CN110770805A - Management system - Google Patents

Management system Download PDF

Info

Publication number
CN110770805A
CN110770805A CN201780091386.3A CN201780091386A CN110770805A CN 110770805 A CN110770805 A CN 110770805A CN 201780091386 A CN201780091386 A CN 201780091386A CN 110770805 A CN110770805 A CN 110770805A
Authority
CN
China
Prior art keywords
area
unit
identification information
receiver
management system
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201780091386.3A
Other languages
Chinese (zh)
Other versions
CN110770805B (en
Inventor
今井胜彦
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Mitsubishi Corp
Mitsubishi Electric Corp
Original Assignee
Mitsubishi Corp
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Mitsubishi Corp filed Critical Mitsubishi Corp
Publication of CN110770805A publication Critical patent/CN110770805A/en
Application granted granted Critical
Publication of CN110770805B publication Critical patent/CN110770805B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G08SIGNALLING
    • G08BSIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
    • G08B25/00Alarm systems in which the location of the alarm condition is signalled to a central station, e.g. fire or police telegraphic systems
    • GPHYSICS
    • G08SIGNALLING
    • G08BSIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
    • G08B25/00Alarm systems in which the location of the alarm condition is signalled to a central station, e.g. fire or police telegraphic systems
    • G08B25/01Alarm systems in which the location of the alarm condition is signalled to a central station, e.g. fire or police telegraphic systems characterised by the transmission medium
    • G08B25/04Alarm systems in which the location of the alarm condition is signalled to a central station, e.g. fire or police telegraphic systems characterised by the transmission medium using a single signalling line, e.g. in a closed loop

Landscapes

  • Business, Economics & Management (AREA)
  • Emergency Management (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Alarm Systems (AREA)

Abstract

When the detector (8-1) detects the presence of a person when the unlocking of the door (15-1) is prohibited by the prohibition means, the storage unit (27) stores the occurrence of the intrusion into the 1 st area. When the identification information is received by the receiver (30), the specifying unit (35) specifies the area indicated by the area information stored in the storage unit (32) in association with the identification information. If the area specified by the specifying unit (35) is the 1 st area, if the storage unit (27) stores the occurrence of the intrusion into the 1 st area, the notification unit (37) notifies the occurrence of the intrusion.

