JP2005322008A - Intruder monitoring system and method - Google Patents

Intruder monitoring system and method Download PDF

Info

Publication number
JP2005322008A
JP2005322008A JP2004139290A JP2004139290A JP2005322008A JP 2005322008 A JP2005322008 A JP 2005322008A JP 2004139290 A JP2004139290 A JP 2004139290A JP 2004139290 A JP2004139290 A JP 2004139290A JP 2005322008 A JP2005322008 A JP 2005322008A
Authority
JP
Japan
Prior art keywords
intruder
detects
monitoring system
sensor unit
sensor
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Withdrawn
Application number
JP2004139290A
Other languages
Japanese (ja)
Inventor
Shigenori Horiuchi
Minoru Manjo
重則 堀内
実 萬城
Original Assignee
Hitachi Ltd
株式会社日立製作所
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Hitachi Ltd, 株式会社日立製作所 filed Critical Hitachi Ltd
Priority to JP2004139290A priority Critical patent/JP2005322008A/en
Publication of JP2005322008A publication Critical patent/JP2005322008A/en
Application status is Withdrawn legal-status Critical

Links

Images

Abstract

<P>PROBLEM TO BE SOLVED: To solve the problem that it is impossible for a conventional intruder monitoring device to easily discriminate an intruder, and that the installation place of the intruder monitoring device is restrained. <P>SOLUTION: Various wireless sensors adopted for a basic part using a power source built-in type compact wireless sensor are singularly or combined, and the rationality is confirmed. Also, a family wears on clothes or watches or the like in which ID tags for generating a radio signal common only to the members of the family are buried, and determines whether or not they are members in a site according to the presence of the ID radio tags. Thus, it is possible to easily, quickly and surely monitor any intruder without being restrained by the installation place. <P>COPYRIGHT: (C)2006,JPO&NCIPI

Description

  The present invention relates to an intruder monitoring system and an intruder monitoring method.

  Conventionally, systems for monitoring intruders have been used for crime prevention purposes. This intruder monitoring system, for example, as described in Japanese Patent Application Laid-Open No. 2003-51076, images and records a monitoring range using a monitoring camera, and outputs an image signal to a monitor as necessary. To do. Alternatively, a sensor line is formed using an optical sensor, and when this sensor line is blocked, it is determined that there is an intruder.

JP 2003-51076 A

  Since the conventional intruder monitoring apparatus uses a monitoring camera or the like, a blind spot occurs in the imaging range. Further, in order to distinguish an intruder using a surveillance camera, an image processing is required, resulting in an expensive system.

  In addition, when a sensor is used, a small animal may be erroneously detected as an intruder. Similarly, there is a case where the sensor turns on the illumination or generates an alarm due to a malfunction. Furthermore, since the conventional sensor needs to supply power from the outside, the installation location is limited, and there is a problem that installation such as laying a power cable is not easy.

  An object of the present invention is to provide an intruder monitoring system or an intruder monitoring method capable of detecting an intruder quickly and reliably without being restricted by an installation location.

  In order to achieve the above object, according to the present invention, a sensor unit detects a state, wirelessly transmits detection information, wirelessly transmits the wirelessly transmitted information via another sensor unit, and receives transmission information. Based on the received information, intruders are monitored.

  Preferably, it is an ultra-compact, built-in power supply type, uses an environment-resistant and highly reliable wireless sensor capable of ID authentication, and has a routing search function. You may comprise so that signal transmission may be permitted to a sensor (security box).

  According to the present invention, an intruder can be detected quickly and reliably without being restricted by the installation location.

The best mode for carrying out the present invention will be described with reference to the drawings. Figure 1 has been overall system illustrated, the pressure sensor unit 18A 1 ~18A 6 When through the gates 21 into the 13 (monitoring area by outdoor wireless sensor) site is buried in the ground. In addition, a vibration sensor unit 18 </ b> B that detects the entry / exit of a person or the like is installed at the entrance / exit 16 of the building 12. In this example, a specified person such as a family has an ID tag, but a reading unit 18E for reading the contents of the ID tag is installed at the doorway 16. Pressure sensor units 18C (18C 1 to 18C 10 ) are installed on the lattice 14 of the building window. A lattice 24 is attached to the window 15 and a magnetic sensor unit 18F (18F 1 to 18F 6 ) is installed. Each sensor unit transmits a wireless detection value to the security box 17. The security box 17 is connected to the service company 20 via the network 19 to exchange information.

