TW201037637A - Method of monitoring an object using ID recognization - Google Patents

Method of monitoring an object using ID recognization Download PDF

Info

Publication number
TW201037637A
TW201037637A TW98111306A TW98111306A TW201037637A TW 201037637 A TW201037637 A TW 201037637A TW 98111306 A TW98111306 A TW 98111306A TW 98111306 A TW98111306 A TW 98111306A TW 201037637 A TW201037637 A TW 201037637A
Authority
TW
Taiwan
Prior art keywords
warning
data
network
identity
message
Prior art date
Application number
TW98111306A
Other languages
Chinese (zh)
Inventor
chang-chun Li
Original Assignee
Lin Wen Yuan
chang-chun Li
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Lin Wen Yuan, chang-chun Li filed Critical Lin Wen Yuan
Priority to TW98111306A priority Critical patent/TW201037637A/en
Publication of TW201037637A publication Critical patent/TW201037637A/en

Links

Abstract

The present invention discloses a method of monitoring an object using ID Recognization. Via utilizes the data stream generated by the monitoring system, the present invention fulfills a robust monitoring behavior. The data stream includes image data, ID data, moving data, and time stamp. The method includes the steps: detect if the data stream having ID data, then generate an object entry signal and alarm. At the same time, detect if the data stream having moving data, then generate an object moving signal and alarm.

Description

201037637 六、發明說明: 【發明所屬之技術領域】 本發月係關於-種視訊監控系統,特別是關於—種以身份識別進 行物件監控之方法。 【先前技術】 • 習知的數位監控系統(D_VideoRecorder,DVR),多半是採用封閉 式的系統架構,例如,4路、8路、16路、32路DVR,其均係採用多個攝影 〇機,岐義方式,舰躲賴至具有多雜人之數健減上盒,並 將影像職於顯Μ上触,_抑贿域,赠賴的雜鋼。 此種設計,可適用於傳統的集合式住宅或者個人家中,不過,對於有 遠端監控需求者’此種封閉式的系統即不符需求。於是,結合網際網路 (Internet)技術、無線通糊路(Te丨哟,將監控資料透辆路傳輸成為可滿 足遞端監控需求者。其有兩種作法,一是在數位監控機上盒上增加網路通 訊模組’並提供網路傳輸環境以將數位化的影像資料傳輸出去。另一種方 ❹妓直接賴賴丨P(|ntemet P「Q_丨,崎_龄)化卿於攝影機 。上加制路介面模組,即可由其娜機上的U定網雜址(|PAdd㈣進行 、 點對闕触影像減雜,進而達職端驗的目的。 請參考第1圖’其為習知之網路攝影機(丨p 〇_「3)1〇之系統架構圖, 其由鏡頭組11、偏光片12、影像感測器13、影縣縮單元14、控制單元15、 記憶單元16、紅外線發射器17、網路介面單元18等構成,並裝設於外殼怕 當t。光線係經由鏡頭組H ’再經偏光片12傳遞至影像感測器13。影像感 測器13則將傳來之规轉換為槪之感應„ ,並傳遞至影像獅單元14 3 201037637 加以轉換為數位影像訊號並進行影像壓縮;或者,影像感蜊器13本身包含 有類比數位轉換器(ADC),直接將類比之影像訊號轉換為數位之影像訊號, 再傳至影像魏單元14進㈣像麵。其巾,f彡像細的技術,有MvJPEG、 MPEG II、MPEG IV、h.263、K264、JPEG2000不等,端視所採用的影 像壓縮晶片而定…般而言,採用影像壓縮之原因係為影像資料的資料量 . 龐大,不適合直接傳輸。 控制單元15則控制了整體系統的工作,藉由控制記憶單元伯將經壓縮 〇位影像資料予以暫存,再控綱路介面單元18傳送至網際網路或者區 域網路。其中,、網路介面單元18-般係透過有線之方式,以RJ45接頭與網 路線連接,並包含有一網路實體層(MAC),其具有一網路實體位址(丨p Address)了直接透過網際網路進行存取^亦即,只要知曉網路攝影機1〇的丨p 位址,傳送控制碼,即可進行網際網路,進行點對點的影像資料傳輸。 此外,網路攝影機10—般尚包含有一紅外線發射器17,其可發射紅外 線以供應賴的鎌,以達到夜視之功能。然而,若加裝紅外線發射器17 Ο 時,尚f對影像感測器13的感度與以要求,其動態範圍(Dynamic Range) . 必須夠大,以使其能在微弱光線下,仍能進行影像之感測。 - 無論是習知的數位監控系統,或者是目前最先進的IP攝影機系統,當 其運用在需要有高度安全需麵環境時,仍會有所不足之處。例如,在有 機密防護的麟之π禁管制,滅f要採間禁卡卜般係湖射頻識別標 藏,RFID Tag)之系統來進行管制。而在具有更高度機密防護的機構,其具 有禁止區、管制區等空間設計時’往往必須採取防護門的設計。因此,對 於有心人的防範,需要花費極大的人力與設備來予以杜絕。 201037637 為了解決此類的問題,眾多廠商莫不費盡心思,欲從監視系統的功能 面上來解決。例如,採用人臉辨識系統者,其雖已研究時日,然仍未進入 大量的商品化’實75其於朗之人臉辨識成功率不高之原因。 總括來說,習知控系統,在進行物件監控時,均需觸錄影資料, 並進行耗時的畫面追蹤,方能針對特定的物件進行追縱與監控。而在警戒 區的防範上,均需採取人員把關的作法,其不僅耗時,人事成本與裝設關 口的成本也相當地高。 因此,若能運用-個既能夠達到身份識別又驗供適切的影像資料的 網際網路型監㈣統’料行各餅咖監控,断進行較麵物件監控 與管制區的動態管制,贿決現有技術之不足。 【發明内容】 有鑑於以上習知技術的問題,本發明提出一種以身份識別進行物件監 控之方法,以達到即時監控的功效,可大幅降低監控系統的操作人員負擔, 更能提高其監控效率。 本發明更提供-種衫份識職行物件監控之紐,運藤包含複數 個網路攝影機之-網路監㈣統,包含下列步驟:由該_路攝影機產生 一資料亊流;當該些網路攝影機讀取一射賴別標籤而產生一身份資料 時,匯入該麟串流;當該些網路騎機姻—熱源而產生—移動資料時, 匯入該資料串流;侧該資料串流是否帶有該身份資料;若該資料串流帶 有該身伤資料’產生-物件出現訊息並進行一警示動作;價測該資料串流 疋否帶有該移動資料;及若該資料枝帶有該移動龍,產生—物件移動 訊息並進行該警示動作。 5 201037637 本發明更提供一種以身份識別進行物件監控之方法,包含下列步驟: 由複數個網路攝影機產生一資料串流;讀取一射頻識別標籤而產生一身份 資枓’並匯入該資料串流;偵測一熱源而產生一移動資料,並匯入該資料 串流,·依價測該身份資料與該移動資料之結果,產生一警示訊息;接收該 警示訊息之一選取指令;依據該選取指令傳送一警示指令至產生該警示事 件之該網路攝影機之該網路位址以進行連線;接收—播音對話指令;及藉 由產生該警示事件之該網路攝影機之該語音撥放單元進行警示播音動作。 本發明尚提供一種以身份識別進行物件監控之方法,包含下列步驟: 由複數個網路攝影機產生-資料串流;讀取—射頻識別標籤而產生一身份 資料,並匯人該資料串流;侧-熱源而產生—移動資料,並匯入該資料 串流,提供該些網路攝雜之-獅資料,賴職料係為每個該網路攝 影機之相鄰祕攝韻之制路健;依_該雜倾與娜動資料之 結果,產生-警示訊息;接收該警示訊息之一追縱指令;依據該追縱指令 選取待追蹤之該網路攝影機,並進行―追料示動作;依據糊聯資料進 行發生該警示事件之該網路攝影機關聯之該些網路攝影機之畫面顯示;及 當該警示事件移動至該網路鄉機關聯之該些網路攝影機時,進行追縱警 示之切換。 以下在實施方式中詳細敘述本發明之詳細特徵以及優點,其内容足以 使任何熟習相關技藝者瞭解本發明之技術内容並據以實施,且根據本說明 書所揭露之内容、中請專利範圍及圖式,任何熟習相關技藝者可輕易地理 解本發明相關之目的及優點。 6 201037637 【實施方式】 赫考第2@ ’其為本發明之網路攝職(丨p Came「_Q之系統架構 圖。本侧運用紅外線感測手段來達到物件個(人體侧),並同時運用射 頻識別域(RFID)來進行身份的辨識。將此兩技術手段整合至網路攝影機 中’讓網路攝減可在傳輸影像資料的啊,@紅親_手段與射頻識 別標簸讀取手段來獲得代表物件出現(移動)與物件身份辨識的訊息。如此, 即可將此兩m分加以運用,讓監控祕的追雜力更強。醜攝影機(丨p O Camera)1〇〇由鏡頭組110、偏光片120、影像感測器130、影像處理單元 140、控制單兀150、記憶單元16〇、紅外線發射器171、紅外線接收器仍、 音效處理單元173、音源輸出介面174、音源輸入介面175、網路介面單元 180與RFID讀取單元190等構成,並裝設於外殼1〇1當中。 偏光片120係裝設於影像感測器13〇之上方,用以產生不同的偏光效 果,其安裝端視攝影機的需求而定。光線係經由鏡頭組11〇,再經偏光片12〇 傳遞至影像感測器130。影像感測器13〇則將傳來之光線轉換為類比之感應 ◎電壓,並傳遞至影像處理單元140加以轉換為數位影像訊號並進行影像處 . 理,或者’影像感測器13〇本身包含有類比數位轉換器(ADC),直接將類比 - 之影像訊號轉換為數位之影像訊號,再傳至影像處理單元彳4〇進行影像處 理。其中,影像處理的技術,有MJPEG、MPEG II、MPEG IV、Η 263、 Η.264、JPEG2000不等’端視所採用的影像麼縮晶片而定。未來,在網路 頻寬逐漸加大,儲存媒體容量不斷增加且價格降低的趨勢下,亦有可能不 需壓縮,採取直接儲存原始之數位影像資料之方式。 控制單元150則控制了整體系統的工作,其分別與影像處理單元14〇、 201037637 記憶單元160、紅外線發射器171、紅外線接收器172、音效處理單元仍、 音源輸出介Φ174、音雜人介面175、睛介面單元湖及rf|d讀取單元 190相連接,音效處理單元173财—音源輸出介面π何外接—揚聲器及 音源輸入介面175可外接一麥克風。控制單元15〇藉由控制記憶單元16〇將 經處理的數位影像資料似暫存,再控咖路介面單元18Q將雜傳送至網 •際網路或者區域網路。其中,網路介面單元180有兩類選擇:一為有線網路 模組’以RJ45接頭與外部之網路線連接;另—為無線網路模組,如wlan 〇模組、WiMAX模組或無線通信網路模組(如3G,3_5G模組)。無論是為有線 或者無線網路介面單元,其均包含有一網路實體層(MAC),其具有一網路實 體位址(丨PAddress)可直接透過網際網路進行存取。亦即,只要知曉網路攝 影機100的IP位址’傳送控制碼,即可進行網際網路,進行點對點的資料傳 輸。 網路介面單元180除了可採用電路板直接與控制單元15〇連接外亦可採 用模組化設計方式與控制單元150連接,以使設計人員針對不同的應用需求 Ο 來做設計,並使本發明之網路攝影機100更具彈性化。模組化之設計,可在 • 控辦元150與醜介面單;之間加裝-連接胃,俾使祕介面單元 180可以插拔的方式直接安裝、更換。 此外,網路攝影機1〇0之紅外線發射器171,其可發射紅外線以供應夜 間的光線’以達到夜視之功能。然而,若加裝紅外線發射器彳71時,尚需對 影像感測器130的感度與以要求,其動態範圍(DynamjcRange)&須夠大, 以使其能在微弱光線下,仍能進行影像之感測。 本發明之紅外線接收器172,用以接收紅外線發射器171之反射光,藉 201037637 以判斷有鱗_。_元15_―卜線_17_送來之感 測電壓之移動訊號,進行物件移動之判斷,若發生物件移動之判斷結果, 則控制單纖將此產生的移動資料傳送之,其包含時間碼與物件移動之移 動碼。其中,紅外線發射副與紅外線_172可細紅外線收發器的 模組來製作。 • 其中鱗間碼,係树_息,產生的機财財兩者:攝影機内部 產生如外部織。娜產生者,—赫制單元侧部產生,許多可滿足 〇控制單元150功能的晶片皆有RTC(實時產生器,力能或 者,由控制單元150自行依據時脈產生器產生相對時間,或者,由一廣播控 制時鐘(Radi〇Cont「0丨Clock)所接收的時間資料來產生絕對時間外部供應 者,則可透過網路介面單元彳議定向某個固定的網址索取時間訊息。