Description

Management system
Technical Field
The present invention relates to a management system.
Background
Patent document 1 describes a system for managing entrance and exit to and from a room. The system described in patent document 1 includes card readers inside and outside a room. In this system, when a specific operation is performed, a guard mode that prohibits unlocking of the door is turned on. When the card is placed in front of a card reader located in a room until a predetermined time elapses after the guard mode is turned on, the guard mode is released.
Documents of the prior art
Patent document
Patent document 1: japanese patent laid-open publication No. 2016-194872
Disclosure of Invention
Problems to be solved by the invention
In the management system, the guard mode is sometimes turned on although a person is still in the room. Resulting in the person turning on the guard mode going home without noticing that someone is still in the room.
In the system described in patent document 1, a person in a room can release the guard mode as long as the predetermined time has elapsed since the guard mode was turned on. However, the armed mode is turned on without the attention of the person located in the room. Therefore, the above-described prescribed time period elapses without causing the alert mode to be released.
The present invention has been made to solve the above problems. An object of the present invention is to provide a management system capable of appropriately notifying a person who is about to leave a specific area according to the guard state of the area.
Means for solving the problems
The management system of the present invention comprises: a 1 st receiver that receives identification information; a 1 st storage unit which stores identification information for identifying a person who can enter and exit the 1 st area; a 1 st unlocking unit which unlocks a 1 st door for entering and exiting the 1 st area when the identification information received by the 1 st receiver matches any of the identification information stored in the 1 st storage unit; a prohibiting unit that prohibits unlocking of the 1 st door by the 1 st unlocking unit when the specific operation is performed; a detector that detects a situation where a person is located in the 1 st area; a 2 nd storage unit for storing the 1 st area intrusion when the detector detects a person when the 1 st door is prohibited by the prohibition unit; a 2 nd receiver that receives the identification information; a 3 rd storage unit which stores the identification information and the area information in association with each other; a determination unit that, when the identification information is received by the 2 nd receiver, determines an area indicated by the area information stored in the 3 rd storage unit in association with the identification information; and a notification unit that, if the area determined by the determination unit is the 1 st area, notifies the occurrence of intrusion if the 2 nd storage unit stores the occurrence of intrusion into the 1 st area.
The management system of the present invention comprises: a 1 st receiver configured in the 1 st area and receiving identification information; a 2 nd receiver configured outside the 1 st area and receiving the identification information; a 1 st storage unit which stores identification information for identifying a person who can enter and exit the 1 st area; a 1 st unlocking unit which unlocks a 1 st door for entering and exiting the 1 st area when the identification information received by the 2 nd receiver matches any of the identification information stored in the 1 st storage unit; a prohibiting unit that prohibits unlocking of the 1 st door by the 1 st unlocking unit when the specific operation is performed; an unattended detection unit which detects that no person exists in the 1 st area according to the receiving result of the 1 st receiver and the receiving result of the 2 nd receiver; a determination unit that determines that the 1 st area is not alert when the absence of a person is detected by the unmanned detection unit while the unlocking of the 1 st door is prohibited by the prohibition unit; a 3 rd receiver which receives the identification information; a 2 nd storage unit that stores the identification information and the area information in association with each other; a determination unit that, when the identification information is received by the 3 rd receiver, determines an area indicated by the area information stored in the 2 nd storage unit in association with the identification information; and a notification unit configured to notify the user of the lack of alert when the determination unit determines that the 1 st area is the lack of alert when the area determined by the determination unit is the 1 st area.
Effects of the invention
In the management system of the present invention, when the detector detects the presence of a person when the unlocking of the 1 st door is prohibited by the prohibiting unit, the 2 nd storage unit stores the occurrence of the intrusion into the 1 st area. Upon receiving the identification information by the 2 nd receiver, the determination unit determines the area indicated by the area information stored in the 3 rd storage unit in correspondence with the identification information. If the area determined by the determination means is the 1 st area, the notification means notifies the occurrence of intrusion if the 2 nd storage means stores the occurrence of intrusion into the 1 st area. According to the management system of the present invention, a person who is going to leave a specific area can be appropriately notified according to the guard state of the area.
Drawings
Fig. 1 is a diagram showing an example of a management system according to embodiment 1 of the present invention.
Fig. 2 is a diagram showing an example of a building to which the management system is applied.
Fig. 3 is a diagram for explaining the function of the management system.
Fig. 4 is a flowchart showing an operation example of the management system according to embodiment 1 of the present invention.
Fig. 5 is a diagram showing another example of the management system according to embodiment 1 of the present invention.
Fig. 6 is a diagram for explaining the function of the management system shown in fig. 5.
Fig. 7 is a flowchart showing another operation example of the management system according to embodiment 1 of the present invention.
Fig. 8 is a diagram showing an example of a management system according to embodiment 2 of the present invention.
Fig. 9 is a diagram showing an example of a building to which the management system is applied.
Fig. 10 is a diagram for explaining the function of the management system.
Fig. 11 is a flowchart showing an example of the operation of the management system according to embodiment 2 of the present invention.
Fig. 12 is a diagram showing another example of the management system according to embodiment 2 of the present invention.
Fig. 13 is a diagram for explaining the function of the management system shown in fig. 12.
Fig. 14 is a flowchart showing another operation example of the management system according to embodiment 2 of the present invention.
Fig. 15 is a diagram showing an example of hardware elements included in the local controller.
Fig. 16 is a diagram showing an example of hardware elements included in the center device.
Fig. 17 is a diagram showing an example of hardware elements included in the local controller.
Detailed Description
The invention is described with reference to the accompanying drawings. With regard to the repeated explanation, simplification or omission will be appropriately made. Like reference symbols in the various drawings indicate like or corresponding parts.
Embodiment mode 1
Fig. 1 is a diagram showing an example of a management system 1 according to embodiment 1 of the present invention. The management system 1 includes, for example, a center device 2, a local controller 3, a local controller 4, an authentication terminal 5, an authentication terminal 6, an authentication terminal 7, a detector 8, a monitoring device 9, a monitoring device 10, a display 11, and a display 12.
Fig. 2 is a diagram showing an example of the building 13 to which the management system 1 is applied. Fig. 2 shows an example in which 6 rooms R1 to R6 are formed in 1 floor of the building 13. The persons who can enter and exit the rooms are determined in advance. For example, a person who can enter or exit the room R1 is determined in advance. Similarly, a person who can enter or exit the room R6 is determined in advance. Rooms R1 to R6 are examples of predetermined areas in which people can enter and exit.
Fig. 2 shows an example in which 5 tenants T1 to T5 live in level 1 of the building 13. For example, a person belonging to tenant T1 can enter or exit room R1. People belonging to tenant T2 can enter and exit room R2. Similarly, a person belonging to tenant T5 can enter and exit both room R5 and room R6.
Fig. 2 shows an example in which persons who can enter and exit the building 13 themselves are also determined in advance. For example, a person belonging to any one of tenants T1 to T5 can enter and exit building 13. The common section C of the building 13 is an example of an area in which a person who can enter and exit is determined in advance. In the example shown in fig. 2, a person located outside the building 13 cannot travel to the rooms R1 to R6 unless passing through the shared department C of the building 13. The persons located in the rooms R1 to R6 cannot leave the building 13 unless they pass through the common section C of the building 13. The entrance to and exit from the shared section C of the building 13 may not be limited to a specific person.
In the example shown in fig. 2, a door 15 having an electronic lock 14 is provided at an entrance of each room. In the following, in the case where it is necessary to individually specify the devices associated with the rooms, the numbers of the rooms are noted after the connection numbers. For example, a door 15-1 having an electronic lock 14-1 is provided at the entrance of the room R1. The door 15-1 is a door for entering and exiting the room R1. The door 15-1 is locked by the electronic lock 14-1. Similarly, a door 15-6 having an electronic lock 14-6 is provided at the entrance of the room R6. The door 15-6 is a door for entering and exiting the room R6. The door 15-6 is locked by the electronic lock 14-6.
The authentication terminal 7 is provided on the wall of the corridor so as to be adjacent to the door 15. For example, the authentication terminal 7-1 is disposed adjacent to the door 15-1. The authentication terminal 7-1 is disposed outside the room R1. Likewise, the authentication terminal 7-6 is disposed adjacent to the door 15-6. The authentication terminal 7-6 is disposed outside the room R6.
The authentication terminal 7 and the electronic lock 14 are connected to the local controller 4. The authentication terminal 7 and the electronic lock 14 are controlled by the local controller 4. A local controller 4 may be connected to only one set of authentication terminal 7 and electronic lock 14. One local controller 4 may be connected to a plurality of authentication terminals 7 and electronic locks 14. The number of local controllers 4 included in the management system 1 is arbitrary.
