high degree of safety. Visitors in the Z7, Z8, and Z9 blocks, which are the escape directions of the criminals B, C, and D, can keep away from the criminals B, C, and D, and can evacuate quickly and safely in the reverse direction.
- the monitoring device 100 broadcasts a moving image of an intruder situation on the monitor 222. For example, an A moving image in which a wide area is imaged and a B moving image in which a close image is taken are shown in which the criminals B, C, and D are imaged. The person concerned can guide to the safe direction by looking at the mail, the layout diagram, and the moving image of the portable device 300.
- the monitoring device 100 broadcasts on the monitor 222 a passage that is safer in the opposite direction than the location where the criminals B, C, and D are located. A nearby party can safely handle customers. Visitors can evacuate directly to the 1st floor entrance / exit stairs, which is safer in the opposite direction than the location where the criminals B, C, D are located.
- the digital smart safety system 1000 includes the monitoring device 100 of the digital smart safety system 1000 including the control unit 110 and the safety related information storage DB 135, and the safety related information.
- the storage DB 135 stores safety-related information including the layout of the facility and the installation location of the smoke detector 234.
- the control unit 110 includes a smoke determination unit 112 that determines the direction, amount, and speed of smoke flow based on smoke information sensed by a plurality of smoke detectors 234 installed at various locations in the facility, and the facility includes Based on the judgment results of the fire door detection means 113 for detecting that the fire door / fire shutter 228 is not closed, the person detection means 114 for detecting a person who has escaped in the event of a fire, and the smoke judgment means 112
- a control unit 115 for executing evacuation guidance control for evacuating and guiding a person concerned at the facility by designating an appropriate place, and a transmission control unit 116.
- the direction, amount, and speed of the smoke flow are detected and a safe place is designated and guided, so high-quality evacuation guidance that guides people in the direction of low smoke flow can be realized, and the facility can be used in the event of a fire. Can be safely evacuated.
- smoke is diffused to the outside and diffused by the blower 235 to an opening / smoke outlet of a window or the like, so that the smoke inhalation can be reduced by diffusing the smoke.
- the number of transmission paths for performing evacuation guidance for the person who has escaped is increased, and the evacuation guidance effect can be further enhanced.
- a telephone line is used as a public line
- the present invention is not limited to this case, and for example, a wireless communication line, the Internet, or a LAN is used as the public line. May be.
- a transceiver may be used as a communication terminal device when the public line is wireless communication
- a personal computer or palmtop computer may be used as a communication terminal device when the public line is the Internet or a LAN. Good.
- constructing a digital smart safety system using an existing public line it is possible to expand the usage mode of the digital smart safety system and reduce the construction cost of the digital smart safety system.
- the name “digital smart safety system and method” is used. However, this is for convenience of explanation, and may be digital smart security, a security system, a security method, or the like. Furthermore, the detection of abnormal situations includes everything known. For example, in an abnormal situation, there is an intrusion or approach of a suspicious person. Further, the report is not limited to e-mail and may be anything.
- the digital smart safety system and method of the present invention can also be realized by a program for causing a computer to function as the digital smart safety system or method.
- This program may be stored in a computer-readable recording medium.
- the recording medium on which this program is recorded may be the ROM itself of the digital smart safety system, or a program reading device such as a CD-ROM drive is provided as an external storage device, and the recording medium is inserted therein. It may be a readable CD-ROM or the like.
- the recording medium may be a magnetic tape, a cassette tape, a flexible disk, a hard disk, an MO / MD / DVD, or a semiconductor memory.
- the digital smart safety system, method, and program according to the present invention can be used in real time in corporations / commercial facilities, offices, etc., and prevent the loss of property, life and economics, and have a great effect.