時間 產生的機制相當地多,不再贅述。 本發明之RFID讀取單元190則用以讀取一 RF|D標鐵(射頻識別標 籤)’當讀取該RFID標籤時’即傳送至控制單元15〇。控制單元15〇接收 O RFID標籤後,即傳送一身份資料給網路介面單it 180並傳輪出知其包含 . 有身份碼(RFID標籤資料)以及讀取到的時間碼。 < 其中,RFID標籤可以採用主動式RFID標籤,或者被動式RF|D標藏。 若採用被動式RFID標籤,則本發明之網路攝影機1〇〇可採用較高功率之 讀取單元,以便增加RFID讀取之距離若採用主動式RnD標籤,則本發 明之網路攝影機100可達到更遠之感測距離。RF丨D的工作頻率,一般有低 頻頻段之135kHz,高頻頻段之13.56MHz,超高頻頻段之433MHz、 860〜960MHz 與 2.45GHz 等。 9 201037637 RFID讀取單元190除了可採用電路板直接與控制單元15〇連接外亦 可採用模組化設計方式與控制單元150連接,以使設計人員針對不同的應 用需求來做設計,並使本發明之網路攝影機1〇〇更具彈性化。模組化之設 計’可在控制單元150與RFID讀取單元190之間加裝一連接器,俾使RRD 續取單元190可以插拔的方式直接安裝、更換。 透過網路語音傳輸技術(Voice over Internet Protocol, VOIP),本發明 更可進行網路語音之傳輸應用,此功能則可透過音效處理單元173來達 〇 成。音效處理單元173接收由控制中心所傳來的麥克風訊號,並將之處理 為可播放音效的類比訊號,藉由音源輸出介面174連接揚聲器,即可進行 遠端的聲音播放’以進行警示或嚇阻之功能。其中,麥克風訊號是由該網 路介面單元180經由控制單元150再傳輸至音效處理單元173,最後再 經由音源輸出介面174傳輸至揚聲器。另外,由連接於音源輸入介面175 的麥克風接收的第二音源為則由音效處理單元173轉換為數位之第二音源 數據,藉由控制單元150傳輸至該網路介面單元180,再傳送至控制中心, 〇 即可進行遠端聲音之監聽。 • 综上所述,本發明之網路攝影機100除了可傳送原先網路攝影機之數201037637 VI. Description of the invention: [Technical field to which the invention pertains] This is a system for monitoring video surveillance systems, and more particularly to a method for monitoring objects by identification. [Prior Art] • The conventional digital monitoring system (D_VideoRecorder, DVR) mostly uses a closed system architecture, for example, 4-way, 8-way, 16-channel, 32-channel DVR, all of which use multiple camera sets. The method of derogatory, the ship hides to the number of people with many miscellaneous people, and puts the image on the display, _ suppresses the bribe domain, and gives the miscellaneous steel. This design can be applied to traditional condominiums or individual homes. However, for those who have remote monitoring needs, such closed systems do not meet the demand. Therefore, combined with Internet technology (Internet) technology, wireless communication road (Te丨哟, the monitoring data transmission through the road to become the need to meet the needs of the end of monitoring. There are two ways, one is in the digital monitoring machine box Adding a network communication module' and providing a network transmission environment to transmit digital image data. Another method is to rely directly on P(|ntemet P "Q_丨, 崎_龄) Camera. Adding the interface module, you can use the U-network miscellaneous address on the machine (|PAdd (4), point to touch the image to reduce the miscellaneous, and then achieve the purpose of the end inspection. Please refer to Figure 1 It is a system architecture diagram of a conventional network camera (丨p 〇_“3)1〇, which is composed of a lens group 11, a polarizer 12, an image sensor 13, a shadow reduction unit 14, a control unit 15, and a memory unit 16. The infrared emitter 17 and the network interface unit 18 are configured to be mounted on the casing, and the light is transmitted to the image sensor 13 via the lens group H' via the polarizer 12. The image sensor 13 The incoming rule is converted into the induction of 槪, and passed to the image lion unit 14 3 201037637 to convert It is a digital image signal and performs image compression; or the image sensor 13 itself includes an analog digital converter (ADC), which directly converts the analog image signal into a digital image signal, and then transmits it to the image Wei unit 14 (four) image. The surface of the towel, such as MvJPEG, MPEG II, MPEG IV, h.263, K264, JPEG2000, depending on the image compression chip used, in general, image compression The reason is the amount of data of the image data. It is huge and is not suitable for direct transmission. The control unit 15 controls the operation of the overall system, and temporarily stores the compressed image data by controlling the memory unit, and then the control channel interface unit 18 Transmitted to the Internet or a local area network, wherein the network interface unit 18 is connected to the network route by means of a wired connection, and includes a network physical layer (MAC) having a network. The physical address (丨p Address) is directly accessed through the Internet. That is, as long as the IP address of the network camera is known, the control code is transmitted, and the Internet can be performed for peer-to-peer. In addition, the network camera 10 generally includes an infrared emitter 17 that emits infrared rays to supply the sputum to achieve the function of night vision. However, if an infrared emitter 17 is installed, f is sensitive to the image sensor 13 and its dynamic range (Dynamic Range) must be large enough to enable image sensing under weak light. - Whether it is conventional digital monitoring The system, or the current state-of-the-art IP camera system, still has some shortcomings when it is used in a highly secure environment. For example, in the case of organic security, the π ban is prohibited. It is banned from the card-like system of the RFID tag system. In a facility with a higher degree of confidentiality, it is often necessary to adopt a protective door design when it has a space design such as a prohibited area or a controlled area. Therefore, for the prevention of the people, it takes a lot of manpower and equipment to eliminate it. 201037637 In order to solve such problems, many manufacturers do not bother to solve the problem from the function of the monitoring system. For example, those who use the face recognition system, although they have studied the time, have not yet entered a large number of commercializations, and the reason why the success rate of the face recognition is not high. In a nutshell, the conventional control system needs to touch the video data and perform time-consuming screen tracking for object tracking, so as to track and monitor specific objects. In the prevention of the security zone, it is necessary to adopt the method of personnel control, which is not only time-consuming, but also the cost of