KR20160004188A - Intrusion detection device and method using the same - Google Patents

Intrusion detection device and method using the same Download PDF

Info

Publication number
KR20160004188A
KR20160004188A KR1020150017267A KR20150017267A KR20160004188A KR 20160004188 A KR20160004188 A KR 20160004188A KR 1020150017267 A KR1020150017267 A KR 1020150017267A KR 20150017267 A KR20150017267 A KR 20150017267A KR 20160004188 A KR20160004188 A KR 20160004188A
Authority
KR
South Korea
Prior art keywords
unique identification
unauthorized
identification information
information
control unit
Prior art date
Application number
KR1020150017267A
Other languages
Korean (ko)
Inventor
김형태
Original Assignee
(주) 디에스앤씨
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by (주) 디에스앤씨 filed Critical (주) 디에스앤씨
Publication of KR20160004188A publication Critical patent/KR20160004188A/en

Links

Images

Classifications

    • GPHYSICS
    • G08SIGNALLING
    • G08BSIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
    • G08B13/00Burglar, theft or intruder alarms
    • G08B13/18Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength
    • G08B13/189Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength using passive radiation detection systems
    • G08B13/194Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength using passive radiation detection systems using image scanning and comparing systems
    • G08B13/196Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength using passive radiation detection systems using image scanning and comparing systems using television cameras
    • G08B13/19602Image analysis to detect motion of the intruder, e.g. by frame subtraction
    • G08B13/19613Recognition of a predetermined image pattern or behaviour pattern indicating theft or intrusion
    • GPHYSICS
    • G08SIGNALLING
    • G08BSIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
    • G08B13/00Burglar, theft or intruder alarms
    • G08B13/22Electrical actuation
    • G08B13/24Electrical actuation by interference with electromagnetic field distribution
    • G08B13/2402Electronic Article Surveillance [EAS], i.e. systems using tags for detecting removal of a tagged item from a secure area, e.g. tags for detecting shoplifting
    • G08B13/2405Electronic Article Surveillance [EAS], i.e. systems using tags for detecting removal of a tagged item from a secure area, e.g. tags for detecting shoplifting characterised by the tag technology used
    • G08B13/2414Electronic Article Surveillance [EAS], i.e. systems using tags for detecting removal of a tagged item from a secure area, e.g. tags for detecting shoplifting characterised by the tag technology used using inductive tags
    • G08B13/2417Electronic Article Surveillance [EAS], i.e. systems using tags for detecting removal of a tagged item from a secure area, e.g. tags for detecting shoplifting characterised by the tag technology used using inductive tags having a radio frequency identification chip
    • GPHYSICS
    • G08SIGNALLING
    • G08BSIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
    • G08B7/00Signalling systems according to more than one of groups G08B3/00 - G08B6/00; Personal calling systems according to more than one of groups G08B3/00 - G08B6/00
    • G08B7/06Signalling systems according to more than one of groups G08B3/00 - G08B6/00; Personal calling systems according to more than one of groups G08B3/00 - G08B6/00 using electric transmission, e.g. involving audible and visible signalling through the use of sound and light sources
    • G08B7/064Signalling systems according to more than one of groups G08B3/00 - G08B6/00; Personal calling systems according to more than one of groups G08B3/00 - G08B6/00 using electric transmission, e.g. involving audible and visible signalling through the use of sound and light sources indicating houses needing emergency help, e.g. with a flashing light or sound

Abstract

The present invention relates to an intruder detection device for detecting and monitoring intruders entering into a certain area such as schools and security areas and a detection method using the same. The objective is to provide an intruder detection device capable of determining intrusion of trespassers intruding into certain areas such as schools accurately and performing monitoring on trespassers and a detection method using the same. The present invention includes; a step where a control unit records a certain area using an image acquisition unit, detects movement of a person entering into the certain area, and acquires image information about the person; a step where the control unit requests unique identification information from an RFID tag sensed by a reader, receives the unique identification information, and makes a first decision on trespassing based on whether the unique identification information is received from an entering person and on comparison between the received unique identification information and the pre-stored unique identification information; and a step where, in case that the control unit determines that the entering person is not a trespasser in the first decision on trespassing, the control unit analyzes the feature of the entering person from the image information and makes a second decision on trespassing.