The detector 8 is provided in each room. The detector 8 detects the presence of a person in the room. For example, detector 8-1 detects the presence of a person in room R1. Likewise, detector 8-6 detects the presence of a person in room R6. The detector 8 is, for example, an infrared sensor. When the detector 8 detects a person in the room, a detection signal is output from the detector 8 to the local controller 4.
In the example shown in fig. 2, a door 17 having an electronic lock 16 is provided at a general entrance of the building 13. The door 17 is a door for entering and exiting the common section C of the building 13. The door 17 is locked by the electronic lock 16.
The authentication terminal 5 and the display 11 are provided in a hall that is a part of the common department C so as to be adjacent to the door 17. The authentication terminal 5 and the electronic lock 16 are connected to the local controller 3. The authentication terminal 5 and the electronic lock 16 are controlled by the local controller 3. The display 11 is controlled by the monitoring device 9.
Fig. 3 is a diagram for explaining the function of the management system 1. The functions related to the room R1 will be described in detail below. The functions related to the other rooms are the same as those related to room R1, and therefore, detailed description thereof is omitted.
The authentication terminal 7-1 includes, for example, a receiver 18-1, a guard button 19-1, and a release button 20-1.
The receiver 18-1 receives an electric wave from the tag 21. The range in which the receiver 18-1 receives the electric wave from the tag 21 is set in advance. The tag 21 is held by a person who is permitted to enter or exit the building 13. Thus, the employee of tenant T1 who is permitted to access room R1 holds tag 21. For example, the tag 21 is built in a card such as a employee certificate.
Identification information is stored in the tag 21. The identification information is information for specifying the tag 21. Each tag 21 is assigned unique identification information. The receiver 18-1 receives an electric wave containing identification information from the tag 21. The receiver 18-1 transmits the identification information received from the tag 21 to the local controller 4.
The local controller 4 includes, for example, a storage unit 22, a checking unit 23, and an unlocking unit 24.
The storage unit 22 stores identification information for identifying a person who can enter or exit the room R1. For example, the storage unit 22 stores identification information for specifying employees of the tenant T1.
The collating section 23 collates the identification information received by the receiver 18-1. For example, the checking section 23 determines whether or not the identification information received by the receiver 18-1 matches any of the identification information stored in the storage section 22.
The unlocking portion 24 controls the electronic lock 14-1. In principle, the unlocking portion 24 locks the door 15-1 by the electronic lock 14-1. The unlocking section 24 unlocks the door 15-1 based on the result of the collation by the collating section 23. The unlocking portion 24 outputs an unlocking instruction to the electronic lock 14-1 when the identification information received by the receiver 18-1 matches any of the identification information stored in the storage portion 22. Thereby, the door 15-1 is unlocked.
The arm button 19-1 is a button for turning on the arm mode. When the guard button 19-1 is pressed and the check section 23 determines that the identification information matches, the guard mode is turned on. In the guard mode, the unlocking of the door 15-1 by the unlocking portion 24 is prohibited. That is, in the armed mode, door 15-1 is not unlocked even when employee of tenant T1 places employee credentials in front of receiver 18-1. The remote controller 4 notifies the center apparatus 2 of the fact that the standby mode is turned on. The alarm button 19-1 and the like are examples of means for prohibiting the unlocking of the door 15-1 by the unlocking unit 24 by a specific operation. The detection by the detector 8-1 described above may be performed only in the armed mode.
The release button 20-1 is a button for ending the alert mode. When the release button 20-1 is pressed and the checkup section 23 determines that the identification information matches, the guard mode ends. The end of the alert mode is notified to the center apparatus 2 by the local controller 3.
The center device 2 includes, for example, a storage unit 27 and a setting unit 28.
The information stored in the storage section 22 of the local controller 4 may be updated from the center apparatus 2. For example, the information set by the setting unit 28 is transmitted to the local controller 4. The local controller 4 updates the information stored in the storage unit 22 based on the setting information. Similarly, the information stored in the storage unit 32 described later may be updated from the center device 2.
The storage unit 27 stores information showing the current status of each room. The information showing the current status of each room is updated according to the inputted information. Table 1 shows an example of information stored in the storage unit 27.
[ Table 1]
Region(s) Mode(s) Invasion occurs
Room R1 Guard mode Is provided with
Room R2 Normal mode -
Room R3 Normal mode -
Room R4 Normal mode -
Room R5 Normal mode -
Room R6 Guard mode Is free of
As described above, when the guard button 19-1 is pressed and the checkup section 23 determines that the identification information matches, the guard mode is turned on. The remote controller 4 notifies the center apparatus 2 of the fact that the standby mode is turned on. In this case, the case where the guard mode is being executed in room R1 is stored in storage unit 27. Table 1 shows an example in which the guard button 19-6 is pressed and the collation of the identification information is successful, thereby also performing the guard mode in the room R6. When the release button 20-1 is pressed and the checking unit 23 determines that the identification information matches, the center device 2 is notified that the alert mode is ended. In this case, the case where the normal mode is executed in room R1 is stored in storage unit 27.
As described above, local controller 4 receives the detection signal from detector 8-1 when it is detected by detector 8-1 that there is a person in room R1. The local controller 4 forwards the detection signal received from the detector 8-1 to the central apparatus 2. When the center apparatus 2 receives the detection signal from the detector 8-1 while the security mode is executed in the room R1, the case where intrusion occurs in the room R1 is stored in the storage unit 27. That is, when the detector 8-1 detects that a person is present while the unlocking of the door 15-1 is prohibited due to the specific operation being performed, information indicating that intrusion into the room R1 has occurred is stored in the storage unit 27.
The authentication terminal 5 includes, for example, a receiver 30 and a notifier 31.
The receiver 30 receives an electric wave from the tag 21. The range in which the receiver 30 receives the radio wave from the tag 21 is set in advance. The receiver 30 receives an electric wave including identification information from the tag 21. The receiver 30 transmits the identification information received from the tag 21 to the local controller 3. The notifier 31 is, for example, a speaker. The notifier 31 may be a display. The notification device 31 may be both a speaker and a display.
The authentication terminal 5 is a terminal operated by a person going out from the general-purpose outlet to the outside of the building 13. The authentication terminal 5 is disposed in the lobby. Fig. 3 shows an example in which an authentication terminal is provided outside the building 13. The function of the authentication terminal provided outside the building 13 is the same as that of the authentication terminal 5.
The local controller 3 includes, for example, a storage unit 32, a checking unit 33, an unlocking unit 34, a determination unit 35, a determination unit 36, and a notification unit 37.
The storage unit 32 stores identification information for identifying a person who can enter or exit the building 13. For example, the storage unit 32 stores identification information for identifying employees of the tenants T1 to T5. In the storage unit 32, area information is stored in association with the identification information. The area information is information for specifying an area that a person assigned the identification information can enter or exit. Table 2 shows an example of information stored in the storage unit 32.
[ Table 2]
Figure BDA0002295100910000071
For example, identification information 1001 is identification information assigned to an employee of tenant T1. Employees of tenant T1 can enter and exit room R1. Therefore, the storage unit 32 stores the area information "room R1" in correspondence with the identification information 1001. Likewise, identification information 5001 is identification information of employees assigned to tenant T5. Employees of tenant T5 can enter and exit both room R5 and room R6. Therefore, the storage unit 32 stores area information "room R5 and room R6" in association with the identification information 5001.
Next, an operation example of the local controller 3 will be described in detail with reference to fig. 4 as well. Fig. 4 is a flowchart showing an operation example of the management system 1 according to embodiment 1 of the present invention.
It is determined in the local controller 3 whether the receiver 30 receives the identification information from the tag 21 (S101). A person located at the building 13 will place an employee certificate with the tag 21 built in front of the receiver 30 when he wants to leave the building 13. Thereby, the receiver 30 receives the radio wave including the identification information from the tag 21. The receiver 30 transmits the identification information received from the tag 21 to the local controller 3.
In the local controller 3, when the identification information is received from the receiver 30, the checkup section 33 performs checkup of the identification information. For example, the checking section 33 determines whether or not the identification information received by the receiver 30 matches any of the identification information stored in the storage section 32 (S102).
The notification unit 37 controls the notifier 31. The notification unit 37 causes the display 11 to perform a desired display and outputs a display command to the monitoring device 9. If the identification information received by the receiver 30 does not match any of the identification information stored in the storage unit 32 (S102: no), the notification unit 37 notifies the notifier 31 that the passage is not permitted (S110).
When the identification information received by the receiver 30 matches any of the identification information stored in the storage unit 32 (yes in S102), the specifying unit 35 specifies an area where a person who has input the identification information from the receiver 30 can enter and exit (S103). For example, in S103, the specifying unit 35 specifies the region indicated by the region information stored in the storage unit 32 in association with the identification information. In the case where the information shown in table 2 is stored in storage unit 32, when receiver 30 receives identification information 1001, determination unit 35 determines room R1 as the above-described area in S103. When the receiver 30 receives the identification information 5001, the determination unit 35 determines the room R5 and the room R6 as the above-described areas in S103.
