EP2116499B1 - Elevator security system - Google Patents

Elevator security system Download PDF

Info

Publication number
EP2116499B1
EP2116499B1 EP07713926.9A EP07713926A EP2116499B1 EP 2116499 B1 EP2116499 B1 EP 2116499B1 EP 07713926 A EP07713926 A EP 07713926A EP 2116499 B1 EP2116499 B1 EP 2116499B1
Authority
EP
European Patent Office
Prior art keywords
image data
suspicious person
date
time information
user
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Not-in-force
Application number
EP07713926.9A
Other languages
German (de)
French (fr)
Other versions
EP2116499A4 (en
EP2116499A1 (en
Inventor
Shinichi Kuroda
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Mitsubishi Electric Corp
Original Assignee
Mitsubishi Electric Corp
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Mitsubishi Electric Corp filed Critical Mitsubishi Electric Corp
Publication of EP2116499A1 publication Critical patent/EP2116499A1/en
Publication of EP2116499A4 publication Critical patent/EP2116499A4/en
Application granted granted Critical
Publication of EP2116499B1 publication Critical patent/EP2116499B1/en
Not-in-force legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • BPERFORMING OPERATIONS; TRANSPORTING
    • B66HOISTING; LIFTING; HAULING
    • B66BELEVATORS; ESCALATORS OR MOVING WALKWAYS
    • B66B5/00Applications of checking, fault-correcting, or safety devices in elevators
    • GPHYSICS
    • G08SIGNALLING
    • G08BSIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
    • G08B13/00Burglar, theft or intruder alarms
    • G08B13/18Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength
    • G08B13/189Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength using passive radiation detection systems
    • G08B13/194Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength using passive radiation detection systems using image scanning and comparing systems
    • G08B13/196Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength using passive radiation detection systems using image scanning and comparing systems using television cameras
    • G08B13/19602Image analysis to detect motion of the intruder, e.g. by frame subtraction
    • G08B13/19613Recognition of a predetermined image pattern or behaviour pattern indicating theft or intrusion
    • BPERFORMING OPERATIONS; TRANSPORTING
    • B66HOISTING; LIFTING; HAULING
    • B66BELEVATORS; ESCALATORS OR MOVING WALKWAYS
    • B66B1/00Control systems of elevators in general
    • B66B1/34Details, e.g. call counting devices, data transmission from car to control system, devices giving information to the control system
    • B66B1/46Adaptations of switches or switchgear
    • B66B1/468Call registering systems
    • BPERFORMING OPERATIONS; TRANSPORTING
    • B66HOISTING; LIFTING; HAULING
    • B66BELEVATORS; ESCALATORS OR MOVING WALKWAYS
    • B66B5/00Applications of checking, fault-correcting, or safety devices in elevators
    • B66B5/0006Monitoring devices or performance analysers
    • B66B5/0012Devices monitoring the users of the elevator system
    • GPHYSICS
    • G08SIGNALLING
    • G08BSIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
    • G08B13/00Burglar, theft or intruder alarms
    • G08B13/18Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength
    • G08B13/189Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength using passive radiation detection systems
    • G08B13/194Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength using passive radiation detection systems using image scanning and comparing systems
    • G08B13/196Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength using passive radiation detection systems using image scanning and comparing systems using television cameras
    • BPERFORMING OPERATIONS; TRANSPORTING
    • B66HOISTING; LIFTING; HAULING
    • B66BELEVATORS; ESCALATORS OR MOVING WALKWAYS
    • B66B2201/00Aspects of control systems of elevators
    • B66B2201/40Details of the change of control mode
    • B66B2201/46Switches or switchgear
    • B66B2201/4607Call registering systems
    • B66B2201/4676Call registering systems for checking authorization of the passengers

