HK1204706B - Digital smart security system and method - Google Patents
Digital smart security system and method Download PDFInfo
- Publication number
- HK1204706B HK1204706B HK15105087.6A HK15105087A HK1204706B HK 1204706 B HK1204706 B HK 1204706B HK 15105087 A HK15105087 A HK 15105087A HK 1204706 B HK1204706 B HK 1204706B
- Authority
- HK
- Hong Kong
- Prior art keywords
- breathing
- abnormality
- communication terminal
- information
- user
- Prior art date
Links
Description
Technical Field
The present invention relates to a digital intelligent security system and method that allows reporting of security anomalies even in the presence of a suspect without the suspect being aware of.
Background
Service operations such as stores including department stores, supermarkets and convenience stores, banks, corporate offices, terminal buildings, currency exchanges, cash carriers, buses, and taxis have been dealing with financial instruments, cash, and/or merchandise. Their customers include not only benevolent persons but also those with criminal intentions, and thus there is a high risk of criminal damage along with operational activities.
In an emergency situation, it is common for a victim to notify his/her family, company-related people, police, etc. of the emergency and wait for help. However, victims threatened by criminals are restricted to any action, which in many cases leads to trouble or accidents.
Patent document 1 describes a security system that makes it possible to recover an abnormality in a switching operation at a stage where the abnormality is detected when the switching operation is performed by an operator. In the security system described in patent document 1, the control device detects and reports an abnormality in the monitored area, and stores identification information assigned to the user and identification information assigned to the administrator in association with email addresses, respectively, accepts a switching operation for security mode setting, and generates and transmits an email message including a specified email address according to these determination results.
Reference list
Patent document
[ patent document 1] JP 2012-113446A
[ patent document 2] JP 2008-503268A
[ patent document 3] JP 2007-As 506158A
Disclosure of Invention
[ problem ] to
When an intruder enters a store and threatens his employees and asks for money and/or items, the employee may surrender the money and/or items that are robbed for his/her own safety. Because the threat carrying the weapon is standing in front of her/her, the employee cannot even perform reporting actions to emergency reporting devices, report to police, or counter-attack the threat for customer and personal security, or the threat could attack the employee and/or store user to cause an accident.
Also, as a measure against crime, there has been provided a crime prevention method in which, when an intruder intruding into a shop or a building threatens his employee or home, the employee or home presses an abnormality switch to report to his security company or company headquarters, or an alarm lamp, a speaker, or the like is installed outside the building, in which case a third party outside the building is notified of an abnormal situation, but such a crime prevention method has not been perfected.
It is an object of the present invention to provide a digital smart security system and method and a program that allow a victim to reliably report the occurrence of an abnormal situation.
[ solution to problems ]
The digital intelligent security system comprises a breathing information acquisition device, a breathing sensor and a security module, wherein the breathing information acquisition device is used for acquiring breathing information from the breathing sensor, and the breathing sensor is used for detecting the breathing of personnel equipped with the breathing information acquisition device; abnormality determination means for determining whether or not an abnormality is present depending on whether or not breathing is stopped for a predetermined period and then resumed, based on the breathing information; and control means for reporting the abnormal situation in response to the abnormality determining means having determined that it is the abnormal situation.
Also, if the breathing stops for a predetermined period of time and then recovers, the abnormality determining means determines that it is a safety abnormality based on the breathing information, and if the breathing stops and does not recover, it determines that it is a person health abnormality, and the control means makes different reports between the safety abnormality and the health abnormality, which allows the safety abnormality and the person health abnormality to be reported in a differentiated manner.
Also, in response to which of the plurality of predetermined periods of respiratory stoppage is then resumed, the abnormality determining means determines that it is a different abnormality based on the respiratory information, and the control means makes a different report in response to the different abnormality, which allows a specific report to be made according to the details or degree of the abnormal situation.
Also, in response to which of the plurality of predetermined periods of breathing is stopped and then resumed, the abnormality determining means determines that it is a different abnormality based on the breathing information, and the controlling means makes a different report in response to the different abnormality, and the digital smart security system includes position information acquiring means for detecting existing positions of the plurality of communication terminals and acquiring position information of the communication terminals; and a jurisdiction holding means for holding a jurisdiction in which a building having a security problem is located for receiving an emergency telephone call, wherein the control means accesses the jurisdiction holding means in response to the abnormality determination means determining that it is an abnormal situation, and if any of the plurality of communication terminals is present in the jurisdiction, reports preferentially to the communication terminals present in the jurisdiction, and can allow prompt reporting when an emergency call is made from a mobile phone.
Also, the reporting apparatus transmits an email message and an image, which allows a person who receives the report to accurately and quickly evaluate an abnormal situation.
The digital intelligent security method comprises a breathing information acquisition step of acquiring breathing information from a breathing sensor, wherein the breathing sensor is used for detecting the breathing of personnel equipped with the breathing information acquisition device; an abnormality determining step of determining whether or not it is abnormal based on the breathing information depending on whether or not breathing is stopped for a predetermined period and then resumed; and a control step of reporting the abnormal situation in response to the abnormality determination means having determined that it is the abnormal situation.
The invention relates to a program for enabling a computer to serve as a digital intelligent security system, wherein the digital intelligent security system comprises a breathing information acquisition device and a breathing sensor, and the breathing information acquisition device acquires breathing information from the breathing sensor, wherein the breathing sensor is used for detecting the breathing of personnel equipped with the breathing information acquisition device; abnormality determining means for determining whether or not it is abnormal based on the breathing information depending on whether or not breathing is stopped for a predetermined period and then resumed; and control means for reporting the abnormal situation in response to the abnormality determining means having determined that it is the abnormal situation.
[ advantageous effects of the invention ]
The present invention allows reporting the occurrence of a security anomaly even in front of a suspect without being recognized by the suspect.
Drawings
Fig. 1 is a block diagram illustrating a configuration of a digital smart security system according to a first embodiment of the present invention.
Fig. 2 is a diagram illustrating registration setting information of a respiratory sensor and a communication terminal of a digital smart security system according to a first embodiment of the present invention.
Fig. 3 is a flowchart illustrating a registration process of a respiratory sensor and a communication terminal of the digital smart security system according to the first embodiment of the present invention.
Fig. 4 is a flowchart illustrating a registration process of a monitoring device of the digital smart security system according to the first embodiment of the present invention.
Fig. 5 is a flowchart illustrating a monitoring control process of a communication terminal of the digital smart security system according to the first embodiment of the present invention.