The determination unit 36 determines whether or not the occurrence of intrusion is recorded in the storage unit 27 for the area specified by the specification unit 35 (S104). When the information shown in table 2 is stored in storage unit 32, and receiver 30 receives identification information 1001, determination unit 36 determines in S104 whether or not the occurrence of intrusion into room R1 is stored in storage unit 27. Similarly, when receiver 30 receives identification information 5001, determination unit 36 determines whether or not the occurrence of intrusion into room R5 is stored in storage unit 27. When receiver 30 receives identification information 5001, determination unit 36 determines whether or not there is an occurrence of intrusion into room R6 stored in storage unit 27.
If it is determined in S104 that intrusion into the area specified in S103 is not recorded in the storage unit 27, the notification unit 37 notifies the notifier 31 that passage is permitted (S108).
The unlocking portion 34 controls the electronic lock 16. In principle, the unlocking portion 34 locks the door 17 by the electronic lock 16. If the determination at S104 is no, the unlocking unit 34 outputs an unlocking instruction to the electronic lock 16. Thereby, the door 17 is unlocked (S109).
When it is determined in S104 that the storage unit 27 has recorded the occurrence of intrusion into the area specified in S103, intrusion information shown in table 3, for example, is stored in the storage unit 32 (S105). If a plurality of areas are specified in S103, if the occurrence of an intrusion is recorded in the storage unit 27 for any of these areas, it is determined yes in S104.
[ Table 3]
Figure BDA0002295100910000091
Table 3 shows an example in which the intrusion information is stored in the storage unit 32 in association with the identification information. The identification information shown in table 3 is the identification information received by the receiver 30 in S101. Table 3 shows an example in which intrusion information is stored in the storage unit 30 in association with information of a person who operates the authentication terminal 5. Table 3 shows an example in which an area where intrusion has occurred and a name indicating the area are stored in the storage unit 30 as intrusion information.
If yes is determined in S104, the notification unit 37 notifies the occurrence of intrusion. For example, the notification unit 37 notifies the notifier 31 of the authentication terminal 5 of necessary information (S106). The notification unit 37 causes the display 11 to display necessary information (S107).
For example, the authentication terminal 5 has a display and a speaker as the notifier 31. If yes in S104, the notification unit 37 causes the display of the authentication terminal 5 to display "failure (NG)". The notification unit 37 may be configured to output a voice message "please return to the room for the guard confirmation" from the speaker of the authentication terminal 5.
If yes is determined in S104, the notification unit 37 transmits the information shown in table 3 to the monitoring device 9. The monitoring apparatus 9 causes the display 11 to display, for example, the following contents based on the information received from the local controller 3.
Information for specifying the person who operates the authentication terminal 5
Fact that invasion has occurred
Area in which invasion occurred
Name indicating the area where intrusion occurred
For example, the monitoring apparatus 9 causes the display 11 to display a name as information for specifying the person who operates the authentication terminal 5. The monitoring apparatus 9 may cause the display 11 to display the identification information received by the receiver 30 as information for identifying the person who operates the authentication terminal 5. The monitoring device 9 causes the display 11 to display the room number as the area where intrusion has occurred. The monitoring apparatus 9 causes the display 11 to display the tenant name as a name indicating the area where intrusion has occurred. The information displayed on the display 11 in S107 is not limited to the above example.
In the example shown in the present embodiment, when the employee of tenant T1 turns on the guard mode without noticing someone in room R1, a notification regarding the occurrence of intrusion is made when the employee or other employee places an employee certificate in front of receiver 30. In the example shown in fig. 4, when the determination in S104 is yes, the unlocking unit 34 does not unlock the door 17. Thus, the employee who knows that intrusion has been detected returns to room R1 and releases the armed mode. According to the example shown in the present embodiment, a person who is going to leave a specific area can be appropriately notified according to the guard state of the area.
Fig. 2 and 3 show an example in which the management system 1 is applied to only level 1 of the building 13. The management system 1 may be applied to a plurality of floors of the building 13 or the entire building 13. For example, when the tenant T1 enters the room R1 on the 1 st floor and the room R11 on the 3 rd floor of the building 13, the storage unit 32 stores the area information "room R1 and room R11" in association with the identification information 1001.
Fig. 5 is a diagram showing another example of the management system 1 according to embodiment 1 of the present invention. An example in which the management system 1 is applied to each floor of the building 13 is shown below. As an example, fig. 5 shows an example in which the management system 1 is applied to the 3-floor of the building 13. For example, 6 rooms R11 to R16 are formed in 3 floors of the building 13. Rooms R11 to R16 are examples of areas in which persons can enter and exit. Fig. 5 shows an example of 5 tenants T11 to T15 entering floor 3 of building 13.
In the example shown in fig. 5, a landing button 42, an authentication terminal 6, and a display 12 are provided in an elevator landing of 3 floors. The landing button 42 and the authentication terminal 6 are connected to the local controller 3. The landing button 42 and the authentication terminal 6 are controlled by the local controller 3. The display 12 is controlled by the monitoring device 10.
Fig. 6 is a diagram for explaining the function of the management system 1 shown in fig. 5. The authentication terminal 6 includes, for example, a receiver 43 and a notifier 44. The function of the receiver 43 is the same as that of the receiver 30. The receiver 43 transmits the identification information received from the tag 21 to the local controller 3. The function of notifier 44 is the same as that of notifier 31.
The local controller 3 includes, for example, a storage unit 32, a checking unit 33, a call registration unit 38, a determination unit 35, a determination unit 36, and a notification unit 37.
The storage unit 32 stores identification information for identifying a person who can enter or exit the installation floor of the authentication terminal 6. For example, the storage unit 32 stores identification information for identifying employees of the tenants T11 to T15. In the storage unit 32, area information is stored in association with the identification information. The area information is information for specifying an area where a person assigned the identification information can enter and exit the floor.
An example of the operation of the local controller 3 will be described in detail with reference to fig. 7. Fig. 7 is a flowchart showing another operation example of the management system 1 according to embodiment 1 of the present invention.
It is determined in the local controller 3 whether the receiver 43 receives the identification information from the tag 21 (S201). A person moving from floor 3 with an elevator places an employee certificate with a built-in tag 21 in front of the receiver 43 at the elevator landing of floor 3. Thereby, the receiver 43 receives the radio wave including the identification information from the tag 21. The receiver 43 transmits the identification information received from the tag 21 to the local controller 3.
In the local controller 3, when the identification information is received from the receiver 43, the checkup section 33 performs checkup of the identification information. For example, the checking section 33 determines whether or not the identification information received by the receiver 43 matches any of the identification information stored in the storage section 32 (S202).
The notification unit 37 controls the notifier 44. The notification unit 37 causes the display 12 to perform a desired display and outputs a display command to the monitoring apparatus 10. When the identification information received by the receiver 43 does not match any of the identification information stored in the storage unit 32 (S202: no), the notification unit 37 notifies the notifier 44 that the call is not to be automatically registered (S209).
When the identification information received by the receiver 43 matches any of the identification information stored in the storage unit 32 (yes in S202), the specifying unit 35 specifies an area where a person who wants to move from the 3 rd floor by the elevator can enter and exit the floor (S203). For example, in S203, the specifying unit 35 specifies an area indicated by the area information stored in the storage unit 32 in association with the identification information. The determination unit 36 determines whether or not the occurrence of intrusion is recorded in the storage unit 27 for the area specified by the specification unit 35 (S204).
The call registration section 38 registers calls of elevators. For example, when the landing button 42 is pressed, the call registration section 38 registers a landing call of 3 floors. When it is determined in S204 that the storage unit 27 does not record the occurrence of the intrusion into the area specified in S203, the call registration unit 38 automatically registers a hall call of the floor 3 (S208).
When it is determined in S204 that the storage unit 27 has recorded the occurrence of intrusion into the area specified in S203, the intrusion information is stored in the storage unit 32 in association with the identification information (S205). For example, an area where intrusion has occurred and a name indicating the area are stored in the storage unit 32 as intrusion information. If a plurality of areas are specified in S203, if the occurrence of intrusion into any one of these areas is recorded in the storage unit 27, it is determined yes in S204.
If yes is determined in S204, the notification unit 37 notifies the occurrence of intrusion. For example, the notification unit 37 notifies the notifier 44 of the authentication terminal 6 of necessary information (S206). The notification unit 37 causes the display 12 to display necessary information (S207). When the answer is yes in S204, the call registration section 38 does not perform automatic registration of a call. When the determination in S204 is yes, the call registration section 38 may not register a hall call even if the hall button 42 is pressed.