Description

[0001] The present invention relates to an intruder detecting apparatus and an intruder detecting apparatus using the same,

The present invention relates to an external intruder detection device and a detection method using the same, and more particularly, to an external intruder detection device for detecting and monitoring an external intruder entering a specific area such as a school and a security area, and a detection method using the same .

In recent years, the increasing number of violent crimes targeting children and children has increased interest in means of safeguarding children from the dangers of various crimes.

In addition, the increased risk of exposure to various types of crimes has increased as children have spent more time in the outskirts of the country. In addition, there have been reports of kidnapping, abduction, sexual harassment, sexual assault, As reported, requests for means to safeguard children from these dangers are ever greater than ever.

In recent years, a security system has been developed in which an intruder is detected, an intruder is monitored, and emergency communication and urgent broadcasting can be performed at the time of intrusion.

Japanese Laid-Open Patent Application No. 2005-310066 discloses a security system for detecting an intruder. At least one RFID receiver for receiving an identification signal transmitted from an RFID originator, at least one detection sensor for transmitting a signal when a person is detected, and a first management computer to which the detection sensor is connected, A determination means for determining an identification signal received from the RFID receiver upon receipt of a signal from the detection sensor and for determining that the identification signal is an intrusion if the identification signal is not received; And display means for displaying the output result of the determination means.

Since the security system configured as described above determines whether or not an intruder is intruded by using only the RFID system, it is difficult to determine whether an intruder is intruding if the intruder has a lost or duplicated RFID tag.

Accordingly, it is an object of the present invention to provide an external intruder detection device and a detection method using the intruder detection device capable of accurately monitoring an intruder entering an unauthorized person entering a specific area such as a school and monitoring unauthorized persons.

A method of detecting an intruder according to the present invention is characterized in that the control unit photographs a specific area through an image acquisition unit, detects movement of a passenger entering and exiting the specific area, and acquires image information on the passenger, And transmits unique identification information to the RFID tag through the RFID tag, and receives the unique identification information from the RFID tag, and compares the received unique identification information with the stored unique identification information, A step of judging whether or not the passenger is unauthorized or unauthorized by judging whether or not the vehicle is unauthorized access, extracting and analyzing the characteristic part of the passenger from the image information to judge whether or not the passenger is unauthorized access .

In the method of detecting an intruder according to the present invention, it is preferable that the step of determining whether or not to enter the first intruder forms an RF field according to an RF signal of a predetermined frequency band radiated from the reader, And comparing the unique identification information transmitted from the RFID tag held by the visitor with the unique identification information stored in the RFID tag to judge whether or not the first unauthorized entry is made.

In the method for detecting an intruder according to the present invention, if it is determined that the user is an unauthorized party through the first unauthorized entry / exit determination after the step of determining whether or not the first unauthorized access is made, And outputting the image information or the alarm sound.

In the method of detecting an intruder according to the present invention, in the step of determining whether or not the second unauthorized entry is made, the feature is a key or face of the visitor.

In the method of detecting an intruder according to the present invention, it is preferable that the step of determining whether or not the second unauthorized entry is performed is such that the controller extracts key information on the visitor from the image information, Comparing the preset key information as a criterion for classifying the student, and determining that the user is an unauthorized person if the key of the visitor exceeds the preset key information.

In the method of detecting an intruder according to the present invention, it is preferable that the step of determining whether or not the second unauthorized entry is performed is characterized in that the controller extracts minutiae points of the face of the passenger from the image information, If not, it is determined that the user is an unauthorized person.

In the method of detecting an intruder according to the present invention, the voice acquiring unit may acquire the voice of the user prior to the step of determining whether or not the second unauthorized entry is made.

In the method of detecting an intruder according to the present invention, it is preferable that the step of determining whether or not the second unauthorized entry is made is that the control unit extracts the voice of the user, and if the extracted voice is determined to be an adult, .

In the method for detecting an intruder according to the present invention, if it is determined that the user is an unauthorized party through the first unauthorized entry / exit determination after the step of determining whether or not the second unauthorized access is made, And outputting image information or an alarm sound.