Fig. 6 is a flowchart illustrating a respiratory abnormality determination process performed by the abnormality determination unit 112 of the communication terminal of the digital smart security system according to the first embodiment of the present invention.
Fig. 7 is a flowchart illustrating a report control operation of a monitoring device of the digital smart security system according to the first embodiment of the present invention.
Fig. 8 is a flowchart illustrating a report control operation of a monitoring device of the digital smart security system according to the first embodiment of the present invention.
Fig. 9 is a flowchart illustrating a report control operation of a monitoring device of the digital smart security system according to the first embodiment of the present invention.
Fig. 10 is a flowchart illustrating a report control operation of a monitoring device of a company or an individual of the digital smart security system according to the first embodiment of the present invention.
Fig. 11 is a flowchart illustrating a registration operation of a monitoring device of the digital smart security system according to the first embodiment of the present invention.
Fig. 12 is a flowchart illustrating a behavior monitoring control operation of a monitoring device of the digital smart security system according to the second embodiment of the present invention.
Fig. 13 is a diagram illustrating an example of a breathing cessation mode of the digital smart security system according to the third embodiment of the present invention.
Detailed Description
Modes for carrying out the invention will be described below in detail with reference to the accompanying drawings.
(first embodiment)
Fig. 1 is a block diagram illustrating a configuration of a digital smart security system according to a first embodiment of the present invention.
The digital smart security system includes a communication terminal 100 worn on a user (person) capable of receiving respiration information from a respiration sensor 10 that detects the respiration of the person to output the respiration information, and a monitoring device 200 as a main body of the digital smart security system equipment, the monitoring device 200 communicating with the communication terminal 100 via a telephone line 210.
Further, when the digital smart security system provides a security contract service to the communication terminal 100, the user of the communication terminal 100 may be referred to as a user from the perspective of the digital smart security system.
Also, the configuration may be such that the monitoring device 200 is incorporated into the communication terminal 100 depending on the desired application, but a description will be given of a configuration in which the communication terminal 100 is separated from the monitoring device 200 in the present embodiment.
The communication terminal 100 is composed of a mobile phone, a PHS (personal handyphone system) phone, a PDA (personal digital assistant), a smart phone, and the like, and transmits a sound transmission and a resistance device operation command to the monitoring device 200 via a telephone line 210. In the present embodiment, a mobile phone or a smart phone is used as the communication terminal 100, which each individual can use at various locations (i.e., current locations). One of the communication terminals 100 is located at a security company 220 together with a PC (personal computer). The communication terminal 100 is capable of receiving an e-mail message, an image including a moving image, and the like from the monitoring apparatus 200 via the telephone line 210.
[ respiration sensor 10]
The respiration sensor 10 captures body surface motion due to respiration. Although not the subject of the present invention, the respiration sensor 10 will be described for the understanding of the present invention. For example, with a microwave doppler sensor, the respiration sensor 10 senses respiration (whether the respiration rate is high or low, breathing or not) based on minute body motion by the microwaves (2.4GHz) transmitted from the sensor. As another example of a viscous sensor with a built-in acoustic transducer, the breath sensor 10 distinguishes between gas flows (in and out) in the respiratory tract to detect the breathing rate sequentially. The respiration information acquired by the respiration sensor 10 is output to the communication terminal 100 according to the wireless communication system, wherein the communication terminal 100 is the subject of the present invention.
[ communication terminal 100]
The communication terminal 100 is configured to include a breathing information acquisition unit 101 that acquires breathing information from the breathing sensor 10, a GPS (global positioning system) function unit 102, a communication unit 103, a storage unit 104, and a control unit 110 that controls the communication terminal as a whole.
The respiratory information acquisition unit 101 acquires respiratory information detected by the respiratory sensor 10 wirelessly or through a wire. Examples of the wireless communication system are Bluetooth (registered trademark), Wi-Fi radio including ieee802.11b standard, distributed low-power radio, ultra-wideband transmission system such as UWB (ultra-wideband), and infrared communication.
The GPS functional unit 102 receives radio waves of position information from GPS satellites or the like. The GPS functional unit 102 calculates current position information as two parameters of latitude and longitude from information received via the GPS antenna to acquire position information. Generally, altitude information may also be acquired by GPS, but this embodiment does not use it. Also, instead of or in combination with the GPS function unit 102, the current location information of the communication terminal 100 may also be acquired by performing transmission/reception of information with a mobile phone company server using a base station and a network. The acquired position information is transmitted to the monitoring apparatus 200 in time.
The communication unit 103 performs transmission/reception with a base station similarly to a general communication terminal. In the present embodiment, the communication terminal 100 transmits the position information of the communication terminal 100 to the monitoring device 200 via the communication unit 103 every predetermined period, and transmits a notification about the occurrence of an abnormality and the latest position information about the occurrence of an abnormal situation.
The storage unit 104 is constituted by a nonvolatile memory such as an EEPROM, and retains information even after the power of the main body is turned off. The storage unit 104 stores ID information of its own terminal, registration setting information (refer to fig. 2) so as to acquire breathing information from the breathing sensor 10, and a breathing stop mode program to determine the occurrence of an abnormality.
The control unit 110 is constituted by a CPU or the like, performs control of the communication terminal 100 as a whole, and performs control to determine occurrence of an abnormal situation and report the abnormal situation.
The control unit 110 includes: a registration unit 111 that registers registration setting information to acquire breathing information, and an abnormality determination unit 112 that determines that an abnormal situation occurs when the breathing detected by the breathing sensor 10 has a breathing pattern set in advance.
The registration unit 111 and the abnormality determination unit 112 are programs. Hereinafter, when the subject is described as the "XX unit", the CPU reads out the breathing cessation mode program from the storage unit 104 as necessary, then loads it into a main storage unit (not shown), and performs the corresponding function (described later). The apnea pattern program may be stored in the storage unit 104 in advance, or may be brought to the communication terminal 100 via another storage medium or a communication medium when necessary.
[ monitoring apparatus 200]
The monitoring apparatus 200 includes a control unit 201, an input unit 202, and an alarm transmission unit 203. The monitoring device 200 may be a common server computer, personal computer, or the like.
The control unit 201 is constituted by a CPU or the like, controls the devices as a whole and executes a security program to function as a digital smart security system. The control unit 201 has a memory (not shown) that stores information. The semiconductor memory, the magnetic recording device, the optical disk device, the magneto-optical disk drive device, and the like may be a memory.