For example, if it is determined yes in S204, the notification unit 37 causes the display of the authentication terminal 6 to display "failure". The notification unit 37 may output a voice message such as "please return to the room for the police confirmation" from the speaker of the authentication terminal 6.
If yes is determined in S204, the notification unit 37 transmits the information stored in the storage unit 32 in S205 to the monitoring apparatus 10. The monitoring apparatus 10 causes the display 12 to display the following contents, for example, based on the information received from the local controller 3.
Information for specifying the person who operates the authentication terminal 5
Fact that invasion has occurred
Area in which invasion occurred
Name indicating the area where intrusion occurred
The information displayed on the display 11 in S207 is not limited to the above example.
In the examples shown in fig. 5 to 7, the same effects as those exhibited by the examples shown in fig. 2 to 4 can be expected.
Embodiment mode 2
In embodiment 1, an example in which an appropriate notification is given when the guard mode is turned on even though a person is in a room is described. In the present embodiment, an example in which an appropriate notification is given when the alert mode is not turned on even though no person is in the room is described.
Fig. 8 is a diagram showing an example of the management system 1 according to embodiment 2 of the present invention. The management system 1 shown in fig. 8 includes an authentication terminal 45 in addition to the elements shown in fig. 1. In the present embodiment, the same features as those disclosed in embodiment 1 will not be described in detail.
Fig. 9 is a diagram showing an example of the building 13 to which the management system 1 is applied. The example shown in fig. 9 is different from the example shown in fig. 2 in that an authentication terminal 45 is provided in each room. The authentication terminal 45 is provided adjacent to the door 15 on the wall of the room. For example, the authentication terminal 45-1 is disposed inside the room R1 adjacent to the door 15-1. Similarly, the authentication terminal 45-6 is disposed inside the room R6 adjacent to the door 15-6.
The authentication terminal 7, the authentication terminal 45, and the electronic lock 14 are connected to the local controller 4. The authentication terminal 7, the authentication terminal 45, and the electronic lock 14 are controlled by the local controller 4. Only one set of the authentication terminal 7, the authentication terminal 45 and the electronic lock 14 may be connected to one local controller 4. A single local controller 4 may be connected to a plurality of sets of the authentication terminal 7, the authentication terminal 45, and the electronic lock 14.
Fig. 10 is a diagram for explaining the function of the management system 1. Next, as in the description of embodiment 1, the functions related to room R1 will be described in detail.
The authentication terminal 7-1 includes, for example, a receiver 18-1, a guard button 19-1, and a release button 20-1. The authentication terminal 45-1 has, for example, a receiver 46-1.
The receiver 46-1 receives an electric wave from the tag 21 located in the room R1. The range in which the receiver 46-1 receives the electric wave from the tag 21 is set in advance. The receiver 46-1 receives an electric wave containing identification information from the tag 21. The receiver 46-1 transmits the identification information received from the tag 21 to the local controller 4.
The local controller 4 includes, for example, a storage unit 22, a checking unit 23, and an unlocking unit 24. In the example shown in the present embodiment, the local controller 4 further includes an unattended detection unit 25.
The storage unit 22 stores identification information for identifying a person who can enter or exit the room R1. For example, the storage unit 22 stores identification information for specifying employees of the tenant T1.
The collating section 23 collates the identification information received by the receiver 18-1. For example, the checking section 23 determines whether or not the identification information received by the receiver 18-1 matches any of the identification information stored in the storage section 22. The collating section 23 collates the identification information received by the receiver 46-1. For example, the checking section 23 determines whether or not the identification information received by the receiver 46-1 matches any of the identification information stored in the storage section 22.
The unlocking portion 24 controls the electronic lock 14-1. In principle, the unlocking portion 24 locks the door 15-1 by the electronic lock 14-1. The unlocking section 24 unlocks the door 15-1 based on the result of the collation by the collating section 23. When the identification information received by the receiver 18-1 matches any of the identification information stored in the storage unit 22, the unlocking unit 24 outputs an unlocking instruction to the electronic lock 14-1. Thereby, the door 15-1 is unlocked. When the identification information received by the receiver 46-1 matches any of the identification information stored in the storage unit 22, the unlocking unit 24 outputs an unlocking instruction to the electronic lock 14-1. Thereby, the door 15-1 is unlocked.
The non-human detector 25 detects that there is no human in the room R1. The unmanned detector 25 may detect the number of persons in the room R1. The non-human detection section 25 performs the above-described detection based on the reception result of the receiver 18-1 and the reception result of the receiver 46-1. For example, let N be the number of people in room R1. When the identification information received by the receiver 18-1 matches any of the identification information stored in the storage section 22, the unmanned detection section 25 adds 1 to the number of persons N. When the identification information received by the receiver 46-1 matches any of the identification information stored in the storage section 22, the unmanned detection section 25 subtracts 1 from the number of people N. If the number of persons N is 0, the absence detection unit 25 detects that there is no person in the room R1. When the absence of a person in the room R1 is detected by the absence detecting unit 25, a detection signal is output from the absence detecting unit 25 to the center device 2.
The center device 2 includes, for example, a storage unit 27 and a setting unit 28.
The storage unit 27 stores information indicating the current status of each room. Information indicating the current status of each room is updated based on the inputted information. Table 4 shows an example of information stored in the storage unit 27.
[ Table 4]
Region(s) Mode(s) Invasion occurs Detect nobody
Room R1 Guard mode Is provided with Is provided with
Room R2 Normal mode - Is free of
Room R3 Normal mode - Is free of
Room R4 Normal mode - Is provided with
Room R5 Normal mode - Is free of
Room R6 Guard mode Is free of Is provided with
As described above, the central apparatus 2 is notified of the fact that the unmanned detector 25 detects that there is no person in the room R1. In this case, it is stored in storage unit 27 that room R1 has no person. The number of persons located in each room may be stored in the storage unit 27. The above-described unmanned detection by the unmanned detection unit 25 may be performed only in the normal mode.
The authentication terminal 5 includes, for example, a receiver 30 and a notifier 31.
The local controller 3 includes, for example, a storage unit 32, a checking unit 33, an unlocking unit 34, a determination unit 35, a determination unit 36, and a notification unit 37. In the example shown in the present embodiment, the local controller 3 further includes a determination unit 39.
An example of the operation of the local controller 3 will be described in detail below with reference to fig. 11. Fig. 11 is a flowchart showing an operation example of the management system 1 according to embodiment 2 of the present invention.
The processing shown in S301 to S305 in fig. 11 is the same as the processing shown in S101 to S105 in fig. 4. The process shown in S313 of fig. 11 is the same as the process shown in S110 of fig. 4.
When it is determined in S304 that the storage unit 27 has recorded the occurrence of intrusion into the area specified in S303, the intrusion information is stored in the storage unit 32 in association with the identification information (S305). When the intrusion information is stored in S305, the determination unit 39 determines whether or not the area specified by the specification unit 35 is in an unattended state (S306). When it is determined in S304 that the storage unit 27 does not store the occurrence of the intrusion into the area specified in S303, the determination in S306 is also performed.
The determination unit 39 determines that the area specified by the specification unit 35 is not alert when the absence detection unit 25 detects that there is no person in the room during the normal mode. For example, when the information shown in table 4 is stored in the storage unit 27, the guard button 19-4 is not pressed. Therefore, the normal mode is executed in the room R4. That is, the unlocking of the door 15-4 is not prohibited. Then, the absence of a person in room R4 is detected by the absence detecting unit 25. In this case, determination unit 39 determines that room R4 is not alert.
When the determination unit 39 determines that the area specified in S303 is not alert, for example, the alert information shown in table 5 is stored in the storage unit 32 (S307). If a plurality of areas are specified in S303, it is determined yes in S306 as long as any one of the areas is unattended.
[ Table 5]
Figure BDA0002295100910000151
Table 5 shows an example in which the disarmed information is stored in the storage unit 32 in association with the identification information. The identification information shown in table 5 is the identification information received by the receiver 30 in S301. Table 5 shows an example in which the disarmed information is stored in the storage unit 32 in association with information of the person who operates the authentication terminal 5. Table 5 shows an example in which an unattended area and a name indicating the area are stored in the storage unit 32 as the unattended information.
When the storage of the disarmed information is executed in S307, the local controller 3 determines whether or not at least one of the intrusion information and the disarmed information is stored in the storage unit 32 (S308). If it is determined in S306 that the area specified in S303 is not unattended, the determination in S308 is also performed.
If both the intrusion information and the non-guard information are not stored in the storage unit 32, the notification unit 37 notifies the slave notifier 31 of permission of passage (S311). If the determination at S308 is no, the unlocking unit 34 outputs an unlocking instruction to the electronic lock 16. Thereby, the door 17 is unlocked (S312).