  The configuration of each sensor unit will be described with reference to FIG.

As shown in FIG. 2A, the sensor network unit 250 transmits / receives data to / from an LSI (Large Scale Integrated Circuit) 251 and a security box 17 (see FIG. 1 and the like) that realize the central function. Antenna 260, a sensor 261 for inputting data from the outside, and a power source 262 such as a battery provided with a power generation element (solar power generation element, vibration power generation element, microwave power generation element, etc.). The LSI 251 is connected to an antenna 260, and is a wireless transmission / reception circuit 252 that controls transmission / reception of data, a controller circuit 253 that is a CPU (Central Processing Unit) that performs overall control of the LSI 251, and a non-volatile memory (for example, flash memory) that records identification information Identification information recording circuit 254 which is a memory), an A / D conversion circuit 255 which converts A / D (Analog / Digital) data input from the sensor 261, and a program memory 256 which is a ROM (Read Only Memory) which records a program. A work memory 257 which is a work RAM (Random Access Memory) when executing a program, a timer circuit 258 for generating a signal (clock signal) at a constant interval, and a power supplied from the power source 262 to a constant voltage In addition to making adjustments, the power is turned off when power is not needed to reduce power consumption. Composed of the power control circuit 259 for performing. The LSI 251 is not limited to one chip, and may be a board on which a plurality of chips are mounted or an MCP (MultiChip Package).

Here, as the sensor 261, the pressure sensor unit 18A (18A 1 to 18A 6 ) is a pressure sensor that detects a pressure at which it is possible to determine that a person has ridden, and in the vibration sensor unit 18B, a person passes through the entrance. The pressure sensor unit 18C (18C 1 to 18C 10 ) is a pressure sensor that can determine that a person has passed through the window, and the reading unit 18E It is a sensor that reads an ID tag, and the magnetic sensor unit 18F (18F 1 to 18F 6 ) is a magnetic sensor that can determine that a person has passed.

  As shown in FIG. 2B, the external appearance of the sensor network unit 250 is divided into an antenna 260, a sensor network unit 250 body, and a sensor 261. An LSI 251 and a power source 262 are provided on the sensor network unit 250 body. It has been.

The identification information recorded in the identification information recording circuit 254 includes product information such as an identification number and coil attributes (product type, plate width, plate thickness, material). In addition to this, since the sensor network terminal is attached to both ends of the coil, in order to confirm it, information indicating that each identification information is paired (for example, a specific part of the identification information) The data in the byte position is “0” and “1”).

  FIG. 3 shows a protocol for sending detection information of each sensor unit to the security box 17. The size of each sensor unit is a business card, a button for clothes, or smaller. The communication distance of each sensor unit is relatively short. For example, it is about 10 m, 50 m or 100 m, and if there is an obstacle, it will be shorter. Therefore, each sensor unit relays to each other up to the security box 17.

  3A shows a communication frame. The communication frame includes a frame recognition symbol 31, a transmission source address (corresponding to an ID (identification information) of each sensor unit) 32, a transmission destination address (of the security box 17). ID 33), routing 34, data 35 (sensor information), and frame check 36.

  For each sensor unit, the information shown in FIG. 3B is shared with the table. Corresponding to the unit ID 36, the sensor unit ID to which the next frame (packet) shown in FIG. 3A is to be communicated and the routing information to the security box 17 are shared. That is, when each sensor unit transmits a frame (packet), the source address 32 is assigned as the ID of its own unit, and the destination address 33 is assigned as the ID of the next communication unit. Routing information is read from the table shown in (b) (stored in the nonvolatile memory of each sensor unit) and attached to the frame (packet) (routing 34). Thereafter, the frame is transmitted. Each sensor unit, when receiving a frame (packet) from another sensor unit, attaches the source address as the destination address as the ID of its own unit, and based on the routing 34 information attached to the frame. It is attached as the next unit ID. Then send.