The control unit 201 includes: a location information acquisition unit 201a that tracks the existing location of the communication terminal 100 serving as an information recipient and acquires location information of the communication terminal 100, and a jurisdiction holding unit 201b that holds a police jurisdiction in which the mobile phone is located. Here, the jurisdiction of the police receiving the mobile phone call is based on one county to one county in japan. When an emergency is detected, the control unit 201 performs control to designate one communication terminal 100 serving as an information recipient, and preferably to report to the designated communication terminal 100, that the communication terminal 100 exists in the police jurisdiction and that the communication terminal 100 serves as an information sender with respect to the police jurisdiction.
The control unit 201 judges the sound transmission (warning intruder) and the resistant apparatus operation command transmitted from the communication terminal 100 which has received the report, and if the command is so, it may even output a sound signal to a speaker (not shown) via the input unit 202 and output an operation signal to the resistant apparatus (not shown).
The input unit 202 has a function as an abnormal situation detection means that detects an abnormal situation based on an abnormality determination result from the communication terminal 100 serving as an information sender. The input unit 202 receives position information of the corresponding communication terminal 100 transmitted from the communication terminal 100 via the telephone line 210, and outputs these signals to the control unit 201.
The alarm transmission unit 203 transmits an e-mail message or an image including a moving image to the other communication terminal 100 and the security company 140 via the telephone line 210.
Upon receiving an email message, image, etc. from the digital intelligent security system, the security company 220 performs an investigation of the abnormal situation. In addition, the security company 220 is not an essential structural element of the digital smart security system according to the present embodiment.
Fig. 2 is a graph showing registration setting information of the respiration sensor 10 and the communication terminal 100.
As shown in fig. 2, the storage unit 104 of the communication terminal 100 stores registration setting information 120, which is accessed when the apnea mode procedure is executed. As the registration setting information 120, the respiration information of the respiration sensor 10 and the communication terminal 100 is set to be associated with each other for each user of the present system. Such registration setting information 120 is transmitted to the monitoring apparatus 200 in advance and registered in the monitoring apparatus 200, and the breathing information of the communication terminal 100 of each user of the present system can also be accessed in the monitoring apparatus 200.
For the registration setting information 120, the respiration sensor 10 and the communication terminal 100 are associated with each other for each user. Specifically, the user's name, mobile phone number, and normal-time respiration information are items on the side of the respiration sensor 10, and at the same time, the user's name, respiration sensor number, monitoring device 200(DS2) information, and normal-time respiration information are used for the communication terminal 100. Then, in the storage unit 104, a breathing stop mode program is registered. The apnea pattern program is recorded at the communication terminal 100 and the monitoring apparatus 200, respectively.
The operation of the digital smart security system configured as described above will be described below.
[ registration processing ]
First, registration processing of the respiration sensor 10, the communication terminal 100, and the monitoring apparatus 200 will be described.
Fig. 3 is a flowchart showing a registration process of the respiration sensor 10 and the communication terminal 100. The present flow is mainly executed by the registration unit 111 (fig. 1) of the control unit 110 of the communication terminal 100.
In step S1, the user sets information such as the name and mobile phone number of the user of the communication terminal 100 to which the breathing information detected in the breathing sensor 10 is transmitted.
In step S2, the registration unit 111 sets user information (name, sex, age) and respiratory sensor information using a wireless communication system such as Bluetooth or a pairing operation of allocated low-power radio with the respiratory sensor 10, and registers the information in the storage unit 104 as registration setting information 120 (refer to fig. 2). In addition to basic information such as name, gender and age, it is preferable to store user service types to which the present system is mainly applied as the above user information in order to enhance the efficiency of the digital smart security system in case of a security problem.
The registration process of the respiration sensor 10, the communication terminal 100, and the monitoring apparatus 200 will be described next.
Fig. 4 is a flowchart showing a registration process of the monitoring apparatus 200 (fig. 1). The present flow is mainly executed by the control unit 201 of the monitoring apparatus 200.
In step S11, the control unit 201 registers in advance the user information transmitted from the communication terminal 100 as monitoring device registration setting information (not shown). As the monitoring device registration setting information, user information of the respiration sensor 10 related to the communication terminal 100, a mobile phone number, a name, a password, a contact address, and a normal respiration rate (normal-time respiration information) of the communication terminal are registered. Also, a breathing cessation mode program is registered.
[ terminal monitor control ]
Next, monitoring control of the communication terminal 100 of the digital smart security system will be described.
Fig. 5 is a flowchart showing a monitoring control process of the communication terminal 100 of the digital smart security system. The present flow is mainly executed by the control unit 110 (fig. 1) of the communication terminal 100.
First, in step S21, the GPS functional unit 102 acquires current position information of the communication terminal 100.
In step S22, the control unit 110 transmits the acquired location information of the communication terminal 100 to the monitoring apparatus 200 via the communication unit 103 every predetermined time (for example, one hour). The control unit 201 of the monitoring apparatus 200 receives the position information from the communication terminal 100 by the input unit 202. Thereby, the monitoring apparatus 200 can be notified of the latest position information of the communication terminal 100, for example, every hour. In the present embodiment, it is assumed that the user carries the respiration sensor 10 and the communication terminal 100 with him. Thus, the monitoring device 200 may be informed of the current location of the user using the respiration sensor 10. Further, if the system resource permits, by setting the above predetermined time to, for example, every 10 minutes, it is possible to obtain a position notification closer to the current position. Alternatively, the pattern of the predetermined time may be changed according to the degree of urgency, necessity, or importance. Here, the location information of the user (the communication terminal 100) is an example of a more preferred embodiment of the digital smart security system, but is not necessarily required. That is, it is sufficient that the abnormal change of the user based on the user's breathing cessation pattern can be determined at the monitoring apparatus 200 side with the breathing sensor 10. It is a unique effect that an abnormal change of a user can be notified without an attacker's awareness or the like. However, if not only an abnormal change of the user but also the current position of the user (communication terminal 100) can be notified, a more appropriate response can be taken.
In step S23, the respiratory information acquisition unit 101 acquires the respiratory information of the user' S respiratory sensor 10 at all times, and the control unit 110 monitors the acquired respiratory information of the user.
In step S24, the control unit 110 starts the breathing stop mode routine, and determines abnormality in breathing of the user based on the breathing information. Details of the breathing abnormality determination will be described later with reference to fig. 6.
In step S25, the abnormality determination unit 112 determines whether the user ' S breathing is abnormal (excluding abnormal conditions of health due to diseases and the like), and if the user ' S breathing is abnormal, the process moves to step S26, and if the user ' S breathing is not abnormal, the process returns to step S21 described above.