If it is determined yes in S308, the notification unit 37 notifies the occurrence of intrusion if intrusion information is stored in the storage unit 32. On the other hand, if the storage unit 32 stores the disarmed information, the notification unit 37 notifies the disarmed information. If both the intrusion information and the disarmed information are stored in the storage unit 32, the notification unit 37 notifies both of the occurrence of the intrusion and the disarmed information. For example, the notification unit 37 notifies the notifier 31 of the authentication terminal 5 of necessary information (S309). The notification unit 37 causes the display 11 to display necessary information (S310).
For example, if it is determined yes in S308, the notification unit 37 causes the display of the authentication terminal 5 to display "failure". The notification unit 37 may be configured to output a voice message such as "please return to the room for the police confirmation" from the speaker of the authentication terminal 5.
When the intrusion information is stored in the storage unit 32 and it is determined as yes in S308, the notification unit 37 transmits, for example, information shown in table 3 to the monitoring apparatus 9. The monitoring apparatus 9 causes the display 11 to display, for example, the following contents based on the information received from the local controller 3.
Information for specifying the person who operates the authentication terminal 5
Fact that invasion has occurred
Area in which invasion occurred
Name indicating the area where intrusion occurred
When the storage unit 32 stores the disarmed information and the determination at S308 is yes, the notification unit 37 transmits, for example, information shown in table 5 to the monitoring apparatus 9. The monitoring apparatus 9 causes the display 11 to display, for example, the following contents based on the information received from the local controller 3.
Information for specifying the person who operates the authentication terminal 5
The fact of not being armed
Areas of no guard
Name indicating an unarmed area
For example, the monitoring apparatus 9 causes the display 11 to display the room number as an unattended area. The monitoring apparatus 9 causes the display 11 to display the tenant name as a name indicating an area which is not alert. The information displayed on the display 11 in S310 is not limited to the above example.
According to the example shown in the present embodiment, the same effects as those exhibited by the example disclosed in embodiment 1 can be exhibited. In addition, in the example shown in the present embodiment, if the employee of tenant T4 does not notice that he was last out of office, a notification relating to disarm is made when the employee or other employee places an employee certificate in front of receiver 30. In the example shown in fig. 11, when the determination in S308 is yes, the unlocking unit 34 does not unlock the door 17. Thus, an employee who knows that the room is not armed returns to the room and turns on the armed mode. According to the example shown in the present embodiment, a person who is going to leave a specific area can be appropriately notified according to the guard state of the area.
Fig. 9 and 10 show an example in which the management system 1 is used only for the floor 1 of the building 13. The management system 1 may be used for a plurality of floors of the building 13 or the entire building 13. For example, when the tenant T1 enters the room R1 on the 1 st floor and the room R11 on the 3 rd floor of the building 13, the storage unit 32 stores the area information "room R1 and room R11" in association with the identification information 1001.
Fig. 12 is a diagram showing another example of the management system 1 according to embodiment 2 of the present invention. An example in which the management system 1 is applied to each floor of the building 13 is shown below. As an example, fig. 12 shows an example in which the management system 1 is applied to the 3-floor of the building 13. The example shown in fig. 12 is different from the example shown in fig. 5 in that an authentication terminal 45 is provided in each room.
Fig. 13 is a diagram for explaining the function of the management system 1 shown in fig. 12. The local controller 4 includes, for example, a storage unit 22, a checking unit 23, an unlocking unit 24, and an unattended detection unit 25. The local controller 3 includes, for example, a storage unit 32, a checking unit 33, a call registration unit 38, a determination unit 35, a determination unit 36, a determination unit 39, and a notification unit 37.
The storage unit 32 stores identification information for identifying a person who can enter or exit the installation floor of the authentication terminal 6. For example, the storage unit 32 stores identification information for identifying employees of the tenants T11 to T15. In the storage unit 32, area information is stored in association with the identification information. The area information is information for specifying an area where a person assigned the identification information can enter and exit the floor.
An example of the operation of the local controller 3 will be described in detail with reference to fig. 14. Fig. 14 is a flowchart showing another operation example of the management system 1 according to embodiment 2 of the present invention.
The processing shown in S401 to S405 of fig. 14 is the same as the processing shown in S201 to S205 of fig. 7. The processing shown in S412 of fig. 14 is the same as the processing shown in S209 of fig. 7.
The processing shown in S406 to S410 in fig. 14 is basically the same as the processing shown in S306 to S310 in fig. 11. For example, when the storage of the disarmed information is executed in S407, the local controller 3 determines whether or not at least one of the intrusion information and the disarmed information is stored in the storage unit 32 (S408). When it is determined in S406 that the area specified in S403 is not unattended, the determination in S408 is also performed. If both the intrusion information and the non-alert information are not stored in the storage section 32, the call registration section 38 automatically registers a hall call of the floor (S411).
If it is determined yes in S408, if the entry information is stored in the storage unit 32, the notification unit 37 notifies that entry has occurred. On the other hand, if the storage unit 32 stores the disarmed information, the notification unit 37 notifies the disarmed information. If both the intrusion information and the disarmed information are stored in the storage unit 32, the notification unit 37 notifies both of the occurrence of the intrusion and the disarmed information. For example, the notification unit 37 notifies the notifier 44 of the authentication terminal 6 of necessary information (S409). The notification unit 37 causes the display 12 to display necessary information (S410). When the determination at S408 is yes, the call registration section 38 does not perform automatic registration of a call. When the determination at S408 is yes, the call registration section 38 may not register the hall call even if the hall button 42 is pressed.
In the examples shown in fig. 12 to 14, the same effects as those exhibited by the examples shown in fig. 9 to 11 can be expected.
In the present embodiment, an example of detecting both the occurrence of intrusion and the occurrence of unauthorized has been described. The management system 1 may also only perform an unwarranted detection. In this case, in the flowchart shown in fig. 4, the processes shown in S306 and S307 may be performed instead of the processes shown in S104 and S105. In the flowchart shown in fig. 7, the processing shown in S406 and S407 may be performed instead of the processing shown in S204 and S205.
The parts indicated by reference numerals 22 to 25 show the functions that the local controller 4 has. Fig. 15 is a diagram showing an example of hardware elements that the local controller 4 has. The local controller 4 has, as hardware resources, a processing circuit 49 including, for example, a processor 47 and a memory 48. The function of the storage unit 22 is realized by the memory 48. The local controller 4 executes programs stored in the memory 48 by the processor 47 to realize the functions of the respective sections shown by reference numerals 23 to 25.
The parts shown by reference numerals 27 to 28 show the functions of the center device 2. Fig. 16 is a diagram showing an example of hardware elements included in the center device 2. The center device 2 has, as hardware resources, a processing circuit 52 including, for example, a processor 50 and a memory 51. The function of the storage unit 27 is realized by the memory 51. The central device 2 realizes the functions of the respective sections shown by reference numerals 27 to 28 by executing a program stored in the memory 51 by the processor 50.
The respective sections shown by reference numerals 32 to 39 show functions of the local controller 3. Fig. 17 is a diagram showing an example of hardware elements that the local controller 3 has. The local controller 3 has, as hardware resources, a processing circuit 55 including, for example, a processor 53 and a memory 54. The functions of the storage unit 32 are realized by the memory 54. The local controller 3 executes programs stored in the memory 54 by the processor 53 to realize the functions of the respective sections shown by reference numerals 33 to 39.
The processors 47, 50, and 53 are also referred to as a CPU (Central Processing Unit), a Central Processing Unit, a Processing device, an arithmetic device, a microprocessor, a microcomputer, and a DSP. As the memories 48, 51, and 54, a semiconductor memory, a magnetic Disk, a flexible Disk, an optical Disk, a compact Disk, a mini Disk, a DVD (Digital Versatile Disk), or the like can be used. Semiconductor memories that can be used include RAM (Random Access Memory), ROM (Read Only Memory), flash Memory, EPROM (Erasable Programmable Read Only Memory), and EEPROM (Electrically Erasable Programmable Read-Only Memory), among others.
Part or all of the functions of the local controller 4 may be implemented by dedicated hardware. Some or all of the functions of the center apparatus 2 may be realized by dedicated hardware. A part or all of the functions of the local controller 3 may be implemented by dedicated hardware. The processing circuits 49, 52, and 55 may be implemented by a single circuit, a composite circuit, a programmed processor, a parallel programmed processor, an ASIC, an FPGA, or a combination thereof.
Industrial applicability
The present invention can be applied to a management system.
Description of the reference symbols
1, managing a system; 2, a central device; 3 a local controller; 4 a local controller; 5, authenticating the terminal; 6, authenticating the terminal; 7 authenticating the terminal; 8, a detector; 9 a monitoring device; 10 a monitoring device; 11 a display; 12 a display; 13 building; 14 an electronic lock; 15 doors; 16 an electronic lock; 17 a door; 18 a receiver; 19 guard button; 20 a release button; 21, a label; 22 a storage section; 23 a checking portion; 24 unlocking the lock; 25 an unmanned detection part; 27 a storage section; 28 setting unit; 30 a receiver; 31 an annunciator; 32 a storage section; 33 a check pair part; 34 unlocking the lock; 35 a determination section; a 36 determination unit; 37 a notification unit; 38 a call registration unit; a determination unit 39; 42 landing buttons; 43 a receiver; 44 an annunciator; 45 authenticating the terminal; 46 a receiver; 47 a processor; 48 a memory; 49 a processing circuit; 50 a processor; 51 a memory; 52 a processing circuit; 53 a processor; 54 a memory; 55 processing circuitry.