- Safety-related device 201 Wi-Fi terminal (Wi-Fi slave) (part of human detection means) 202 RFID reader (part of human detection means) 203 i-beacon handset 211 human sensor 212 laser radar 221 surveillance camera 222 monitor 223 speaker 224 microphone 225 relay box 226 electric lock 228 fire door / fire shutter 232 mechanical smoke outlet 233 CO detector 234 smoke detector (smoke detection means) ) 235 Blower 300 Portable device 301 Wi-Fi individual identification device (Wi-Fi master) (part of human detection means) 30
Landscapes
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Engineering & Computer Science (AREA)
- Business, Economics & Management (AREA)
- Emergency Management (AREA)
- Multimedia (AREA)
- Theoretical Computer Science (AREA)
- Chemical & Material Sciences (AREA)
- Analytical Chemistry (AREA)
- Environmental & Geological Engineering (AREA)
- General Health & Medical Sciences (AREA)
- Toxicology (AREA)
- Human Computer Interaction (AREA)
- Health & Medical Sciences (AREA)
- Alarm Systems (AREA)
- Burglar Alarm Systems (AREA)
Abstract
Description
利便性と共に安全に対する対策は極めて重要となっており、高度な安全策が求められている。大規模施設における滞在人口は多数であり、事故事件、火災等の影響は大きい。
前記制御手段は、前記防火戸検出手段の検出結果に基づいて、前記施設の関係者に前記防火戸が閉じていないことを通報することで、防火戸が開いた状態で煙が充満してしまって、避難者が煙による事故に会うのを防止する対応ができて避難者が安心して避難を行うことができる。なお、この防火戸には、本明細書では防火シャッタも含まれ、防火シャッタは、建物施設の3,000m2以内の区画ごとに設置されている。
なお、有毒ガスであるCOの濃度は換気設備のある事務所においては10ppm以下とするように法令により定められている。
(実施の形態)
図1は、本発明の実施の形態に係るデジタルスマートセフティシステムの構成を示すブロック図である。
本実施形態は、施設に設置されたセフティ関連装置からの情報を取り込んで施設の状況を監視し、該施設の関係者が携帯する携帯装置に情報を送信するデジタルスマートセフティシステムに適用した例である。事件、事故には、火災発生のほか、不審者などがある。
また、不審者には、社外からの侵入者、許可を得ている時間以外に勤務する社内関係者、及び許可を得ている業務範囲以外のエリアにいる社内関係者などがある。
デジタルスマートセフティシステム1000は、施設に設置されたセフティ関連装置からの情報を取り込んで施設の状況を監視し、必要な情報を表示すると共に、該施設の関係者が携帯する携帯装置に情報を送信するシステムである。
監視装置100は、例えば営業施設の管理室に設置され、営業施設内を集中管理するPCサーバや、業務を推進する業務PCサーバである。監視装置100は、これらPCサーバや業務PCサーバ内において、デジタルスマートセフティ制御を担う機能部として設置されていてもよいし、単体で設置されていてもよい。監視装置100は、一般的なサーバ計算機、パーソナルコンピュータ等であってよい。また、監視装置100は、外部記憶装置(図示省略)を備え、ネットワーク(図示省略)に接続されている。なお、業務PCサーバに備えられる外部記憶装置には、業務PCサーバの業務に関する情報がバックアップされる。
監視装置100は、上述する社外又は社内の不審者である人物が店舗に現れたことが検出された場合、この人物の情報と店舗の情報をネットワークを通して本部・本社や警備会社システムに通知する。
制御部110は、複数の関係者がそれぞれ携帯する携帯装置の位置情報を取得する関係者位置情報取得手段111と、施設の各所に設置された複数の煙感知器234が感知することによって検知した煙情報に基づいて、煙の流れの方向、量及び速度を判定する煙判定手段112と、施設に備えられた防火戸・防火シャッタ228が閉じていないことを検出する防火戸検出手段113と、火災発生時、逃げ遅れた人を検出する人検出手段114と、煙判定手段112の判定結果に基づいて、安全な場所を指定して施設の関係者を避難誘導させる避難誘導制御を実行する制御手段115と、送信制御部116とを備える。
制御手段115は、防火戸検出手段113の検出結果に基づいて、施設の関係者に防火戸228(後記)が閉じていないことを通報する。
制御手段115は、人検出手段の検出結果に基づいて、逃げ遅れた人に通報(Wi-Fi・RFIDを使う。Wi-Fi・RFIDの詳細については後記)する。
記憶部130は、監視カメラ221から受信した静止画や動画、制御部110が用いる各種データ、プログラムなどを記憶する。
また、セフティ関連情報記憶DB135は、Wi-Fi認証登録情報、iビーコン(iBeacon)(登録商標)登録情報を記憶する。セフティ関連情報記憶DB135は、施設に発生しうる緊急事態に対して、深刻度に応じた複数の対応パターンをn次モード(nは、2以上の整数)として記憶する。
出力部150は、例えばオーディオインタフェースであり、施設内のスピーカ223に対して監視装置100からの音声信号を出力する。監視装置100からスピーカ223へ出力する音声信号としては、例えば入力部120に設けられたマイク224などの音声入力装置から入力された音声信号や、記憶部130に記憶された音声データ(音声サンプルデータ)を制御部110が読み出して再生する音声信号であってよい。スピーカ223は、アンプ及び施設内に配置された拡声器を備え、監視装置100から入力された音声信号を施設内に放送する。
画像処理部170は、受信した画像に対して予め定められた処理を行う。予め定められた処理には、輪郭抽出、画像のリサイズ、解像度変換処理などがある。また、画像処理部170は、関係者の携帯装置300に送信する顔画像に、赤枠や黄色枠を付すなどの画像処理を行う。
セフティ関連装置200は、業務施設に設置されたWi-Fi(Wireless Fidelity)ターミナル(以下Wi-Fi子機という)201、RFIDリーダ202、iビーコン子機203、人感センサ211、レーザレーダ(Laser Radar)212、監視カメラ221、モニタ222、スピーカ223、マイク224、リレーボックス225、電気錠226、火災報知機227、防火戸・防火シャッタ228、サーキュレータ(以下送風機ともいう)229、投光器230、撃退装置231、機械排煙口232、一酸化炭素(以下、COという)感知器233、火災発生時の煙を感知する複数の煙感知器234(煙検知手段)、煙を拡散する送風機235を備える。なお、機械排煙口232の間の任意の地点に更に機械排煙口232を増設してもよい。
人感センサ211は、人間の所在を検知するためのセンサである。赤外線、超音波、可視光などが用いられる。
レーザレーダ212は、物体の大きさや位置・速度を計測し、不審者の侵入・横断を検出する。レーザレーダ212は、オフィス、設計室、研究開発室、管理室等の重要セキュリティ区画に設置されている。また、通常、人が出入りすることのない建物の出入口等にも設置されている。
モニタ222は、テレビ画面又はLED表示であってもよい。
撃退装置231は、特殊な高周波や大音量サイレンにより不審者を撃退する。
なお、本実施形態では、認証カード31は、RFIDリーダ202との間で認証を行うRFID認証カードをRFIDタグとして用いた例であるが、どのような認証手段による認証カードであってもよい。また、認証カード31が、カード形状であることは説明の便宜上から呼称しているに過ぎず、カード形状でなくてもよい。
防火戸・防火シャッタ228は、監視装置100の制御部110に接続(シリアル伝送による接続)されている。後記するように、制御部110は、防火戸・防火シャッタ228の開閉状態(特に防火戸が閉じていないこと)を検出する。
携帯装置300は、複数の関係者がそれぞれ携帯する。携帯装置300は、例えばスマートフォン、タブレット、ノートパソコンである。携帯装置300は、このほか、携帯電話、PHS(Personal Handy-Phone System)、PDA(Personal Digital Assistants)、専用端末である。本実施の形態では、携帯装置300は、各関係者が様々な場所(すなわち現在位置)で使用可能であり、図示しない電話回線を介して監視装置100からのメール又は動画を含む映像等を受信可能である。
Wi-Fi親機301は、業務施設に設置されたWi-Fi子機201の電波を受信・個別識別する。
iビーコン親機302は、iビーコン機能を搭載したアプリケーション実行によりバックグラウンドで待機する。iビーコン親機302は、施設内に設置されたiビーコン子機203に近接したときに固有のID情報を発信し、そのID情報に紐付けられたアプリケーションが反応して自己の位置情報を得る。ここで、監視装置100は、施設内に設置されたiビーコン子機203の配置情報をセフティ関連情報記憶DB135に蓄積している。したがって、iビーコン親機302がiビーコン子機203に近接すると、携帯装置300を携帯する関係者のIDと位置を判定することができる。
まず、デジタルスマートセフティシステムの基本的な考え方について述べる。
(1)建物施設等において火災、煙、ガス等の災害発生がある。
本デジタルスマートセフティシステムは、災害発生時、関係者を適切に避難誘導し、建物施設にいる関係者の安全を確保する。
(2)事故事件は、外部からの不審者の侵入がある。内部からは企業の社内関係者の情報漏洩等の事故、事件がある。
本デジタルスマートセフティシステムは、火災発生の場合、すべての人を安全な場所に誘導するとともに、不審者・侵入者がある場合、関係者に現在の状況をリアルタイムに通知し、事故、事件を未然に防止する。