An external intruder detecting apparatus according to the present invention includes an image acquiring unit that senses a motion of an externally entering or exiting a specific area and acquires image information of the externally applied person, A reader for requesting unique identification information and receiving the unique identification information, a reader for comparing the received unique identification information with the unique identification information stored in the reader, And a control unit for determining whether or not the user is unauthorized access by extracting and analyzing the feature of the visitor from the image information through the determination of the first unauthorized access, .

The external intruder detection device and the detection method using the same according to the present invention receive the unique identification information from the passenger and make a first judgment as to whether or not the passenger is unauthorized, extract feature parts through the CCTV, It is possible to accurately monitor the unauthorized access to the user.

1 is a block diagram of an intruder detection apparatus according to an embodiment of the present invention.
2 is a block diagram illustrating a configuration of an external intruder detection apparatus according to an embodiment of the present invention.
3 is a flowchart illustrating a method of detecting an intruder detection apparatus according to an embodiment of the present invention.

In the following description, only parts necessary for understanding the embodiments of the present invention will be described, and the description of other parts will be omitted so as not to obscure the gist of the present invention.

The terms and words used in the present specification and claims should not be construed as limited to ordinary or dictionary meanings and the inventor is not limited to the meaning of the terms in order to describe his invention in the best way. It should be interpreted as meaning and concept consistent with the technical idea of the present invention. Therefore, the embodiments described in the present specification and the configurations shown in the drawings are merely preferred embodiments of the present invention, and are not intended to represent all of the technical ideas of the present invention, so that various equivalents And variations are possible.

Hereinafter, embodiments of the present invention will be described in detail with reference to the accompanying drawings.

FIG. 1 is a block diagram of an external intruder detection apparatus according to an embodiment of the present invention, and FIG. 2 is a block diagram illustrating a configuration of an external intruder detection apparatus according to an embodiment of the present invention.

Referring to FIG. 1, an external intruder detection apparatus 100 according to an exemplary embodiment of the present invention is installed in a specific area requiring security such as a school or a security zone, and can determine whether an intruder is intruding. The external intruder detection apparatus 100 according to the embodiment of the present invention may be installed in any place requiring security such as a school or a security zone. In the following description, an external intruder detection apparatus 100 that is installed in a school and is capable of monitoring an unauthorized visitor by determining whether or not an intruder intruding into the school is intruded will be described.

Referring to FIGS. 1 and 2, an external intruder detection apparatus 100 according to an embodiment of the present invention includes an image acquisition unit 10, a reader 20, and a control unit 30.

The image acquiring unit 10 can acquire image information by photographing a visitor. For example, the image acquiring unit 10 may be a dome camera, a square camera, a PTZ (Pan-tilt-zoom) CCTV camera, a pinhole camera, or the like,

The image acquiring unit 10 may be installed at a plurality of intervals at predetermined intervals to acquire images with respect to the entire area of the campus. Here, the image obtaining unit 10 may detect the motion of a user using a motion detection method.

For example, when the temporally stored image information is compared with the current screen and the previous screen, the image obtaining unit 10 may collect the image information and transmit the collected image information to the control unit 30 when the changed part occurs over the reference value.

The reader 20 is a device capable of data communication with an apparatus such as an RFID tag possessed by a visitor.

Although the reader 20 can be installed at a doorway entering or leaving the campus, the reader 20 can be arranged at regular intervals in the outskirts of the campus in case of intruding into a place other than the entrance door.

In this manner, the reader 20 can be disposed at predetermined intervals around the exterior of the campus to form RF fields. Here, the interval at which the reader 20 is installed is set such that the RF signal area covered by each reader 20 can be partially overlapped so that no empty space is generated in the RF signal area.

The reader 20 receives the unique identification information for primarily determining whether or not the user enters the RF field. That is, the reader 20 requests unique identification information from the passenger detected by the image acquisition unit 10.

The reader 20 transmits the unique identification information received from the user to the controller 30. In addition, even when the reader 20 requests unique identification information to the user, but does not receive the requested unique identification information, the controller 20 transmits a corresponding signal indicating that the unique identification information is not received to the controller 30.