personnel and the cost of installing the gate is quite high. Therefore, if we can use an Internet-based supervisor (four) who can achieve both identification and appropriate image data, we will monitor and control the dynamic control of the surface object monitoring and control area. The deficiencies of the prior art. SUMMARY OF THE INVENTION In view of the above problems of the prior art, the present invention provides a method for object monitoring by identity identification, so as to achieve the effect of real-time monitoring, which can greatly reduce the burden on the operator of the monitoring system and improve the monitoring efficiency. The invention further provides a button for monitoring the appearance of the article, and the carrier includes a plurality of network cameras - the network monitoring system, which comprises the following steps: generating a data stream by the camera; When the road camera reads a tag and generates an identity data, it imports the stream; when the network rides the machine-heat source, the data stream is imported; the data is imported. Whether the stream carries the identity data; if the data stream carries the physical injury data 'generating-object appearance message and performs a warning action; the price data is not included in the data stream; and if the data is The branch carries the moving dragon, generates an object movement message and performs the alert action. 5 201037637 The present invention further provides a method for object monitoring by identity, comprising the steps of: generating a data stream from a plurality of network cameras; reading a radio frequency identification tag to generate an identity resource and importing the data Streaming; detecting a heat source to generate a mobile data, and importing the data stream, detecting the identity data and the result of the mobile data by price, generating a warning message; receiving one of the warning messages to select an instruction; The selection command transmits an alert command to the network address of the webcam generating the alert event for connection; receiving-broadcast dialog command; and the voice dialing of the webcam by generating the alert event The release unit performs a warning broadcast operation. The present invention further provides a method for object monitoring by identity, comprising the steps of: generating a data stream by a plurality of network cameras; reading an RFID tag to generate an identity data, and collecting the data stream; Side-heat source generation--moving data, and importing the data stream, providing the network--the lion information, which is the system of the neighboring secrets of each of the network cameras. According to the result of the confession and the data, a warning message is generated; one of the warning messages is received; the network camera to be tracked is selected according to the tracking command, and the tracking operation is performed; Performing a screen display of the network cameras associated with the webcam in which the alert event occurs according to the paste link data; and performing a tracking alert when the alert event moves to the network cameras associated with the network home machine Switching. The detailed features and advantages of the present invention are described in detail in the following description of the embodiments of the present invention. The related objects and advantages of the present invention will be readily understood by those skilled in the art. 6 201037637 [Embodiment] He Khao 2@ 'is the network of the invention (丨p Came "_Q system architecture diagram. This side uses infrared sensing means to reach the object (human side), and at the same time The use of Radio Frequency Identification (RFID) to identify the identity. Integrating these two technologies into the network camera, 'Let the network take down the image data, @红亲_ means and the RFID tag reads Means to obtain the message that the object appears (moving) and the identity of the object. In this way, the two m points can be used to make the surveillance secret more powerful. The ugly camera (丨p O Camera) The lens group 110, the polarizer 120, the image sensor 130, the image processing unit 140, the control unit 150, the memory unit 16A, the infrared emitter 171, the infrared receiver still, the sound processing unit 173, the sound source output interface 174, and the sound source The input interface 175, the network interface unit 180, the RFID reading unit 190, and the like are disposed in the housing 1〇1. The polarizer 120 is mounted on the image sensor 13〇 to generate different polarized lights. Effect, its installation Depending on the needs of the camera, the light is transmitted through the lens group 11 and then transmitted to the image sensor 130 via the polarizer 12〇. The image sensor 13 turns the transmitted light into an analog ◎ voltage. And the image processing unit 140 is converted to a digital image signal for image processing, or the image sensor 13 itself includes an analog digital converter (ADC), which directly converts the analog image signal into a digital image. The image signal is transmitted to the image processing unit 〇4〇 for image processing. Among them, the image processing technology has MJPEG, MPEG II, MPEG IV, 263 263, Η.264, JPEG2000 and the image used by the end view. In the future, in the trend of increasing network bandwidth, increasing storage media capacity and lowering the price, it is also possible to directly store the original digital image data without compression. Controlling the operation of the overall system, which is still associated with the image processing unit 14〇, 201037637 memory unit 160, infrared emitter 171, infrared receiver 172, and sound processing unit The sound source output medium Φ174, the sound mixed person interface 