火災発生時は、施設内にいる人すべてが関係者である。そしてなによりも誘導情報の正確性と迅速性が求められる。また、上述したように、火事での死亡事例の多くは、煙を吸い込み、呼吸困難になるため発生するので、煙から人を逃げさせるための誘導が極めて重要である。
まず、ステップS101で、制御部110は、施設の各所に設置された複数の煙感知器234からの煙情報(煙感知有無及び煙量)を取得する。
上記(1)-(3)の判定結果は、制御部110が総合的に判定し、正確な避難誘導を実現する。
ステップS105では、制御部110の防火戸検出手段113(図1参照)は、施設に備えられた防火戸・防火シャッタ228が閉じていないか否かを検出する。
ステップS106で制御手段115は、防火戸検出手段113の検出結果を基に、施設の関係者に、避難経路中の該当する防火戸・防火シャッタ228が閉じていないことを通報する。この通報は、アナウンス、映像、関係者のWi-Fi・RFIDなどどのようなものでもよい。この通報を受けて関係者は、安全を確認の上、閉じていない防火戸・防火シャッタ228を閉じることができるため、閉じていなければならない防火戸・防火シャッタ228が閉じていないという事態を避けることができる。また、すでに危険が差し迫っていて、防火戸・防火シャッタ228を閉じることができない場合でも、防火戸・防火シャッタ228が閉じていないことを事前に知り安心して避難を行うことができる。
ステップS109で制御手段115は、火災による煙を感知時又は避難誘導の際、送風機235を駆動して煙を外部廻り、窓等の開口部・排煙口などに拡散させる。煙を拡散させることで、避難の際の煙吸い込みを減少させることができる。
次に、デジタルスマートセフティシステムの各種情報の登録処理について説明する。不審者・侵入者を判定するためには、事前に下記の登録処理が必要である。
(顔認証登録)
図3Aは、デジタルスマートセフティシステムの監視装置100の制御部110の人物の登録処理を示すフローチャートである。本フローは、監視装置100の制御部110により実行される。
ステップS3では、制御部110は、認証カード31発行者、施設関係者、及び関係者関係者等の詳細情報、車両ナンバー、関連情報の登録を行う。
図3Bは、デジタルスマートセフティシステムの監視装置100の制御部110のWi-Fi認証の登録処理を示すフローチャートである。本フローは、監視装置100の制御部110により実行される。
ステップS11では、制御部110は、業務施設に設置されたWi-Fi子機201とWi-Fi親機301とを接続し、Wi-Fi認証登録する。また、設置されたWi-Fi子機201の位置は、Wi-Fi親機301に登録されている。
関係者がWi-Fi子機201の電波区域を通行すると、関係者の携帯装置300のWi-Fi親機301は、関係者K3がWi-Fi子機201の区域にいることを、電波を発信して知らせる。監視装置100は、後記するWi-Fi認証により関係者の許可/不許可を判定する。
図3Cは、デジタルスマートセフティシステムの監視装置100の制御部110のiビーコンの登録処理を示すフローチャートである。本フローは、監視装置100の制御部110により実行される。
監視装置100には、関係者の携帯装置300が登録されるとともに、携帯装置300のアプリケーションとして、電波の識別範囲が10cm~5m程度のiビーコン子機が備えられている。
ステップS21では、制御部110は、業務施設に設置されたiビーコン子機203とiビーコン親機302とを接続し、iビーコンを認証登録する。
図3Dは、デジタルスマートセフティシステムの監視装置100の制御部110のRFID認証の登録処理を示すフローチャートである。本フローは、監視装置100の制御部110により実行される。
ステップS31では、制御部110は、業務施設に設置されたRFIDリーダ202とRFIDタグとを接続し、RFIDを認証登録する。
(避難誘導制御)
図4は、デジタルスマートセフティシステムの監視装置100の避難誘導制御処理を示すフローチャートである。本フローは、主に監視装置100の制御部110により実行される。
まず、ステップS41で、制御部110は、不審者・侵入者(以下、不審者という)候補を判定する。
上記ステップS41で不審者と判定した場合、ステップS42で制御部110は、不審者に近接した関係者の位置情報を取得する。
ステップS43では、制御部110は、取得した位置情報に基づいて、不審者に最も近い関係者の携帯装置300の位置を判定する。
ステップS44では、制御部110は、不審者の位置に最も近い関係者に優先的に、不審者に関する情報を送信する。例えば、制御部110は、メールにて音声・動画・不審者の位置情報(施設レイアウト上に印を付した情報など)を送信する。
この場合、不審者が、最も近い携帯装置300の位置から所定距離離れた場合、他の携帯装置300に対して、不審者に関する情報を送信するようにしてもよい。
なお、当該携帯装置300から所定時間(例えば5秒間)経過しても肯定的応答ACKがないか、又は、当該携帯装置300から否定的応答NCKが返された場合、ステップS45で制御部110は、照合結果が一致した不審者に次に近い携帯装置300の位置を判定し、当該携帯装置300に不審者に関する情報を送信する。
不審者の場合、ステップS47で、制御部110は、当該携帯装置300の加圧セキュリティ装置310からの非常信号を受信したか否かを判別する。
加圧セキュリティ装置310からの非常信号を受信していない場合、命に係わるような緊急事態発生時ではないと判断して、ステップS48で制御部110は、他の関係者の携帯装置300に対してメールにて音声・動画・不審者の位置情報(レイアウト上に印を付した情報など)を送信する。これにより、他の関係者は、不審者のいる現場に急行することができる。
ステップS51では、制御部110は、不審者の現場の近傍に設置されているマイク224から不審者と関係者が話している会話を集音する。
ステップS52では、制御部110は、取り込んだ不審者の状況の画像(動画を含む)と集音した不審者の音声を、関係者の携帯装置300、警備関係者、関係機関にメールにより送信する。他の関係者は、リアルタイムに不審者の状況を確認することができ、現場への急行とそれに伴う警戒を準備しておくことができる。また、関係機関へ不審者の状況を的確に通報することがきる。
上記ステップS50乃至ステップS53は、必須ではなく省略してもよい。また、後記するように、緊急事態発生時からの時間経過又はイベント発生に伴って適宜追加される態様でもよい。
ステップS61で、制御部110は、レーザレーダ212により不審者を判定する。オフィス、設計室、研究開発室、管理室等の重要セキュリティ区画には、不審者を検知するレーザレーダ212が設置されている。また、通常、人が出入りすることのない建物の出入口等にもレーザレーダ212が設置されている。レーザレーダ212が作動した場合、以下の処理をまたずに侵入者(不審者)と判定(断定)する。
また、RIFD認証により不審者でないと判定した場合、ステップS67で判定された不審者候補が、不審者でないと認定して、図4のステップS41に戻る。
なお、上記ステップS61乃至ステップS66の実行順序は、この処理順序でなくてもよい。また、上記ステップS61乃至ステップS66のうち一部の認証のみを用いてもよい。
図6Aは、デジタルスマートセフティシステムの監視装置100のモード対応制御処理を示すフローチャートである。本フローは、主に監視装置100の制御部110により実行される。
まず、ステップS71で、制御部110は、緊急事態発生時か否かを判別する。緊急事態発生時でない場合、本フローを終了する。上記緊急事態発生は、火災発生や不審者の侵入による事故事件を想定している。火災の場合は、火災報知機の作動、防火戸等に取り付けた煙を検知する微弱電流センサからの信号がある。また、不審者の侵入による事故事件の場合は、不審者に近い関係者の携帯装置300からの通報がある。また、監視装置100側において、監視カメラ221等による監視結果も含まれる。
例えば、第1モードで、関係者の携帯装置300に、メールにより不審者の情報を送信し、5秒後に退去しなければ第2モードに移行し、不審者がいる該当位置場所を、監視カメラ221が方向を定め、侵入者を撮影する。そして、10秒後、以降も退去しなければ第3モードに移行し、業務施設の情報抜取り防止のためにPC等の電源を遮断し、他の関係者を現場に急行させる。更に10秒後以降も退去しなければ第4モードに移行し、音声で警告後、関係機関へ通報と連携する。
図6Bは、デジタルスマートセフティシステムの監視装置100のモード処理を示すフローチャートである。本サブルーチンは、図6AのステップS72の詳細フローである。
ステップS81で、監視装置100の制御部110は、緊急事態発生の種別と制御対象を判定する。
ステップS82で、制御部110は、緊急事態発生の種別と制御対象施設に従って第1モードから順に各モード毎の対応制御を実行する。
ステップS83で、制御部110は、時間経過又はイベント発生により次のモードに移行するか否かを判定する。次のモードに移行しない場合、ステップS82に戻る。
次のモードに移行する場合、ステップS84でモード対応制御を終了するか否かを判定する。モード対応制御を終了しない場合、ステップS82に戻る。モード対応制御を終了する場合、図6AのステップS72に戻る。
火災に対するデジタルスマートセフティシステム1000の運用方法について述べる。
[適用例1]
商業施設、ホテル、高層オフィス、多目的用途複合建物、集会所、病院、劇場、大学、工場、高層・超高層マンション、ターミナルビル、地下街、船舶、個人住宅等の人間が経済活動、居住等の、滞在人口は多数である。火災等事故の影響は大きく、火災時に発生した場合は不特定多数の多数の場合は、煙、炎、ガスによるパニックは大きい。
デジタルスマートセフティシステム1000は、火災発生をリアルタイムに把握し、建物施設に滞在した不特定多数の人を、安全、無事故に避難させるシステムを提供する。関係者が的確な避難誘導と、滞在者が火災の状況と、火災場所より逆方向で、近い順々の階段、避難施設、出入02口に避難できるようにする。
図7は、火災発生時の商業施設の上層階レイアウトを示す図である。
図7に示すように、この商業施設の上層階には、階段、特別避難階段、避難施設、非常ELV等と、売場、通路、各コーナ、宿泊室、オフィス、住居等があり、煙感知器、炎感知器、熱感知器(以下火災報知機という)、CO感知器233、RFIDリーダ202、監視カメラ221、モニタ222、人感センサ211、ドップラセンサ(図示省略)、レーザレーダ212、スピーカ223、煙感知器234(煙検知手段)(★印参照)、方向可動送風機235(◆印参照)を備える。