In the present embodiment, the reader 20 capable of recognizing the RFID tag is used. However, the present invention is not limited to this, and a mobile phone, a tablet PC, or the like may be used instead of the RFID tag, A reader 20 capable of authenticating a terminal such as a reader can be used. Here, the reader 20 may be an active RFID tag or an active RFID tag that exchanges information with a terminal, or may be a passive RFID tag or receiving information from the terminal.

On the other hand, the control unit 30 receives the unique identification information transmitted from the reader / writer from the reader 20. That is, when the image acquisition unit 10 senses the movement of the passenger, the control unit 30 requests the authentication data through the reader 20 located near or at the same position, and receives the unique identification information received from the reader from the reader .

The control unit 30 compares the received unique identification information with pre-stored unique identification information to firstly determine whether or not the user is intruding.

For example, when the accessing party does not have the RFID tag, the reader 20 can not receive the unique identification information, and the control unit 30 sends a signal from the reader 20 to the reader 20 Receive. Further, even if the unique identification information is received from the reader 20, the control unit 30 compares the unique identification information with the previously stored unique identification information,

In this way, when the accessing party does not have the RFID tag and the unique identification information differs from the previously stored unique identification information, the control unit 30 determines that the accessing party is an unauthorized party, It is possible to output the image information or the alarm sound.

Here, the control server 40 can be a management room or an administrative office for managing CCTV in the school and managing students. The control server 40 may include an image information output unit 41 for outputting image information and an alarm sound output unit 42 for outputting alarm sounds.

The image information output unit 41 may be a display device composed of a plurality of monitors so that the image information obtained from the plurality of image acquisition units 10 can be output.

The alarm sound output unit 42 may be constituted by a siren or the like so as to recognize the emergency situation.

Also, when the passenger has the RFID tag, the reader receives the authentication data from the passenger, and the controller receives the data from the passenger and determines that the passenger is the unauthorized passenger by judging that the passenger is the same as the previously stored data.

If it is determined that the user is not an unauthorized person through the reader 20, the control unit 30 extracts a character part of the visitor from the photographed image information, compares the character part with the previously stored character part, The second judgment is made. Here, the feature may be the key or face of the guest.

If the second judgment is made based on the key of the visitor, the control unit 30 extracts the key information about the visitor from the image information, extracts key information about the extracted visitor, predetermined key information And judges that the user is an unauthorized person if the key of the user exceeds the preset key information.

For example, in the case of an elementary school, the control unit sets the key information as a reference for distinguishing the adult from the student to 160 cm, judges that the student is 160 cm or less in height, and judges the student as an unauthorized person if the height of the student is 160 cm or more have.

On the other hand, when the second judgment is made through the face of the passenger, the control unit 30 extracts the minutiae of the face of the passenger from the image information, and judges that the minutiae are unauthorized passengers when the minutiae are not minutiae points of the previously registered face.

For example, the control unit 30 extracts the feature points of the face of the user from the image information acquired from the image acquisition unit 10 using the SURF (Speed Up Robust Features) algorithm, and matches the extracted feature points with the previously stored feature point information It is possible to judge whether or not the user is unauthorized access.

On the other hand, the control unit 30 may include a storage unit 31 for storing unique identification information on an interested party, key setting information on a visitor, and minutia information about the face of a person concerned in order to judge whether or not the first trespass has been invaded .

The control unit 30 makes a secondary determination based on the key or the face of the passenger, and when it is determined that the passenger is an unauthorized passenger, the control unit 30 can output video information or alarm sound to the passenger through the control server 40 described above.

Meanwhile, the present embodiment may further include a voice acquiring unit 50 for acquiring voice information about a user.

The voice acquiring unit 50 may be a microphone or the like capable of acquiring voice information for a user and may be configured to acquire voice information while acquiring image information installed in the image acquiring unit 10 have.

Meanwhile, after determining whether or not the first trespassing through the reader is performed, the control unit 30 can secondarily determine whether the trespassing is intruded through the voice information of the passenger acquired through the voice acquisition unit 50.

That is, the control unit 30 analyzes the voice information obtained from the voice acquiring unit 50, and if the analyzed voice information is determined to be adult, it can determine that the user is an unauthorized party.

For example, the control unit 30 may determine whether the user is a transformer by analyzing the voice information to distinguish the user from the adult, or compare the voice information previously stored in the storage unit 31 with the voice information obtained from the voice acquiring unit 50, It can judge whether or not to enter.