Definitions

  • the present invention relates to an elevator security system that includes an authenticating apparatus that authenticates permission to use an elevator.
  • JP 2007/22776 A discloses a security system for an elevator comprising a camera inside an elevator car.
  • a face image of a passenger is processed to be compared against image data of wanted criminals stored in a wanted criminals database, which is supplied and updated by an external source.
  • a wanted criminal an information part sends the face image to a remote monitoring center.
  • previously registered face images are used to identify suspicious persons by determining that the suspicious person is not among the previously registered face images, in order to inform a manager or watchman to take countermeasures.
  • JP 2006/109014 A discloses a suspicious person determining device which takes into account a face direction determined from an photographed image of a person's face over some time. If the face direction coincides over a prescribed period of time, the person is determined as a suspicious.
  • JP 2006/103854 A discloses a security system for an elevator in which a data address of image data from a crime prevention camera recorded in a recoding means is linked to a certification operation of an elevator user so that image date and user operation can be retrieved in common for display.
  • the present invention aims to solve the above problems and an object of the present invention is to provide an elevator security system that enables improvements in security by determining whether or not an elevator user is a suspicious person.
  • an elevator security system comprising an authenticating apparatus that authenticates permission to use an elevator in response to a predetermined authorizing operation being performed; a security camera for photographing a user who performs the authorizing operation; a processor comprising a sampling portion that samples facial portion image data of the user from image data from the security camera as sampled image data only if authentication by the authenticating apparatus results in a denial of permission; a recording medium in which stored information is stored that includes suspicious person image data consisting of sampled image data that have been sampled in the past for identifying a suspicious person; and a determining portion that determines whether or not the user is a suspicious person by searching whether or not identifying image data that can be recognized as identical to the sampled image data are present in the stored information as the suspicious person image data, and that records the sampled image data in the recording medium as the suspicious person image data if presence of the identifying image data is negated; and an alarm device that issues a warning that indicates that the user is a suspicious person if a determination is made by the
  • an elevator security system because facial portion image data of a user are sampled as sampled image data by the sampling portion only if the authentication result is "failed", and sampled image data that have been sampled in the past are stored in the recording medium as suspicious person image data, and whether a user is a suspicious person or not can be determined by searching whether or not identifying image data that can be recognized as identical to the sampled image data from the sampling portion are present as suspicious person image data, a user who has had an authentication result "failed" in the past can be designated a suspicious person, enabling determination as to whether or not an elevator user is a suspicious person to be performed easily.
  • use of an elevator by suspicious persons can be prevented, enabling elevator security to be improved.
  • FIG 1 is a block diagram that shows an elevator security system according to Embodiment 1 of the present invention.
  • An elevator that moves a car inside a hoistway elevator is disposed in a building. The car can be stopped at a plurality of floors by control from an elevator control board 1.
  • An elevator authenticating apparatus 2 is disposed on a predetermined floor (in this example, a first floor (1 F) which is a lobby floor) .
  • the authenticating apparatus 2 authenticates permission to use the elevator in response to a predetermined authorizing operation being performed.
  • a predetermined authorizing operation include operations such as holding a card on which personal information is registered, or a key, etc., over the authenticating apparatus 2, for example.
  • the authenticating apparatus 2 When the permission to use the elevator is authenticated, the authenticating apparatus 2 generates authenticating information 21 that includes an authentication result that is either "passed” or "failed".
  • the authenticating apparatus 2 has a clock function, and generates date and time information 22 that corresponds to the date and time that the authorizing operation was performed when the authorizing operation is performed.
  • the authenticating information 21 is sent from the authenticating apparatus 2 to the elevator control board 1. If the authentication result from the authenticating apparatus 2 is "failed", the elevator control board 1 disables call registration by the operation of landing buttons (not shown), and releases the disabling of call registration only if the authentication result from the authenticating apparatus 2 is "passed”.
  • a security camera 3 for photographing users that perform the authorizing operation on the authenticating apparatus 2 is disposed on the floor on which the authenticating apparatus 2 is disposed (the lobby floor).
  • the security camera 3 photographs a predetermined range in the vicinity of the authenticating apparatus 2.
  • the security camera 3 is also capable of serial photography.
  • the security camera 3 constantly outputs image data 23 that are obtained by that photography.
  • the authenticating information 21, the date and time information 22, and the image data 23 are sent to a processor 4.
  • the processor 4 performs processes related to the determination of whether or not the user is a suspicious person based on the authenticating information 21, the date and time information 22, and the image data 23.
  • the processor 4 has a recording medium 5, a sampling portion 6, and a determining portion 7.
  • Stored information that includes suspicious person image data for identifying suspicious persons is stored in the recording medium 5.
  • the suspicious person image data that are stored in the recording medium 5 are also associated with the date and time information and saved.
  • the sampling portion 6 determines the ability to process the image data 23 from the security camera 3 based on the authenticating information 21. Specifically, the sampling portion 6 performs processing of the image data 23 if the authentication result from the authenticating apparatus 2 is "failed", and stops the processing of the image data 23 if the authentication result from the authenticating apparatus 2 is "passed". In other words, processing of the image data 23 by the sampling portion 6 is performed by sampling image data from a facial portion of the user in the image data 23 as sampled image data 24 only if the authentication that is performed by the authenticating apparatus 2 results in a denial of permission. The sampled image data 24 that have been sampled by the processing of the sampling portion 6 are sent to the determining portion 7 from the sampling portion 6.
  • the determining portion 7 receives the sampled image data 24 from the sampling portion 6 and the date and time information 22 from the authenticating apparatus 2.
  • the determining portion 7 has a searching portion 8.
  • the searching portion 8 searches whether or not identifying image data that can be recognized as identical to the sampled image data 24 (i.e., image data that identify a facial portion that is identical to the facial portion of the user identified by the sampled image data 24) are present as suspicious person image data in the stored information.
  • the method for searching the stored information is not dependent on any specific method, provided that the algorithm outputs presence or absence of identifying image data as a search result.
  • the searching portion 8 records the sampled image data 24 as suspicious person image data in the recording medium 5, and also records the date and time information 22 from the authenticating apparatus 2 in the recording medium 5 so as to be associated with the sampled image data 24. If the identifying image data are present as suspicious person image data in the stored information, the searching portion 8 adds the date and time information 22 from the authenticating apparatus 2 to past date and time information that has been associated with the identifying image data.
  • sampled image data (facial portion image data) of users whose authentication result in the authenticating apparatus 2 was “failed” are accumulated as suspicious person image data in the recording medium 5, and the date and time information when the authentication result was "failed” is accumulated so as to be associated with the suspicious person image data.
  • the determining portion 7 determines whether or not the user who performed the authorizing operation is a suspicious person based on the search results from the searching portion 8. Specifically, the determining portion 7 determines that the user is a legitimate user if the presence of identifying image data is negated by the searching portion 8 (i.e., if identifying image data are not present as suspicious person image data in the stored information). The determining portion 7 determines that the user is a suspicious person if the presence of identifying image data is found by the searching portion 8 (i.e., if identifying image data are present as suspicious person image data in the stored information).
  • the determining portion 7 outputs the sampled image data 24 to an alarm device 9 as warning image data 25 only when it has determined that the user is a suspicious person.
  • the processor 4 is constituted by a computer that has: an arithmetic processing portion (a CPU), a storage portion (ROM, RAM, etc.), and a signal input/output portion.
  • the functions of the sampling portion 6 and the determining portion 7 are implemented by the computer of the processor 4. That is, programs for implementing the functions of the sampling portion 6 and the determining portion 7 are stored in the storage portion of the computer.
  • the data processing portion executes arithmetic processing that relates to the functions of the processor 4 based on the programs that are stored in the storage portion.