この状況では、この施設のフロアのすべての煙感知器SM1~SM10が煙感知している。煙量は、煙感知器SM3,SM2,SM1,SM6,SM5,SM4,SM7…の順で多いことが検知された。図7の白抜き矢印に示すように、煙の流れの方向は、大きくは商業施設の西側から東側に流れていると判定できる。また、煙感知器SM6,SM5,SM4の煙量に着目すると、一部の煙は、南側から北側にも向かっていると判定できる。さらに、煙の流れの速度は、煙感知器SM3から西側へ向かう方向(「煙の流れの方向」A)が、煙感知器SM2やSM1から西側へ向かう方向(「煙の流れの方向」B,C)よりも大きいことが判定できたとする。監視装置100は、これらの判定結果から、まず大きな煙の流れの方向、すなわち「煙の流れの方向」A、「煙の流れの方向」B、「煙の流れの方向」Cを決める。次に、「煙の流れの方向」A,B,Cの中から、煙の流れの速度の大小を比較して最終的な避難誘導方向を決定する。ここでは、「煙の流れの方向」Aの煙の速度が最も大きく、「煙の流れの方向」B,Cの順である。「煙の流れの方向」Cの煙の速度が最も小さいので、煙の影響が最も少ないのは「煙の流れの方向」Cとなる。したがって、この施設における安全な避難誘導場所は、図7に示す商業施設の北東角の「正面東側」であると判定し、煙の影響が最も少ない「正面東側」に避難誘導する。
本実施形態では、煙の流れの方向だけではなく、煙の速度も判定要素に入れているので、上記のようにきめの細かな(より安全性の高い)避難誘導が可能になる。
ここで、煙の流れの速度が、非常に大きい場合には、その方向の火災が急拡大している可能性がある。この場合には、監視装置100は、煙の流れの速度が大きい方向を避けて避難誘導する。具体的に説明する。
仮に、図7において、「煙の流れの方向」Aの煙の速度が、急速に大きくなった場合を想定する。ただし、煙量は「煙の流れの方向」Bと同程度である。この場合、「煙の流れの方向」Aの火災が急拡大していると判定し、将来的な安全性を確保するため、「煙の流れの方向」Aへの避難誘導を「煙の流れの方向」Bへの避難誘導に切り替える。本実施形態では、煙の速度も判定要素に入れているが、煙の速度を判定しないで、煙の方向と量からだけでは、「煙の流れの方向」AとBとの区別ができない。本実施形態では、煙の流れの速度を、煙の流れの方向及び量の判定と併用することになって、将来的な避難誘導を可能にしている。
本実施形態では、煙の速度を判定することによって、制御精度向上(具体例1)と将来的な避難誘導を可能(具体例2)にする。
図8は、火災発生時の商業施設の上層階レイアウトを示す図である。説明の便宜上、図7を再び記載したものである。
建物施設全体をLAN構築し、デジタルスマートセフティシステム1000に接続する。監視装置100は、火災位置場所と階段、特別避難階段、避難施設、出入口の距離を記憶する。
監視装置100は、火災位置場所を特定し、火災位置場所より逆方向で、近い順の各階段、避難施設、出入口を関係者の携帯装置300に送信する。関係者は、来店者を適切な誘導と、逃げ遅れた来店者救護を関係者に指示することができる。
また、監視装置100は、来店、来館者、関係者へモニタ222、スピーカ223で報知し、火災位置場所より逆方向で、近い順の各階段、避難施設、出入口を安全な、避難誘導する。
煙、COの濃度を薄め、建物施設にいる、来店者、関係者が避難階段、避難施設、特別避難階段、非常ELVより、迅速、安全に避難誘導できる。
監視装置100は、連動している監視カメラ221が撮影し、火災の位置場所を特定する。監視装置100は、関係者の携帯装置300へ、該当の位置場所のレイアウト図に表記、画像を送信する。関係者がリアルタイムに対応できる。
第1モード(通報)は、火災という性格上、優先処理により「5階駐車場の西側窓W3~4のエリア」のZ135ブロックのレイアウトと照合する。監視装置100は、Z135ブロックのFS8の火災報知機のエリア、位置場所で火災の発生状況と、火災が発生しているZ135ブロックより離間距離があり安全度が高い、逆方向の階段である東側階段S1、南側階段S3、北側階段S4、出入口を示すレイアウトを関係者の携帯装置300に送信する。より詳細には、監視装置100は、火災を撮影した、2分割した、広範囲を撮影したA動画と、至近を撮影したB動画の火災状況の動画を送信する。また、監視装置100は、集音した火災状況の音声を、関係者の携帯装置300にメールにより送信する。リアルタイムに関係者が確認し、現場への急行と、関係機関へ通報できる。
関係者は緊急事態の発生を、警備関係者、関係機関へ通報ができ、多数の来店者が混乱防止、安全、無事故で避難することができる。
モニタ222の放映では、広範囲を撮影したA動画と、至近を撮影したB動画により、火災がどの状況で、どちらの方向に延焼、拡大しているかを放映するとよい。火災位置場所Z135ブロックの、火災状況を見て知ることができる。
さらに、監視装置100は、スピーカ223から音声により報知する。避難者は、正確な火災の状況を見ながら、音声によっても、安全度が高い避難方向、例えば、階段から大通り正面玄関出入り口東側階段S1、バス停南側の南側階段S3、駅側の北側階段S4へ避難できる。
第3モード(避難)は、火災報知機FS8の火災報知機が感知後、10秒後に、火災がZ50、Z10、Z2ブロックの方へ拡大し、煙感知器(図示省略)が感知発報した場合、監視装置100は、火災報知機FS9~FS12の発報信号を受信する。監視カメラ221が延焼している、Z50、Z10、Z2ブロックの方を向けて撮影し、監視装置100のセフティ関連情報記憶DB135に記憶する。
監視装置100は、建物施設に設置したモニタ222で緊急放映する。建物施設にいる来店者、関係者が、館内放送により、火災の状況が明確になり、避難階段へ、落ち着いて、転倒、パニック、逃げ遅れ等の混乱もなく、安全に避難ができる。
(COの影響)
建物施設では、管理者、関係者の業務と、来店客、来館者は顧客として利用している。火災発生時に管理者、関係者が顧客の避難誘導に取組む。一度に大挙して避難するために混雑し、スム-ズに避難できず、逃げ遅れる場合が多々ある。火災は発生後より時間の経過に比例して炎、煙、有毒ガスの充満等により、リスクは高まる。
建物施設が超高層化、広大化及び、閉鎖性が高い地下街、海外客船等は多人数である。また施設の構造的な規模、複雑さ等のリスクは、低層階、小型施設とは比較にならない程にリスクは増加する。企業、法人等は顧客を安全、迅速な避難活動のために、管理者、関係者の責務は高まっている。
企業人としての責務のために、顧客を避難させ、次に一般関係者を避難させ、最後に管理者は、全員が無事に避難したかを確認し避難するために、逃げ遅れ痛ましい事故等が発生している場合もある。
排煙設備は、法的に設置基準があり、例えば機械排煙の稼働、自然排煙口が均等に設置される。また、サーキュレータ229は固定、可動式どちらでも可能な方式を避難階段、避難バルコニー、非常エレベータの前方と、避難通路に設置する。可動式の送風機は、A火災報知機、B火災報知機の感知した、例示としてAの火災報知機に連動して、監視カメラ221、投光器、送風機は、Aの火災報知機の方向に向いて、撮影、投光、稼働する。
このような排煙設備(機械排煙機、自然排煙窓開口等)が設置されていても、火災が激しく延焼し、防炎垂れ壁を超えて、Z135、50、10、2ブロックからZ140、60、10、3ブロックへ延焼する場合がある。人間の行動に支障をきたす約20m前後の距離に近づくと、煙感知機が感知する。この場合、煙感知器SM1~SM10、CO感知器CO1~CO100が感知する。
ここでは、建物施設は、ブロックZ1~Z250にブロック割されている。送風機は、排煙設備の排気口方向に向けて稼働し、煙、COを屋外へ排出する。火災の勢いが強く、別のブロック方向からも、煙、CO等の刺激臭が蔓延して、避難階段、避難バルコニー、非常エレベータに向けて、煙、COが流れてきた場合、監視装置100は、煙感知器SM1~SM10、CO感知器CO1~CO100の信号を検出し、当該ブロックの送風機を稼働させる。これによって、避難階段、避難バルコニー、非常エレベータの前方周囲に向けて煙、COを拡散する。視界を開くことができ、刺激臭を除去して、避難者が安全に避難することをサポートできる。
上述したように、デジタルスマートセフティシステム1000は、建物施設にWi-Fi子機201、RFIDリーダ202、iビーコン子機203、人感センサ211を設置し、関係者にRFIDタグを貸与し、携帯装置300を携帯させる。業務施設では、Wi-Fi子機201、RFIDリーダ202、人感センサ211、iビーコン子機203は常時稼働して、セキュリティ度を高め万全な業務をしている。また、営業施設は、顧客の通行、買物等に支障を与えるために、人感センサ211は平常時は、OFFにしている。
[適用例3]
デジタルスマートセフティシステム1000は、各種用途の商業、オフィス、複合施設、サーバ施設、金融施設、工場、地下街、駅、エアーターミナル、競技場、船舶施設等(以下、建物施設という)がある。このような建物施設が、業務施設として利用される場合、不特定多数の人が来館、来店し、また該当企業の関係者が多数、出入、業務する。
図9に示すように、この商業施設には、施設に出入する、出入口、重要な売場、通路、各コーナ等があり、Wi-Fi子機201、RFIDリーダ202、iビーコン子機203、監視カメラ221、モニタ222、人感センサ211、レーザレーダ212、スピーカ223等のセフティ関連装置200が備えられている。セフティ関連装置200の機能範囲を、1ブロックとし、例えば1ブロック~70ブロックに区画する。
監視装置100は、建物施設の重要エリアの出入口、ゲート、売場等と、一般エリア、立入禁止エリアの建物施設全体を異常の有無を監視する。監視装置100は、挙動不審者、要注意不審者と迷惑行為、事故、事件行為等を監視する。監視装置100は、関係者の携帯装置300等に、メール、音声、画像を送信する。関係者がリアルタイムに対応できる。また、不正、犯罪行為を事前に防止してセキュリティ向上を図ることができる。
なお、監視装置100は、業務施設の営業時、閉館、閉店時を24時間通して監視することが好ましい。
業務関係者K1~K150(図示省略)は、携帯装置300を登録・所持する。また、設置されたWi-Fi子機1~200(図示省略)の位置は、Wi-Fi親機301に登録されている。
関係者K3が、Wi-Fi子機の電波区域を通行又は業務すると、関係者K3の携帯装置300の電波を受信し、関係者K3の携帯装置300がWi-Fi親機301にWi-Fi子機201の区域にいることを電波発信する。監視装置100は、該当区域に存在する人物が許可されているか不許可を判定する。
業務施設に、例えば企業の役職員関係者の携帯装置300を監視装置100のセフティ関連情報記憶DB135に登録する。また、業務施設に、電波の識別範囲が10cm~5m程度のiビーコン子機203を設置する。LAN構成のルータへの接続は有線でも、無線でも可能である。ルータは監視装置100に接続する。
関係者K8が、iビーコン子機203の位置場所で通行又は業務すると、関係者K8の携帯装置300のiビーコン親機302が発信する電波を受信する。関係者K8の携帯装置300は、iビーコン子機203の位置場所にいることを監視装置100に電波を発信して知らせる。監視装置100は、セフティ関連情報記憶DB135を参照して関係者K8が許可されているか不許可であるかを判定する。