  The electronic circuit chip 401 is a small electronic circuit chip of about 0.3 mm square, for example, and has a thin, substantially rectangular parallelepiped shape. As shown in FIG. 2A, an electronic circuit 403 that functions as a memory and its reading circuit, a capacitor 404, and an antenna 405 are formed on a silicon chip 402. The memory includes a memory portion that cannot be rewritten. An extension ID is stored in the non-rewritable memory portion.

  The extension ID is stored in the non-rewritable memory portion of the electronic circuit 403 in advance before the manufacturer of the electronic circuit chip 401 ships the chip 401 to the manufacturer of the ID tag 400. . The non-rewritable memory portion of the electronic circuit 403 includes, in addition to a non-rewritable memory such as a ROM, for example, a rewritable memory such as an EEPROM in which a portion where an extension ID is written is set to be non-rewritable. Shall be included.

The electronic circuit 403, the capacitor 404, and the antenna 405 induce a current in the antenna 405 by radio waves given from the outside, and accumulate electric charge in the capacitor 404. Then, information stored in the electronic circuit 403 is transmitted from the antenna 405 using radio waves using electric power obtained from the electric charge accumulated in the capacitor 404. That is, by giving radio waves to the electronic circuit chip 401, the extension ID stored in the electronic circuit 403 of the electronic circuit chip 401 can be read out from the outside without contact.

  As described above, the detection values from the various wireless sensors 18 connected to the network 19 and the various wireless sensors 18 such as pressure, vibration, infrared, and magnetism that are installed in the site 11 and in the building 12 to detect the visitor are intruders. Each unit is hopped in the presence or absence, and sent to the security box 17 that controls the entire system.

  A visitor is detected when the detected value of the pressure sensor unit 18A in the monitoring area 13 by an outdoor sensor in which the pressure sensor units 18A are laid out at intervals where the wireless sensors can communicate with each other becomes equal to or greater than a certain value.

  The family wears clothes or a wristwatch embedded with an ID wireless 402 tag that generates a wireless signal common only to members of the family.

  Information obtained by reading the ID wireless tag 402 by the sensor unit 18E is determined by the security box 17, and it is determined whether or not a visitor has a predetermined ID wireless tag 402 to determine whether or not he / she is a member in the site.

  In addition, if a key having an ID wireless tag is distributed to a family, it can be determined when the doorway is opened or closed. When a visitor entering the premises tries to enter the building through the entrance / exit 16, whether or not the entrance / exit 16 has been opened with a key having the ID wireless tag 402, other keys such as a joint key and picking are used to open the key. Determine if you have operated.

  A case where a visitor entering the site tries to enter the building through a window will be described with reference to FIG.

The pressure sensor unit 18C (18C 1 to 18C 7 ) is a sensor that detects the presence force. In this case, an intruder can be detected because the strain stress has continued for a predetermined time or more and a predetermined time or more. In that case, intruder detection is performed when infrared rays are interrupted for a certain period of time and a certain pressure or more is abnormally applied for a certain period of time. It is preferable to use infrared rays that are sensitive to 30 ° C. to 40 ° C.

Information of the pressure sensor unit 18C (18C 1 to 18C 7 ) is relayed by the sensor unit 18D and given to the security box 17.

  A case where a visitor entering the site tries to enter the building through a window with a lattice will be described with reference to FIG.

A permanent magnet is attached to the lattice of the window, and the pressure sensor unit 18F (18F 1 to 18F 1) provided on the window frame
18F 5 ) detects the magnetic intensity, and detects the movement (removal) of the lattice when the magnetic flux density deviates from a predetermined value. Furthermore, it is possible to detect that an abnormality has occurred in the lattice by installing a vibration detection device and detecting vibrations generated by a driver or the like that occurs when the lattice is removed.

  In this case, an intruder can be detected when the vibration amplitude is greater than a predetermined value or the vibration spectrum is within a predetermined range.

  All of the above sensors are capable of wireless communication, have an ad hoc function that dynamically configures a LAN, and have a power source that is an independent power source system that is obtained from minute vibrations of buildings or the like. As a result, wiring can be eliminated, and higher power supply reliability can be realized.