  • the alarm device 9 is disposed at a predetermined position in a vicinity of the authenticating apparatus 2.
  • the alarm device 9 generates an alarm that indicates that the user is a suspicious person in response to receiving warning image data 25 from the determining portion 7.
  • the alarm device 9 has a display portion 10 that displays an image that is obtained from the warning image data 25 (i.e., the sampled image data) as a warning.
  • the alarm device 9 issues a warning sound together with the display of the image on the display portion 10.
  • processing of the image data 23 is performed by the sampling portion 6. Facial portion image data of the user from the image data 23 of the security camera 3 is thereby sampled as sampled image data 24.
  • the sampled image data 24 that has been sampled by the sampling portion 6 is sent to the determining portion 7. Next, whether the user is a suspicious person or not is determined by the determining portion 7 based on the sampled image data 24. If it is determined that the user is a suspicious person, the sampled image data 24 are sent from the determining portion 7 to the alarm device 9 as warning image data 25. Thus, the image that is obtained from the warning image data 25 is displayed on the display portion 10 as a warning. At that point, the warning sound issues from the warning device 9.
  • Figure 2 is a flowchart that shows actions of the determining portion 7 from Figure 1 .
  • the searching portion 8 searches whether or not image data that can be recognized as identical to the sampled image data 24 (identifying image data) are stored in the recording medium 5 as suspicious person image data (S2).
  • the searching portion 8 records the sampled image data 24 in the recording medium 5 as suspicious person image data, and also records the date and time information 22 from the authenticating apparatus 2 in the recording medium 5 so as to be associated with the sampled image data 24 (S3). In that case, the determining portion 7 determines that the user is not a suspicious person (S4).
  • the searching portion 8 adds the date and time information 22 from the authenticating apparatus 2 to past date and time information that has been stored in the recording medium 5 so as to be associated with the identifying image data (S5).
  • the determining portion 7 determines that the user is a suspicious person (S6), and also outputs the sampled image data 24 to the alarm device 9 as warning image data 25 (S7). Processing by the determining portion 7 is performed in this manner.
  • the alarm device 9 has a display portion 10 that displays an image that is obtained from the warning image data 25 (the sampled image data) as a warning, the warning that indicates that the person is suspicious can be presented visually, facilitating identification of the suspicious person to whom the warning refers.
  • the alarm device 9 is installed in the vicinity of the authenticating apparatus 2, but the alarm device 9 may also be installed in a control room of the building.
  • the warning from the alarm device 9 can thereby be transmitted to a controller who is stationed inside the control room, enabling elevator security to be improved further.
  • FIG 3 is a block diagram that shows an elevator security system according to Embodiment 2 of the present invention.
  • a processor 4 has a recording medium 5, a sampling portion 6, and a determining portion 31. Configuration of the recording medium 5 and the sampling portion 6 is similar to that of the recording medium 5 and the sampling portion 6 according to Embodiment 1.
  • the determining portion 31 has a searching portion 32 and a condition comparing portion 33.
  • the searching portion 32 searches whether or not identifying image data (i.e., image data that can be recognized as identical to the sampled image data 24) are present as suspicious person image data in the stored information in the recording medium 5. As a result of the search, if identifying image data are not present as suspicious person image data in the stored information, the searching portion 32 records the sampled image data 24 as suspicious person image data in the recording medium 5, and also records the date and time information 22 from the authenticating apparatus 2 in the recording medium 5 so as to be associated with the sampled image data 24.
  • identifying image data i.e., image data that can be recognized as identical to the sampled image data 24
  • the searching portion 32 adds the date and time information 22 from the authenticating apparatus 2 to past date and time information that has been associated with the identifying image data, and outputs the sampled image data 24, the past date and time information that has been linked to the identifying image data, and the date and time information 22 from the authenticating apparatus 2 to the condition comparing portion 33 as suspicious person candidate information 26.
  • the condition comparing portion 33 determines whether or not the suspicious person candidate information 26 satisfies preset suspicious person qualifying conditions.
  • condition comparing portion 33 obtains the count of past date and time information that has been linked to the identifying image data in the suspicious person candidate information 26 (Count), and compares the obtained count of past date and time information (Count) and a set count value (a predetermined threshold value) (TH1) that has been preset.
  • the condition comparing portion 33 also obtains the past date and time information that has been linked to the identifying image data in the suspicious person candidate information 26 (the newest past date and time information item if more than one past date and time information item exists) and the date and time information 22 from the authenticating apparatus 2, and compares a time difference between the obtained past date and time information and the date and time information 22 from the authenticating apparatus 2 (Time) and a set time value (a predetermined threshold value) (TH2) that has been preset.
  • the set time value can be set to one minute, for example.
  • the condition comparing portion 33 determines that the user does not satisfy the suspicious person qualifying conditions only if a relationship between the past date and time information count (Count) and the set count value (TH1) satisfies Expression (1) and a relationship between the date and time information time difference (Time) and the set time value (TH2) satisfies Expression (3).
  • the condition comparing portion 33 determines that the user satisfies the suspicious person qualifying conditions if a relationship between the past date and time information count (Count) and the set count value (TH1) satisfies Expression (2), or a relationship between the date and time information time difference (Time) and the set time value (TH2) satisfies Expression (4).
  • the determining portion 31 determines that the user is a suspicious person only if the condition comparing portion 33 has made a determination that the user satisfies the suspicious person qualifying conditions.
  • the determining portion 31 also outputs the sampled image data 24 that is included in the suspicious person candidate information 26 to the alarm device 9 as warning image data 25 only if it has been determined that the user is a suspicious person.
  • the rest of the configuration is similar to that of Embodiment 1.
  • Figure 4 is a flowchart that shows actions of the determining portion 31 from Figure 3 .
  • the searching portion 32 searches whether or not image data that can be recognized as identical to the sampled image data 24 (identifying image data) are stored in the recording medium 5 as suspicious person image data (S12).
  • the searching portion 32 records the sampled image data 24 in the recording medium 5 as suspicious person image data, and also records the date and time information 22 from the authenticating apparatus 2 in the recording medium 5 so as to be associated with the sampled image data 24 (S13). In that case, the determining portion 31 determines that the user is not a suspicious person (S14).
  • the searching portion 32 adds the date and time information 22 from the authenticating apparatus 2 to past date and time information that has been stored in stored in the recording medium 5 so as to be associated with the identifying image data (S15). In that case, suspicious person candidate information 26 is sent from the searching portion 32 to the condition comparing portion 33.
  • condition comparing portion 33 determines whether or not the suspicious person candidate information 26 satisfies the suspicious person qualifying conditions (S16). If the suspicious person qualifying conditions are not satisfied, the determining portion 31 determines that the user is not a suspicious person (S14).
  • the determining portion 31 determines that the user is a suspicious person (S17), and also outputs the sampled image data 24 to the alarm device 9 as warning image data 25 (S18). Processing by the determining portion 31 is performed in this manner.
  • the determining portion 31 determines whether or not a user is a suspicious person by comparing a count of past date and time information that has been associated with the identifying image data and a predetermined threshold value, it is possible to designate as a suspicious person only a user for whom the authentication result has been "failed" frequently. Consequently, legitimate users who have accidentally had an authentication result "failed" in the past can be excluded from being treated as suspicious persons, enabling erroneous determinations to be prevented.
  • the determining portion 31 determines whether or not a user is a suspicious person by comparing a time difference between past date and time information that has been associated with the identifying image data and date and time information 22 from the authenticating apparatus 2 with a predetermined threshold value, it can be determined that a user is a suspicious person when an authentication result is repeatedly "failed" a number of times in a short time, enabling accuracy in determining whether or not someone is a suspicious person to be improved.
  • the configuration may also be such that elevator running information is transmitted to the display portion 10 from the elevator control board 1, and the display portion 10 displays the elevator running information during normal operation, and display images that are obtained from the suspicious person image data instead of the elevator running information or together with the elevator running information when warning image data 25 is input.