業務施設には、許可された時間内、及び電波発信距離内でセキュリティを確保するためにRFIDリーダ202が設置されている。監視装置100は、RFIDリーダ202を設置した場所、業務エリア、部屋名、曜日、時間等をセフティ関連情報記憶DB135に記憶する。
業務施設に出入、業務を許可された関係者は、RFIDリーダ202に正規アクセス可能なRFIDタグ(認証カード31)を貸与される。企業の関係者、取引先は、貸与されたRFIDタグを携帯することで、許可された、通路、エリア、倉庫、業務室等を出入したり、業務ができる。
RFIDタグを携帯する関係者、取引先が、決められた曜日、時間帯で出入、業務する場合は、許可されるが、許可された以外の行動をすると、監視装置100は、関係者の携帯装置300に、メール、音声、画像を送信、発信する。関係者がリアルタイムに対応できる。
RFIDリーダ202に不適合電波又は、RFIDタグ不所持の場合は、監視装置100が、データベースを参照して該当RFIDリーダ202が設置されている階数、エリア、レイアウトを抽出する。また、監視装置100は、該当RFIDリーダ202に近い監視カメラ221により人物を撮影する。そして、監視装置100は、事態の深刻度によるモードに応じた処理を実行する。
第2モードは、音声で警告後、不審者が5秒後、以降も退去しなければ、不審者がいる該当位置場所を、監視カメラ221で方向を定め、不審者を撮影する。業務施設にいる関係者の安全を確保することができる。
第3モードは、更に音声で警告後、不審者が例示として10秒後、以降も退去しなければ、関係機関へ通報する。業務施設の情報抜取り防止、不審者情報の正確さと、誤認を防ぎ、企業関係者は、関係機関へ通報と連携することができる。
なお、第1モード~第3モードの、モード数、時間は重要性により任意に設定ができる。
監視装置100は、不審者がいるR3の位置場所より、安全性が高く離間距離がある1階出入口、避難階段、通路を、関係者の携帯装置300によりメールにより送信する。関係者は、来店者を安全性が高く不審者から離間距離がある、1階出入口、避難階段にダイレクトに避難できる。
また、監視装置100は、業務施設に設置しているモニタ222に放映する。高い精度で安全に対応できる。
図10は、オフィス、研究開発室を示す図である。
図10に示すように、オフィス、研究開発室には、休憩室、パブリック、業務室、研究開発室、設計室、資料室、顧客情報室等の業務エリアがある。
監視装置100は、許可された内容である、許可エリア、室名、曜日、時間等をデータベースに記憶する。
許可された関係者R10(図示省略)は、例えば、全館、休憩室等パブリック等は全般で行動、業務ができる。また、許可された関係者R11(図示省略)は、業務室は、研究開発室、設計室、資料室、顧客情報室等の業務エリアにおいて、業務が定められた時間、曜日に行動、業務ができる。
関係者がRFIDタグ(認証カード31)を不携帯、又は不許可の場合は、監視装置100は、該当者の位置場所のRFIDリーダ202に近いスピーカ223が自動的に音声で注意する。この場合、誤認防止のために遅延時間を設定する。
第1モードは、5秒後に、退去しなければ関係者の携帯装置300に、メールにより音声、画像を送信する。関係者がリアルタイムに現地へ急行できる。業務施設にいる多数の関係者が混乱防止、安全、無事故で避難できる。
第2モードは、音声で警告後、不審者が10秒経過しても退去しなければ、不審者がいるZ3ブロックの、R3の位置場所を、監視カメラ221が方向を定め、侵入者を撮影する。業務施設にいる関係者の安全を確保することができる。
第3モードは、更に音声で警告後、不審者が15秒後、以降も退去しなければ、該当位置のR3を示すレイアウトを関係機関へ送信する。関係機関へ通報することで、関係機関と連携することができる。業務施設にいる関係者の安全を図り、誤認を防ぎ、正確な情報伝達することができる。
なお、第1モード~第3モードの、モード数、時間は重要性により任意に設定ができる。
監視装置100は、不審者がいるR3の位置場所より、安全性が高く離間距離がある1階出入口、避難階段、通路を、関係者の携帯装置300によりメールにより送信する。関係者は、来店者を安全性が高く不審者から離間距離がある、1階出入口、避難階段にダイレクトに避難できる。
また、監視装置100は、業務施設に設置しているモニタ222に放映する。高い精度で安全に対応できる。
関係者K20(図示省略)又は外部保守業者は、重要施設の研究開発室の出入りは許可されていない。関係者K20が許可された以外の、研究開発室R4エリアに出入しようとすると、RFIDリーダ202に不適合電波又は、RFIDタグ不所持の場合は、監視装置100が、セフティ関連情報記憶DB135を参照して該当RFIDリーダ202が設置されている階数、エリア、レイアウトを抽出する。また、監視装置100は、該当RFIDリーダ202に近い監視カメラ221により人物を撮影する。そして、監視装置100は、事態の深刻度によるモードに応じた処理を実行する。
第2モードは、音声で警告後、不審者が5秒後、以降も退去しなければ、不審者がいる該当位置場所を、監視カメラ221で方向を定め、不審者を撮影する。業務施設にいる関係者の安全を確保することができる。
第3モードは、更に音声で警告後、不審者が例示として10秒後、以降も退去しなければ、関係機関へ通報する。業務施設の情報抜き取り防止、不審者情報の正確さと、誤認を防ぎ、企業関係者は、関係機関へ通報と連携することができる。
なお、第1モード~第3モードの、モード数、時間は重要性により任意に設定ができる。
[適用例5]
iビーコン子機203の電波と、携帯装置300の電波が不適合の場合と、又は携帯装置300を不所持の場合は、監視装置100は、関係者の携帯装置300にメールにより、音声、画像を送信する。
K3(図示省略)の位置場所にK5(図示省略)が立止まり停止している、K3は不在中であり、K3の位置場所のiビーコン子機203は電波を発信し、K5の携帯装置はiビーコン子機203の電波を受信し、監視装置100は、不適合電波であると判定する。
この場合、監視装置100は、K3のデスク、資料キャビネット等の電気錠226をONしてデスク、資料キャビネット等は施錠するようにしてもよい。また、サーバ室、顧客情報室、研究開発室等の重要な部屋の出入り口ドアの電気錠226のリレーボックス225のスイッチをONにして、K5が該当室に入ることができないようにしてもよい。K5の不正行為のK3の資料の抜き取り、コピー等をリアルタイムに防止できる。
なお、第1モード~第4モードの、モード数、時間は重要性により任意に設定ができる。
デジタルスマートセフティシステム1000は、LANに接続することで下記の業務に適用できる。
業務トップのK1、部門長K2,グループ長K3と担当者K4~K200の業務があるとする。担当者が病欠等の不急の事由により、出勤できない場合の代行の業務遂行がある場合、デジタルスマートセフティシステム1000は、LANを構成するネットワークに接続することで、情報漏洩、抜取り、コピー等の防止を実現する。構成されたLANに、監視装置100を接続する。K1~K200の業務の内容は、監視装置100のデータベースに入力されている。また、業務上必要なネットワーク及び外部接続記憶装置にアクセスする場合は、K1~K200の業務内容、職責、サイト等の、相手先の許可、不許可が決められている。許可以外の相手先、業務内容、サイトは、アクセスは不許可により接続はできない。
例えば、病欠、出張等の事情で、K3の業務を早急に他の、K2が継続業務する場合は、管理監督者のK1の承認を得て、管理権限者ZKの許可により、監視装置100がK3の管理PCに対し登録を許可する。なお、この場合の監視装置100は、業務全体管理PCにデジタルスマートセフティ制御を担う機能部として設置されたものでもよい。また、K2の携帯装置300による人物照合を行う。また、不正行為、情報コピー漏洩等の監視装置100に入力する。
次に、i3の位置場所のiビーコンの発信する電波を、K2が所持する携帯装置300が受信する。監視装置100は、監視カメラ221をK2の行動を追随させるよう撮影する。K3がPC画面、デスク、資料キャビネットを開き、資料を取り出し閲覧等の状況をズームアップ撮影する。
次に、監視装置100は、K2が、K3の位置場所で業務したことを、年月日、曜日、時間と、K3のPCのデスクトップ、マイドキュメント、ファイル、メール、インターネット、USBメモリ、FAX等の全記録を監視装置100が照合し、許可、不許可を判別する。
第1モードは、監視装置100が信号を送り2秒後に、警告を画面に表示する。監視装置100が不許可信号発信し、注意後に時間経過を秒数単位で、警告画面に表示することで、PCの操作ミス等による誤報を防止し、正確な情報の入力を促すことができる。
同時に、監視装置100は、不許可信号を発信し4秒後にK3のデスク、資料キャビネットに設置された、電気錠226の電源装置のリレーボックス225のスイッチが電源入りになり、デスク、資料キャビネット等は施錠される。
同時に、監視装置100は、サーバ室、顧客情報室、研究開発室等の重要な部屋の出入り口ドアに電気錠226が設置されている。電気錠226のリレーボックス225のスイッチがONとなり、電気錠226が施錠されて、K5又は不審者は該当室に入ることができず、K5の不正行為のK3の資料の抜き取り、コピー等をリアルタイムに防止できる。
(不審者の逃走)
監視装置100は、K2のiビーコンが発信する電波を、K2が所持する携帯装置300が受信することで、K2の位置場所を逃走していることを判定する。監視装置100は、K2の位置場所の監視カメラ221がK2を撮影し、関係者の携帯装置300へ画像、位置場所、レイアウト等を送信する。関係者が急行しK2又は不審者を確保できる。K2又は、不審者が、逃走の追跡のためにRFIDタグや携帯装置300を棄てた場合は、施設に設置された人感センサ211が感知し、監視装置100は、K2又は不審者の行動を、関係者の携帯装置300へ画像、位置場所、レイアウト等を送信する。この場合、この不審者がRFIDタグや携帯装置300を棄てて逃走しているメッセージを併せて送信するようにしてもよい。関係者が急行し、K2又は不審者をより迅速に確保できる。
不審者又はK2が、K4~K5の方向へ逃走した場合、iビーコンの電波又は、設置されている該当センサが稼働する。監視装置100は、監視カメラ221を次の逃走方向であるK5~K6の方向に稼働させて撮影する。監視装置100は、K5~K6のレイアウトを、関係者の携帯装置300へ送信する。関係者が適切に対応できる。
(iビーコンの活用)
デジタルスマートセフティシステム1000は、業務施設に設置された、iビーコンと携帯装置300の電波は通常10cm程度~5m程度電波を送受信する。そのiビーコンの発信する電波を携帯装置が受信する距離毎に、下記を行う。
(1)iビーコン親機302に番号を付し、該当施設の業務室、重要部署、関係者が業務する位置場所へ設置する。監視装置100は、該当業務施設のレイアウト図、関係者のK1~K200全員の業務する位置場所、関係者K1~K200の携帯装置300の電話番号をセフティ関連情報記憶DB135に記憶する。