175, the eye interface unit lake and the rf|d reading unit 190 are connected, the sound processing unit 173 financial-audio source output interface π externally connected-the speaker and the sound source input interface 175 can be connected with a microphone The control unit 15 uses the control memory unit 16 to temporarily store the processed digital image data, and then the control device interface unit 18Q transmits the impurities to the network or the regional network. There are two types of options for 180: one is a wired network module' with an RJ45 connector to connect to an external network route; the other is a wireless network module, such as a wlan module, a WiMAX module, or a wireless communication network module ( Such as 3G, 3_5G module). Whether it is a wired or wireless network interface unit, it includes a network physical layer (MAC) with a network real address (丨PAddress) that can be accessed directly over the Internet. That is, as long as the IP address of the network camera 100 is known to transmit the control code, the Internet can be performed for point-to-point data transmission. The network interface unit 180 can be connected to the control unit 150 in a modular design manner by using a circuit board directly connected to the control unit 15 to enable the designer to design for different application requirements and to make the present invention The webcam 100 is more flexible. The modular design can be installed and replaced between the control unit 150 and the ugly interface; the system can be directly installed and replaced by means of plugging and unplugging the interface unit 180. In addition, the infrared camera 171 of the network camera 1 , can emit infrared rays to supply the light of the night to achieve the function of night vision. However, if the infrared emitter 彳71 is added, the sensitivity and the sensitivity of the image sensor 130 are required, and the dynamic range (DynamjcRange) & must be large enough to enable it to be performed under weak light. Image sensing. The infrared receiver 172 of the present invention is configured to receive the reflected light of the infrared emitter 171, and use 201037637 to determine the scaled_. _ yuan 15_―Bu _17_ sent the sensed voltage mobile signal, the object movement judgment, if the object movement judgment result occurs, the control single fiber transmits the generated mobile data, which includes the time code The mobile code that moves with the object. Among them, the infrared emission pair and the infrared _172 can be fabricated by a module of a fine infrared transceiver. • Among them, the scale code is the tree, and the generated machine money is both: the inside of the camera is produced like external weave. Na generator, the side of the unit is generated, and many of the chips that can satisfy the function of the control unit 150 have RTC (real-time generator, force energy or, by the control unit 150, the relative time is generated according to the clock generator, or, The time data received by a broadcast control clock (Radi〇Cont “0丨Clock” to generate an absolute time external provider can be used to request a fixed URL to request a time message through the network interface unit. Time generation mechanism The RFID reading unit 190 of the present invention is used to read an RF|D standard (Radio Frequency Identification Tag) 'when the RFID tag is read', that is, it is transmitted to the control unit 15A. After receiving the O RFID tag, the unit 15 transmits an identity data to the network interface unit it 180 and transmits it to know that it contains the identity code (RFID tag data) and the read time code. The tag can be either an active RFID tag or a passive RF|D tag. If a passive RFID tag is used, the network camera of the present invention can use a higher power reading unit to increase the RFID. If the active RnD tag is adopted, the network camera 100 of the present invention can reach a farther sensing distance. The operating frequency of the RF 丨D generally has a low frequency band of 135 kHz and a high frequency band of 13.56 MHz, which is super high. The frequency band is 433MHz, 860~960MHz and 2.45GHz, etc. 9 201037637 The RFID reading unit 190 can be connected to the control unit 150 in a modular design manner by using a circuit board directly connected to the control unit 15 to make the design The personnel are designed for different application requirements, and the network camera of the present invention is more flexible. The modular design can be installed with a connector between the control unit 150 and the RFID reading unit 190. The RRD renewing unit 190 can be directly installed and replaced by means of plugging and unplugging. Through the Voice over Internet Protocol (VOIP), the present invention can further transmit a network voice, and the function can be transmitted through The sound effect processing unit 173 receives the microphone signal transmitted by the control center and processes it into an analog signal capable of playing sound effects. The source output interface 174 is connected to the speaker, and the remote sound playback can be performed for warning or deterrence. The microphone signal is transmitted from the network interface unit 180 to the sound processing unit 173 via the control unit 150, and finally And transmitting to the speaker via the sound source output interface 174. In addition, the second sound source received by the microphone connected to the sound source input interface 175 is the second sound source data converted into digital by the sound effect processing unit 173, and transmitted to the The network interface unit 180 is then transmitted to the control center for remote sound monitoring. • In summary, the network camera 100 of the present invention can transmit the number of original network cameras.