Description

    TECHNICAL FIELD
  • The present invention relates to an elevator security system that includes an authenticating apparatus that authenticates permission to use an elevator.
  • BACKGROUND ART
  • Conventionally, as described in JP 2006-103854 A , elevator security systems have been proposed in which an area around an authenticating apparatus that authenticates permission to use an elevator is photographed by a security camera when a predetermined operation is performed on the authenticating apparatus. In these conventional elevator security systems, a date and time that the operation was performed on the authenticating apparatus, and an authentication result, etc., are displayed on a display portion
  • JP 2007/22776 A discloses a security system for an elevator comprising a camera inside an elevator car. A face image of a passenger is processed to be compared against image data of wanted criminals stored in a wanted criminals database, which is supplied and updated by an external source. When it is determined that a passenger is a wanted criminal, an information part sends the face image to a remote monitoring center.
  • Also according to JP 2003/109129 A , previously registered face images are used to identify suspicious persons by determining that the suspicious person is not among the previously registered face images, in order to inform a manager or watchman to take countermeasures.
  • JP 2006/109014 A discloses a suspicious person determining device which takes into account a face direction determined from an photographed image of a person's face over some time. If the face direction coincides over a prescribed period of time, the person is determined as a suspicious.
  • JP 2006/103854 A discloses a security system for an elevator in which a data address of image data from a crime prevention camera recorded in a recoding means is linked to a certification operation of an elevator user so that image date and user operation can be retrieved in common for display.
  • DISCLOSURE OF THE INVENTION PROBLEM TO BE SOLVED BY THE INVENTION
  • However, in conventional elevator security systems, because the date and time and the authentication result are only displayed on the display portion, it is not possible to decide if an elevator user is a suspicious person or if the person has simply pressed a wrong button.
  • The present invention aims to solve the above problems and an object of the present invention is to provide an elevator security system that enables improvements in security by determining whether or not an elevator user is a suspicious person.
  • MEANS FOR SOLVING THE PROBLEM
  • The above object is solved by an elevator security system comprising an authenticating apparatus that authenticates permission to use an elevator in response to a predetermined authorizing operation being performed; a security camera for photographing a user who performs the authorizing operation; a processor comprising a sampling portion that samples facial portion image data of the user from image data from the security camera as sampled image data only if authentication by the authenticating apparatus results in a denial of permission; a recording medium in which stored information is stored that includes suspicious person image data consisting of sampled image data that have been sampled in the past for identifying a suspicious person; and a determining portion that determines whether or not the user is a suspicious person by searching whether or not identifying image data that can be recognized as identical to the sampled image data are present in the stored information as the suspicious person image data, and that records the sampled image data in the recording medium as the suspicious person image data if presence of the identifying image data is negated; and an alarm device that issues a warning that indicates that the user is a suspicious person if a determination is made by the determining portion that the user is a suspicious person.
  • EFFECTS OF THE INVENTION
  • In an elevator security system according to the present invention, because facial portion image data of a user are sampled as sampled image data by the sampling portion only if the authentication result is "failed", and sampled image data that have been sampled in the past are stored in the recording medium as suspicious person image data, and whether a user is a suspicious person or not can be determined by searching whether or not identifying image data that can be recognized as identical to the sampled image data from the sampling portion are present as suspicious person image data, a user who has had an authentication result "failed" in the past can be designated a suspicious person, enabling determination as to whether or not an elevator user is a suspicious person to be performed easily. Thus, use of an elevator by suspicious persons can be prevented, enabling elevator security to be improved.
  • BRIEF DESCRIPTION OF THE DRAWINGS
    • Figure 1 is a block diagram that shows an elevator security system according to Embodiment 1 of the present invention;
    • Figure 2 is a flowchart that shows actions of a determining portion from Figure 1;
    • Figure 3 is a block diagram that shows an elevator security system according to Embodiment 2 of the present invention; and
    • Figure 4 is a flowchart for explaining processing actions of a determining portion from Figure 3.
    BEST MODE FOR CARRYING OUT THE INVENTION
  • Preferred embodiments of the present invention will now be explained with reference to the drawings.
  • Embodiment 1
  • Figure 1 is a block diagram that shows an elevator security system according to Embodiment 1 of the present invention. An elevator that moves a car inside a hoistway elevator is disposed in a building. The car can be stopped at a plurality of floors by control from an elevator control board 1. An elevator authenticating apparatus 2 is disposed on a predetermined floor (in this example, a first floor (1 F) which is a lobby floor) .
  • The authenticating apparatus 2 authenticates permission to use the elevator in response to a predetermined authorizing operation being performed. Examples of a predetermined authorizing operation include operations such as holding a card on which personal information is registered, or a key, etc., over the authenticating apparatus 2, for example.
  • When the permission to use the elevator is authenticated, the authenticating apparatus 2 generates authenticating information 21 that includes an authentication result that is either "passed" or "failed". The authenticating apparatus 2 has a clock function, and generates date and time information 22 that corresponds to the date and time that the authorizing operation was performed when the authorizing operation is performed.
  • The authenticating information 21 is sent from the authenticating apparatus 2 to the elevator control board 1. If the authentication result from the authenticating apparatus 2 is "failed", the elevator control board 1 disables call registration by the operation of landing buttons (not shown), and releases the disabling of call registration only if the authentication result from the authenticating apparatus 2 is "passed".
  • A security camera 3 for photographing users that perform the authorizing operation on the authenticating apparatus 2 is disposed on the floor on which the authenticating apparatus 2 is disposed (the lobby floor). The security camera 3 photographs a predetermined range in the vicinity of the authenticating apparatus 2.
    The security camera 3 is also capable of serial photography. In addition, the security camera 3 constantly outputs image data 23 that are obtained by that photography.
  • The authenticating information 21, the date and time information 22, and the image data 23 are sent to a processor 4. The processor 4 performs processes related to the determination of whether or not the user is a suspicious person based on the authenticating information 21, the date and time information 22, and the image data 23. The processor 4 has a recording medium 5, a sampling portion 6, and a determining portion 7.
  • Stored information that includes suspicious person image data for identifying suspicious persons is stored in the recording medium 5. The suspicious person image data that are stored in the recording medium 5 are also associated with the date and time information and saved.
  • The sampling portion 6 determines the ability to process the image data 23 from the security camera 3 based on the authenticating information 21. Specifically, the sampling portion 6 performs processing of the image data 23 if the authentication result from the authenticating apparatus 2 is "failed", and stops the processing of the image data 23 if the authentication result from the authenticating apparatus 2 is "passed". In other words, processing of the image data 23 by the sampling portion 6 is performed by sampling image data from a facial portion of the user in the image data 23 as sampled image data 24 only if the authentication that is performed by the authenticating apparatus 2 results in a denial of permission. The sampled image data 24 that have been sampled by the processing of the sampling portion 6 are sent to the determining portion 7 from the sampling portion 6.