PCの電源装置とデスクの引出し、資料キャビネットの扉、サーバ室、設計室、顧客情報室等出入り口ドアの重要箇所にiビーコンを設置する。
関係者K1~K200全員の位置場所に設置されたiビーコンi1~i200の番号と、関係者K1~K200全員の携帯装置S1~S200の番号のiビーコンi3が発信する。携帯装置300は、K3iビーコンの電波を受信し、監視装置100が、入力、照合する。適正電波として、i3iビーコンの電波をK6であるとする。
上述の社外又は社内の不審者が業務する位置場所で、不適正電波を発信する時間経過により、業務施設にいる多数の関係者が、第1モード~第5モードにより、セキュリティのスペックをレベルアップする。
不許可行為については、監視装置100は、不審者の位置場所、音声、レイアウト、画像で警告する。関係者の携帯装置300で通信し、関係者はリアルタイムに対応することができ、盗難、情報抜取り、情報抜取等を未然に防止できる。
第2モードは、PC電源装置のリレーボックス225のスイッチをOFFし、PCの電源を遮断する。
第3モードは、音声で警告後、不審者が5秒後以降も退去しなければ、不審者がいる該当位置場所を、監視カメラ221で撮影する。業務施設にいる関係者の安全を確保することができる。
第4モードは、更に音声で警告後、不審者が10秒後以降も退去しなければ、監視装置100は、企業関係者に該当位置のR3を図示したレイアウト画像を送信し、関係機関と連携する。業務施設の情報抜取り防止し、不審者情報の正確さと、誤認を防ぐことができる。
避難誘導制御では、不審者がいるR3の位置場所より、安全性が高く離間距離がある、1階出入口、避難階段にダイレクトに避難できるように、通路を表記し、業務施設に設置しているモニタ222に放映する。高い精度で安全に対応できる。
以上、iビーコンの活用について説明したが、業務施設に設置されたRFIDリーダ202を併用して活用できる。業務施設のRFIDリーダ202は数m~20m程度、iビーコンは10cm~5m程度の距離空間を検知し、その距離空間の人物が適正か、異常かを判定できる。
(営業施設の事故、事件)
営業施設で事故、事件に対するデジタルスマートセフティシステム1000の運用方法について述べる。
図9に示すように、営業施設に、各種センサ、レーザレーダ212、監視カメラ221、マイク224、拡声器、投光器、噴霧器等を設置する。また、後方の部門毎の部屋、事務室、金銭集計室、通路、荷捌きヤード、厨房、休憩室、倉庫等がある。建物形状、規模により、例えば水平軸のX1、X2、X3~X7、垂直軸のY1、Y2、Y3~Y9のブロックの、Z1B,Z2B,Z3B~Z250Bに区画する。
事故、事件の緊急時に、侵入者が居る位置場所は、例えば人感センサ211が感知し、監視カメラ221が撮影する。
本実施形態では、監視装置100は、予めセフティ関連情報記憶DB135に記憶している経路情報から最適な経路を出力する。例えば、監視装置100は、出入口、階段、避難施設等と、各ブロックの、部屋、室、通路に設置された人感センサ211の位置と出入口、階段、避難施設等の配置情報と、それらを人が移動する場合の動線距離とをセフティ関連情報記憶DB135に記憶している。また、監視装置100は、侵入者がいる位置場所を感知した人感センサ211の位置を判定する。緊急時に避難者が避難することができる。
(営業施設の事故、事件の未然防止)
デジタルスマートセフティシステム1000は、商業施設、複合施設、地下街、駅ビル、ターミナル施設、金融施設、競技場、船舶施設等の営業エリアのセキュリティを確保する。
このような営業施設でセキュリティを確保するには、不規則の行動、万引、該当企業で事故を発生したことがある要注意者について、警備関係者、関係機関へ詳細な状況を通報することが好ましい。すなわち、警備関係者、関係機関への協力を仰ぐことが好ましい。警備関係者、関係機関へ詳細な状況を通報することで、万一、該当施設で事故、事件が発生した場合に、来店者、来館者、関係者のより安全な避難誘導と、不審者の発見と行動の追随がより有効になる。また、警備関係者、関係機関へ、より詳細な状況を通報できる。
営業施設の各階の、売場、売場コーナ、貴重品売場、通路、階段、避難施設、ELV、出入口等がある場合、建物形状、規模により、水平軸のX1、X2、X3~X7、垂直軸のY1、Y2、Y3~Y9のブロックの、Z1B,Z2B,Z3B,~Z250Bに区画する。
人物を認識できる監視カメラ221を営業施設の出入口、通路、階段上下口、エレベータ(ELV)乗降口、売場、売場コーナ、貴重品売場等に設置する。営業施設の同一の売場、通路を何回も通行当の不規則な行動や、該当企業、施設で過去に万引、事故等を発生した要注意者を、発見する。
不審者Aの位置場所に近い、関係者K7が「いらっしゃいませ、何かお探しですかと」接客する。万引等の事故を未然に防止することができる。
(営業施設の重大事故、事件の避難誘導)
営業施設で突然、来店者が3階、Z3ブロック貴重品、金融商品等を売場から複数の人B、C、Dが凶器を出し、金銭、商品を強奪しようとした緊急事態時について述べる。
接客していた関係者は、緊急事態時に、加圧セキュリティ装置310を稼働させ非常信号を、ブルートウースの送受信機能により発信する。携帯装置300は、デジタルスマートセフティシステム1000の監視装置100は、非常信号を送信する。
監視装置100は、非常信号を受信し、緊急事態発生時制御に移行する。具体的には、3階、Z3ブロック貴重品売場に設置した監視カメラ221を稼働させ、犯人B,C,Dを撮影し、マイク224が犯人と関係者が話していることを集音する。
監視装置100は、他の関係者の携帯装置300へ、メールにより、3階、Z3ブロック貴重品売場を表記したレイアウト、画像、音声を送信する。他の関係者は、緊急事態の発生を、警備関係者、関係機関へ通報することができる。多数の来店者が混乱防止、安全、無事故で避難することができる。
第1モードとして、加圧セキュリティ装置310を稼働して信号を発信し、5秒後に、事件発生した、3階、Z3ブロック貴重品売場、通路に設置したモニタ222で画像を放映する。また、監視装置100は、関係者の携帯装置300に犯人B,C,Dの画像、音声を送信する。
顧客の安全を確保のために、例えば、監視装置100は、下記の制御を行う。
侵入者の位置場所Z3ブロックより、逆方向Z4~Z7ブロックの計測、入力、離間距離があり、安全度が高い、避難施設の階段、出入口を明記したレイアウト図を送信する。この場合、犯人B,C,Dを撮影した、2分割した、広範囲を撮影したA動画を表示する。このうち、至近を撮影したB動画は、侵入位置場所Z3ブロックの、侵入者の状況の動画である。また、集音した侵入者の音声を、関係者の携帯装置300にメールにより、音声、画像を送信する。リアルタイムに関係者が確認し、現場への急行と、関係機関へ通報できる。
また、RFIDリーダを所持している関係者K1~K200の位置場所のPC画面に犯人の映像を表示する。該当関係者が近くにいる、来店者を、安全、迅速に案内誘導を指示することができる。
以上により、関係者が、Z2ブロック位置場所の犯人B,C,Dより、逆の方向で計測の離間距離がある階段、出入口、安全な屋外へ安全、無事故、迅速に避難できる。
(営業施設の重大事故、事件の犯人逮捕)
続いて、犯人B,C,DがZ2ブロックより、Z3~Z6ブロックの方へ逃走した場合、犯人逮捕につながる制御を行う。
監視装置100は、犯人B,C,Dが逃走する次の、Z7、Z8ブロックの方向に監視カメラ221を向けて犯人B,C,Dが逃走してくる、正面の姿を撮影し、監視カメラ221が撮影した正面の姿を映した動画と、該当レイアウトに関係者の携帯装置300に送信する。
監視装置100は、犯人B,C,Dから離間距離があり、安全度が高い、避難施設の階段、出入口を明記したレイアウト図の画像を放映する。犯人B,C,Dの逃走方向である、Z7,Z8,Z9ブロックにいる来店客は、犯人B,C,Dとの離間距離を保って、早く逆方向で安全に避難できる。
監視装置100は、犯人B,C,Dがいる位置場所より、逆の方向で安全性が高い通路をモニタ222で放映する。近くにいる関係者が来店者を安全に対応できる。来店者は、犯人B,C,Dがいる位置場所より、逆の方向で安全性が高い、1階出入口、避難階段にダイレクトに避難できる。
さらに、異常事態の検出には、公知のすべてが含まれる。例えば異常事態には、不審者の侵入又は接近がある。また、通報は、メールに限らずどのようなものでもよい。
このプログラムを記録した記録媒体は、本デジタルスマートセフティシステムのROMそのものであってもよいし、また、外部記憶装置としてCD-ROMドライブ等のプログラム読取装置が設けられ、そこに記録媒体を挿入することで読み取り可能なCD-ROM等であってもよい。
100 監視装置
110 制御部
111 関係者位置情報取得手段
112 煙判定手段
113 防火戸検出手段
114 人検出手段
115 制御手段
116 送信制御部
120 入力部
130 記憶部
135 セフティ関連情報記憶データベース(DB)(煙判定手段の一部)
140 表示部
150 出力部
160 顔情報データベース(DB)
170 画像処理部
180 インタフェース(I/F)部
190 通信部
200 セフティ関連装置
201 Wi-Fiターミナル(Wi-Fi子機)(人検出手段の一部)
202 RFIDリーダ(人検出手段の一部)
203 iビーコン子機
211 人感センサ
212 レーザレーダ
221 監視カメラ
222 モニタ
223 スピーカ
224 マイク
225 リレーボックス
226 電気錠
228 防火戸・防火シャッタ
232 機械排煙口
233 CO感知器
234 煙感知器(煙検知手段)
235 送風機
300 携帯装置
301 Wi-Fi個別識別機(Wi-Fi親機)(人検出手段の一部)
302 iビーコン親機
303 GPS
1000 デジタルスマートセフティシステム
Claims (6)
- 施設のレイアウトを含むセフティ関連情報を記憶するセフティ関連情報記憶手段と、
前記施設に設置され、火災による煙を検知する複数の煙検知手段と、
複数の前記煙検知手段が検知した煙情報に基づいて、煙の流れの方向、量及び速度を判定する煙判定手段と、
前記煙判定手段の判定結果に基づいて、安全な場所を指定して前記施設の関係者を避難誘導させる避難誘導制御を実行する制御手段と
を備えることを特徴とするデジタルスマートセフティシステム。 - 外部廻り、窓等の開口部又は排煙口を含む煙拡散場所に設置され、前記煙判定手段の判定結果に基づいて送風方向を定める送風機を備え、
前記制御手段は、火災による煙を検知時又は前記避難誘導の際、前記送風機を駆動して煙を拡散することを特徴とする請求項1記載のデジタルスマートセフティシステム。 - 前記施設に備えられている防火戸が閉じていないことを検出する防火戸検出手段を備え、
前記制御手段は、前記防火戸検出手段の検出結果に基づいて、前記施設の関係者に前記防火戸が閉じていないことを通報することを特徴とする請求項1記載のデジタルスマートセフティシステム。 - 火災発生時、逃げ遅れた人を検出する人検出手段を備え、