In step S26, the control unit 110 shifts to the emergency mode to transmit an electronic mail message about the occurrence of an abnormality to the monitoring apparatus 200 via the communication unit 103 and to transmit the latest position information of the communication terminal 100. Further, if it takes a long time to acquire the latest position information of the communication terminal 100 in the emergency mode (such as a failure to acquire GPS position information), it is preferable to first make the abnormality occurrence notified without waiting for the latest position information acquisition. Also, the last acquired location information may be transmitted.
This allows the user to intentionally and reliably report the abnormal situation without the robber being aware of it.
[ respiratory abnormality determination treatment ]
Fig. 6 is a flowchart showing a respiratory abnormality determination process performed by the abnormality determination unit 112 of the communication terminal 100, and is a subroutine of step S24 of fig. 5.
First, in step S31, respiration information acquisition section 101 acquires respiration information of respiration sensor 10 of the user.
In step S32, the abnormality determination unit 112 determines whether the user stops breathing for a given period of time (e.g., 10 to 15 seconds) and then resumes breathing. Here, the user has been instructed beforehand to stop breathing only for the above-described given period in the event of an abnormal situation, and then resume breathing. Also, the user has been subjected to training, i.e., stopping breathing only for the above-mentioned predetermined period in the event of an abnormal situation, and then resuming breathing, the training being carried out while the abnormal situation actually occurs. Examples of abnormal situations are robberies in convenience stores or department stores, bank robberies, armoured van robberies, and jewellery shop robberies.
If the user stops breathing for a predetermined period of time and then resumes breathing, the abnormality determining unit 112 determines in step S33 whether an abnormal situation of the user' S health has occurred. The physiological disorder of respiratory function may be a health abnormality. That is, even when the user stops breathing for a predetermined period of time and then resumes breathing, if the pattern of breathing stoppage is different from that in the case where an abnormal situation occurs, even if it is slightly different (so that the above-described fixed period is slightly different, or the stoppage and resumption of breathing are repeated), such a situation can be regarded as a health abnormal situation and distinguished from the abnormal situation covered by the present system.
If it is determined in the above-described step S33 that the user health abnormal situation has not occurred, the abnormality determining unit 112 determines in step S34 that an abnormal situation has occurred to the user to return to step S24 of fig. 5.
In contrast, if the user does not stop breathing for the given period and then resumes breathing in the above-described step S32, or if a health abnormality of the user occurs in the above-described step S33, the abnormality determination unit 112 determines in step S35 that a safety abnormality of the user has not occurred, to return to step S24 of fig. 5.
As described above, even when breathing is stopped and then resumed, the occurrence of an abnormal situation of the user's health is excluded, and only a safe abnormal situation of interest to the present system is determined.
Furthermore, patent document 2 describes a system that monitors physiological data in real time using physiological parameters describing the respiratory function of a subject. Also, patent document 3 describes an apparatus for detecting an emergency of a body of a target person using stress level information including respiration rate information. Since the devices described in patent documents 2 and 3 both detect naturally occurring physiological changes based on the breathing rate of the target person without taking the intention of the target person into consideration, it is difficult to distinguish: the target person is urgently needed as part of his/her routine and therefore has a situation of irregular breathing, as opposed to the situation where the target person has irregular breathing due to a safety anomaly. In contrast, the digital smart security system detects physiological changes based on the intention of the target person, thus allowing the reporting to be reliably made when it is really necessary without the suspicious person being aware of it.
[ report control of the monitoring apparatus 200]
< reporting example 1 >
Fig. 7 is a flowchart illustrating a report control operation of the monitoring device 200 of the digital smart security system. The present flow is mainly executed by the control unit 201 (fig. 1) of the monitoring apparatus 200.
First, in step S41, the control unit 201 waits until the input unit 202 receives abnormality determination information from the communication terminal 100 through an email message. Alternatively, it may be determined whether the abnormality determination information and the latest position information of the communication terminal 100 have been received. In the present embodiment, the communication terminal 100 is configured by a mobile phone, a smart phone, or the like, is capable of mobile communication, and is used at a location of each person (i.e., an existing location). The monitoring apparatus 200 receives the normal notification every predetermined time (for example, one hour) so as to store the position of the communication terminal 100 at the normal time at which it is determined that the abnormality is not notified from the communication terminal 100.
If abnormality determination information has been received from the communication terminal 100, the control unit 201 determines in step S42 which county, which is the jurisdiction where emergency alert telephone calls are received, the communication terminal 100 is located based on the received location information of the communication terminal 100.
In step S43, the control unit 201 transmits an email message instructing a report to the police 230 (refer to fig. 1), preferably to the communication terminal 100 determined to be in a suitable county as the jurisdiction in which the building having a security problem is located.
In step S44, the control unit 201 of the monitoring device 200 transmits a result email message, informing that it has been reported to the police 230, to the other communication terminal 100 and the security company 220 (refer to fig. 1) to end the present flow.
As described above, the present reporting example 1 is preferably reporting to information recipients who are in the same police administrative district as the user (victim).
In particular, the present reporting example 1 reports only to other communication terminals 100, security companies 220, and police 230, intentionally not performing warnings, threats, and the like to the communication terminal 100 of the user (victim). That is, this is to protect the body of the user (victim) without irritating the robber, and also to consider that the user (victim) cannot even use his/her voice in such a dangerous situation. The present system has a unique effect that an abnormal situation can be reliably reported intentionally by a user without being recognized by a robber, and the present reporting example 1 can achieve a maximized effect of reporting an abnormal situation without being recognized by a robber.
< reporting example 2 >
Report example 2 is an example of an application to a service operating a building, such as a store, bank, corporate office, station/terminal building, currency exchange, securicar, bus or taxi, and a person's home (hereinafter referred to as a store, etc.).
The above-mentioned shop or the like mounts a plurality of monitoring cameras, and a predetermined monitoring area can be photographed. Also, the surveillance camera may follow a specific person or shooting location. Even if the monitoring camera does not follow the shooting position, a person or the like can be shot from various angles by installing a plurality of monitoring cameras.
A digital smart security system in a shop or the like will be described.
Fig. 8 is a flowchart showing a report control operation of the monitoring device 200 of the digital smart security system in a shop or the like. The present flow is mainly executed by the control unit 201 (fig. 1) of the monitoring apparatus 200. Steps for performing the same processing as in fig. 7 are denoted by the same reference numerals.
First, in step S51, the control unit 201 waits until the input unit 202 receives abnormality determination information from the communication terminal 100 through an email message.