* 位影像資料以及網路位址等相關訊息外,尚可傳送代表物件移動之以及代 表RFID標藏讀取到之身份資料。此兩訊號係透過本發明之紅外線接收器 172、RFID讀取單元190與控制單元150 ’以及外部之RF|[)與攜帶RF|D 之使用者共同產生。實際_作上,使用者身上擺有可供本發明之網路攝 影機100讀取之RFID標籤,當使用者經過本發明之網路攝影機1〇〇可感 測範圍時,一方面紅外線接收器172可偵測到該使用者控制單元透 201037637 過紅外線接收器172傳來的訊號變化來計算得有人接近(人體即為一熱 源)’即可傳送出其所產生的移動資料;另—方面,咖讀取單元19〇讀 取到RF丨D標籤時,即傳送出該身份資料。由於此兩資料應同時或在接近時 間内產生’因此’後端之系統即可依據此兩資料之出現與否來進行物件追 蹤與監控,以達嚴密監控之效。 〇 〇 此外,網輯影機W亦可設計為在接收到身份f料或者產生了移動 資料時,樹觸__督,㈣刪跑,並僅讓監 控人員僅針財物件__賴職來撕監控,可大幅降低監控人員 的負擔。其動作同樣由控制單元150來進行整體的控制,當控制單元150 接收到身份資料或產生移動資料時,控制網路介面料18Q傳送影像資料 與接收到的身份資料與料;並於未接_身份資槪未產生移動資 料後,控制網路介面單元18〇停止傳送影像資料。 此外,由於網路介面單元180所傳送者係為數位之資料,因此,控制 單元150可以將代表影像的影歸料串流、代表移動訊息的,以及代表身 份訊息之身份資料透過網路介面單元崎別傳送之。若採用無線網路模 組之本瓣,___称爾___佈線者, 則可採用有線的網路模組之本發明。 如前所述者,本發明藉由網路攝影機1〇〇來提供影像資料、身份資料 以及移動熟,三者皆具__可供_行_。_路攝影機⑽ 所可能採用的網路模组,則有有線網路模組、無線網路模组、有線絲線 網路模組者三種。於是,本㈣在整健㈣、_綠上當衫種組合方 式.丨·有線區域網路連結;"無線區域網路連結;丨"網際網路連結;丨V以上 11 201037637 任選之網路連結之組合。於是,系統的架設可視實際的監控需求來進行。 例如,僅有單-區域的需求者,可依據現場的網路環境來規刻。如果 現場網路環境為有線區域網路充分者,則可採用有線區域網路的架設方 式。若現場網路環境為有線區域網路可達,但部份區域無有線區域網路者, •則可採取有線區域網路以及無線區域網路混合搭配者。若現場網路環境並 .無有線區域網路,且有線區域網路環境架設不易者,則可採用無線區域網 路者。 Ο 例如,有遠端監控與本地端監控需求者,則可採取本地端以有線區域 網路或無線區域網路或其組合者,而遠端則透過網際網路進行直接監控。 而遠端的部份’亦可由有線區域網路、無線區域網路或其組合者之方式架 設。以下,將介紹部份的實施架構。 運用第2圖的網路攝影機,進行適當的安裝與設置,即可達到發明所 欲達到的嚴密監控的目的。具體的佈置,請參考第3 _範例,其為本發 明運用網路攝影機架設於實韹場所之架設範例,於T1時間之情形。 〇 在受監控場所當中,其被區分為多個區塊,分別為:大門302, 314、 .區域 304, 306, 3〇8, 310, 311, 312, 316, 318, 320, 322, 324, 326, 328, 330, .332, 334, 336, 338, 340, 342, 344, 346, 348 等等,其中,每個區塊都至少 安裝了一台網路攝影機402〜464,例如,區域320, 322, 324, 326, 328, 330, 336, 338, 340, 342, 344等,其為小型個人辦公室,由於其空間較小,因此 只裝設了一台網路攝影機,分別為網路攝影機402, 404,406, 408,410, 412, 444, 446, 448,450, 452等。此外’區域346為廊所,不適宜安裝網路攝 影機’以免侵害個人隱私權,因此未加安裝。區域304, 306, 308, 310為走 12 201037637 廊因其為狹長之空間結構,因此,分別安裝了兩台的網路攝影機,分別 為網路攝影機 414, 416, 418, 420, 422, 424, 436, 438, 440, 442 等。區域 332、區域334射型空間,分別安裝了 2〜3台網鱗影機,分別為網路 攝影機426, 428, 430, 432, 434等。區域348則為實驗室的空間,其具有 ' _走道區域’分別為區域316, 318。由於其範圍較大,因此裝設了多個 網路攝影機,分別為,網路攝影機454, 456, 458, 460, 464等。 此外,第3圖中亦顯示有一些固定的辦公室設備,例如,電腦設備5〇2 〇 安裝於前述的房間中,置物櫃504、置物櫃506、工作平台508等等,分 別位於不同的區域。 如此的網路攝影機的配置,可讓整個工作場所的每個角落,均被納入 嚴密的監控當中。例如第3圖中,使用者901在T1時間時,位於區域308, 亦即走廊上,其影像將同時被6台網路攝影機所拍攝到,分別為網路攝影 機414, 416, 418, 420, 422, 424。此六台網路攝影機將會分別產生移動資 料’透過網路(無論是區域網路或者遠端網際網路)傳輸到監控中心以儲存到 〇 資料庫當中。同時,由於使用者901身上帶有代表身份的RFID,因此,在 , 可感測到RFID的距離當中,有部份網路攝影機將會感測到此RF|D的存 • 在’進而產生身份資料’並透過網路傳輸到監控中心以儲存到資料庫當中。 如果同時有多台網路攝影機擷取到RHD資料時,較容易造成系統的負 擔。因此,較為適當的作法是,所採用的主動式的RFIDS射功率,其發射 距離有所限制,並與網路攝影機的紅外線感測可擷取到的距離搭配。例如, 一般來講’紅外線感測可偵測到5公尺’則搭配RFID發射距離5公尺為 佳°當然,其他的感測距離同樣可達到本發明的功效。 13 201037637 如此,在第3圖的T1時間時,雖然有六台網路攝影機會拍攝到使用者 901 ’但由於有擷取距離的限制時,較佳者為只有網路攝影機416,418, 422 三台能同時產生移動資料與代表使用者9〇1的rfid身份資料。 接著,請參考第4圖,其為本發明運用網路攝影機架設於實體場所之 架設範例,於T2時間之情形。於丁2時,使用者9〇1由ή的位置移動到 " 走廊的另一側,此時,有五台網路攝影機會拍攝到使用者901的影像,分 別為網路攝影機436, 438, 440, 442, 424。而由於前述的距離限制,因此, 0 有四台網路攝影機會擷取到使用者901的RFID身份資料,分別為網路攝 影機438, 440, 424, 422,不過,卻只有三台網路攝影機會棟取到使用者 901的移動資料,分別為網路攝影機438, 440, 424。會產生這樣差異性的 原因在於,網路攝影機有其視角,其非36〇度可視,於是,雖然使用者9〇1 已離開網路攝影機422的可視範圍,可是卻未離開其RF|D感測範圍,因 此’在網路攝影機422宜離開時’會發生移動資料已消失,但RFID的身 份資料仍然會產生,直到其離開了 RHD的感測範圍》 〇 接下來,請參考第5圖,其為本發明運用網路攝影機架設於實體場所 • 之架設範例,於T3時間之情形。於T3時,使用者901由T2的位置移動 • 到區域348的部份,並向區域316的走廊前近,此時,區域348當中的六 台網路攝影機均會拍攝到使用者9〇1的影像,分別為網路攝影機 458, 460, 462, 464。而由於前述的距離限㈣,因此,有兩台網路攝影機會 糊取到使用者901的RFID身份資料’分別為網路攝影機460, 462,同樣 地’此兩台網路攝影機亦會擷取到使用者9〇1的移動資料。 接著,請參考第6圖,其為本發明運用網路攝影機架設於實體場所之 201037637 架設範例’於T4時間之情形。