前記制御手段は、前記人検出手段の検出結果に基づいて、前記逃げ遅れた人が存在することを通報することを特徴とする請求項1記載のデジタルスマートセフティシステム。 - 施設のレイアウトを含むセフティ関連情報を記憶するセフティ関連情報記憶ステップと、
前記施設に設置され、火災による煙を検知する煙検知ステップと、
前記煙検知ステップが検知した煙情報に基づいて、煙の流れの方向、量及び速度を判定する煙判定ステップと、
前記煙判定ステップの判定結果に基づいて、安全な場所を指定して前記施設の関係者を避難誘導させる避難誘導制御を実行する制御ステップと
を備えることを特徴とするデジタルスマートセフティ方法。 - コンピュータを、
施設のレイアウトを含むセフティ関連情報を記憶するセフティ関連情報記憶手段と、前記施設に設置され、火災による煙を検知する複数の煙検知手段と、複数の前記煙検知手段が検知した煙情報に基づいて、煙の流れの方向、量及び速度を判定する煙判定手段と、前記煙判定手段の判定結果に基づいて、安全な場所を指定して前記施設の関係者を避難誘導させる避難誘導制御を実行する制御手段とを備えるデジタルスマートセフティシステム
として機能させるためのプログラム。
Priority Applications (3)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US15/771,068 US20180308326A1 (en) | 2015-10-29 | 2016-05-16 | Digital smart safety system, method, and program |
CN201680063500.7A CN108352107A (zh) | 2015-10-29 | 2016-05-16 | 数字智能安全***、方法和程序 |
JP2016558426A JP6067197B1 (ja) | 2015-10-29 | 2016-05-16 | デジタルスマートセフティシステム、方法及びプログラム |
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
JPPCT/JP2015/080620 | 2015-10-29 | ||
PCT/JP2015/080620 WO2017072923A1 (ja) | 2015-10-29 | 2015-10-29 | デジタルセフテイ・サポートシステム、方法及びプログラム |
Publications (1)
Publication Number | Publication Date |
---|---|
WO2017073101A1 true WO2017073101A1 (ja) | 2017-05-04 |
Family
ID=58630125
Family Applications (2)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/JP2015/080620 WO2017072923A1 (ja) | 2015-10-29 | 2015-10-29 | デジタルセフテイ・サポートシステム、方法及びプログラム |
PCT/JP2016/064462 WO2017073101A1 (ja) | 2015-10-29 | 2016-05-16 | デジタルスマートセフティシステム、方法及びプログラム |
Family Applications Before (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/JP2015/080620 WO2017072923A1 (ja) | 2015-10-29 | 2015-10-29 | デジタルセフテイ・サポートシステム、方法及びプログラム |
Country Status (4)
Country | Link |
---|---|
US (1) | US20180308326A1 (ja) |
JP (1) | JPWO2017072923A1 (ja) |
CN (1) | CN108352107A (ja) |
WO (2) | WO2017072923A1 (ja) |
Cited By (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP2019046135A (ja) * | 2017-09-01 | 2019-03-22 | 日東工業株式会社 | 地震報知システム |
JP2020077303A (ja) * | 2018-11-09 | 2020-05-21 | 能美防災株式会社 | 防災システム |
WO2021029086A1 (ja) * | 2019-08-14 | 2021-02-18 | 株式会社 テクノミライ | デジタル・スマートガイド・セキュリティシステム、方法及びプログラム |
Families Citing this family (21)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
DE102016207705A1 (de) * | 2016-05-04 | 2017-11-09 | Robert Bosch Gmbh | Rauchdetektionsvorrichtung, Verfahren zur Detektion von Rauch eines Brandes sowie Computerprogramm |
WO2018189770A1 (ja) * | 2017-04-10 | 2018-10-18 | 三菱電機株式会社 | 地図管理装置および自律移動体制御装置 |
KR101844472B1 (ko) * | 2017-05-10 | 2018-04-02 | 김경수 | 원격 방재 시스템 |
CN108875491B (zh) * | 2017-10-11 | 2021-03-23 | 北京旷视科技有限公司 | 人脸解锁认证的数据更新方法、认证设备和***以及非易失性存储介质 |
JP2019185724A (ja) * | 2018-03-30 | 2019-10-24 | ダイキン工業株式会社 | 情報管理システム |
CN110088643B (zh) * | 2018-08-31 | 2021-12-07 | 深圳迈睿智能科技有限公司 | 人体存在探测器及其人体存在探测方法 |
CN110895862B (zh) * | 2018-09-13 | 2023-07-04 | 开利公司 | 火灾探测***-用于火灾探测设计框架的端对端解决方案 |
US10553085B1 (en) | 2019-01-25 | 2020-02-04 | Lghorizon, Llc | Home emergency guidance and advisement system |
CN109903490B (zh) * | 2019-03-25 | 2020-12-01 | 哈尔滨工程大学 | 一种火灾撤离路径的计算方法和指示*** |
CN111402536A (zh) * | 2020-06-08 | 2020-07-10 | 南京长江都市建筑设计股份有限公司 | 一种消防防火窗信号监控***和方法 |
CN112634578A (zh) * | 2020-12-17 | 2021-04-09 | 招商局重庆交通科研设计院有限公司 | 隧道可变逃生指示*** |
CN112785807A (zh) * | 2021-03-08 | 2021-05-11 | 成都星河天玑数字科技有限公司 | 一种用于复杂现场可视化救援的解决方法及其设备 |
CN113269942A (zh) * | 2021-05-17 | 2021-08-17 | 北京万强安全技术有限公司 | 一种消防工程火灾自动报警*** |
JP7505767B2 (ja) | 2021-06-09 | 2024-06-25 | Necプラットフォームズ株式会社 | 誘導情報生成装置、制御方法、及びプログラム |
WO2023288209A1 (en) * | 2021-07-14 | 2023-01-19 | Sensormatic Electronics, LLC | Systems and methods for parsing sensor data to provide contextual data for a security event |
CN113610392A (zh) * | 2021-08-05 | 2021-11-05 | 深圳英飞拓科技股份有限公司 | 基于人工智能的城市安防管理方法及*** |
CN114511982B (zh) * | 2022-04-19 | 2022-07-08 | 亿慧云智能科技(深圳)股份有限公司 | 一种烟雾报警方法及智能烟雾报警器 |
WO2024084597A1 (ja) * | 2022-10-18 | 2024-04-25 | 日本電気株式会社 | 情報処理装置、情報処理制御方法及び記録媒体 |
CN116187105B (zh) * | 2023-04-27 | 2023-09-26 | 广东广宇科技发展有限公司 | 一种基于数字孪生技术的火灾疏散规划方法及*** |
CN117197984B (zh) * | 2023-09-04 | 2024-04-23 | 北京太平机电设备安装有限责任公司 | 一种办公建筑楼梯间火灾自动报警及灭火*** |
CN117152903A (zh) * | 2023-10-31 | 2023-12-01 | 深圳市美安科技有限公司 | 一种具有人数统计及火灾检测的逃生*** |
Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP2000113357A (ja) * | 1998-09-30 | 2000-04-21 | Hitachi Software Eng Co Ltd | 総合防災救難システム |
JP2005338991A (ja) * | 2004-05-25 | 2005-12-08 | Mitsubishi Electric Corp | 避難誘導支援システム |
JP2006201961A (ja) * | 2005-01-19 | 2006-08-03 | Hitachi Ltd | 災害時誘導システム、災害時誘導方法およびプログラム |
JP2014241062A (ja) * | 2013-06-12 | 2014-12-25 | 住友電気工業株式会社 | 処理装置、及び監視システム |
Family Cites Families (14)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP2000099836A (ja) * | 1998-09-25 | 2000-04-07 | Matsushita Electric Works Ltd | 防犯センサ |
JP2002288771A (ja) * | 2001-03-27 | 2002-10-04 | Secom Co Ltd | 非常送信器 |