  • The determining portion 7 receives the sampled image data 24 from the sampling portion 6 and the date and time information 22 from the authenticating apparatus 2. The determining portion 7 has a searching portion 8. The searching portion 8 searches whether or not identifying image data that can be recognized as identical to the sampled image data 24 (i.e., image data that identify a facial portion that is identical to the facial portion of the user identified by the sampled image data 24) are present as suspicious person image data in the stored information. Moreover, the method for searching the stored information is not dependent on any specific method, provided that the algorithm outputs presence or absence of identifying image data as a search result.
  • If identifying image data are not present as suspicious person image data in the stored information, the searching portion 8 records the sampled image data 24 as suspicious person image data in the recording medium 5, and also records the date and time information 22 from the authenticating apparatus 2 in the recording medium 5 so as to be associated with the sampled image data 24. If the identifying image data are present as suspicious person image data in the stored information, the searching portion 8 adds the date and time information 22 from the authenticating apparatus 2 to past date and time information that has been associated with the identifying image data.
  • In this manner, among users who have operated the authenticating apparatus 2 in the past, sampled image data (facial portion image data) of users whose authentication result in the authenticating apparatus 2 was "failed" are accumulated as suspicious person image data in the recording medium 5, and the date and time information when the authentication result was "failed" is accumulated so as to be associated with the suspicious person image data.
  • The determining portion 7 determines whether or not the user who performed the authorizing operation is a suspicious person based on the search results from the searching portion 8. Specifically, the determining portion 7 determines that the user is a legitimate user if the presence of identifying image data is negated by the searching portion 8 (i.e., if identifying image data are not present as suspicious person image data in the stored information). The determining portion 7 determines that the user is a suspicious person if the presence of identifying image data is found by the searching portion 8 (i.e., if identifying image data are present as suspicious person image data in the stored information).
  • The determining portion 7 outputs the sampled image data 24 to an alarm device 9 as warning image data 25 only when it has determined that the user is a suspicious person.
  • Moreover, the processor 4 is constituted by a computer that has: an arithmetic processing portion (a CPU), a storage portion (ROM, RAM, etc.), and a signal input/output portion. The functions of the sampling portion 6 and the determining portion 7 are implemented by the computer of the processor 4. That is, programs for implementing the functions of the sampling portion 6 and the determining portion 7 are stored in the storage portion of the computer. The data processing portion executes arithmetic processing that relates to the functions of the processor 4 based on the programs that are stored in the storage portion.
  • The alarm device 9 is disposed at a predetermined position in a vicinity of the authenticating apparatus 2. The alarm device 9 generates an alarm that indicates that the user is a suspicious person in response to receiving warning image data 25 from the determining portion 7. In addition, the alarm device 9 has a display portion 10 that displays an image that is obtained from the warning image data 25 (i.e., the sampled image data) as a warning. The alarm device 9 issues a warning sound together with the display of the image on the display portion 10.
  • Next, operation will be explained. Photography by a security camera 3 is performed continuously on the floor on which the authenticating apparatus 2 is disposed (the lobby floor). Thus, image data 23 from the security camera 3 is sent to the sampling portion 6 continuously. Processing of the image data 23 is not performed by the sampling portion 6 and output of sampled image data 24 from the sampling portion 6 is stopped if an authorizing operation has not been performed on the authenticating apparatus 2.
  • When an authorizing operation is performed on the authenticating apparatus 2 by a user, permission to use the elevator is authenticated by the authenticating apparatus 2. If the authentication result is "failed" (i.e., the authentication returns that use of the elevator is not permitted), then call registration by operation of the landing buttons is disabled by control from the elevator control board 1. Consequently, call registration cannot be performed even if the landing buttons are operated.
  • In that case, processing of the image data 23 is performed by the sampling portion 6. Facial portion image data of the user from the image data 23 of the security camera 3 is thereby sampled as sampled image data 24.
  • The sampled image data 24 that has been sampled by the sampling portion 6 is sent to the determining portion 7. Next, whether the user is a suspicious person or not is determined by the determining portion 7 based on the sampled image data 24. If it is determined that the user is a suspicious person, the sampled image data 24 are sent from the determining portion 7 to the alarm device 9 as warning image data 25. Thus, the image that is obtained from the warning image data 25 is displayed on the display portion 10 as a warning. At that point, the warning sound issues from the warning device 9.
  • If it is determined that the user is a legitimate user, transmission of the warning image data 25 from the determining portion 7 to the alarm device 9 is not performed, nor is warning performed by the alarm device 9.
  • On the other hand, if the authentication result is "passed" (i.e., if the authentication returns that use of the elevator is permitted), then disabling of call registration by operation of the landing buttons is released by control from the elevator control board 1. In that case, call registration can be performed by operating the landing buttons, and a car that responds to the call registration is moved to the lobby floor (the floor on which the authenticating apparatus 2 is disposed). Here, processing of the image data 23 is not performed by the sampling portion 6, and output of the sampled image data 24 from the sampling portion 6 remains stopped.
  • Next, processing actions of the determining portion 7 will be explained. Figure 2 is a flowchart that shows actions of the determining portion 7 from Figure 1. In the figure, when the determining portion 7 receives sampled image data 24 from the sampling portion 6 (S1), the searching portion 8 searches whether or not image data that can be recognized as identical to the sampled image data 24 (identifying image data) are stored in the recording medium 5 as suspicious person image data (S2).
  • If the identifying image data are not present as suspicious person image data, the searching portion 8 records the sampled image data 24 in the recording medium 5 as suspicious person image data, and also records the date and time information 22 from the authenticating apparatus 2 in the recording medium 5 so as to be associated with the sampled image data 24 (S3). In that case, the determining portion 7 determines that the user is not a suspicious person (S4).
  • On the other hand, if the identifying image data are present as suspicious person image data, the searching portion 8 adds the date and time information 22 from the authenticating apparatus 2 to past date and time information that has been stored in the recording medium 5 so as to be associated with the identifying image data (S5). In that case, the determining portion 7 determines that the user is a suspicious person (S6), and also outputs the sampled image data 24 to the alarm device 9 as warning image data 25 (S7). Processing by the determining portion 7 is performed in this manner.
  • In an elevator security system of this kind, because facial portion image data of a user are sampled as sampled image data 24 by the sampling portion 6 only if the authentication result is "flailed", and sampled image data 24 that have been sampled in the past are stored in the recording medium 5 as suspicious person image data, and whether a user is a suspicious person or not can be determined by searching whether or not identifying image data that can be recognized as identical to the sampled image data 24 from the sampling portion 6 are present as suspicious person image data, a user who has had an authentication result "failed" in the past can be designated a suspicious person, enabling determination as to whether or not an elevator user is a suspicious person to be performed easily. Thus, use of an elevator by suspicious persons can be prevented, enabling elevator security to be improved.