  Thus, by adding an automatic routing search function to a wireless sensor, a wireless sensor having a new function can be installed without changing any existing equipment. As soon as there is a visitor from the gate, the presence of the visitor is identified and whether or not the visitor is a member of the site is also known. When the door of the building is opened and the door is opened, if it is performed by means other than those with an authentication wireless tag (for example, picking etc.), an alarm is sounded and a warning sound is sounded, and it is stored in a storage medium in the security box and a wireless line Report to the contracted service company via the network, etc., and report the contents to the registered mobile phone. (The video of the relevant department is not added by adding video shooting and transmission means. A pop-up screen pops up a caution screen on the registered mobile phone, which also displays the image content and emergency contact information (such as the police), so you can check the image content and make emergency contact if necessary. ).

  For intrusions from windows, when the lattice doors start to be removed, an abnormality is detected and an alarm is distributed to the relevant parties and accounting departments. By doing so, an intruder can be warned and patroled. Further, by installing a wireless pressure sensor with an authentication function on the floor or the ground where there is a risk of intrusion such as a window, it is possible to immediately detect that an outside member has approached and issue an alarm.

It is a figure which shows the structure of an intruder management system. It is detail drawing of a sensor unit. It is a figure explaining a communication protocol. It is detail drawing of an ID tag. It is a figure which shows the intrusion detection structure from a window. It is a figure which shows a lattice removal detection structure.

Explanation of symbols

DESCRIPTION OF SYMBOLS 11 ... Site, 12 ... Building, 13 ... Monitoring area by outdoor wireless sensor, 14 ... Window lattice, 15 ... Window, 16 ... Doorway, 17 ... Security box, 18A ... Pressure sensor unit, 18B ... Vibration sensor unit, 18C ... pressure sensor unit, 18D ... vibration sensor unit, 19 ... network, 110 ... service company.

Claims (11)

  1.   It has a plurality of sensor units that detect the state and wirelessly transmit the detection information, and wirelessly transmit the detection information of a certain sensor unit via another sensor unit, and intrude by receiving the transmission information An intruder monitoring system characterized by monitoring an intruder.
  2.   The intruder monitoring system according to claim 1, wherein at least one of the sensor units detects pressure, and detects a visitor based on information on the detected pressure.
  3.   2. The sensor unit according to claim 1, wherein at least one of the sensor units detects whether or not a visitor has an ID tag, and determines whether or not the visitor is a predetermined member based on the detection. Intruder monitoring system.
  4.   The intruder monitoring system according to claim 3, wherein at least one of the units detects vibration, and an attendee is detected when an amplitude value of the vibration becomes a predetermined value or more.
  5.   3. The intruder monitoring system according to claim 2, wherein it is determined whether or not an entrance / exit is opened with a key having an authentication wireless tag by detecting the ID tag.
  6.   The intruder according to claim 1, wherein at least one of the sensor units detects a pressure at a position below the window, and detects an intruder when a predetermined pressure is applied for a predetermined time. Monitoring system.
  7.   The intruder monitoring system according to claim 6, wherein intruder detection is performed when the vibration amplitude is equal to or greater than a predetermined value and the vibration spectrum is within a predetermined range.
  8.   The intruder monitoring system according to claim 1, wherein at least one of the sensor units detects a strain stress in a lower portion of the window, and detects an intruder when a strain stress greater than or equal to a predetermined time is generated.
  9.   2. The intrusion according to claim 1, wherein at least one of the sensor units detects an infrared sensor on the upper and lower sides or the left and right sides of the window, and detects an intruder by detecting infrared rays corresponding to 30 ° C. to 40 ° C. Monitoring system.
  10.   2. The intruder monitoring system according to claim 1, wherein at least one of the sensor units detects the magnetism of the window frame, and detects that the detected magnetic flux deviates from a predetermined value.
  11. A sensor unit detects a state and wirelessly transmits the detection information, transmits the wirelessly transmitted information via another sensor unit, receives the transmission information, and monitors an intruder based on the received information An intruder monitoring method characterized by:

JP2004139290A 2004-05-10 2004-05-10 Intruder monitoring system and method Withdrawn JP2005322008A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
JP2004139290A JP2005322008A (en) 2004-05-10 2004-05-10 Intruder monitoring system and method

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
JP2004139290A JP2005322008A (en) 2004-05-10 2004-05-10 Intruder monitoring system and method

Publications (1)

Publication Number Publication Date
JP2005322008A true JP2005322008A (en) 2005-11-17

Family

ID=35469249

Family Applications (1)

Application Number Title Priority Date Filing Date
JP2004139290A Withdrawn JP2005322008A (en) 2004-05-10 2004-05-10 Intruder monitoring system and method

Country Status (1)

Country Link
JP (1) JP2005322008A (en)

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2011512044A (en) * 2007-08-05 2011-04-14 マスコ コーポレイション Wireless energy self-sufficiency switch
JP2012178059A (en) * 2011-02-25 2012-09-13 Seikei Gakuen Crime-prevention system and crime-prevention program
JP2018166335A (en) * 2013-09-13 2018-10-25 コニカミノルタ株式会社 Notification system, display means, display method, and computer program

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2011512044A (en) * 2007-08-05 2011-04-14 マスコ コーポレイション Wireless energy self-sufficiency switch
US8786435B2 (en) 2007-08-05 2014-07-22 Enocean Gmbh Security system including wireless self-energizing switch
JP2012178059A (en) * 2011-02-25 2012-09-13 Seikei Gakuen Crime-prevention system and crime-prevention program
JP2018166335A (en) * 2013-09-13 2018-10-25 コニカミノルタ株式会社 Notification system, display means, display method, and computer program

Similar Documents

Publication Publication Date Title
US8120459B2 (en) Access authentication system and method using smart communicator
US20090042604A1 (en) Cellular home security system
CN100592104C (en) Wireless monitoring device
US20030201889A1 (en) Remote security condition detection and notifcation system
US20090121861A1 (en) Detecting, deterring security system
US20040036603A1 (en) Lighting security system
JP4142062B2 (en) Monitoring system and terminal device
EP0402539A1 (en) Detector units
ES2674923T3 (en) Procedure for monitoring tamper protection as well as monitoring system for a field device with tamper protection
US8752106B2 (en) Mesh networked video and sensor surveillance system and method for wireless mesh networked sensors
ES2677274T3 (en) Security monitoring with programmable mapping
US8456305B2 (en) Redundant security system
EP2911125B1 (en) Security monitoring arrangement and method using a common field of view
GB2371907A (en) Controlling the use of portable cameras
AU2007217477A1 (en) System and method for remotely attended delivery
US20070120978A1 (en) Intelligent Sensory Platform for Wireless Two-Way Sensory Surveillance
US20080169922A1 (en) Portable deterrent alarm system
WO2005088846A1 (en) Phone for unmanned guard and method of preventing crimes using the same
US20070289012A1 (en) Remotely controllable security system
US9679455B2 (en) Security monitoring with programmable mapping
JP2007249303A (en) Monitoring system, terminal device and main control device for the same, method for registering terminal device, and program
AU2005309892B2 (en) MEMS sensor unit for security applications
JP3709881B2 (en) Machine security system, control device, remote alarm, control method, control program, and computer-readable recording medium recording the control program
EP2008223A2 (en) Security alarm system
JP2005228197A (en) Monitoring system and method

Legal Events

Date Code Title Description
RD04 Notification of resignation of power of attorney

Effective date: 20060424

Free format text: JAPANESE INTERMEDIATE CODE: A7424

A621 Written request for application examination

Effective date: 20060620

Free format text: JAPANESE INTERMEDIATE CODE: A621

A131 Notification of reasons for refusal

Free format text: JAPANESE INTERMEDIATE CODE: A131

Effective date: 20090217

A977 Report on retrieval

Free format text: JAPANESE INTERMEDIATE CODE: A971007

Effective date: 20090219

A761 Written withdrawal of application

Free format text: JAPANESE INTERMEDIATE CODE: A761

Effective date: 20090415