Claims (13)

1. A management system, having:
a 1 st receiver that receives identification information;
a 1 st storage unit which stores identification information for identifying a person who can enter and exit the 1 st area;
a 1 st unlocking unit that unlocks a 1 st door for entering and exiting the 1 st area, when the identification information received by the 1 st receiver matches any of the identification information stored in the 1 st storage unit;
a prohibiting unit that prohibits unlocking of the 1 st door by the 1 st unlocking unit when a specific operation is performed;
a detector that detects a situation in which a person is located in the 1 st area;
a 2 nd storage unit that stores occurrence of intrusion into the 1 st area when the detector detects presence of a person while unlocking of the 1 st door is prohibited by the prohibition unit;
a 2 nd receiver that receives the identification information;
a 3 rd storage unit which stores the identification information and the area information in association with each other;
a determination unit that determines, when identification information is received by the 2 nd receiver, an area indicated by the area information stored in the 3 rd storage unit in association with the identification information; and
and a notification unit configured to notify occurrence of intrusion if the 2 nd storage unit stores that intrusion into the 1 st area has occurred if the area determined by the determination unit is the 1 st area.
2. The management system of claim 1,
the management system also has a display disposed in zone 2,
the 2 nd receiver is configured in the 2 nd zone,
the notification unit causes the display to display, as a notification relating to occurrence of intrusion, a name indicating the 1 st area and content indicating intrusion of a person into the 1 st area.
3. The management system of claim 2,
the management system further has a 2 nd unlocking unit that unlocks a 2 nd door for entering and exiting the 2 nd zone,
if the area determined by the determination unit is the 1 st area, the 2 nd unlocking unit does not unlock the 2 nd door if the 2 nd storage unit stores that intrusion into the 1 st area has occurred.
4. The management system of claim 1,
the 2 nd receiver is provided in an elevator hall of a floor where the 1 st receiver is provided.
5. The management system of claim 4,
the management system further has a display provided at the landing,
the notification unit causes the display to display, as a notification relating to occurrence of intrusion, a name indicating the 1 st area and content indicating intrusion of a person into the 1 st area.
6. The management system according to claim 4 or 5,
the management system further has:
a landing button of an elevator provided in the landing; and
a call registration means for registering a hall call of an elevator when the hall button is pressed,
in the case where the area specified by the specifying means is the 1 st area, if the 2 nd storage means stores that intrusion into the 1 st area has occurred, the call registration means does not register a hall call even if the hall button is pressed.
7. The management system according to any one of claims 1 to 6,
the management system further has:
a 3 rd receiver which is disposed in the 1 st area and receives the identification information;
an unattended detection unit which detects that the 1 st area is unattended according to the reception result of the 1 st receiver and the reception result of the 3 rd receiver; and
a determination unit that determines that the 1 st area is not alert when the absence of a person is detected by the unmanned detection unit when the unlocking of the 1 st door is not prohibited by the prohibition unit,
the 1 st receiver is configured outside the 1 st zone,
the notification unit performs a notification regarding an alert failure when the determination unit determines that the 1 st area is alert failure when the area determined by the determination unit is the 1 st area.
8. A management system, having:
a 1 st receiver configured in the 1 st area and receiving identification information;
a 2 nd receiver configured outside the 1 st area and receiving identification information;
a 1 st storage unit that stores identification information for identifying a person who can enter and exit the 1 st area;
a 1 st unlocking unit that unlocks a 1 st door for entering and exiting the 1 st area, when the identification information received by the 2 nd receiver matches any of the identification information stored in the 1 st storage unit;
a prohibiting unit that prohibits unlocking of the 1 st door by the 1 st unlocking unit when a specific operation is performed;
an unattended detection unit which detects that no person exists in the 1 st area according to the reception result of the 1 st receiver and the reception result of the 2 nd receiver;
a determination unit that determines that the 1 st area is not alert when the absence of a person is detected by the unmanned detection unit while the unlocking of the 1 st door is prohibited by the prohibition unit;
a 3 rd receiver which receives the identification information;
a 2 nd storage unit that stores the identification information and the area information in association with each other;
a determination unit that determines, when identification information is received by the 3 rd receiver, an area indicated by the area information stored in the 2 nd storage unit in association with the identification information; and
and a notification unit configured to notify that the first area is not alert when the determination unit determines that the first area is not alert when the area determined by the determination unit is the 1 st area.
9. The management system of claim 8,
the management system also has a display disposed in zone 2,
the 3 rd receiver is disposed in the 2 nd zone,
the notification unit causes the display to display, as a notification relating to no-guard, a name indicating the 1 st area and content indicating that the 1 st area is not guard.
10. The management system of claim 9,
the management system further has a 2 nd unlocking unit that unlocks a 2 nd door for entering and exiting the 2 nd zone,
when the determination unit determines that the 1 st area is not alert when the area determined by the determination unit is the 1 st area, the 2 nd unlocking unit does not unlock the 2 nd door.
11. The management system of claim 8,
the 3 rd receiver is provided in an elevator landing on a floor where the 2 nd receiver is provided.
12. The management system of claim 11,
the management system further has a display provided at the landing,
the notification unit causes the display to display, as a notification relating to no-guard, a name indicating the 1 st area and content indicating that the 1 st area is not guard.
13. The management system according to claim 11 or 12,
the management system further has:
a landing button of an elevator provided in the landing; and
a call registration means for registering a hall call of an elevator when the hall button is pressed,
when the determination means determines that the 1 st zone is not alert when the zone specified by the specification means is the 1 st zone, the call registration means does not register a hall call even if the hall button is pressed.
CN201780091386.3A 2017-06-27 2017-06-27 Management system Active CN110770805B (en)