  • Because the alarm device 9 has a display portion 10 that displays an image that is obtained from the warning image data 25 (the sampled image data) as a warning, the warning that indicates that the person is suspicious can be presented visually, facilitating identification of the suspicious person to whom the warning refers.
  • Moreover, in the above example, the alarm device 9 is installed in the vicinity of the authenticating apparatus 2, but the alarm device 9 may also be installed in a control room of the building. The warning from the alarm device 9 can thereby be transmitted to a controller who is stationed inside the control room, enabling elevator security to be improved further.
  • Embodiment 2
  • Figure 3 is a block diagram that shows an elevator security system according to Embodiment 2 of the present invention. In the figure, a processor 4 has a recording medium 5, a sampling portion 6, and a determining portion 31. Configuration of the recording medium 5 and the sampling portion 6 is similar to that of the recording medium 5 and the sampling portion 6 according to Embodiment 1. The determining portion 31 has a searching portion 32 and a condition comparing portion 33.
  • In response to the determining portion 7 receiving sampled image data 24, the searching portion 32 searches whether or not identifying image data (i.e., image data that can be recognized as identical to the sampled image data 24) are present as suspicious person image data in the stored information in the recording medium 5. As a result of the search, if identifying image data are not present as suspicious person image data in the stored information, the searching portion 32 records the sampled image data 24 as suspicious person image data in the recording medium 5, and also records the date and time information 22 from the authenticating apparatus 2 in the recording medium 5 so as to be associated with the sampled image data 24. In addition, as a result of the search, if the identifying image data are present as suspicious person image data in the stored information, the searching portion 32 adds the date and time information 22 from the authenticating apparatus 2 to past date and time information that has been associated with the identifying image data, and outputs the sampled image data 24, the past date and time information that has been linked to the identifying image data, and the date and time information 22 from the authenticating apparatus 2 to the condition comparing portion 33 as suspicious person candidate information 26.
  • The condition comparing portion 33 determines whether or not the suspicious person candidate information 26 satisfies preset suspicious person qualifying conditions.
  • Specifically, the condition comparing portion 33 obtains the count of past date and time information that has been linked to the identifying image data in the suspicious person candidate information 26 (Count), and compares the obtained count of past date and time information (Count) and a set count value (a predetermined threshold value) (TH1) that has been preset. The condition comparing portion 33 also obtains the past date and time information that has been linked to the identifying image data in the suspicious person candidate information 26 (the newest past date and time information item if more than one past date and time information item exists) and the date and time information 22 from the authenticating apparatus 2, and compares a time difference between the obtained past date and time information and the date and time information 22 from the authenticating apparatus 2 (Time) and a set time value (a predetermined threshold value) (TH2) that has been preset. The set time value can be set to one minute, for example.
  • The condition comparing portion 33 determines that the user does not satisfy the suspicious person qualifying conditions only if a relationship between the past date and time information count (Count) and the set count value (TH1) satisfies Expression (1) and a relationship between the date and time information time difference (Time) and the set time value (TH2) satisfies Expression (3). The condition comparing portion 33 determines that the user satisfies the suspicious person qualifying conditions if a relationship between the past date and time information count (Count) and the set count value (TH1) satisfies Expression (2), or a relationship between the date and time information time difference (Time) and the set time value (TH2) satisfies Expression (4). Count TH 1
    Figure imgb0001
    Count > TH 1
    Figure imgb0002
    Time > TH 2
    Figure imgb0003
    Time TH 2
    Figure imgb0004
  • The determining portion 31 determines that the user is a suspicious person only if the condition comparing portion 33 has made a determination that the user satisfies the suspicious person qualifying conditions. The determining portion 31 also outputs the sampled image data 24 that is included in the suspicious person candidate information 26 to the alarm device 9 as warning image data 25 only if it has been determined that the user is a suspicious person. The rest of the configuration is similar to that of Embodiment 1.
  • Next, operation will be explained. Because operation according to the present embodiment is similar to operation according to Embodiment 1 except for processing actions of the determining portion 31, only the processing actions of the determining portion 31 will be explained.
  • Figure 4 is a flowchart that shows actions of the determining portion 31 from Figure 3. In the figure, when the determining portion 31 receives sampled image data 24 from the sampling portion 6 (S11), the searching portion 32 searches whether or not image data that can be recognized as identical to the sampled image data 24 (identifying image data) are stored in the recording medium 5 as suspicious person image data (S12).
  • If the identifying image data are not present as suspicious person image data, the searching portion 32 records the sampled image data 24 in the recording medium 5 as suspicious person image data, and also records the date and time information 22 from the authenticating apparatus 2 in the recording medium 5 so as to be associated with the sampled image data 24 (S13). In that case, the determining portion 31 determines that the user is not a suspicious person (S14).
  • On the other hand, if the identifying image data are present as suspicious person image data, the searching portion 32 adds the date and time information 22 from the authenticating apparatus 2 to past date and time information that has been stored in stored in the recording medium 5 so as to be associated with the identifying image data (S15). In that case, suspicious person candidate information 26 is sent from the searching portion 32 to the condition comparing portion 33.
  • Next, the condition comparing portion 33 determines whether or not the suspicious person candidate information 26 satisfies the suspicious person qualifying conditions (S16). If the suspicious person qualifying conditions are not satisfied, the determining portion 31 determines that the user is not a suspicious person (S14).
  • If the suspicious person qualifying conditions are satisfied, the determining portion 31 determines that the user is a suspicious person (S17), and also outputs the sampled image data 24 to the alarm device 9 as warning image data 25 (S18). Processing by the determining portion 31 is performed in this manner.
  • In an elevator security system of this kind, because the determining portion 31 determines whether or not a user is a suspicious person by comparing a count of past date and time information that has been associated with the identifying image data and a predetermined threshold value, it is possible to designate as a suspicious person only a user for whom the authentication result has been "failed" frequently. Consequently, legitimate users who have accidentally had an authentication result "failed" in the past can be excluded from being treated as suspicious persons, enabling erroneous determinations to be prevented.
  • Because the determining portion 31 determines whether or not a user is a suspicious person by comparing a time difference between past date and time information that has been associated with the identifying image data and date and time information 22 from the authenticating apparatus 2 with a predetermined threshold value, it can be determined that a user is a suspicious person when an authentication result is repeatedly "failed" a number of times in a short time, enabling accuracy in determining whether or not someone is a suspicious person to be improved.
  • Moreover, the configuration may also be such that elevator running information is transmitted to the display portion 10 from the elevator control board 1, and the display portion 10 displays the elevator running information during normal operation, and display images that are obtained from the suspicious person image data instead of the elevator running information or together with the elevator running information when warning image data 25 is input.