JP2003272064A (ja) * | 2002-03-15 | 2003-09-26 | Tsubakimoto Chain Co | 警報送信システム及び警報送信装置 |
JP2003288657A (ja) * | 2002-03-28 | 2003-10-10 | Sanyo Electric Co Ltd | 監視センサシステム |
JP2008226165A (ja) * | 2007-03-15 | 2008-09-25 | Toshiba Corp | 施設監視システム及び方法 |
CN101079178A (zh) * | 2007-06-19 | 2007-11-28 | 南开大学 | 一种火灾疏散预警控制*** |
JP2009188689A (ja) * | 2008-02-06 | 2009-08-20 | Nec Access Technica Ltd | セキュリティシステム及びその通報方法並びにそれに用いるセキュリィティ装置 |
JP2009265928A (ja) * | 2008-04-24 | 2009-11-12 | Panasonic Electric Works Co Ltd | セキュリティシステム |
JP5363272B2 (ja) * | 2009-11-04 | 2013-12-11 | トヨタホーム株式会社 | 地域警備システム |
JP5435740B2 (ja) * | 2010-11-12 | 2014-03-05 | オムロン株式会社 | 監視システム、および監視サーバ |
CN102509410B (zh) * | 2011-12-07 | 2013-08-07 | 浙江大学 | 智能化消防疏散逃生指示***及方法 |
CN103191533B (zh) * | 2013-03-25 | 2015-06-10 | 武汉大学 | 一种智能火灾监控疏散指示***及方法 |
JP5522707B1 (ja) * | 2013-10-28 | 2014-06-18 | 株式会社 テクノミライ | デジタル・セキュリティシステム、方法及びプログラム |
CN103830855B (zh) * | 2014-03-17 | 2016-05-25 | 中国科学技术大学 | 一种针对大型公共建筑的动态消防应急疏散指示*** |
-
2015
- 2015-10-29 WO PCT/JP2015/080620 patent/WO2017072923A1/ja active Application Filing
- 2015-10-29 JP JP2015560481A patent/JPWO2017072923A1/ja active Pending
-
2016
- 2016-05-16 CN CN201680063500.7A patent/CN108352107A/zh active Pending
- 2016-05-16 WO PCT/JP2016/064462 patent/WO2017073101A1/ja active Application Filing
- 2016-05-16 US US15/771,068 patent/US20180308326A1/en not_active Abandoned
Patent Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP2000113357A (ja) * | 1998-09-30 | 2000-04-21 | Hitachi Software Eng Co Ltd | 総合防災救難システム |
JP2005338991A (ja) * | 2004-05-25 | 2005-12-08 | Mitsubishi Electric Corp | 避難誘導支援システム |
JP2006201961A (ja) * | 2005-01-19 | 2006-08-03 | Hitachi Ltd | 災害時誘導システム、災害時誘導方法およびプログラム |
JP2014241062A (ja) * | 2013-06-12 | 2014-12-25 | 住友電気工業株式会社 | 処理装置、及び監視システム |
Cited By (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP2019046135A (ja) * | 2017-09-01 | 2019-03-22 | 日東工業株式会社 | 地震報知システム |
JP2020077303A (ja) * | 2018-11-09 | 2020-05-21 | 能美防災株式会社 | 防災システム |
WO2021029086A1 (ja) * | 2019-08-14 | 2021-02-18 | 株式会社 テクノミライ | デジタル・スマートガイド・セキュリティシステム、方法及びプログラム |
WO2021029035A1 (ja) * | 2019-08-14 | 2021-02-18 | 株式会社 テクノミライ | デジタル・スマートガイド・セキュリティシステム、方法及びプログラム |
JPWO2021029086A1 (ja) * | 2019-08-14 | 2021-09-13 | 株式会社 テクノミライ | デジタル・スマートガイド・セキュリティシステム、方法及びプログラム |
Also Published As
Publication number | Publication date |
---|---|
US20180308326A1 (en) | 2018-10-25 |
JPWO2017072923A1 (ja) | 2017-10-26 |
CN108352107A (zh) | 2018-07-31 |
WO2017072923A1 (ja) | 2017-05-04 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
WO2017073101A1 (ja) | デジタルスマートセフティシステム、方法及びプログラム | |
JP6067197B1 (ja) | デジタルスマートセフティシステム、方法及びプログラム | |
US9466199B2 (en) | Responder-ready reporting network | |
US11024105B1 (en) | Safety and security methods and systems | |
US11710395B2 (en) | Apparatus, system and methods for providing notifications and dynamic security information during an emergency crisis | |
US9683856B2 (en) | Evacuation navigation device | |
US7323980B2 (en) | Security system and method with realtime imagery | |
JP5120906B1 (ja) | デジタルセキュリティー・ネットワークシステム及び方法 | |
KR101638972B1 (ko) | 건축-구조물의 스마트 재난대피 및 안전정보시스템 및 그 방법 | |
WO2014072910A1 (en) | Smart alarm system with user confirmed video stream notification of psap in combination with data safety and public emergency involvement using smartphone agents | |
KR102011342B1 (ko) | 소방 안전 점검 방법 및 시스템 | |
US20220343443A1 (en) | Safety management and building operational assessment system and method for multiple occupancy buildings | |
WO2020213058A1 (ja) | デジタルスマート・ディフェンスセキュリティシステム、方法及びプログラム | |
JP7158940B2 (ja) | 位置情報システム | |
KR102471397B1 (ko) | 화재 관제 시스템 | |
JP7196430B2 (ja) | 装置、管理システム及びプログラム | |
KR102396420B1 (ko) | 재난 대피 모니터링 시스템 및 방법 | |
Jacoby et al. | Considerations for coordinating and interfacing fire protection and life safety systems | |
WO2021084612A1 (ja) | デジタルセフティ・レスポンスセキュリティシステム、方法及びプログラム | |
KR20240061628A (ko) | 재난 대응 재실자 확인 시스템 및 이를 이용한 재난 대응 재실자 확인 방법 | |
KR20240037566A (ko) | 수신기 연동 비상 유도 시스템 | |
Keough et al. | Fire Alarm Systems (Draft) | |
Keough et al. | Fire alarm systems | |
Holmberg et al. | Building Networks and Public Safety Communications |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
ENP | Entry into the national phase |
Ref document number: 2016558426 Country of ref document: JP Kind code of ref document: A |
|
121 | Ep: the epo has been informed by wipo that ep was designated in this application |
Ref document number: 16859338 Country of ref document: EP Kind code of ref document: A1 |
|
WWE | Wipo information: entry into national phase |
Ref document number: 15771068 Country of ref document: US |
|
NENP | Non-entry into the national phase |
Ref country code: DE |
|
122 | Ep: pct application non-entry in european phase |
Ref document number: 16859338 Country of ref document: EP Kind code of ref document: A1 |