KR20160004188A - Intrusion detection device and method using the same - Google Patents
Intrusion detection device and method using the same Download PDFInfo
- Publication number
- KR20160004188A KR20160004188A KR1020150017267A KR20150017267A KR20160004188A KR 20160004188 A KR20160004188 A KR 20160004188A KR 1020150017267 A KR1020150017267 A KR 1020150017267A KR 20150017267 A KR20150017267 A KR 20150017267A KR 20160004188 A KR20160004188 A KR 20160004188A
- Authority
- KR
- South Korea
- Prior art keywords
- unique identification
- unauthorized
- identification information
- information
- control unit
- Prior art date
Links
Images
Classifications
-
- G—PHYSICS
- G08—SIGNALLING
- G08B—SIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
- G08B13/00—Burglar, theft or intruder alarms
- G08B13/18—Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength
- G08B13/189—Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength using passive radiation detection systems
- G08B13/194—Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength using passive radiation detection systems using image scanning and comparing systems
- G08B13/196—Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength using passive radiation detection systems using image scanning and comparing systems using television cameras
- G08B13/19602—Image analysis to detect motion of the intruder, e.g. by frame subtraction
- G08B13/19613—Recognition of a predetermined image pattern or behaviour pattern indicating theft or intrusion
-
- G—PHYSICS
- G08—SIGNALLING
- G08B—SIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
- G08B13/00—Burglar, theft or intruder alarms
- G08B13/22—Electrical actuation
- G08B13/24—Electrical actuation by interference with electromagnetic field distribution
- G08B13/2402—Electronic Article Surveillance [EAS], i.e. systems using tags for detecting removal of a tagged item from a secure area, e.g. tags for detecting shoplifting
- G08B13/2405—Electronic Article Surveillance [EAS], i.e. systems using tags for detecting removal of a tagged item from a secure area, e.g. tags for detecting shoplifting characterised by the tag technology used
- G08B13/2414—Electronic Article Surveillance [EAS], i.e. systems using tags for detecting removal of a tagged item from a secure area, e.g. tags for detecting shoplifting characterised by the tag technology used using inductive tags
- G08B13/2417—Electronic Article Surveillance [EAS], i.e. systems using tags for detecting removal of a tagged item from a secure area, e.g. tags for detecting shoplifting characterised by the tag technology used using inductive tags having a radio frequency identification chip
-
- G—PHYSICS
- G08—SIGNALLING
- G08B—SIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
- G08B7/00—Signalling systems according to more than one of groups G08B3/00 - G08B6/00; Personal calling systems according to more than one of groups G08B3/00 - G08B6/00
- G08B7/06—Signalling systems according to more than one of groups G08B3/00 - G08B6/00; Personal calling systems according to more than one of groups G08B3/00 - G08B6/00 using electric transmission, e.g. involving audible and visible signalling through the use of sound and light sources
- G08B7/064—Signalling systems according to more than one of groups G08B3/00 - G08B6/00; Personal calling systems according to more than one of groups G08B3/00 - G08B6/00 using electric transmission, e.g. involving audible and visible signalling through the use of sound and light sources indicating houses needing emergency help, e.g. with a flashing light or sound
Abstract
Description
The present invention relates to an external intruder detection device and a detection method using the same, and more particularly, to an external intruder detection device for detecting and monitoring an external intruder entering a specific area such as a school and a security area, and a detection method using the same .
In recent years, the increasing number of violent crimes targeting children and children has increased interest in means of safeguarding children from the dangers of various crimes.
In addition, the increased risk of exposure to various types of crimes has increased as children have spent more time in the outskirts of the country. In addition, there have been reports of kidnapping, abduction, sexual harassment, sexual assault, As reported, requests for means to safeguard children from these dangers are ever greater than ever.
In recent years, a security system has been developed in which an intruder is detected, an intruder is monitored, and emergency communication and urgent broadcasting can be performed at the time of intrusion.
Japanese Laid-Open Patent Application No. 2005-310066 discloses a security system for detecting an intruder. At least one RFID receiver for receiving an identification signal transmitted from an RFID originator, at least one detection sensor for transmitting a signal when a person is detected, and a first management computer to which the detection sensor is connected, A determination means for determining an identification signal received from the RFID receiver upon receipt of a signal from the detection sensor and for determining that the identification signal is an intrusion if the identification signal is not received; And display means for displaying the output result of the determination means.
Since the security system configured as described above determines whether or not an intruder is intruded by using only the RFID system, it is difficult to determine whether an intruder is intruding if the intruder has a lost or duplicated RFID tag.
Accordingly, it is an object of the present invention to provide an external intruder detection device and a detection method using the intruder detection device capable of accurately monitoring an intruder entering an unauthorized person entering a specific area such as a school and monitoring unauthorized persons.
A method of detecting an intruder according to the present invention is characterized in that the control unit photographs a specific area through an image acquisition unit, detects movement of a passenger entering and exiting the specific area, and acquires image information on the passenger, And transmits unique identification information to the RFID tag through the RFID tag, and receives the unique identification information from the RFID tag, and compares the received unique identification information with the stored unique identification information, A step of judging whether or not the passenger is unauthorized or unauthorized by judging whether or not the vehicle is unauthorized access, extracting and analyzing the characteristic part of the passenger from the image information to judge whether or not the passenger is unauthorized access .
In the method of detecting an intruder according to the present invention, it is preferable that the step of determining whether or not to enter the first intruder forms an RF field according to an RF signal of a predetermined frequency band radiated from the reader, And comparing the unique identification information transmitted from the RFID tag held by the visitor with the unique identification information stored in the RFID tag to judge whether or not the first unauthorized entry is made.
In the method for detecting an intruder according to the present invention, if it is determined that the user is an unauthorized party through the first unauthorized entry / exit determination after the step of determining whether or not the first unauthorized access is made, And outputting the image information or the alarm sound.
In the method of detecting an intruder according to the present invention, in the step of determining whether or not the second unauthorized entry is made, the feature is a key or face of the visitor.
In the method of detecting an intruder according to the present invention, it is preferable that the step of determining whether or not the second unauthorized entry is performed is such that the controller extracts key information on the visitor from the image information, Comparing the preset key information as a criterion for classifying the student, and determining that the user is an unauthorized person if the key of the visitor exceeds the preset key information.
In the method of detecting an intruder according to the present invention, it is preferable that the step of determining whether or not the second unauthorized entry is performed is characterized in that the controller extracts minutiae points of the face of the passenger from the image information, If not, it is determined that the user is an unauthorized person.
In the method of detecting an intruder according to the present invention, the voice acquiring unit may acquire the voice of the user prior to the step of determining whether or not the second unauthorized entry is made.
In the method of detecting an intruder according to the present invention, it is preferable that the step of determining whether or not the second unauthorized entry is made is that the control unit extracts the voice of the user, and if the extracted voice is determined to be an adult, .
In the method for detecting an intruder according to the present invention, if it is determined that the user is an unauthorized party through the first unauthorized entry / exit determination after the step of determining whether or not the second unauthorized access is made, And outputting image information or an alarm sound.
An external intruder detecting apparatus according to the present invention includes an image acquiring unit that senses a motion of an externally entering or exiting a specific area and acquires image information of the externally applied person, A reader for requesting unique identification information and receiving the unique identification information, a reader for comparing the received unique identification information with the unique identification information stored in the reader, And a control unit for determining whether or not the user is unauthorized access by extracting and analyzing the feature of the visitor from the image information through the determination of the first unauthorized access, .
The external intruder detection device and the detection method using the same according to the present invention receive the unique identification information from the passenger and make a first judgment as to whether or not the passenger is unauthorized, extract feature parts through the CCTV, It is possible to accurately monitor the unauthorized access to the user.
1 is a block diagram of an intruder detection apparatus according to an embodiment of the present invention.
2 is a block diagram illustrating a configuration of an external intruder detection apparatus according to an embodiment of the present invention.
3 is a flowchart illustrating a method of detecting an intruder detection apparatus according to an embodiment of the present invention.
In the following description, only parts necessary for understanding the embodiments of the present invention will be described, and the description of other parts will be omitted so as not to obscure the gist of the present invention.
The terms and words used in the present specification and claims should not be construed as limited to ordinary or dictionary meanings and the inventor is not limited to the meaning of the terms in order to describe his invention in the best way. It should be interpreted as meaning and concept consistent with the technical idea of the present invention. Therefore, the embodiments described in the present specification and the configurations shown in the drawings are merely preferred embodiments of the present invention, and are not intended to represent all of the technical ideas of the present invention, so that various equivalents And variations are possible.
Hereinafter, embodiments of the present invention will be described in detail with reference to the accompanying drawings.
FIG. 1 is a block diagram of an external intruder detection apparatus according to an embodiment of the present invention, and FIG. 2 is a block diagram illustrating a configuration of an external intruder detection apparatus according to an embodiment of the present invention.
Referring to FIG. 1, an external
Referring to FIGS. 1 and 2, an external
The
The
For example, when the temporally stored image information is compared with the current screen and the previous screen, the
The
Although the
In this manner, the
The
The
In the present embodiment, the
On the other hand, the
The
For example, when the accessing party does not have the RFID tag, the
In this way, when the accessing party does not have the RFID tag and the unique identification information differs from the previously stored unique identification information, the
Here, the
The image
The alarm
Also, when the passenger has the RFID tag, the reader receives the authentication data from the passenger, and the controller receives the data from the passenger and determines that the passenger is the unauthorized passenger by judging that the passenger is the same as the previously stored data.
If it is determined that the user is not an unauthorized person through the
If the second judgment is made based on the key of the visitor, the
For example, in the case of an elementary school, the control unit sets the key information as a reference for distinguishing the adult from the student to 160 cm, judges that the student is 160 cm or less in height, and judges the student as an unauthorized person if the height of the student is 160 cm or more have.
On the other hand, when the second judgment is made through the face of the passenger, the
For example, the
On the other hand, the
The
Meanwhile, the present embodiment may further include a
The
Meanwhile, after determining whether or not the first trespassing through the reader is performed, the
That is, the
For example, the
The
DETAILED DESCRIPTION OF THE PREFERRED EMBODIMENTS Hereinafter, a detection method using an external
3 is a flowchart illustrating a method of detecting an intruder detection apparatus according to an embodiment of the present invention.
1 to 3, in step S10, the
Here, the
Next, in step S20, the
If it is determined in step S30 that the unique identification information is not received or if the received unique identification information is unique identification information that is not previously stored, it is determined that the user is an unauthorized visitor, and the image information Or an alarm sound may be output (S60).
If the received unique identification information is unique identification information that is stored in step S20, the
In step S40, the feature of the passenger is extracted and analyzed from the image information acquired from the
If it is determined in step S40 that the user is an unauthorized party, the
If it is determined in step S40 that the user is not an unauthorized person, it can be recognized that the person is an unauthorized person.
As described above, the external
It should be noted that the embodiments disclosed in the drawings are merely examples of specific examples for the purpose of understanding, and are not intended to limit the scope of the present invention. It will be apparent to those skilled in the art that other modifications based on the technical idea of the present invention are possible in addition to the embodiments disclosed herein.
10: image acquiring unit 20: reader
30: control unit 31: storage unit
40: control server 41: video information output unit
42: alarm sound output unit 50: sound acquisition unit
100: External intruder detection device
Claims (10)
Wherein the control unit requests unique identification information from the RFID tag detected by the reader, receives the unique identification information, determines whether or not the unique identification information is received from the visitor, the received unique identification information, Determining whether a first unauthorized access is made through comparison of information;
Extracting and analyzing a characteristic part of the visitor from the image information if the controller determines that the user is not an unauthorized person through the first unauthorized accessing step;
And detecting an intruder.
Wherein the step of determining whether or not the first-
The RF field is formed by an RF signal according to an RF signal of a predetermined frequency band radiated from the reader, and the control unit transmits the unique identification information transmitted from the RFID tag held by the visitor entering and leaving the RF field, And determines whether or not the first unauthorized entry is made.
After the step of determining whether or not the first-time unauthorized entry is made,
Outputting the image information or alarm sound through the control server when the control unit determines that the user is an unauthorized party through the first unauthorized access;
Further comprising: detecting an intruder.
In the step of determining whether or not the second unauthorized entry is made,
Wherein the feature is a key or face of the guest.
Wherein the step of determining whether or not the second-
The control unit extracts key information on the visitor from the image information, compares key information on the extracted visitor with predetermined key information that is a reference for distinguishing an adult from a student, And if it exceeds the set key information, it is determined that the user is an unauthorized person.
Wherein the step of determining whether or not the second-
Wherein the control unit extracts a feature point of the face of the visitor from the image information, and when the feature point is not a feature point of the registered face, the control unit determines that the user is an unauthorized person.
Before the step of determining whether or not the first-time unauthorized entry is made,
Acquiring voice information for the user through a voice acquiring unit;
Further comprising: detecting an intruder.
Wherein the step of determining whether or not the second-
Wherein the control unit analyzes voice information of the passer-by and judges the passer-by as an unauthorized passenger if the analyzed voice information is judged to be an adult.
After the step of determining whether or not the second unauthorized entry is made,
Outputting the image information or alarm sound through the control server when the control unit determines that the user is an unauthorized party through the second unauthorized access;
Further comprising: detecting an intruder.
A reader for requesting unique identification information from the visitor detected by the image acquisition unit and receiving the unique identification information;
Judging whether or not a first unauthorized access is made by comparing whether or not the unique identification information is received from the accessing party, comparing the received unique identification information with previously stored unique identification information, and determining whether the first unauthorized access is made, A controller for extracting and analyzing the feature of the visitor from the image information to determine whether or not the user is a second-time unauthorized entry;
And an external intruder detection device.
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
KR1020140081677 | 2014-07-01 | ||
KR20140081677 | 2014-07-01 |
Publications (1)
Publication Number | Publication Date |
---|---|
KR20160004188A true KR20160004188A (en) | 2016-01-12 |
Family
ID=55170144
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
KR1020150017267A KR20160004188A (en) | 2014-07-01 | 2015-02-04 | Intrusion detection device and method using the same |
Country Status (1)
Country | Link |
---|---|
KR (1) | KR20160004188A (en) |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
KR20220077407A (en) * | 2020-12-02 | 2022-06-09 | 주식회사 에스원 | Preventing Method of Security Clear Mistake by Using UWB sensor and System thereof |
-
2015
- 2015-02-04 KR KR1020150017267A patent/KR20160004188A/en active IP Right Grant
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
KR20220077407A (en) * | 2020-12-02 | 2022-06-09 | 주식회사 에스원 | Preventing Method of Security Clear Mistake by Using UWB sensor and System thereof |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
KR100882890B1 (en) | Surveillance system and surveillance method | |
KR100962529B1 (en) | Method for tracking object | |
US7504942B2 (en) | Local verification systems and methods for security monitoring | |
KR101610657B1 (en) | Three-dimensional virtual entrance control and communicable disease control system and method based on entrance control data | |
EP3026904B1 (en) | System and method of contextual adjustment of video fidelity to protect privacy | |
KR101387628B1 (en) | Entrance control integrated video recorder | |
KR101858396B1 (en) | Intelligent intrusion detection system | |
CN104881911A (en) | System And Method Having Biometric Identification Instrusion And Access Control | |
EP2779132A2 (en) | System and method of anomaly detection with categorical attributes | |
KR20130085315A (en) | Method for video surveillance system based on human identification | |
KR102039279B1 (en) | System and method for supporting police work using image recognition | |
KR101381924B1 (en) | System and method for monitoring security using camera monitoring apparatus | |
US20190392691A1 (en) | Entry security system and method | |
US10419728B2 (en) | Monitoring system having personal information protection function and method thereof | |
US8941484B2 (en) | System and method of anomaly detection | |
KR20160053601A (en) | Appratus and method for processing image | |
KR101492799B1 (en) | Entrance control integrated video recording system and method thereof | |
KR20190035187A (en) | Sound alarm broadcasting system in monitoring area | |
KR102011226B1 (en) | Security management system by face recognition and method | |
KR102046591B1 (en) | Image Monitoring System and Method for Monitoring Image | |
JP2007058314A (en) | Monitoring system | |
KR101523027B1 (en) | Intrusion detection system using mobile terminal | |
JP5529593B2 (en) | Image monitoring device | |
KR20160004188A (en) | Intrusion detection device and method using the same | |
JP2015079472A (en) | Security system for architectural structure |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
A201 | Request for examination | ||
E902 | Notification of reason for refusal | ||
N231 | Notification of change of applicant | ||
E701 | Decision to grant or registration of patent right |