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
PCT/JP2017/023629 WO2019003315A1 (en) 2017-06-27 2017-06-27 Management system

Publications (2)

Publication Number Publication Date
CN110770805A true CN110770805A (en) 2020-02-07
CN110770805B CN110770805B (en) 2021-05-25

Family

ID=64741987

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201780091386.3A Active CN110770805B (en) 2017-06-27 2017-06-27 Management system

Country Status (3)

Country Link
JP (1) JP6711461B2 (en)
CN (1) CN110770805B (en)
WO (1) WO2019003315A1 (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN115088027A (en) * 2020-02-20 2022-09-20 三菱电机株式会社 Access management system

Citations (13)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2006185128A (en) * 2004-12-27 2006-07-13 Sogo Keibi Hosho Co Ltd Security apparatus, security method and monitoring system
JP2006202204A (en) * 2005-01-24 2006-08-03 Adc Technology Kk Entry and exit control system
CN101004847A (en) * 2007-01-10 2007-07-25 福建居安通智能技术有限公司 Control device and control method for automatic setting up or resetting bugging unit with human body inducting probe
JP2010205092A (en) * 2009-03-05 2010-09-16 Hitachi Ltd Entry/exit management system
CN102026900A (en) * 2008-05-21 2011-04-20 三菱电机株式会社 Elevator system and group management control device
CN102510477A (en) * 2011-10-28 2012-06-20 珠海市竞争电子科技有限公司 Digitalized indoor unit and intelligent household security system
CN202957929U (en) * 2012-12-06 2013-05-29 珠海市竞争电子科技有限公司 Digital indoor unit and intelligent home security system
CN103198596A (en) * 2013-03-22 2013-07-10 成都狼嗅科技有限公司 Intelligent network alarm system and implementation method thereof
CN104040595A (en) * 2011-12-26 2014-09-10 三菱电机株式会社 Room entry/exit administration system
CN104484929A (en) * 2014-12-22 2015-04-01 唐玉勇 Novel community safety application system and implementing method
JP2016038766A (en) * 2014-08-08 2016-03-22 セコム株式会社 Security device
CN205247167U (en) * 2015-12-29 2016-05-18 河南工业职业技术学院 Building intellectualized supervisory control fire extinguishing system
CN106205046A (en) * 2016-09-14 2016-12-07 深圳市慧友安电子技术有限公司 A kind of intelligent residential district personnel management system

Patent Citations (13)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2006185128A (en) * 2004-12-27 2006-07-13 Sogo Keibi Hosho Co Ltd Security apparatus, security method and monitoring system
JP2006202204A (en) * 2005-01-24 2006-08-03 Adc Technology Kk Entry and exit control system
CN101004847A (en) * 2007-01-10 2007-07-25 福建居安通智能技术有限公司 Control device and control method for automatic setting up or resetting bugging unit with human body inducting probe
CN102026900A (en) * 2008-05-21 2011-04-20 三菱电机株式会社 Elevator system and group management control device
JP2010205092A (en) * 2009-03-05 2010-09-16 Hitachi Ltd Entry/exit management system
CN102510477A (en) * 2011-10-28 2012-06-20 珠海市竞争电子科技有限公司 Digitalized indoor unit and intelligent household security system
CN104040595A (en) * 2011-12-26 2014-09-10 三菱电机株式会社 Room entry/exit administration system
CN202957929U (en) * 2012-12-06 2013-05-29 珠海市竞争电子科技有限公司 Digital indoor unit and intelligent home security system
CN103198596A (en) * 2013-03-22 2013-07-10 成都狼嗅科技有限公司 Intelligent network alarm system and implementation method thereof
JP2016038766A (en) * 2014-08-08 2016-03-22 セコム株式会社 Security device
CN104484929A (en) * 2014-12-22 2015-04-01 唐玉勇 Novel community safety application system and implementing method
CN205247167U (en) * 2015-12-29 2016-05-18 河南工业职业技术学院 Building intellectualized supervisory control fire extinguishing system
CN106205046A (en) * 2016-09-14 2016-12-07 深圳市慧友安电子技术有限公司 A kind of intelligent residential district personnel management system

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
侯东良: "一种入侵监测系统的设计与实现", 《科技信息》 *

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN115088027A (en) * 2020-02-20 2022-09-20 三菱电机株式会社 Access management system

Also Published As

Publication number Publication date
JPWO2019003315A1 (en) 2019-12-12
JP6711461B2 (en) 2020-06-17
WO2019003315A1 (en) 2019-01-03
CN110770805B (en) 2021-05-25

Similar Documents

Publication Publication Date Title
CN101438329B (en) Security system entry control
CN107810160A (en) Solution lock key with authorization device
JP2006244039A (en) Monitoring system
CN110770805B (en) Management system
WO2015145485A1 (en) Security device, security system, and security mode setting method
JP5991798B2 (en) Apartment house management device
JP6422229B2 (en) Notification system
CN108154577A (en) Preventing lock system
CN108665591B (en) Security system based on identity recognition
JP2018190420A (en) Information processing system
JP2006283296A (en) Entry and withdrawal control system, entry and withdrawal control method and entry and withdrawal control program
JP2004265007A (en) Security system for condominium
JP2012173977A (en) Security device and security method
JP4424814B2 (en) Alarm device
KR100392116B1 (en) Unmaned entrance system and control mehtod thereof
KR20150004569U (en) Security System
JP2007115018A (en) Entrance and exit control system
JP2010238104A (en) Security system
JP2012069069A (en) Multiple dwelling house intercom system
JPH069265Y2 (en) Access control device
JP6297384B2 (en) Security device, security system, and security mode setting method
JPH08185589A (en) Automatic guard device
JP6312221B2 (en) Security device, security method, and security program
JPH085603B2 (en) Security system
JP3580780B2 (en) Multi-area security system

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant