JP2008294921A - Security monitoring system, security monitoring method, and information processing terminal - Google Patents

Security monitoring system, security monitoring method, and information processing terminal Download PDF

Info

Publication number
JP2008294921A
JP2008294921A JP2007140411A JP2007140411A JP2008294921A JP 2008294921 A JP2008294921 A JP 2008294921A JP 2007140411 A JP2007140411 A JP 2007140411A JP 2007140411 A JP2007140411 A JP 2007140411A JP 2008294921 A JP2008294921 A JP 2008294921A
Authority
JP
Japan
Prior art keywords
video
information
permission information
terminal
means
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
JP2007140411A
Other languages
Japanese (ja)
Other versions
JP4736096B2 (en
Inventor
Tomohiko Tanigawa
智彦 谷川
Original Assignee
Nec Soft Ltd
Necソフト株式会社
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Nec Soft Ltd, Necソフト株式会社 filed Critical Nec Soft Ltd
Priority to JP2007140411A priority Critical patent/JP4736096B2/en
Publication of JP2008294921A publication Critical patent/JP2008294921A/en
Application granted granted Critical
Publication of JP4736096B2 publication Critical patent/JP4736096B2/en
Application status is Active legal-status Critical
Anticipated expiration legal-status Critical

Links

Images

Abstract

<P>PROBLEM TO BE SOLVED: To attain a highly convenient security monitoring system and a security monitoring method by easing storage and retrieval of image data. <P>SOLUTION: The security monitoring system includes a monitoring camera and a video image monitoring system. The video monitoring system includes a video image monitoring terminal; an abnormality detection terminal; and an allowed information monitoring terminal. A monitoring camera, once photographing a monitoring object, transmits a video image via a network. The video image monitoring terminal includes monitoring object video image receiving means for receiving the video image; video image analyzing/storing means for dynamically storing the video image while analyzing the same; and video image analyzing/requiring means for extracting and transmitting a vehicle number or face feature data. The abnormality detection terminal includes allowed information transmission means for transmitting a vehicle number or face feature data; and collation result notification means for detecting and notifying suspicious individual when a collation result is not allowed. The allowed information monitoring terminal includes allowed information collation means for collating vehicle numbers or face feature data and collation result returning means for returning a collation result. <P>COPYRIGHT: (C)2009,JPO&INPIT

Description

  The present invention relates to a security monitoring system, a security monitoring method, and an information processing terminal, and more particularly to a highly convenient security monitoring system, a security monitoring method, and an information processing terminal using digitized video.

  In recent years, as social backgrounds, stalker incidents, walk-through incidents, incidents targeting infants, etc. have occurred frequently, and there is a great concern about the deterioration of security.

  Therefore, there is an increasing need for a system for ensuring security.

  Accordingly, attention has been paid to a home security system, a security monitoring system using a surveillance camera, and the like as a solution for ensuring security against this deterioration in security.

  However, the products realized at present have the following problems.

  There are many problems with the security monitoring system, such as those that maintain a home security system and those in which a supervisor goes around several times a day.

  These general home security systems are systems that detect unauthorized entry into a house and cannot prevent unauthorized entry.

  In addition, the patrol by the observer was limited to several times a day, and the criteria for checking depended on the person, so it was not accurate.

  Also, when monitoring for 24 hours, problems such as labor costs occur. There are also a combination of a surveillance system using a surveillance camera and a video analysis system, but the video surveillance system is a very expensive system and cannot be easily introduced.

Therefore, Patent Documents 1 and 2 describe security monitoring systems.
JP 2004-222036 A JP 11-252535 A

By the way, related security monitoring systems have had the following problems.
1) In the existing home security system, an unauthorized intrusion into a private house or the like is detected after an unauthorized intrusion. As a result, when it is detected, it has already been illegally invaded, and the degree of danger is very high.
2) All functions do not work unless the home security system is turned on. Normally, since it is turned on at night or when the house is absent, even if an unauthorized intrusion occurs during daily life during the day when it is not turned on, the unauthorized intrusion cannot be detected.
3) Some existing security management systems can perform image analysis, but it is necessary to construct a dedicated image analysis system, resulting in a very high system construction cost.
4) The monitoring criteria are not clear because monitoring is performed by humans.
5) Since monitoring by a supervisor is a work performed by a person, in order to perform monitoring at all locations for 24 hours and 365 days, a considerable labor cost is required, which is not realistic.
6) An existing monitoring system using RFID (radio frequency identification) is a system for tracking a person who has RFID. In this case, a person who does not have an RFID cannot be a monitoring target.
7) There are surveillance systems that use surveillance cameras and video analysis systems, but video analysis systems are very expensive and cannot be easily introduced by general companies.

Moreover, it is not at a level that can be easily introduced for general users.
8) Although there are surveillance systems using surveillance cameras and video analysis systems, there are many systems that target unspecified majority, and it is almost impossible to detect in real time.
9) As a personal security system, there is a product with an automatic notification function using a mobile terminal such as PHS (personal handy phone system), but there is no product that handles image information such as videos and still images at the same time, and an abnormality occurs. Sometimes no definitive evidence can be left.
10) No published patent document relating to a security surveillance system combining a surveillance camera and an image analysis system is found.

  Therefore, when the thing related to the security monitoring system described in Patent Documents 1 and 2 is examined, the type of image is not described at all.

  In addition to the problems pointed out above, there are problems such as the amount of data for storing video data, ease of search in video data, network availability, and the like.

  The present invention has been made in view of the above problems, and by using digitized video, it is easy to store and search video data, and it is a highly convenient security monitoring system, security monitoring method, and information processing. The purpose is to realize a terminal.

  A security monitoring system according to the present invention is a security monitoring system comprising: a monitoring camera that captures a monitoring target as a digitized video; and a video management system that receives and analyzes the video via a network. The video management system includes a video management terminal, an abnormality detection terminal, and a permission information management terminal. When the monitoring camera captures the monitoring target, the video management system transmits the video to the video management system via the network. A monitoring target video transmitting unit, wherein the video management terminal receives the video captured by the monitoring camera via the network; and the video received by the monitoring target video receiving unit. Video analysis and accumulation method that accumulates storable while dynamically analyzing whether the vehicle is human or human In the case of the vehicle, the video analysis and storage means analyzes the vehicle number, extracts the facial feature data in the case of the human, and uses the vehicle number or the facial feature data as the image analysis request. Image analysis requesting means for transmitting to the detection terminal, and the abnormality detection terminal sends the vehicle number or the facial feature data transmitted by the image analysis requesting means to the permission information management terminal as a permission information collation request. A suspicious person detection notification in which a suspicious person is detected when the verification result sent from the permission information management terminal is received by the verification result return means from the permission information management terminal and the verification result is not permitted. The permission information management terminal includes the vehicle number or the facial feature data transmitted by the permission information transmitting means. A permission information collating means for collating the permission information registered, the result collation are collated by the permission information collation means, characterized in that it comprises a said collation result returning means for returning to the abnormality detecting terminal.

  A security monitoring method according to the present invention is a security monitoring method in a security monitoring system including a monitoring camera that captures a monitoring target as a digitized video and a video management system that receives and analyzes the video via a network. The video management system includes a video management terminal, an abnormality detection terminal, and a permission information management terminal. When the monitoring camera captures the monitoring target, the video management system includes the video management system. A monitoring target video transmission step for transmitting to the monitoring target video receiving step for the video management terminal to receive the video taken by the monitoring camera via the network; and the video management terminal for the monitoring The video received in the target video receiving step is dynamically a vehicle or a person A video analysis accumulation step for storable accumulation while analyzing whether or not the video management terminal analyzes a vehicle number in the case of the vehicle and a face in the case of a human being in the video analysis accumulation step. Image analysis request step for extracting the feature data of the vehicle and transmitting the vehicle feature data or the feature data of the face to the abnormality detection terminal as an image analysis request, and the abnormality detection terminal transmitted in the image analysis request step A permission information transmitting step of transmitting the vehicle number or the feature data of the face to the permission information management terminal as a permission information collation request; and the vehicle information or the vehicle information transmitted in the permission information transmitting step by the permission information management terminal A permission information matching step for matching facial feature data with permission information registered in the permission information management terminal, and the permission The information management terminal returns the collation result collated in the permission information collation step to the abnormality detection terminal, and the abnormality detection terminal receives the collation result returned in the collation result return step. And when the said collation result is not permitted, it is provided with the collation result notification step which performs the suspicious person detection notification which detected the suspicious person.

  The information processing terminal according to the present invention can store a video receiving means for receiving a video via a network and the video received by the video receiving means while dynamically analyzing whether the video is a vehicle or a human being In the case of the vehicle, a vehicle number is analyzed, and in the case of the human being, facial feature data is extracted, and the vehicle number or the facial feature Image analysis requesting means for transmitting data to the outside as an image analysis request is provided.

  The information processing terminal according to the present invention receives the vehicle number or facial feature data transmitted from the outside, permission information transmitting means for transmitting to the outside as a permission information collation request, and the collation result returned from the outside, In the case where the collation result is not permitted, a collation result notification means for performing a suspicious person detection notification for detecting a suspicious person is provided.

  An information processing terminal according to the present invention includes a permission information collating unit that collates the transmitted vehicle number or facial feature data with registered permission information, and a collation result collated by the permission information collating unit. And a collation result transmitting means for transmitting to.

  The video management program according to the present invention can store video while receiving video through a network and analyzing whether the video received by the video receiving procedure is a vehicle or a human being dynamically. In the case of the vehicle, the vehicle number is analyzed, and in the case of the human, the facial feature data is extracted, and the vehicle number or the facial feature is extracted. An image analysis request procedure for transmitting data as an image analysis request to the outside is executed by a computer.

  The abnormality detection program according to the present invention receives a vehicle information or facial feature data transmitted from the outside, a permission information transmission procedure for transmitting to the outside as a permission information verification request, and a verification result returned from the outside, When the collation result is not permitted, the computer is caused to execute a collation result notification procedure for performing a suspicious person detection notification for detecting a suspicious person.

  The permission information management program according to the present invention includes a permission information matching procedure for matching the transmitted vehicle number or facial feature data with registered permission information, and a matching result verified by the permission information matching procedure. And causing the computer to execute a verification result transmission procedure for transmission to the outside.

  According to the present invention, the security monitoring system installs a monitoring camera that shoots a monitored object as a digitized video in a video management system environment connected to a network, and thereby uses a high security image analysis technology. A monitoring system, a security monitoring method, and an information processing terminal can be realized.

  In the security monitoring system according to the present invention, a monitoring camera is installed on a target to be monitored for entering / exiting a building, factory, town, or the like.

  The video from the surveillance camera is sent to the video management system through a network such as the Internet, and the vehicles and humans entering and exiting are dynamically identified by the image analysis system in the video management system.

  About a vehicle, individual identification is performed by identifying with a vehicle number in an image analysis system.

  For humans, the human face is recognized by the face recognition function of the video management system.

  In addition, this security monitoring system registers face information and the like in advance in the permission information management terminal regarding the vehicle number of the vehicle permitted to enter and exit and the person permitted to enter and exit.

  In addition, this security monitoring system performs image analysis dynamically in the image analysis system included in the video management system, compares the image analysis information with the information in the permission information management terminal, and enters and exits vehicles, humans, etc. The system can automatically determine.

  The video management system is performed by a company that operates the system, and the system operation company publishes the service on the Internet or the like.

  As a result, in this security monitoring system, the video management system automatically detects and discriminates vehicles or people who are not allowed to enter or exit, and records information, reports to the administrator, reports to the police / security company, etc. A security monitoring system capable of taking appropriate measures can be provided.

  In the embodiment described later, the video management system is formed by including a video management terminal, an abnormality detection terminal, and a permission information management terminal, and also forms an image analysis system.

  Therefore, this security monitoring system is formed by providing a video management system that forms an image analysis system with a monitoring camera.

  In addition, the form of a present Example is not limited to these, You may make it form the video management system and image analysis system provided with another structure.

  The image analysis system is realized by a program, but is not limited to this, and may be provided with necessary hardware as appropriate.

  Furthermore, in the present invention, since an ASP (application service provider) type security monitoring system utilizing a broadband environment is formed, an advanced security monitoring system using an expensive image analysis system can be easily used by general users. It is possible to introduce.

  In addition, by using a method using a mobile camera, which will be described in Example 2 described later, it is possible to provide a service that further improves personal security.

(1) Security Monitoring System in Embodiment 1 (1-1) Configuration of Security Monitoring System First, the security monitoring system in Embodiment 1 according to the present invention will be described in detail with reference to FIG.

  Referring to FIG. 1, the security monitoring system according to the first embodiment includes a monitoring camera 10, a video management terminal 20, an abnormality detection terminal 30, a permission information management terminal 40, a service disclosure terminal 50, and a user terminal 60. I have.

  These are connected to a network 1000 such as an intranet or the Internet.

  In addition, the video management terminal 20, the permission information management terminal 40, the abnormality detection terminal 30, the service disclosure terminal 50, and the user terminal 60 operate by program control, and are mutually connected via a network 1000 such as the Internet or an intranet. It is connected.

  The surveillance camera 10 is a surveillance camera capable of distributing video via the network 1000, and allows the captured video to flow through the network 1000 in real time as digitized image data (that is, digitized video). It has a function that can.

  In addition, in the case of a surveillance camera with an operation object detection device, video can be distributed only when a suspicious operation object is detected.

  The video management terminal 20 is an information processing apparatus such as a workstation / server installed in the video management system, which has a function of storing image data distributed from the monitoring camera 10.

  The video management terminal 20 has a function of dynamically analyzing image data distributed from the monitoring camera 10.

  The abnormality detection terminal 30 is an information processing apparatus such as a workstation / server, and analyzes information transmitted from the video management terminal 20 and information stored in the permission information management terminal 40 to detect entry of a suspicious person. It has a function to do.

  The permission information management terminal 40 is an information processing apparatus such as a workstation / server, and has a function of storing information for determining permission of access.

  In addition, when an abnormality such as a suspicious person's intrusion is detected, a function of automatically reporting to an administrator or the like is provided.

  The service public terminal 50 is an information processing apparatus such as a workstation server, and transmits service information to general users who use the security management service through a Web server or the like.

  And it provides the function which provides the function which receives a use application with respect to the user who desires service provision.

The user terminal 60 is an information processing apparatus such as a personal computer, and has a function of collecting and displaying information on a Web server or the like that is disclosed on the network 1000 using a Web browser or the like.
(1-2) Operation of Security Monitoring System Next, the operation of the security monitoring system according to the first embodiment will be described in detail with reference to FIGS.
(1-2-1) Overall Operation of Security Monitoring System First, the overall operation of the security monitoring system will be described with reference to FIG.

  First, referring to the flowchart showing the overall operation described in FIG. 2, the video shot by the surveillance camera 10 is transmitted as a digital image to the video management terminal 20 via the network 1000 (step A1).

  The video management terminal 20 makes full use of video analysis technology to identify whether the operation target photographed in the digital image is a vehicle or a human.

  Thereby, the video management terminal 20 receives the digital video transmitted from the surveillance camera 10 as a digital image and analyzes the digital image (step A2).

  Here, if the object identified by the analysis is a vehicle, the vehicle number is analyzed. On the other hand, if the object identified is a human, the face recognition technology is used. Feature data is extracted and transmitted to the abnormality detection terminal 30 as an image analysis request (step A3).

  The anomaly detection terminal 30 that has received the image analysis request analyzes the vehicle number if the identified item is a vehicle, and on the other hand, if the identified item is a human, the feature of the face is analyzed. Data is transmitted to the permission information management terminal 40 as a permission information collation request (step A4).

  The permission information management terminal 40 that has received the permission information collation request collates with the registered permission information (step A5).

  And the permission information management terminal 40 transmits a collation result to the abnormality detection terminal 30 (step A6).

  The abnormality detection terminal 30 that has received the collation result confirms the collation result (step A7).

If the collation result is OK, nothing is done, but if it is not OK, a suspicious person detection notification is sent using the set method (step A8).
(1-2-2) Operation of Video Management Terminal in Security Monitoring System Next, details of the operation of the video management terminal 20 will be described using the flowchart showing the operation of the video management terminal 20 shown in FIG.

  The surveillance camera 10 converts the captured and digitized video into image data as a digital image and transmits it to the video management terminal 20 via the network 1000 (step B1).

  The video management terminal 20 makes full use of video analysis technology to identify whether the operation target photographed in the digital image is a vehicle or a human.

  Thereby, the video management terminal 20 receives the image data transmitted from the monitoring camera 10 as a digital image and analyzes the digital image (step B2).

  If the vehicle identified and identified is a vehicle (step B3), the vehicle number is analyzed, and information on the vehicle number is transmitted to the abnormality detection terminal 30 as an abnormality analysis request (step B4). ).

  On the other hand, when the identified person is a human (step B5), facial feature data is extracted using the face recognition technology.

  Then, the video management terminal 20 transmits the extracted facial feature data to the abnormality detection terminal 30 as an abnormality analysis request (step B6).

The above process is repeatedly executed (step B7).
(1-2-3) Operation of the Anomaly Detection Terminal in the Security Monitoring System Next, details of the operation of the anomaly detection terminal 30 will be described using the flowchart showing the operation of the anomaly detection terminal 30 described in FIG.

  The abnormality detection terminal 30 receives the image analysis request from the video management terminal 20 (step C1).

  Here, if the one identified by the video management terminal 20 is a vehicle, the vehicle number is transmitted to the permission information management terminal 40. On the other hand, if the identified one is a human, The feature data is transmitted to the permission information management terminal 40 as a permission information collation request (step C2).

  And the collation result from the permission information management terminal 40 is received (step C3).

  The abnormality detection terminal 30 that has received the collation result confirms the collation result (step C4).

  Here, if the collation result is OK, nothing is done, but if it is not OK, the surveillance camera 10 uses the method already set in the installed user information, and the suspicious person The suspicious person who has detected is notified (step C5).

Then, the above process is repeatedly executed (step C6).
(1-2-4) Operation of permission information management terminal in security monitoring system Next, details of the operation of the permission information management terminal 40 will be described using the flowchart showing the operation of the permission information management terminal 40 described in FIG. explain.

  The permission information management terminal 40 checks whether or not the received request is a permission information registration request (step D1).

  If it is a permission information registration request, the following information is registered as user information (step D2).

  When the registration information is vehicle information, the vehicle number is registered in association with the user number sent as the user information.

  If the registration information is human information, the facial image analysis information is registered in association with the user number sent as the user information.

  Next, the permission information management terminal 40 checks whether the received request is a permission information collation request (step D3).

  If the request is a permission information collation request, the user number sent as the collation information is used as a search key to collate with the registered permission information registered in association with the user number. (Step D4).

  Then, the verification result is returned to the abnormality detection terminal 30 (step D5).

Then, the above process is repeatedly executed (step D6).
(1-2-5) Service Providing Procedure in Security Monitoring System Next, the user who receives the security management service provided by the security monitoring system using the flowchart showing the operation of the security monitoring system described in FIG. The procedure for making the application and the operation related to the preparation before receiving the service will be described.

  First, the user operates the user terminal 60 to access the service providing web page published by the service publication terminal 50 using a web browser or the like (step E1).

  The service public terminal 50 transmits the security management service content to the user terminal 50 (step E2).

  The user confirms the displayed service content, selects a service to be provided, and transmits a service start request to the service disclosure terminal 50 (step E3).

  When receiving the service start request, the service public terminal 50 performs user registration and assigns a user number. And it sets so that the applied service can be provided (step E4).

  Next, the user installs the monitoring camera 10 (step E5). Then, the video management terminal 20 is set as the video distribution destination of the monitoring camera 10.

  Then, as information for identifying the surveillance camera 10, an IP (internet protocol) address of the camera is registered in the user terminal 60, and a notification means such as a telephone number and an e-mail address is registered as an automatic notification means (step E6). .

  When the service disclosure terminal 50 receives the monitoring camera information, the service disclosure terminal 50 transmits the user number, the IP address of the monitoring camera, etc. and the automatic notification means information to the video management terminal 20 as user information (step E7).

  When receiving the user information, the video management terminal 20 registers the user number, the IP address of the monitoring camera, etc., and the automatic notification means information as user information (step E8).

  Next, the user registers the vehicle number and human face image information as permission information (step E9).

  The service disclosure terminal 50 transmits the user number and the vehicle number or the face image data and the automatic notification means to the permission information management terminal 40 as a permission information registration request (step E10).

The permission information management terminal 40 registers the user number and the vehicle number or the face image data as a permission information registration request (step E11).
(1-3) Effect of Security Monitoring System in Embodiment 1 According to this embodiment, the monitoring target is digitally installed in an environment that can be connected to the network without the user purchasing expensive video analysis equipment individually. A security surveillance system that uses advanced image analysis technology can be realized simply by installing a surveillance camera that captures images that have been made into an image.

  In this case, the network may be an environment that can be connected to the Internet.

  In addition, since the service provider can recover the cost of expensive video analysis equipment as a service to an unspecified number of users, this security monitoring system also has the merit of the security management service provider Very big.

  In addition, video taken by a surveillance camera is attracting a great deal of attention as a very useful tool for crime prevention and in the event of a crime.

  Therefore, by spreading the use of this system to buildings, schools, communities, and society, it can contribute to the improvement of the security level of the installed area and can be greatly expected to maintain security.

  Further, in this embodiment, since the crime deterrent effect is generated only by appealing that the surveillance camera is monitoring, a secondary effect can be expected.

(2) Security Monitoring System in Embodiment 2 (2-1) Configuration of Security Monitoring System Next, the security monitoring system in Embodiment 2 of the present invention will be described in detail below.

The present embodiment is different from the above-described first embodiment in that the surveillance camera 10 is not fixedly installed, but a camera that can be carried around by a person as a personal security measure.
(2-2) Operation of Security Monitoring System Next, the operation of this embodiment will be described in detail.

  As countermeasures against stalker incidents, street magic incidents, incidents targeting infants, etc., how to ensure security when individuals go out is an important countermeasure.

  Therefore, as a target of the security monitoring system, a mobile camera that can be carried by an individual is targeted as a camera that acquires digital video.

  As a mobile camera, it is also possible to send moving images and still images using the camera of a mobile phone.

  In order to improve the security level, it is also effective to show that monitoring is being performed to a third party. By wearing a dedicated mobile camera, images can be transmitted from there to a network such as the Internet. You may make it do.

(3) Security Monitoring System in Embodiment 3 (3-1) Configuration of Security Monitoring System Next, the security monitoring system in Embodiment 3 of the present invention will be described in detail below.

This embodiment is different from the above-described embodiment in that the suspicious person information management terminal is further used.
(3-2) Operation of Security Monitoring System Next, the operation of this embodiment will be described in detail.

  In the above-described embodiment, comparison and verification are performed with information to be permitted registered in the permission information management terminal 40, but in this embodiment, criminal information, suspicious vehicle information, and the like are further held as suspicious person information. An image check request is also sent to the suspicious person information management terminal.

  Thereby, a more dangerous suspicious person can be detected.

  Normally, such suspicious person information seems to be held by an organization such as the police, and since it also becomes personal information and confidential information, the content of the information is not disclosed to the public.

  However, it is also possible if an institution such as the police discloses suspicious person information on the Internet so that the suspicious person information terminal holding the suspicious person information can be collated from another system.

(4) Security Monitoring System in Example 4 (4-1) Configuration of Security Monitoring System Next, the security monitoring system in Example 4 according to the present invention will be described in detail below.

The present embodiment is different from the above-described embodiment in that an image analysis system uses a function of notifying detection (or identification) of a photographed operation object but notifying that there is no movement.
(4-2) Operation of Security Monitoring System Next, the operation of this embodiment will be described in detail.

  In the first to third embodiments described above, the captured operation target is detected (or identified) from the video information transmitted from the monitoring camera. However, in this embodiment, the monitoring camera is not an operation target. Image analysis technology is used to detect (or identify) that there is no movement in the video captured by the camera.

  This makes it possible to detect (or identify) when something that must be moving normally stops, and can be used for remote monitoring in the factory, monitoring of the elderly living alone, monitoring of children at daycare centers, etc. can do.

  As a method for providing a remote monitoring function, if the video stored in the video management terminal 20 can be referred to from a network-connectable PC such as the user terminal 60 or a mobile phone, the video can be confirmed directly. It can also provide services that can be done.

It is a block diagram which shows the structure of the security monitoring system by Example 1 in this invention. It is a flowchart which shows the whole operation | movement by Example 1 in this invention. It is a flowchart which shows operation | movement of the video management terminal by Example 1 in this invention. It is a flowchart which shows operation | movement of the abnormality detection terminal by Example 1 in this invention. It is a flowchart which shows operation | movement of the permission information management terminal by Example 1 in this invention. It is a flowchart which shows the service provision procedure of the security monitoring system by Example 1 in this invention.

Explanation of symbols

DESCRIPTION OF SYMBOLS 10 Surveillance camera 20 Video management terminal 30 Abnormality detection terminal 40 Permit information management terminal 50 Service public terminal 60 User terminal 100 Network

Claims (16)

  1. A security surveillance system comprising a surveillance camera that captures a surveillance object as a digitized video, and a video management system that receives and analyzes the video over a network,
    The video management system includes:
    A video management terminal, an abnormality detection terminal, and a permission information management terminal;
    The surveillance camera is
    When shooting the monitoring target, the monitoring target video transmission means for transmitting the video to the video management system via the network,
    The video management terminal
    Monitoring target video receiving means for receiving the video taken by the monitoring camera via the network;
    Video analysis storage means for storing the video received by the monitoring target video reception means in a storable manner while dynamically analyzing whether the video is a vehicle or a human;
    In the case of the vehicle, the video analysis and storage means analyzes a vehicle number, extracts the facial feature data in the case of the human, and uses the vehicle number or the facial feature data as an image analysis request to detect the abnormality. An image analysis requesting means for transmitting to
    The abnormality detection terminal is
    Permission information transmission means for transmitting the vehicle number or the facial feature data transmitted by the image analysis request means to the permission information management terminal as a permission information collation request;
    A verification result notification means for receiving a verification result returned by the verification result return means from the permission information management terminal and performing a suspicious person detection notification for detecting a suspicious person when the verification result is not permitted; Prepared,
    The permission information management terminal
    Permission information collating means for collating the vehicle number or the facial feature data transmitted by the permission information transmitting means with registered permission information;
    The security monitoring system, comprising: the collation result returning means for returning the collation result collated by the permission information collating means to the abnormality detecting terminal.
  2. A user terminal that receives input from the user, and a service public terminal that provides a service to the user,
    The user terminal is
    Service start request transmitting means for selecting the service to be provided to the service public terminal and transmitting a service start request;
    Predetermined notification information set by the user, predetermined notification information transmitting means for transmitting to the service public terminal,
    User information transmission means for transmitting user information set by the user to the service public terminal,
    The service public terminal is
    Upon receiving the service start request from the user terminal, service provision setting means for setting the corresponding service to be able to be provided;
    Predetermined notification information receiving means for receiving the predetermined notification information from the user terminal by the predetermined notification information transmitting means;
    Predetermined notification information transfer means for transferring the predetermined notification information to the video management terminal as user information;
    User information receiving means for receiving the user information from the user terminal by the user information transmitting means;
    User information transfer means for transferring the user information as permission information to the permission information management terminal,
    The video management terminal
    Receiving the predetermined notification information transferred by the predetermined notification information transfer means, further comprising a predetermined notification information registration means for registering the predetermined notification information as user information,
    The permission information management terminal
    The security monitoring system according to claim 1, further comprising user information registration means for receiving the user information transferred by the user information transfer means and registering the user information as permission information.
  3. The security monitoring system according to claim 1, wherein the network is a network connectable to the Internet.
  4. The surveillance camera is a portable camera,
    The security monitoring system according to any one of claims 1 to 3, wherein the video is photographed as a moving image or a still image, and the outside is perceived to be monitoring.
  5. A suspicious person information management terminal that holds at least one of criminal information or suspicious vehicle information as suspicious person information;
    The suspicious person information management terminal is
    The security monitoring system according to any one of claims 1 to 4, wherein a suspicious person or a suspicious vehicle is detected from the video based on the suspicious person information.
  6. The video management terminal
    The security monitoring system according to any one of claims 1 to 5, wherein a dynamic change is detected in the video to be monitored.
  7. A security monitoring method in a security monitoring system comprising: a surveillance camera that captures a surveillance object as a digitized video; and a video management system that receives and analyzes the video via a network,
    The video management system includes:
    A video management terminal, an abnormality detection terminal, and a permission information management terminal;
    When the monitoring camera captures the monitoring target, the monitoring camera includes a monitoring target video transmission step of transmitting the video to the video management system via the network;
    A monitoring target video receiving step in which the video management terminal receives the video taken by the monitoring camera via the network;
    A video analysis accumulation step in which the video management terminal accumulates the video received in the monitoring target video reception step in a storable manner while dynamically analyzing whether the video is a vehicle or a human;
    In the video analysis and accumulation step, the video management terminal analyzes a vehicle number in the case of the vehicle, extracts facial feature data in the case of the human, and images the vehicle number or the facial feature data. An image analysis requesting step for transmitting to the abnormality detection terminal as an analysis request;
    A permission information transmission step in which the abnormality detection terminal transmits the vehicle number or the facial feature data transmitted in the image analysis request step to the permission information management terminal as a permission information matching request;
    A permission information matching step in which the permission information management terminal matches the vehicle number or the facial feature data transmitted in the permission information transmission step with permission information registered in the permission information management terminal;
    The authorization information management terminal returns a collation result collated in the authorization information collation step to the abnormality detection terminal.
    The abnormality detection terminal receives the verification result returned in the verification result return step, and when the verification result is not permitted, a verification result notification step of performing a suspicious person detection notification detecting a suspicious person When,
    A security monitoring method comprising:
  8. Video receiving means for receiving video over a network;
    Video analysis storage means for storing the video received by the video reception means in a storable manner while dynamically analyzing whether it is a vehicle or a human;
    In the case of the vehicle, the video analysis / accumulation means analyzes the vehicle number, extracts the facial feature data in the case of the human, and transmits the vehicle number or the facial feature data to the outside as an image analysis request. Image analysis requesting means,
    An information processing terminal comprising:
  9. Permission information transmitting means for transmitting vehicle number or facial feature data transmitted from the outside to the outside as a permission information collation request;
    A collation result notifying means for receiving a suspicious person detection notification when a collation result returned from outside is received and the collation result is not permitted;
    An information processing terminal comprising:
  10. Permission information collating means for collating the transmitted vehicle number or facial feature data with registered permission information;
    Collation result transmitting means for transmitting the collation result collated by the permission information collating means to the outside;
    An information processing terminal comprising:
  11. A video management method in an information processing terminal,
    A video receiving step for receiving video via a network;
    A video analysis storage step for storing the video received in the video reception step in a storable manner while dynamically analyzing whether it is a vehicle or a human;
    In the image analysis and accumulation step, the vehicle number is analyzed in the case of the vehicle, the facial feature data is extracted in the case of the human, and the vehicle number or the facial feature data is transmitted to the outside as an image analysis request. An image analysis requesting step,
    A video management method comprising:
  12. An abnormality detection method in an information processing terminal,
    Permission information transmission step of transmitting vehicle number or facial feature data transmitted from outside as permission information matching request;
    A collation result notifying step for receiving a suspicious person detection notification when a collation result returned from outside is received and the collation result is not permitted;
    An abnormality detection method comprising:
  13. A method for managing permission information in an information processing terminal,
    A permission information collation step for collating the transmitted vehicle number or facial feature data with the registered permission information;
    A verification result transmission step of transmitting the verification result verified in the permission information verification step to the outside;
    A permission information management method comprising:
  14. A video reception procedure for receiving video over a network;
    A video analysis storage procedure for storing the video received by the video reception procedure in a storable manner while dynamically analyzing whether it is a vehicle or a human;
    In the video analysis and accumulation procedure, the vehicle number is analyzed in the case of the vehicle, the facial feature data is extracted in the case of the human, and the vehicle number or the facial feature data is transmitted to the outside as an image analysis request. Image analysis request procedure to
    A video management program for causing a computer to execute the program.
  15. Permission information transmission procedure for transmitting vehicle number or facial feature data transmitted from the outside to the outside as a permission information matching request;
    When a verification result returned from the outside is received and the verification result is not permitted, a verification result notification procedure for performing a suspicious person detection notification for detecting a suspicious person;
    An abnormality detection program characterized by causing a computer to execute.
  16. A permission information matching procedure for matching the transmitted vehicle number or facial feature data with registered permission information;
    A verification result transmission procedure for transmitting the verification result verified by the permission information verification procedure to the outside;
    A permission information management program for causing a computer to execute.
JP2007140411A 2007-05-28 2007-05-28 Security monitoring system, security monitoring method, and information processing terminal Active JP4736096B2 (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
JP2007140411A JP4736096B2 (en) 2007-05-28 2007-05-28 Security monitoring system, security monitoring method, and information processing terminal

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
JP2007140411A JP4736096B2 (en) 2007-05-28 2007-05-28 Security monitoring system, security monitoring method, and information processing terminal

Publications (2)

Publication Number Publication Date
JP2008294921A true JP2008294921A (en) 2008-12-04
JP4736096B2 JP4736096B2 (en) 2011-07-27

Family

ID=40169178

Family Applications (1)

Application Number Title Priority Date Filing Date
JP2007140411A Active JP4736096B2 (en) 2007-05-28 2007-05-28 Security monitoring system, security monitoring method, and information processing terminal

Country Status (1)

Country Link
JP (1) JP4736096B2 (en)

Cited By (21)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US8094026B1 (en) 2011-05-02 2012-01-10 Robert M Green Organized retail crime detection security system and method
US8115623B1 (en) 2011-03-28 2012-02-14 Robert M Green Method and system for hand basket theft detection
WO2014050518A1 (en) * 2012-09-28 2014-04-03 日本電気株式会社 Information processing device, information processing method, and information processing program
CN105491354A (en) * 2016-01-18 2016-04-13 广州爱九游信息技术有限公司 Video monitoring method and video monitoring platform
US9460616B1 (en) 2015-12-16 2016-10-04 International Business Machines Corporation Management of mobile objects and service platform for mobile objects
US9467839B1 (en) 2015-12-16 2016-10-11 International Business Machines Corporation Management of dynamic events and moving objects
US9497591B1 (en) 2015-06-19 2016-11-15 International Business Machines Corporation Management of moving objects
US9513134B1 (en) 2015-12-16 2016-12-06 International Business Machines Corporation Management of evacuation with mobile objects
US9562775B2 (en) 2015-06-19 2017-02-07 International Business Machines Corporation Geographic space management
US9578093B1 (en) 2015-12-16 2017-02-21 International Business Machines Corporation Geographic space management
US9576482B2 (en) 2015-06-19 2017-02-21 International Business Machines Corporation Management of moving objects
US9638533B2 (en) 2015-06-19 2017-05-02 International Business Machines Corporation Geographic space management
US9792288B2 (en) 2015-06-19 2017-10-17 International Business Machines Corporation Geographic space management
US9805598B2 (en) 2015-12-16 2017-10-31 International Business Machines Corporation Management of mobile objects
US9865163B2 (en) 2015-12-16 2018-01-09 International Business Machines Corporation Management of mobile objects
CN108055502A (en) * 2017-11-30 2018-05-18 南京南邮信息产业技术研究院有限公司 Urban public security based on NB-IoT is quickly deployed to ensure effective monitoring and control of illegal activities system and method
US10169403B2 (en) 2015-06-19 2019-01-01 International Business Machines Corporation Geographic space management
US10168424B1 (en) 2017-06-21 2019-01-01 International Business Machines Corporation Management of mobile objects
US10339810B2 (en) 2017-06-21 2019-07-02 International Business Machines Corporation Management of mobile objects
US10504368B2 (en) 2017-06-21 2019-12-10 International Business Machines Corporation Management of mobile objects
US10535266B2 (en) 2017-06-21 2020-01-14 International Business Machines Corporation Management of mobile objects

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103916626A (en) * 2013-01-05 2014-07-09 中兴通讯股份有限公司 Monitoring video information providing method and device and video monitoring system

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2000036088A (en) * 1996-02-24 2000-02-02 Masanobu Kujirada Portable security system
JP2000331209A (en) * 1999-05-25 2000-11-30 Omron Corp Passage controller
JP2003333201A (en) * 2002-05-14 2003-11-21 Victor Co Of Japan Ltd Monitor video supply method used for remote monitor system
JP2005136978A (en) * 2003-10-08 2005-05-26 Oojisu Soken:Kk Image photographing system, processor, computer program, and recording medium
JP2006260524A (en) * 2005-02-16 2006-09-28 Nonomura Denshi Giken:Kk Care reporting system

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2000036088A (en) * 1996-02-24 2000-02-02 Masanobu Kujirada Portable security system
JP2000331209A (en) * 1999-05-25 2000-11-30 Omron Corp Passage controller
JP2003333201A (en) * 2002-05-14 2003-11-21 Victor Co Of Japan Ltd Monitor video supply method used for remote monitor system
JP2005136978A (en) * 2003-10-08 2005-05-26 Oojisu Soken:Kk Image photographing system, processor, computer program, and recording medium
JP2006260524A (en) * 2005-02-16 2006-09-28 Nonomura Denshi Giken:Kk Care reporting system

Cited By (43)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US8115623B1 (en) 2011-03-28 2012-02-14 Robert M Green Method and system for hand basket theft detection
US8094026B1 (en) 2011-05-02 2012-01-10 Robert M Green Organized retail crime detection security system and method
US10248868B2 (en) 2012-09-28 2019-04-02 Nec Corporation Information processing apparatus, information processing method, and information processing program
WO2014050518A1 (en) * 2012-09-28 2014-04-03 日本電気株式会社 Information processing device, information processing method, and information processing program
US9875247B2 (en) 2015-06-19 2018-01-23 International Business Machines Corporation Geographic space management
US10262529B2 (en) 2015-06-19 2019-04-16 International Business Machines Corporation Management of moving objects
US9497591B1 (en) 2015-06-19 2016-11-15 International Business Machines Corporation Management of moving objects
US9497590B1 (en) 2015-06-19 2016-11-15 International Business Machines Corporation Management of moving objects
US10215570B2 (en) 2015-06-19 2019-02-26 International Business Machines Corporation Geographic space management
US9538327B1 (en) 2015-06-19 2017-01-03 International Business Machines Corporation Management of moving objects
US10169400B2 (en) 2015-06-19 2019-01-01 International Business Machines Corporation Geographic space management
US10169402B2 (en) 2015-06-19 2019-01-01 International Business Machines Corporation Geographic space management
US9576482B2 (en) 2015-06-19 2017-02-21 International Business Machines Corporation Management of moving objects
US9584977B2 (en) 2015-06-19 2017-02-28 International Business Machines Corporation Management of moving objects
US9638533B2 (en) 2015-06-19 2017-05-02 International Business Machines Corporation Geographic space management
US9639537B2 (en) 2015-06-19 2017-05-02 International Business Machines Corporation Geographic space management
US9646493B2 (en) 2015-06-19 2017-05-09 International Business Machines Corporation Management of moving objects
US9646402B2 (en) 2015-06-19 2017-05-09 International Business Machines Corporation Geographic space management
US9659016B2 (en) 2015-06-19 2017-05-23 International Business Machines Corporation Geographic space management
US10019446B2 (en) 2015-06-19 2018-07-10 International Business Machines Corporation Geographic space management
US9784584B2 (en) 2015-06-19 2017-10-10 International Business Machines Corporation Geographic space management
US9792288B2 (en) 2015-06-19 2017-10-17 International Business Machines Corporation Geographic space management
US10001377B2 (en) 2015-06-19 2018-06-19 International Business Machines Corporation Geographic space management
US9857196B2 (en) 2015-06-19 2018-01-02 International Business Machinces Corporation Geographic space management
US9562775B2 (en) 2015-06-19 2017-02-07 International Business Machines Corporation Geographic space management
US10169403B2 (en) 2015-06-19 2019-01-01 International Business Machines Corporation Geographic space management
US9467839B1 (en) 2015-12-16 2016-10-11 International Business Machines Corporation Management of dynamic events and moving objects
US9930509B2 (en) 2015-12-16 2018-03-27 International Business Machines Corporation Management of dynamic events and moving objects
US9460616B1 (en) 2015-12-16 2016-10-04 International Business Machines Corporation Management of mobile objects and service platform for mobile objects
US9699622B1 (en) 2015-12-16 2017-07-04 International Business Machines Corporation Management of dynamic events and moving objects
US10032367B2 (en) 2015-12-16 2018-07-24 International Business Machines Corporation Management of mobile objects and service platform for mobile objects
US10043384B2 (en) 2015-12-16 2018-08-07 International Business Machines Corporation Management of mobile objects and service platform for mobile objects
US9513134B1 (en) 2015-12-16 2016-12-06 International Business Machines Corporation Management of evacuation with mobile objects
US9578093B1 (en) 2015-12-16 2017-02-21 International Business Machines Corporation Geographic space management
US9805598B2 (en) 2015-12-16 2017-10-31 International Business Machines Corporation Management of mobile objects
US9865163B2 (en) 2015-12-16 2018-01-09 International Business Machines Corporation Management of mobile objects
CN105491354A (en) * 2016-01-18 2016-04-13 广州爱九游信息技术有限公司 Video monitoring method and video monitoring platform
US10540895B2 (en) 2017-06-21 2020-01-21 International Business Machines Corporation Management of mobile objects
US10339810B2 (en) 2017-06-21 2019-07-02 International Business Machines Corporation Management of mobile objects
US10504368B2 (en) 2017-06-21 2019-12-10 International Business Machines Corporation Management of mobile objects
US10535266B2 (en) 2017-06-21 2020-01-14 International Business Machines Corporation Management of mobile objects
US10168424B1 (en) 2017-06-21 2019-01-01 International Business Machines Corporation Management of mobile objects
CN108055502A (en) * 2017-11-30 2018-05-18 南京南邮信息产业技术研究院有限公司 Urban public security based on NB-IoT is quickly deployed to ensure effective monitoring and control of illegal activities system and method

Also Published As

Publication number Publication date
JP4736096B2 (en) 2011-07-27

Similar Documents

Publication Publication Date Title
Froomkin The death of privacy
Carrier et al. Getting physical with the digital investigation process
EP2021960B1 (en) Secure mobile information management system and method
US7876351B2 (en) Methods and systems for alerting by weighing data based on the source, time received, and frequency received
US9552684B2 (en) Methods and systems configured to detect and guarantee identity for the purpose of data protection and access control
US8225380B2 (en) Methods to authenticate access and alarm as to proximity to location
US10467885B2 (en) Drone-augmented emergency response services
US20100238019A1 (en) Human guard enhancing multiple site security system
US7323980B2 (en) Security system and method with realtime imagery
US20080108324A1 (en) Methods of authorizing actions
US6894617B2 (en) Human guard enhancing multiple site integrated security system
US7627665B2 (en) System and method for providing configurable security monitoring utilizing an integrated information system
US6917902B2 (en) System and method for processing monitoring data using data profiles
US7944468B2 (en) Automated asymmetric threat detection using backward tracking and behavioral analysis
US7679507B2 (en) Video alarm verification
AU2008262268B2 (en) System and method for integrating video analytics and data analytics/mining
US8350698B2 (en) Method and protocol for real time security system
Woodward Jr et al. Biometrics: A look at facial recognition
US20020143938A1 (en) System and method for providing configurable security monitoring utilizing an integrated information system
US20060224797A1 (en) Command and Control Architecture
US20110257985A1 (en) Method and System for Facial Recognition Applications including Avatar Support
La Vigne et al. Evaluating the use of public surveillance cameras for crime control and prevention
US10257469B2 (en) Neighborhood camera linking system
US8275096B2 (en) System and method for security monitoring and response delivery
Fennelly Handbook of loss prevention and crime prevention

Legal Events

Date Code Title Description
RD03 Notification of appointment of power of attorney

Effective date: 20100902

Free format text: JAPANESE INTERMEDIATE CODE: A7423

RD04 Notification of resignation of power of attorney

Free format text: JAPANESE INTERMEDIATE CODE: A7424

Effective date: 20100902

A977 Report on retrieval

Free format text: JAPANESE INTERMEDIATE CODE: A971007

Effective date: 20110118

A131 Notification of reasons for refusal

Effective date: 20110120

Free format text: JAPANESE INTERMEDIATE CODE: A131

A521 Written amendment

Effective date: 20110317

Free format text: JAPANESE INTERMEDIATE CODE: A523

A01 Written decision to grant a patent or to grant a registration (utility model)

Effective date: 20110406

Free format text: JAPANESE INTERMEDIATE CODE: A01

A61 First payment of annual fees (during grant procedure)

Free format text: JAPANESE INTERMEDIATE CODE: A61

Effective date: 20110415

R150 Certificate of patent (=grant) or registration of utility model

Free format text: JAPANESE INTERMEDIATE CODE: R150

FPAY Renewal fee payment (prs date is renewal date of database)

Free format text: PAYMENT UNTIL: 20140513

Year of fee payment: 3

S533 Written request for registration of change of name

Free format text: JAPANESE INTERMEDIATE CODE: R313533

R350 Written notification of registration of transfer

Free format text: JAPANESE INTERMEDIATE CODE: R350