於T4時,使用者9〇1由T3的位置移動到 代表會議至的區域332 ’此時’有三台網路攝影機會拍攝到使用者9〇1的 影像,分別為網路攝影機426, 428, 43〇。而由於前述的距離限制,因此, 有一台網路攝影機會操取到使用者9〇1的RFID身份資料,其為網路攝影 機430 ’同時,其會擷取使用者901的移動資料。 接著,請參考第7 ® ’其為本發明運制路攝影齡設於實體場所之 架叹範例’於T4時間之另外一種情形。於T4時,使用者9〇1由T3的位 〇 ϊ先移動到代表廁所的區域346,再移動到代表會議室的區域332。由於使 用者901將RFID遺失在廊所當中,因此,會發生不同的感測情形。j在 廟所旁的網路攝影機442,會持續感測到代表使用者身份的RF丨D,並持續 傳送身份資料給監控中心;2·使用者從區域346往區域332移動的過程 中’會經過區域312, 308, 304,其間的網路攝影機442, 440, 438, 436, 424, 422, 416, 414, 418, 420, 430, 428, 426等會拍攝到其影像,不過,經過距 離較近的幾_路攝影機會細到使,並產生移㈣料,分別為網路 〇攝影機442, 420, 424, 422, 416, 430等。這幾台網路攝影麟續拍攝到使 用者901的影像’並且’其中一些網路攝影機持續傳送移動資料不過, * 卻因為使用者901未攜帶RFID,造成未擷取到身份資料。此種情形,皆可 藉由本發明的方法輕易地進行辨別,並達到嚴密的監控目的。 接下來,請參考第8圖,其為依第3〜7圖,T1〜T4時間内所纷製之物 件移動動線@範例。f知的技術’要賴相_隸,‘賴採用人工的方 式進行影像掉閱,並進行判別。運用本發明,可輕易完成各種監控的需求。 使用者901從大門302進入後的動線,過程中,會由各個不同的網路攝影 15 201037637 機祿取到代表其身份的身份資料與移動賴。由於身份資料與移動資料均 包含到資料串流當中’與網際網路簡取的影像f料共_輸並储存到資 料庫中。因此’每筆身份資料、影像資料與移動資料均包含有時間戮記。 網路攝影機由於具有網路位址,因此,資料串流當中,亦包含有網路位址 '的資料’如此’每筆資料串流,都有其可供檢索的資料槽頭,分別為:時 .間、網路位址(代表特定的網賴影機)、身份資料(代表操取刺咖)、 與移動資職表使用者存朴藉由資料庫當中所健存的這些資料,本發明 0 即可進行各種不同的監控應用。 清參考第9圖’其為本發明之以身份識別進行物件監控之方法第一具 體流程圖,包含下列步驟: 步驟601 :接收並儲存經核准身份資料。 監控中〜的監控軟體’可設計—使用者介面,讓射人貞於進入欲監 控場所時’蹄雜魏的雜。_般_,餘每魏人監㈣所的人 於是’經由操作人員的輸入 員,皆需配帶一個RFID,以便作人員的控管 〇監控軟體即將操作人員所輸入的身份資料予以接收並儲存在資料庫中,以 進行後續的監控動作。 步驟602 ··細到資料串流帶有身份資料。 孤控軟體將持續制由各個網路攝影機所傳來的資料串流當中,是否 帶有身份資料。 步轉603 :產生-物件出現訊息並進行警示。 一旦資料串流帶有雜資料時,即進行警示。警示的方法有數種,例 如’畫面跳岭示符號 '畫舰岭示訊息、產生警示聲、產生警示語音, 16 201037637 或者,以上數種動作的任意組合皆可採用。前述的各種警示方法,其内容 可由設計人員自行調整。此外,警示語音可由監控中心電腦的撥放器,或 者外接到監控中心的喇叭系統,以產生較強烈的警示作用。 步驟604 :偵測到非核準之身份資料。 步驟602所偵測到的身份資料,有可能是步驟6〇1所未登錄的身份資 •料。此種狀況,可能是操作人員登錄錯誤,或者,有人自行攜帶其他未登 錄的RFID進入尊等,各種可能的狀況。此時,可藉由此步驟將此事件進行 Ο I示。 步驟605 :產生一非法身份進入訊息並進行警示。 警示的方法如前所述,不再贅述。 步驟606 :經過T1時間仍未偵測到移動資料。 此T1時間的長短,可依據現場的環境來設計。例如,網路攝影機的距 離較近,可設定為較短時間,反之,網路攝影機的距離較遠時,可設定較 長時間β Q 步驟607 :產生一物件消失訊息並進行警示。 . 警示的方法如前所述,不再贅述。 . 步驟608 :偵測到身份資料消失。 當相同來源的資料串流中,原先所偵測到的身份資料消失時,監控軟 體同樣可偵測到。 步驟609 :產生一物件離開訊息並進行警示Τ3時間。 此Τ3時間的長短,可依據實際的需求來設計。其中,長—點的時間, 例如3〜5秒鐘’可達到較持續的警示;短一點的時間,可達到降低敗^人 17 201037637 員的負擔’例如3秒以下。不同的時間長度,有不_效果,可由實務上 的需求調整之。 第9圖的雜圖’說明了本發明的基本魏,亦即,運用同時儲存有 影像資料、雜㈣、移動資料、時間戳記的資料串流的龍庫,即可進 打各種監控的運用’以下,將分別介紹各種監控的警示或應用功能。 請參考第10圖,其為本發明之以身份識別進行物件監控之方法第二具 體流程圖,其說明了使用者移動卻未攜帶RFID時本發a月之處置方法,包含 0 下列步驟: 步驟611 :接收並儲存所核准身份資料。 監控令心的監控軟體,可設計一介面,讓操作人員於進入欲監控場所 時,進行身份資料的登錄。一般來講,由於每個進入監控場所的人員,皆 需配帶-個RFID,以便作人員的控管。於是,經由操作人員的輸入,監控 軟體即將操作人員所輸入的身份資料予以接收並儲存在資料庫中,以進行 後續的監控動作。 Q 步驟612 W貞測到資料串流帶有移動資料。 . 當使用者移動時,若進入網路攝影機的熱源偵測之監控範圍時,網路 攝影機即會產生移動資料。此時,資料串流將會包含有移動資料,監控軟 體隨時進行此項監控。 步驟613 :產生一物件移動訊息並進行警示。 當偵測到移動資料,隨即產生物件移動訊息。同樣地,警示的方法如 前所述,不再贅述。 步驟614 :經過T4時間仍未偵測到身份資料。 18 201037637 如果經過Τ4 _ ’卻仍未姻献表者的身份雜,表示使用者 並未攜帶RF丨D。此丁4時間,係以移動資料產生時的距離,與細到RFID 的距離之間的可能差距來計算。例如第3圖的情形,當使用者從大門3〇2 走到區域308時’網路攝影機422可能先偵測到使用者9〇1的熱源,並先 •產生移動資料。除非制者901到了大Η 口停下來,到,使用者持續前 進的結果’應於極短的時間内達到RFID的_範圍一般來講,人的步行 速度約為每秒2步,男人的步距約為75公分,女人約為的公分換算的 〇、’〇果男人約為每&1·5公尺,女人約為12公尺。因此,還需視實際上的 RFID讀取距離以及紅外線熱源偵測的距離而定。 步驟615 .產生-不明物件闖入訊息並進行警示。 曰發生步驟614之情形時,即進行此種事件之警示,警示的方法如前 所述,不再贅述。 接下來’ π參考第11圖,其為本發a月之以身份識別進行物件監控之方 法第三具體流程圖,其說明了本發明應用在管制區之監控措施,包含下列 〇 步驟: • 步驟621 .接收並儲存所設定之管制區網路攝影機丨p。 , i控軟體可提供操作平台供操作人貞進行操作,以輸人管制區當中的 網路攝景/機IP纟於每台網路攝影機均有一個網路位址,因此,只要依據 平面圖的配置’如第3圖的範例,即可對應出管制區的網路攝影機。藉由 操作人員H即可於資料賴存管制區網路攝影機的丨p資訊。 步驟622 .接收並儲存允許進人管制區之身份資料。 監控中心的監控軟體,可設計一使用者介面,讓操作人員於進入欲監 19 201037637 控場所時,進行身份資料的登錄。一般來講,由於每個進入監控場所的人 員,皆需配帶一個RFID,以便作人員的控管。於是,經由操作人員的輸入, 監控軟體即將操作人員所輸入的身份資料予以接收並儲存在資料庫中,以 進行後續的監控動作。 