If abnormality determination information has been received from the communication terminal 100, the control unit 201 notifies the relevant shop office, headquarters, security company, etc. of the abnormality by an email message based on the received location information of the communication terminal 100 and requests the relevant user to be photographed by the monitoring camera in step S52. Based on the user photographing request of the monitoring apparatus 200, a shop office, a headquarters, a security company, or the like takes a moving image of the user at the relevant shop or the like through the monitoring camera and transmits the moving image to the monitoring apparatus 200.
In step S53, the acquired user real-time moving image is visually confirmed.
In step S54, input of a visual confirmation result by the input unit 202 is awaited.
As a result of the visual confirmation, if the abnormality is confirmed, the control unit 201 transmits an e-mail message instructing to report to the police 230, preferably to the communication terminal 100 determined to be in a suitable county as the jurisdiction where the building having the security problem is located, in step S43.
In step S44, the control unit 201 of the monitoring device 200 transmits a result email message that has been reported to the relevant police 230, other communication terminals 100, and security company 220 to end the present flow.
This report example 2 is to protect the body of the user (victim) without irritating the robber, and also considers that the user (victim) cannot even use his/her voice in such a dangerous situation. The system can be used for intentionally and reliably reporting the abnormal condition by a user without being realized by a robber. In particular, since the present reporting example 2 visually confirms a real-time moving image of the environment in which the user is present at the time of determining an abnormality, it is possible to perform more reliable abnormality determination and to realize more appropriate measures.
< reporting example 3 >
By reporting instances 1 and 2, abnormal situations can be reported without being realized by the robber.
Reporting example 3 is an example of reporting an abnormal situation after a threat to a robber without being realized by the robber.
Fig. 9 is a flowchart showing a report control operation of the monitoring apparatus 200 of the digital smart security system in a shop or the like. The present flow is mainly executed by the control unit 201 (fig. 1) of the monitoring apparatus 200. Steps for performing the same processing as in fig. 8 are denoted by the same reference numerals.
First, in step S61, the control unit 201 waits until the input unit 202 receives abnormality determination information from the communication terminal 100 through an email message.
If abnormality determination information has been received from the communication terminal 100, the control unit 201 notifies the relevant shop office, headquarters, security company, etc. of the abnormality by an e-mail message based on the received position information of the communication terminal 100 and causes the communication terminal 100 of the user to produce a sound by automated voice to confirm the situation in step S62.
In step S63, the control unit 201 requests photographing of the user by the monitoring camera. Based on the user photographing request of the monitoring apparatus 200, a shop office, a headquarters, a security company, or the like acquires a moving image of the user in the shop or the like through the monitoring camera and transmits the moving image to the monitoring apparatus 200.
In step S64, the control unit 201 determines whether there is a response from the communication terminal 100 of the user in response to confirmation by the situation of the automated voice. If there is no response from the communication terminal 100 of the user, the control unit 201 notifies the emergency (abnormal situation) about the shop or the like by attaching the photograph to the email message again in step S65.
If there is a response from the user 'S communication terminal 100, the user' S real-time moving image taken in step S66 is visually confirmed to determine whether it is abnormal, questionable, or not.
As a result of the visual confirmation, when there is an abnormality, the control unit 201 requests the headquarters of the shop or the like to make a sound report to an appropriate location in the shop (the location in the shop where the user is located) in step S67. The headquarters of the store or the like receives this request to place a threat (such as a threat tone or warning message) to the appropriate location within the store through an audible notification.
In step S68, after the headquarters of the shop or the like and/or the security company confirms the emergency, the control unit 201 transmits an email message instructing reporting to the police 150, based on the user position, preferably to the communication terminal 100 determined to be in a suitable county as the jurisdiction where the building having the security problem is located.
In step S44, the control unit 201 of the monitoring device 200 transmits a result email message that a report has been made to the concerned police party 150, other communication terminal 100, and security company 140 to end the present flow.
As a result of the visual confirmation, if there is a question, the control unit 201 requests the head office of the shop or the like to make a predetermined action (such as an action to notify not an emergency) by sound to the user in step S69. The headquarters of the shop or the like instructs the user to take appropriate action by voice message by receiving this request.
In step S70, based on a response from the headquarters of the shop or the like, the control unit 201 determines whether the user has performed an action as instructed. If the user has performed the action as instructed, it is judged that there is no abnormality, and it proceeds to step S71, and if the user has not performed the action as instructed, it is judged that there is an abnormality, and it proceeds to step S68.
If it is determined at the above-described step S66 that there is no abnormality, or if the user has performed an action as instructed, the control unit 201 notifies the user and the other communication terminal 100 in step S71 that the emergency mode has been cancelled to end the present flow.
As described above, in the present reporting example 3, the headquarters office of the business that has received the abnormal situation confirms the moving image of the monitoring camera and warns the robber, and the accident can be thereby prevented. Also, the monitoring apparatus 200 detects an abnormal situation, checks a moving image of the monitoring camera, and warns an intruder through a speaker. In such cases where a third party is not involved in the trouble, a resistance device (not shown) may be activated to resist the intruder.
< reporting example 4 >
Similar to reporting example 3, reporting example 4 is an example of reporting an abnormal situation without being realized by the robber, followed by warning the robber.
Fig. 10 is a flowchart illustrating a report control operation of the monitoring device 200 of the digital smart security system at a company or an individual. The present flow is mainly executed by the control unit 201 (fig. 1) of the monitoring apparatus 200. Steps for performing the same processing as in fig. 9 are denoted by the same reference numerals.
First, in step S61, the control unit 201 waits until the input unit 202 receives abnormality determination information from the communication terminal 100 through an email message.
If abnormality determination information has been received from the communication terminal 100, the control unit 201 notifies the relevant family, security company, company headquarters, etc. of the abnormality by an e-mail message based on the received position information of the communication terminal 100 and causes the communication terminal 100 of the user to produce a sound by automated voice to confirm the situation in step S81.
In step S82, the control unit 201 issues the above-described email message to family or corporate headquarters, and then determines whether there is a response to the email message within a predetermined time (e.g., three minutes).
If there is no response even within a predetermined time (for example, three minutes) after the above-described e-mail message is issued, the control unit 201 notifies other users (other communication terminals 100) of the possibility of abnormality occurrence of the user through the e-mail message in step S83.
In step S64, the control unit 201 determines whether there is a response from the communication terminal 100 of the user in response to the situation confirmation of the automated voice. If there is no response from the communication terminal 100 of the user, the control unit 201 notifies the emergency (abnormal situation) about the shop or the like again by attaching the photograph to the email message in step S65.