The control unit 30 determines whether or not the user is unauthorized access through the voice information of the passenger. If the passenger is determined to be an unauthorized passenger, the control unit 30 may output video information or alarm sound for the passenger through the control server 40 have.

DETAILED DESCRIPTION OF THE PREFERRED EMBODIMENTS Hereinafter, a detection method using an external intruder detection apparatus 100 according to an embodiment of the present invention will be described.

3 is a flowchart illustrating a method of detecting an intruder detection apparatus according to an embodiment of the present invention.

1 to 3, in step S10, the control unit 30 photographs a specific area through the image obtaining unit 10, detects movement of a passenger entering and exiting the specific area, and displays image information on the passenger .

Here, the control unit 30 can acquire the voice information of the passengers through the voice acquisition unit 50 as well as the image information of the passengers.

Next, in step S20, the control unit 30 requests the unique identification information from the user detected through the reader 20, receives the unique identification information, determines whether or not the unique identification information is received from the user, And comparing the unique identification information stored in advance with the stored identification information.

If it is determined in step S30 that the unique identification information is not received or if the received unique identification information is unique identification information that is not previously stored, it is determined that the user is an unauthorized visitor, and the image information Or an alarm sound may be output (S60).

If the received unique identification information is unique identification information that is stored in step S20, the control unit 30 determines whether the unauthorized access is unauthorized through the image information or audio information (S40) .

In step S40, the feature of the passenger is extracted and analyzed from the image information acquired from the image acquisition unit 10 to determine whether the user is unauthorized or unauthorized, or the voice information obtained from the voice acquisition unit 50 is analyzed, Can be determined.

If it is determined in step S40 that the user is an unauthorized party, the control server 40 may output video information or alert sound to the user through the second unauthorized access in step S40 (S60).

If it is determined in step S40 that the user is not an unauthorized person, it can be recognized that the person is an unauthorized person.

As described above, the external intruder detecting apparatus 100 according to the embodiment of the present invention and the detecting method using the same detect the unique identification information from the passengers and judge whether the passengers are unauthorized or unauthorized. It is possible to monitor unauthorized visitors by accurately judging whether or not unauthorized persons intruding into a specific area are intruded.

It should be noted that the embodiments disclosed in the drawings are merely examples of specific examples for the purpose of understanding, and are not intended to limit the scope of the present invention. It will be apparent to those skilled in the art that other modifications based on the technical idea of the present invention are possible in addition to the embodiments disclosed herein.

10: image acquiring unit 20: reader
30: control unit 31: storage unit
40: control server 41: video information output unit
42: alarm sound output unit 50: sound acquisition unit
100: External intruder detection device

Claims (10)