步驟623 :細到資料串流同時包含設定之管制區網路攝影機|p與非 經允許的身份資料。 步驟624 :產生一非法闖入訊息並進行警示。 〇 ㈣的方法如前所述,科贅述。此種可依據現場控管的 需求來設計。由於管制區的控管,為重視保密措施的公司所著重,因此, 特別需要嚴密的控管。相關的控管方法,可參考第12圖的方法。 請參考第12圖,其為本發明之以綠識別進行物件監控之方法第四具 體流程圖,其說明了本發明的互動式主動人員控管的方法,包含下列步驟: 步驟631 :接收一警示事件選取指令。 畜發生了如第 ❹ 圃的警示事件時’操作人員可依據監控軟體所提 的介面’選擇其卜個警轉件。當猶人員進行選顯,監控軟體即 收到-個警素綱+ 辦獅。祕本發明所 用的網路攝影機,具有椒的播音功能,並且,還可選擇具有麥克風的 能。於是,本發明所採用的網路攝影機,可與監控中心進行雙向的對談 當選取到辩_了物·細,爛—個到 個’以進行更廣泛的播音或雙向溝通。 步續:依軸取齡傳㈣谢_事件發 影機以進行連線。 20 201037637 S選取到特疋的網路攝影機時’監控軟體即傳送警示指令到該相關的 網路攝影機,並進行連細作㈣的準倚動作。 步称633 :接收播音對話指令。 接下來一操作人員啟動了播音對話鍵,亦即,下達了播音對話指 令給監控軟體’監控軟體即獲得了被選取_路攝影機的私、麥克風介 面的雙向溝通的控制權》 〇 ❹ 步驟634 .藉由產生該警示事件之铜路攝賴之該語音撥放單元進 行警示播音動作。 於是,監控軟斷可透過網路,讓操作人員可收制被選取的網路攝 影機的聲音,並且’由被選取的網路攝影機播放監控中心操作人員的發音。 第13圖說明了藉由本發明的方法來達到主動警示的功能。此功能係透 過本發明的方法,來即時提醒監控中心的操作人員警示事件的發生,献後, 操作人員在依據本發明的方法,來進行即時的監控,以達到警示、嚇阻、 S月的力能如此可即時防止危害事件或者誤聞管制區的狀況發生。 接下來’請參考第13圖,其為本發明之以身份識別進行物件監控之方 法第五具程圖,其說明了本發明如何達到將物件的移動歷程予以播放 或燒錄的功能,包含下列步驟: 步称641 :接收欲搜尋之躲資料。 監控軟體可麟-制者介面,義作人貞_^所欲搜份 資料。 步釋642 ··搜尋資料庫t含有該身份資料之資料串流。 當監控軟體細了__綱,特行f物搜尋,將 21 201037637 包含有該身份資料的資料串流找出來。 步驟643:衫進行事件燒錄。 監控軟體可提供-選項供操作人貞餅麟’是否要進行麟以做後 續的證據保全。 步驟644 :操取具有該身份資料之資料串流’並依據時間先後順序進 ' 行串流合併,以進行燒錄。 當操作人員選擇燒錄時,即可進行資料的燒錄動作。由於資料串流皆 0 帶有時間戳記,因此,監控軟體可依據時間先後順序提供給燒錄軟體燒錄 成光碟片,或者’儲存為一資料檔,以便日後調閱方便。 步驟645 :擷取具有該身份資料之資料串流,並依據時間先後順序進 .行播放。 當操作人員未選擇燒錄時,即可進行該身份資料的移動歷程播放。播 放的過程,可能是單一個網路攝影機的畫面,可能是多個網路攝影機的畫 面"端視實際上擷取到身份資料的網路攝影機數目而定。 Ο 以上第9〜13圖的方法,可由第14圖的畫面簡易說明之,其為運用本 - 發明之運用射頻識別功能之網路監控系統進行物件監控之方法,於監控平 台700上之模擬圖。 監控平台700上,共有16個監控畫面70W16。每個監控畫面的左 上角,皆有-事件訊息顯示畫面,而右上㈣可能跳出警示符號。其中, 第14圖的範例令’左上角的事件訊息,包含了 ID、時間、事件。其中,監 控畫面707與監控畫面708為管制區的網路攝影機。 以第14圓為例,共有4個事件,分別發生於監控畫面7〇3, % 22 201037637 711。其狀況顯示分別為:畫面7〇3,丨D: 〇〇〇1111、時間:12: 31: 56、事件: 有丨D無人員,紅色警示符號;畫面7〇6,丨D: 〇〇〇1234、時間a % 56、 事件·人員進入’藍色警示符號;晝面7〇7,丨D: 〇〇〇4321、時間:泌、 事件:非法進入管制區,紅色警示符號;畫面711,|D: N/A、時間:12: 31: 56、事件:無ID,紅色警示符號; 藉由第14圖’監控中心的操作人員可清楚知道每個畫面的狀況,並依 .據有狀況的畫面進行直接之處h並且,可依據第則的方法,將所有的 〇人員移動的歷程輕易觸,並不需要調閱大量的影像播案。於是,藉由本 發明可達到嚴密監控之效果。* In addition to related information such as image data and network address, it can also transmit the identity data that is represented by the object movement and that is read by the RFID tag. The two signals are generated by the infrared receiver 172 of the present invention, the RFID reading unit 190 and the control unit 150', and the external RF|[) and the user carrying the RF|D. Actually, the user has an RFID tag that can be read by the webcam 100 of the present invention. When the user passes the network camera of the present invention, the infrared receiver 172 is on the one hand. The user control unit can detect that the signal change from the infrared receiver 172 through the 201037637 is calculated to be close to the human body (the human body is a heat source) to transmit the mobile data generated by the user control unit; When the reading unit 19 reads the RF 丨D tag, the identity data is transmitted. Since the two materials should generate the 'then' back-end system at the same time or in close proximity, the object tracking and monitoring can be carried out according to the presence or absence of the two materials, so as to achieve strict monitoring effect. In addition, the network video player W can also be designed to receive the identity material or generate mobile data, the tree touch __supervisor, (4) delete run, and only let the monitoring personnel only take the financial