In step S84, the control unit 201 requests photographing of the periphery of the building by the monitoring camera. Based on the user photographing request of the monitoring apparatus 200, a shop office, a headquarters, a security company, and the like photograph a moving image of the periphery of a building through a monitoring camera and transmit the moving image to the monitoring apparatus 200.
The user' S real-time moving image taken at step S66 is visually confirmed to determine whether it is abnormal, questionable, or abnormal-free.
As a result of the visual confirmation, if it is abnormal, the control unit 201 requests the headquarters of the shop or the like to make a sound report to an appropriate position in the shop (the position where the user is located in the shop) in step S67. The headquarters of the store or the like receives this request to place a threat (such as a threat tone or warning message) to the appropriate location within the store through an audible notification.
In step S68, after confirmation of an emergency by the headquarters of the shop or the like and/or security company, the control unit 201 transmits an email message instructing reporting to the police 150, preferably to the communication terminal 100 determined to be in a suitable county as the jurisdiction where the building having a security problem is located, based on the location of the user.
In step S44, the control unit 201 of the monitoring device 200 transmits a result email message that a report has been made to the concerned police 230, other communication terminal 100, and security company 220 to end the present flow.
As a result of the visual confirmation, if there is a question, the control unit 201 requests the head office of the shop or the like to make a predetermined action (such as an action to notify not an emergency) by sound to the user in step S69. The headquarters of the shop or the like instructs the user to take appropriate action by voice message by receiving this request.
In step S70, based on a response from the headquarters of the shop or the like, the control unit 201 determines whether the user has performed an action as instructed. If the user has performed the action as instructed, it is judged that there is no abnormality, and it proceeds to step S71, and if the user has not performed the action as instructed, it is judged that there is an abnormality, and it proceeds to step S68.
If it is determined in the above-described step S66 that there is no abnormality, or if the user has performed an action as instructed, the control unit 201 notifies the user and the other communication terminal 100 in step S71 that the emergency mode has been cancelled to end the present flow.
As described above, even in the event that an employee is threatened by a threat and cannot take any action, the monitoring device 200 can report an abnormal situation to the merchant's office and headquarters and the security company 220 in order to dial the emergency number 110 to the police 230 (i.e., make an emergency call) in real time without the threat being aware.
As described in detail above, according to the present embodiment, the digital smart security system includes the respiration sensor 10 for detecting the respiration of the user, the abnormality determination unit 112, if the respiration detected by the respiration sensor 10 has a preset respiration pattern, the abnormality determination unit 112 determines the occurrence of an abnormal situation, and the alarm transmission unit 203 that reports the abnormal situation based on the determination result of the occurrence of the abnormal situation. If the user (communication terminal 100) stops breathing for a fixed period (for example, 10 to 15 seconds) and then resumes breathing, the abnormality determination unit 112 determines the occurrence of an abnormal situation. In contrast, if breathing is stopped and not recovered, the abnormality determination unit 112 determines that a user (communication terminal 100) health abnormality has occurred.
This configuration allows the user to intentionally report the abnormal situation reliably without being aware of the robber. For example, even in a case where he/she is threatened by a threat person (robber) and cannot take any action, the user can report an abnormal situation to his/her family (other communication terminal 100), the business' office and headquarters, and the security company 220 without being recognized by the robber through a breath stop pattern in which he/she stops breathing for several seconds. Family members or the like may confirm and dial the emergency number 110 to the police 230 to prevent trouble or accidents. Moreover, similarly for an employee of a securicar, bus, taxi, precious metal, jewelry counter, etc., the employee's security can be ensured, protecting him/her in case of a robbery. Moreover, even the elderly, children and those who are socially vulnerable because of health problems, and even those from remote places, can provide help support in real time when an abnormal situation occurs. Therefore, the lives and properties of companies or individual employees (more in the home) can be protected in real time, and the digital smart security system is useful as a system for crime-fighting measures, and its economic advantages and contribution are considerable.
For example, in the case where a robber invades a building operated by a service such as a shop, a bank, a company office, a station/terminal building, a currency exchange, a cash carrier, a bus or a taxi, and a personal home, his/her employee can reliably report an abnormal situation by stopping breathing for a fixed period of time and then resuming breathing, and his/her related family can dial the emergency number 110 to the police.
Also, when the respiration sensor 10 is stopped due to violence of a threat (robber) or the communication terminal 100 is robbed by the robber and signal communication between the respiration sensor 10 and the communication terminal 100 is unavailable, the communication terminal 100 transmits the current location identified by the GPS and the user is in an emergency to the monitoring apparatus 200, and the monitoring apparatus 200 further reports the situation to a person related to his/her company or family, which allows the person related to the company or family to dial the emergency number 110 to the police. As described above, even when an employee is threatened by a threat and cannot take any action, the monitoring device 200 can report an abnormal situation to the merchant's headquarters office and security company 220 to allow the emergency number 110 to be dialed to the police 230 in real time without being recognized by the threat.
In this embodiment, since it is preferable to report to the information recipients who are in the same police administrative district as the victim, the person who receives the report can promptly make an emergency call to the police of the police administrative district in which the victim is located.
(second embodiment)
The second embodiment of the invention is an example of an application to a user, a securicar, a bus, a taxi, etc.
The digital smart security system according to the second embodiment of the present invention has the same hardware configuration as that of fig. 1, and thus a description thereof will be omitted.
The registration process of the monitoring device 200 of the digital smart security system will be described next.
Fig. 11 is a flowchart showing a registration operation of the monitoring apparatus 200 (fig. 1). The present flow is mainly executed by the control unit 201 of the monitoring apparatus 200.
In step S91, the control unit 201 registers behavior information of the user of the securicar, bus, taxi, or the like as monitoring device registration setting information (not shown) in advance. As the monitoring device registration setting information, user information of the respiration sensor 10 associated with the communication terminal 100, such as a mobile phone number, a name, a password, a contact address, and a normal respiration rate (normal time respiration information) of the communication terminal, is registered. Also, a breathing cessation pattern program is registered.
Fig. 12 is a flowchart showing a behavior monitoring control operation of the monitoring device 200 of the digital smart security system. The present flow is mainly executed by the control unit 201 (fig. 1) of the monitoring apparatus 200.
First, if the user is a user of a securicar, a bus, a taxi, or the like, the control unit 201 sets the mode of the communication terminal 100 to a behavior monitoring mode in step S101. Also, the mode setting of the communication terminal 100 is similarly set to the behavior monitoring mode. In this case, there may be the following modes: the communication terminal 100 is first set to the behavior monitoring mode and reports its behavior monitoring mode to the monitoring device 200, and then the monitoring device 200 sets the behavior monitoring mode.