Claims (4)

  1. An elevator security system comprising:
    an authenticating apparatus (2) that authenticates permission to use an elevator in response to a predetermined authorizing operation being performed;
    a security camera (3) for photographing a user who performs the authorizing operation;
    a processor (4) comprising:
    a sampling portion (6) that samples facial portion image data (24) of the user from image data from the security camera (3) as sampled image data (23) only if authentication by the authenticating apparatus results in a denial of permission;
    a recording medium (5) in which stored information is stored that includes suspicious person image data consisting of sampled image data that have been sampled in the past for identifying a suspicious person;
    and
    a determining portion (7) that determines whether or not the user is a suspicious person by searching whether or not identifying image data that can be recognized as identical to the sampled image data (24) are present in the stored information as the suspicious person image data, and that records the sampled image data (24) in the recording medium (5) as the suspicious person image data if presence of the identifying image data is negated; and
    an alarm device (9) that issues a warning that indicates that the user is a suspicious person if a determination is made by the determining portion (7) that the user is a suspicious person.
  2. An elevator security system according to Claim 1, characterized in that:
    the authenticating apparatus (2) generates date and time information (22) that corresponds to a date and time that the authorizing operation was performed;
    the determining portion (7) associates and records the date and time information (22) and the sampled image data (24) in the recording medium (5) if presence of the identifying image data is negated, and adds the date and
    time information (22) from the authenticating apparatus (2) to past date and time information (22) that has been associated with the identifying image data if the identifying image data are present in the stored information; and
    the determination by the determining portion (7) as to whether or not the user is a suspicious person is made by comparing:
    a count of the past date and time information (22) that has been associated with the identifying image data; and
    a predetermined threshold value.
  3. An elevator security system according to Claim 1, characterized in that:
    the authenticating apparatus (2) generates date and time information (22) that corresponds to a date and time that the authorizing operation was performed;
    the determining portion (7) associates and records the date and time information (22) and the sampled image data (24) in the recording medium (5) if presence of the identifying image data is negated, and adds the date and time information (22) from the authenticating apparatus (2) to past date and time information (22) that has been associated with the identifying image data if the identifying image data are present in the stored information; and
    the determination by the determining portion (7) as to whether or not the user is a suspicious person is made by comparing:
    a time difference between the date and time information (22) that has been associated with the identifying image data and the date and time information (22) from the authenticating apparatus (2); and
    a predetermined threshold value.
  4. An elevator security system according to any of Claims 1 through 3, characterized in that the alarm device (9) has a display portion (1 0) that displays an image that is obtained from the sampled image data (24) as the warning.
EP07713926.9A 2007-02-08 2007-02-08 Elevator security system Not-in-force EP2116499B1 (en)

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
PCT/JP2007/052210 WO2008096433A1 (en) 2007-02-08 2007-02-08 Elevator security system

Publications (3)

Publication Number Publication Date
EP2116499A1 EP2116499A1 (en) 2009-11-11
EP2116499A4 EP2116499A4 (en) 2013-08-28
EP2116499B1 true EP2116499B1 (en) 2014-08-20

Family

ID=39681352

Family Applications (1)

Application Number Title Priority Date Filing Date
EP07713926.9A Not-in-force EP2116499B1 (en) 2007-02-08 2007-02-08 Elevator security system

Country Status (5)

Country Link
EP (1) EP2116499B1 (en)
JP (1) JP5377982B2 (en)
KR (1) KR101079891B1 (en)
CN (1) CN101600640B (en)
WO (1) WO2008096433A1 (en)

Families Citing this family (14)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101734527A (en) * 2009-12-31 2010-06-16 上海杰远环保科技有限公司 Face recognition elevator reservation system and implementation method thereof
CN101901340A (en) * 2010-08-04 2010-12-01 惠州市华阳多媒体电子有限公司 Suspect tracking method and system
CN104299629A (en) * 2014-10-28 2015-01-21 上海皓业广播传媒有限公司 Video-control audio playing device and control method
CN106144795B (en) 2015-04-03 2020-01-31 奥的斯电梯公司 System and method for passenger transport control and security by identifying user actions
CN106144862B (en) 2015-04-03 2020-04-10 奥的斯电梯公司 Depth sensor based passenger sensing for passenger transport door control
CN106144861B (en) 2015-04-03 2020-07-24 奥的斯电梯公司 Depth sensor based passenger sensing for passenger transport control
CN106144801B (en) 2015-04-03 2021-05-18 奥的斯电梯公司 Depth sensor based sensing for special passenger transport vehicle load conditions
CN112850406A (en) 2015-04-03 2021-05-28 奥的斯电梯公司 Traffic list generation for passenger transport
CN105060050A (en) * 2015-07-23 2015-11-18 孟凯涛 Elevator running door opening dangerous case detection system
CN105502110A (en) * 2015-08-03 2016-04-20 陈思 Intelligent elevator capable of refusing dangerous persons
CN105601679B (en) * 2016-01-13 2019-10-15 复旦大学 A method of monosaccharide, organic acid and phenolic compound component are separated and recovered from biomass by hydro-thermal liquefaction hydrolyzate
US20210214184A1 (en) * 2016-02-18 2021-07-15 Otis Elevator Company Elevator Access Control System
CN108109348A (en) * 2017-12-11 2018-06-01 日立楼宇技术(广州)有限公司 Classifying alarm method and device
CN108171123A (en) * 2017-12-11 2018-06-15 日立楼宇技术(广州)有限公司 Dangerous user's identification and the method and apparatus of alarm

Family Cites Families (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
KR940006489B1 (en) * 1992-06-19 1994-07-21 금성산전 주식회사 Elevator crime prevention apparatus and method
JP4703880B2 (en) * 2001-03-30 2011-06-15 綜合警備保障株式会社 Access control system
JP2003109129A (en) 2001-09-27 2003-04-11 Toshiba Corp Device, system and method for managing passage
JP2005132549A (en) * 2003-10-29 2005-05-26 Toshiba Corp Control device for elevator
JP2006103854A (en) 2004-10-04 2006-04-20 Toshiba Elevator Co Ltd Security system of elevator
JP4687058B2 (en) * 2004-10-04 2011-05-25 オムロン株式会社 Suspicious person judgment device
JP2006202204A (en) * 2005-01-24 2006-08-03 Adc Technology Kk Entry and exit control system
JP2007022776A (en) * 2005-07-20 2007-02-01 Toshiba Elevator Co Ltd Security system for elevator

Also Published As

Publication number Publication date
CN101600640B (en) 2013-05-29
EP2116499A4 (en) 2013-08-28
KR20090100409A (en) 2009-09-23
KR101079891B1 (en) 2011-11-04
CN101600640A (en) 2009-12-09
JP5377982B2 (en) 2013-12-25
JPWO2008096433A1 (en) 2010-05-20
EP2116499A1 (en) 2009-11-11
WO2008096433A1 (en) 2008-08-14

Similar Documents

Publication Publication Date Title
EP2116499B1 (en) Elevator security system
JP4829343B2 (en) Information processing apparatus, information processing program, and information processing method
JP5191658B2 (en) Elevator control device
JP3972779B2 (en) Personal authentication device
JP2011048547A (en) Abnormal-behavior detecting device, monitoring system, and abnormal-behavior detecting method
JP2008027286A (en) Personal authentication system
JP2003109129A (en) Device, system and method for managing passage
JP2019159573A (en) Log-in support system
JP2013210927A (en) Security device and security method
JP2010205092A (en) Entry/exit management system
JP2007162369A (en) Security system
JP2008083813A (en) Image monitoring device and image monitoring method
JP4603350B2 (en) Personal authentication device
JP2007022776A (en) Security system for elevator
WO2020170643A1 (en) Information processing device, information processing system, information processing method, and program
JP2005272088A (en) Door control device and method
JP5524250B2 (en) Abnormal behavior detection device, monitoring system, abnormal behavior detection method and program
JP2005263363A (en) Security system of elevator
JP2006132195A (en) Entry control system
JP5264258B2 (en) Elevator control device
JP2007219683A (en) Security management equipment, security management system and security management method
JP2002338149A (en) Elevator
WO2023145059A1 (en) Entry management device, entry management method, and program recording medium
US11900743B2 (en) Security authentication method and security authentication device using same
JP2008063050A (en) Security system of elevator