The controller captures a specific area through the image acquisition unit, detects movement of a passenger entering and exiting the specific area, and acquires image information of the passenger;
Wherein the control unit requests unique identification information from the RFID tag detected by the reader, receives the unique identification information, determines whether or not the unique identification information is received from the visitor, the received unique identification information, Determining whether a first unauthorized access is made through comparison of information;
Extracting and analyzing a characteristic part of the visitor from the image information if the controller determines that the user is not an unauthorized person through the first unauthorized accessing step;
And detecting an intruder.
The method according to claim 1,
Wherein the step of determining whether or not the first-
The RF field is formed by an RF signal according to an RF signal of a predetermined frequency band radiated from the reader, and the control unit transmits the unique identification information transmitted from the RFID tag held by the visitor entering and leaving the RF field, And determines whether or not the first unauthorized entry is made.
The method according to claim 1,
After the step of determining whether or not the first-time unauthorized entry is made,
Outputting the image information or alarm sound through the control server when the control unit determines that the user is an unauthorized party through the first unauthorized access;
Further comprising: detecting an intruder.
The method according to claim 1,
In the step of determining whether or not the second unauthorized entry is made,
Wherein the feature is a key or face of the guest.
5. The method of claim 4,
Wherein the step of determining whether or not the second-
The control unit extracts key information on the visitor from the image information, compares key information on the extracted visitor with predetermined key information that is a reference for distinguishing an adult from a student, And if it exceeds the set key information, it is determined that the user is an unauthorized person.
5. The method of claim 4,
Wherein the step of determining whether or not the second-
Wherein the control unit extracts a feature point of the face of the visitor from the image information, and when the feature point is not a feature point of the registered face, the control unit determines that the user is an unauthorized person.
The method according to claim 1,
Before the step of determining whether or not the first-time unauthorized entry is made,
Acquiring voice information for the user through a voice acquiring unit;
Further comprising: detecting an intruder.
8. The method of claim 7,
Wherein the step of determining whether or not the second-
Wherein the control unit analyzes voice information of the passer-by and judges the passer-by as an unauthorized passenger if the analyzed voice information is judged to be an adult.
9. The method of claim 8,
After the step of determining whether or not the second unauthorized entry is made,
Outputting the image information or alarm sound through the control server when the control unit determines that the user is an unauthorized party through the second unauthorized access;
Further comprising: detecting an intruder.
An image capturing unit for capturing a specific area and detecting a movement of a passenger entering and exiting the specific area and acquiring image information of the passenger;
A reader for requesting unique identification information from the visitor detected by the image acquisition unit and receiving the unique identification information;
Judging whether or not a first unauthorized access is made by comparing whether or not the unique identification information is received from the accessing party, comparing the received unique identification information with previously stored unique identification information, and determining whether the first unauthorized access is made, A controller for extracting and analyzing the feature of the visitor from the image information to determine whether or not the user is a second-time unauthorized entry;
And an external intruder detection device.
KR1020150017267A 2014-07-01 2015-02-04 Intrusion detection device and method using the same KR20160004188A (en)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
KR1020140081677 2014-07-01
KR20140081677 2014-07-01

Publications (1)

Publication Number Publication Date
KR20160004188A true KR20160004188A (en) 2016-01-12

Family

ID=55170144

Family Applications (1)

Application Number Title Priority Date Filing Date
KR1020150017267A KR20160004188A (en) 2014-07-01 2015-02-04 Intrusion detection device and method using the same

Country Status (1)

Country Link
KR (1) KR20160004188A (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
KR20220077407A (en) * 2020-12-02 2022-06-09 주식회사 에스원 Preventing Method of Security Clear Mistake by Using UWB sensor and System thereof

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
KR20220077407A (en) * 2020-12-02 2022-06-09 주식회사 에스원 Preventing Method of Security Clear Mistake by Using UWB sensor and System thereof

Similar Documents

Publication Publication Date Title
KR100882890B1 (en) Surveillance system and surveillance method
KR100962529B1 (en) Method for tracking object
US7504942B2 (en) Local verification systems and methods for security monitoring
KR101610657B1 (en) Three-dimensional virtual entrance control and communicable disease control system and method based on entrance control data
EP3026904B1 (en) System and method of contextual adjustment of video fidelity to protect privacy
KR101387628B1 (en) Entrance control integrated video recorder
KR101858396B1 (en) Intelligent intrusion detection system
CN104881911A (en) System And Method Having Biometric Identification Instrusion And Access Control
EP2779132A2 (en) System and method of anomaly detection with categorical attributes
KR20130085315A (en) Method for video surveillance system based on human identification
KR102039279B1 (en) System and method for supporting police work using image recognition
KR101381924B1 (en) System and method for monitoring security using camera monitoring apparatus
US20190392691A1 (en) Entry security system and method
US10419728B2 (en) Monitoring system having personal information protection function and method thereof
US8941484B2 (en) System and method of anomaly detection
KR20160053601A (en) Appratus and method for processing image
KR101492799B1 (en) Entrance control integrated video recording system and method thereof
KR20190035187A (en) Sound alarm broadcasting system in monitoring area
KR102011226B1 (en) Security management system by face recognition and method
KR102046591B1 (en) Image Monitoring System and Method for Monitoring Image
JP2007058314A (en) Monitoring system
KR101523027B1 (en) Intrusion detection system using mobile terminal
JP5529593B2 (en) Image monitoring device
KR20160004188A (en) Intrusion detection device and method using the same
JP2015079472A (en) Security system for architectural structure

Legal Events

Date Code Title Description
A201 Request for examination
E902 Notification of reason for refusal
N231 Notification of change of applicant
E701 Decision to grant or registration of patent right