In step S102, the control unit 201 acquires the communication terminal 100 position information transmitted from the communication terminal 100 every 30 minutes, for example. Here, it is preferable that the position information notification by the GPS of the present embodiment is every predetermined time (for example, 30 minutes) shorter than the predetermined time (for example, one hour) of the first embodiment. That is, the user (communication terminal 100) of the securicar, bus, taxi, or the like may move within the vehicle, in which case the positional information is considered to vary greatly. Therefore, it is preferable to acquire the position information at each time shorter than the predetermined time of the first embodiment. Also, even when the communication terminal 100 is in a place where radio communication is not available (such as in a tunnel), the position information can be continuously acquired by an autonomous navigation system using a gyroscope or the like. In addition, when the communication terminal 100 is thus in a place where radio communication is not available, the monitoring device 200 cannot receive the position of the communication terminal 100 any more; however, when it is assumed that the communication terminal 100 is in an area where radio communication is unavailable, by judging that a failure to acquire position information is not abnormal, erroneous reporting can be prevented.
In step S103, the control unit 201 constantly monitors (here, monitors every 30 minutes) the setting behavior and the position information of the user of the securicar, bus, taxi, or the like.
In step S104, the control unit 201 determines: whether a predetermined time (e.g., 30 minutes or more) has elapsed and a result that the setting behavior is mismatched with the location information of the user's GPS for the securicar, bus, taxi, etc. occurs.
If the predetermined time has not elapsed (accompanied by the result of occurrence of a mismatch between the setting behavior program and the position information of the GPS), it is judged that the setting behavior program and the position information behavior are matched to return to the above-described step S102. If the predetermined time has elapsed and there is a result of a mismatch between the setting behavior program and the position information of the GPS, it is judged that there is a mismatch between the setting behavior program and the position information of the GPS, and it proceeds to step S105.
In step S105, it is determined whether a notification of occurrence of an abnormal situation from a user (the communication terminal 100) of an armored car, a bus, a taxi, or the like is received. Further, the determination of the abnormal situation has been described with reference to fig. 5.
If the notification of the occurrence of the abnormal situation has been received, the control unit 201 transmits an alarm to the communication terminal 100 of the user by an email message or sound via the alarm transmission unit 203 (fig. 1) and transmits the email message to the family, company headquarters, or the like of the user in step S106. If the notification of the occurrence of the abnormal situation is not received, the control unit 201 returns to the above-described step S102.
In step S107, the control unit 201 determines whether there is a response from the communication terminal 100 of the user.
If there is a response from the communication terminal 100 of the user, the control unit 201 returns to the above-described step S102. In contrast, if there is no response from the user 'S communication terminal 100, the control unit 201 continues to monitor the location information by the GPS of the user' S communication terminal 100 in step S108.
In step S109, the control unit 201 determines whether a predetermined time (for example, 30 minutes or more) has elapsed, and there is a result of setting a behavior mismatch between the behavior program and the location information.
If the predetermined time has not elapsed (accompanied by the result of mismatch between the setting behavior program and the position information of the GPS), it is judged that the setting behavior program and the position information behavior are matched to return to the above-described step S102. If the predetermined time has elapsed and a result of a mismatch between the setting action program and the position information of the GPS is attached, it is judged that there is a mismatch between the setting action program and the position information of the GPS, and it proceeds to step S110.
In step S110, the control unit 201 confirms the emergency, confirms the user location, and dials the emergency number 110 to the police through the head office and/or the security company to end the present flow.
Here, as an example of the reporting method, it may be preferable to report to information recipients who are in the same police administrative district as the victim, as in the first embodiment.
As described above, according to the present embodiment, even when a threat person (robber) attacks an armored car, a bus, a taxi, or the like and threatens employees thereof, and the employees are restricted and cannot take any action or call for help, the employees can reliably report the occurrence of an abnormal situation and current location information. Also, even when the headquarters contacts the employee through a phone whether there is any abnormality and hears his/her safety from the employee, if the behavior of the armored car, bus, taxi, etc. confirmed by the GPS is not along the prescribed route, the headquarters can dial the emergency number 110 to the police so that the accident can be prevented. In addition, moving images or photographs of a monitoring camera installed in a vehicle such as an armored car, a bus, a taxi, etc. are transmitted to a relevant person located at a company headquarters through e-mails to communicate an abnormal state of the armored car, the bus, the taxi, etc. The relevant person at the company headquarters who received the e-mail confirms the situation in the car, and if it is an emergency, dials an emergency number 110 to the police, and thus can respond thereto by tracking the cash carrier, bus, taxi, etc. via the GPS and the mobile terminal.
(third embodiment)
In the respective embodiments described above, an example has been given in which it is indicated in advance that breathing is stopped for a given period of time only in the event of occurrence of an abnormal condition and then breathing is resumed, and if it is judged that a person stops breathing for a predetermined period of time (for example, 10 to 15 seconds) and then resumes breathing, it is judged that an abnormal condition has occurred, and a report is made accordingly.
The third embodiment of the present invention is an example of another breathing cessation mode.
The digital smart security system according to the present embodiment has the same hardware configuration as that of fig. 1, and thus a description thereof will be omitted. In the present embodiment, the storage unit 104 of fig. 1 stores the breathing cessation pattern shown in fig. 13.
Fig. 13 is a graph showing an example of the breathing cessation mode of the digital smart security system according to the present embodiment.
As shown in fig. 13, each user has normal breathing, an abnormal state, a period of intentionally stopping breathing (a period set by an individual), a breathing stop mode, and an emergency situation as the breathing stop mode of the present invention.
For example, according to the personal level, the user a sets the stop breathing time and the following number of times, and as a mode, a period of about 5 seconds within 30 seconds is "i.attention state", a period of 10 seconds is "ii.abnormal state", and a period of 15 seconds is "iii.emergency state". The pattern of apnea is created by repeating the above "i", "ii", or "iii" once or two to three times at intervals set depending on the site conditions. Furthermore, it is preferred that the pattern of breathing cessation is generated by the industry of the user and/or by a classification of children, minors, adults and elderly persons.
As described above, according to the present embodiment, storing the breathing cessation pattern of each user in advance allows the occurrence of an abnormal state to be automatically recognized in the event of the occurrence of the abnormal state, without requiring the user to perform an operation of stopping breathing only for a predetermined period and then resuming breathing.