Legal Events

Date Code Title Description
PUAI Public reference made under article 153(3) epc to a published international application that has entered the european phase

Free format text: ORIGINAL CODE: 0009012

17P Request for examination filed

Effective date: 20090702

AK Designated contracting states

Kind code of ref document: A1

Designated state(s): AT BE BG CH CY CZ DE DK EE ES FI FR GB GR HU IE IS IT LI LT LU LV MC NL PL PT RO SE SI SK TR

DAX Request for extension of the european patent (deleted)
A4 Supplementary search report drawn up and despatched

Effective date: 20130730

RIC1 Information provided on ipc code assigned before grant

Ipc: G08B 13/196 20060101ALI20130724BHEP

Ipc: B66B 5/00 20060101AFI20130724BHEP

Ipc: B66B 1/46 20060101ALI20130724BHEP

GRAP Despatch of communication of intention to grant a patent

Free format text: ORIGINAL CODE: EPIDOSNIGR1

INTG Intention to grant announced

Effective date: 20140321

GRAS Grant fee paid

Free format text: ORIGINAL CODE: EPIDOSNIGR3

GRAA (expected) grant

Free format text: ORIGINAL CODE: 0009210

AK Designated contracting states

Kind code of ref document: B1

Designated state(s): AT BE BG CH CY CZ DE DK EE ES FI FR GB GR HU IE IS IT LI LT LU LV MC NL PL PT RO SE SI SK TR

REG Reference to a national code

Ref country code: GB

Ref legal event code: FG4D

REG Reference to a national code

Ref country code: CH

Ref legal event code: EP

REG Reference to a national code

Ref country code: AT

Ref legal event code: REF

Ref document number: 683332

Country of ref document: AT

Kind code of ref document: T

Effective date: 20140915

REG Reference to a national code

Ref country code: IE

Ref legal event code: FG4D

REG Reference to a national code

Ref country code: DE

Ref legal event code: R096

Ref document number: 602007038201

Country of ref document: DE

Effective date: 20141002

REG Reference to a national code

Ref country code: AT

Ref legal event code: MK05

Ref document number: 683332

Country of ref document: AT

Kind code of ref document: T

Effective date: 20140820

REG Reference to a national code

Ref country code: NL

Ref legal event code: VDEP

Effective date: 20140820

REG Reference to a national code

Ref country code: LT

Ref legal event code: MG4D

PG25 Lapsed in a contracting state [announced via postgrant information from national office to epo]

Ref country code: ES

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20140820

Ref country code: PT

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20141222

Ref country code: BG

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20141120

Ref country code: LT

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20140820

Ref country code: GR

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20141121

Ref country code: SE

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20140820

Ref country code: FI

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20140820

PG25 Lapsed in a contracting state [announced via postgrant information from national office to epo]

Ref country code: AT

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20140820

Ref country code: IS

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20141220

Ref country code: LV

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20140820

PG25 Lapsed in a contracting state [announced via postgrant information from national office to epo]

Ref country code: NL

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20140820

PG25 Lapsed in a contracting state [announced via postgrant information from national office to epo]

Ref country code: RO

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20140820

Ref country code: EE

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20140820

Ref country code: CZ

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20140820

Ref country code: IT

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20140820

Ref country code: SK

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20140820

Ref country code: DK

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20140820

REG Reference to a national code

Ref country code: DE

Ref legal event code: R097

Ref document number: 602007038201

Country of ref document: DE

PG25 Lapsed in a contracting state [announced via postgrant information from national office to epo]

Ref country code: PL

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20140820

PLBE No opposition filed within time limit

Free format text: ORIGINAL CODE: 0009261

STAA Information on the status of an ep patent application or granted ep patent

Free format text: STATUS: NO OPPOSITION FILED WITHIN TIME LIMIT

PG25 Lapsed in a contracting state [announced via postgrant information from national office to epo]

Ref country code: BE

Free format text: LAPSE BECAUSE OF NON-PAYMENT OF DUE FEES

Effective date: 20150228

26N No opposition filed

Effective date: 20150521

PG25 Lapsed in a contracting state [announced via postgrant information from national office to epo]

Ref country code: LU

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20150208

REG Reference to a national code

Ref country code: CH

Ref legal event code: PL

GBPC Gb: european patent ceased through non-payment of renewal fee

Effective date: 20150208

PG25 Lapsed in a contracting state [announced via postgrant information from national office to epo]

Ref country code: LI

Free format text: LAPSE BECAUSE OF NON-PAYMENT OF DUE FEES

Effective date: 20150228

Ref country code: MC

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20140820

Ref country code: CH

Free format text: LAPSE BECAUSE OF NON-PAYMENT OF DUE FEES

Effective date: 20150228

REG Reference to a national code

Ref country code: IE

Ref legal event code: MM4A

REG Reference to a national code

Ref country code: FR

Ref legal event code: ST

Effective date: 20151030

PG25 Lapsed in a contracting state [announced via postgrant information from national office to epo]

Ref country code: SI

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20140820

PG25 Lapsed in a contracting state [announced via postgrant information from national office to epo]

Ref country code: IE

Free format text: LAPSE BECAUSE OF NON-PAYMENT OF DUE FEES

Effective date: 20150208

Ref country code: GB

Free format text: LAPSE BECAUSE OF NON-PAYMENT OF DUE FEES

Effective date: 20150208

PG25 Lapsed in a contracting state [announced via postgrant information from national office to epo]

Ref country code: FR

Free format text: LAPSE BECAUSE OF NON-PAYMENT OF DUE FEES

Effective date: 20150302

PG25 Lapsed in a contracting state [announced via postgrant information from national office to epo]

Ref country code: BE

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20140820

REG Reference to a national code

Ref country code: DE

Ref legal event code: R084

Ref document number: 602007038201

Country of ref document: DE

PG25 Lapsed in a contracting state [announced via postgrant information from national office to epo]

Ref country code: HU

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT; INVALID AB INITIO

Effective date: 20070208

PG25 Lapsed in a contracting state [announced via postgrant information from national office to epo]

Ref country code: CY

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20140820

PG25 Lapsed in a contracting state [announced via postgrant information from national office to epo]

Ref country code: TR

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20140820

PGFP Annual fee paid to national office [announced via postgrant information from national office to epo]

Ref country code: DE

Payment date: 20211230

Year of fee payment: 16

REG Reference to a national code

Ref country code: DE

Ref legal event code: R119

Ref document number: 602007038201

Country of ref document: DE

PG25 Lapsed in a contracting state [announced via postgrant information from national office to epo]

Ref country code: DE

Free format text: LAPSE BECAUSE OF NON-PAYMENT OF DUE FEES

Effective date: 20230901