The above description is illustrative of the preferred embodiments of the invention, and the scope of the invention is not limited thereto. For example, in the present embodiment, a case of using the telephone line 210 as a public line has been given, but the present invention is not limited to this case, and for example, a radio communication line, the internet, or a LAN may be used as the public line. Also, the communication terminal may be used according to the type of public line, such as a transceiver used as the communication terminal when the public line is radio communication, a personal computer or a palmtop computer used as the communication terminal when the public line is the internet or a LAN. Therefore, constructing the digital smart security system using the existing public line allows the use form of the digital smart security system to be expanded and allows the construction cost of the digital smart security system to be suppressed.
In addition, the names of the digital intelligent security system and the digital intelligent security method are used in the embodiment, which is for convenience of description, and the names can also be digital intelligent security, a crime prevention system, a security method and the like.
In addition, abnormal situation detection covers all common problems. An example of an abnormal situation is an intrusion or proximity of a suspicious person. Moreover, the report may be any report and is not limited to an email message.
Moreover, the digital intelligent security system and the method can also be realized by a program, so that the computer is operated as the digital intelligent security system or the method. Such a program may be stored in a storage medium that can be read by a computer.
Such a storage medium on which a program is recorded may be the ROM itself of the present digital smart security system, or may be a storage medium such as a CD-ROM which is read by inserting the storage medium therein when a program reading device such as a CD-ROM drive is provided as an external storage device.
Further, the storage medium may be a magnetic tape, a magnetic tape cartridge, a flexible disk, a hard disk, an MO/MD/DVD, or the like, or a semiconductor memory.
All publications, patents and patent applications cited in this specification are herein incorporated by reference in their entirety.
[ Industrial Applicability ]
The digital smart security system and method according to the present invention provides a real-time response in companies and commercial facilities, offices, etc. to prevent property and life loss and economic loss, thereby providing excellent utilization effects.
[ list of reference numerals ]
10 breathing sensor
100 communication terminal
101 breathing information acquisition unit
102 GPS functional unit
103 communication unit
104 memory cell
110 control unit
111 registration unit
112 abnormality determination unit
200 monitoring device
201 control unit
202 input unit
203 alarm transmitting unit
210 telephone line
220 Security company
Claims (5)
1. A digital intelligent security system comprises:
a breathing information acquisition device for acquiring breathing information from a breathing sensor for detecting the breathing of a person provided with the breathing information acquisition device;
abnormality determination means for determining whether a safety abnormality or a human health abnormality is caused by intrusion or approach of a suspicious person based on a breathing cessation pattern in the breathing information if breathing is stopped for a predetermined period and then resumed, and otherwise determining that there is no safety abnormality caused by intrusion or approach of a suspicious person; and
first control means for reporting an abnormal situation different between the safety abnormality and the abnormality of the health of the person, which is determined by the abnormality determining means, due to the intrusion or approach of the suspicious person.
2. The digital smart security system of claim 1, wherein the anomaly determination means determines different security anomalies due to intrusion or proximity of the suspicious individual based on the breathing information in response to which of the plurality of predetermined periods of breathing is stopped and then resumed, and the first control means makes different reports in response to the different security anomalies due to intrusion or proximity of the suspicious individual.
3. The digital smart security system of claim 1, wherein the respiration information acquiring means, the abnormality determining means and the first controlling means are included in a first communication terminal for transmitting a report of the abnormal situation, the digital smart security system further comprising a monitoring device communicably connected with the first communication terminal, the monitoring device comprising:
position information acquisition means for detecting existing positions of a plurality of second communication terminals for receiving reports of abnormal situations and acquiring position information of the plurality of second communication terminals;
a jurisdiction holding means for holding a jurisdiction in which a building having a security problem is located for receiving an emergency telephone call; and
second control means for accessing the jurisdiction holding means in response to the abnormality determining means determining that it is an abnormal situation, and, if any of the plurality of second communication terminals exists within the jurisdiction, preferentially reporting to the second communication terminals existing within the jurisdiction.
4. The digital smart security system of claim 1, wherein the first control device sends an email message and an image.
5. A digital intelligent security method comprises the following steps:
a breathing information acquisition step of acquiring breathing information from a breathing sensor for detecting the breathing of a person equipped with a breathing information acquisition device;
an abnormality determining step of determining whether a safety abnormality or a human health abnormality is caused by intrusion or approach of a suspicious person based on a breathing cessation pattern in the breathing information if breathing cessation is stopped for a predetermined period and then resumed, and otherwise determining that there is no safety abnormality caused by intrusion or approach of a suspicious person; and
and a control step of reporting an abnormal situation which is different between the safety abnormality and the abnormality of the health of the person, which is determined by the abnormality determination means, due to the intrusion or approach of the suspicious person.
Applications Claiming Priority (3)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| PCT/JP2012/067242 WO2014006733A1 (en) | 2012-07-05 | 2012-07-05 | Digital security network system and method |
| JPPCT/JP2012/067242 | 2012-07-05 | ||
| PCT/JP2012/077265 WO2014006772A1 (en) | 2012-07-05 | 2012-10-22 | Digital smart security system and method, and program |
Publications (2)
| Publication Number | Publication Date |
|---|---|
| HK1204706A1 HK1204706A1 (en) | 2015-11-27 |
| HK1204706B true HK1204706B (en) | 2018-07-27 |
Family
ID=
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| CN104541312B (en) | Digital intelligent security network system and method | |
| US8630820B2 (en) | Methods and systems for threat assessment, safety management, and monitoring of individuals and groups | |
| JP5514562B2 (en) | Location management method and portable terminal | |
| US8842006B2 (en) | Security system and method using mobile-telephone technology | |
| US20140118140A1 (en) | Methods and systems for requesting the aid of security volunteers using a security network | |
| JP4891113B2 (en) | Emergency call system with emergency call function and emergency response function | |
| JP2008203985A5 (en) | ||
| US8487773B2 (en) | Crime prevention system using human body communication and crime prevention method using human body communication | |
| KR100993887B1 (en) | Real-time two-way safety management system using surveillance camera | |
| EP3065115B1 (en) | Digital security system, method and program | |
| WO2015036926A2 (en) | Networked devices and methods for personal safety and security | |
| JP5278981B1 (en) | Digital smart security system, method and program | |
| KR101493399B1 (en) | Near Offender Alarm System and Control Method of the Server in it | |
| HK1204706B (en) | Digital smart security system and method | |
| US10741047B2 (en) | Security system and method using mobile-telephone technology | |
| JPH09288791A (en) | Security system | |
| HK1225488A1 (en) | Digital security system, method and program | |
| HK1221546B (en) | Digital real security system and method |