object __ Lai Tear monitoring can greatly reduce the burden on monitoring personnel. The action is also controlled by the control unit 150 as a whole. When the control unit 150 receives the identity data or generates the mobile data, the control network fabric 18Q transmits the image data and the received identity data and materials; After the identity information has not generated the mobile data, the control network interface unit 18 stops transmitting the image data. In addition, since the sender of the network interface unit 180 is digital data, the control unit 150 can transmit the shadow stream representing the image, the mobile representative message, and the identity data representing the identity message through the network interface unit. Saki is not transmitting. If the stencil of the wireless network module is used, the ___ ___ router, the invention of the wired network module can be used. As described above, the present invention provides video data, identity data, and mobile familiarity by using a network camera, and all of them have __ available_行_. _ Road Camera (10) Possible network modules are wired network modules, wireless network modules, and wired wire network modules. Therefore, this (four) in the whole health (four), _ green on the shirt type combination. 丨 · wired regional network connection; " wireless regional network connection; 丨 " Internet connection; 丨 V above 11 201037637 Optional network A combination of road links. Therefore, the erection of the system can be carried out according to actual monitoring requirements. For example, only single-area demanders can be tailored to the on-site network environment. If the live network environment is sufficient for the wired area network, the wired area network can be set up. If the on-premises network environment is reachable by a wired area network, but some areas have no wired area network, • a wired area network and a wireless area network hybrid partner can be adopted. If the on-premises network environment does not have a wired area network and the wired area network environment is not easily installed, the wireless area network provider can be used. Ο For example, if there is remote monitoring and local monitoring requirements, the local end can be wired to a wired area network or a wireless area network or a combination thereof, while the remote end can be directly monitored through the Internet. The remote portion can also be configured by a wired local area network, a wireless local area network, or a combination thereof. Below, some of the implementation architectures will be introduced. By using the network camera of Figure 2, proper installation and setup can achieve the purpose of strict monitoring by the invention. For the specific layout, please refer to the 3rd _ example, which is an example of the installation of the network camera rack in the real place, in the case of T1 time. 〇 In the monitored place, it is divided into multiple blocks, namely: gates 302, 314, .304, 306, 3〇8, 310, 311, 312, 316, 318, 320, 322, 324, 326, 328, 330, .332, 334, 336, 338, 340, 342, 344, 346, 348, etc., wherein each block has at least one network camera 402-464 installed, for example, area 320 , 322, 324, 326, 328, 330, 336, 338, 340, 342, 344, etc., which are small personal offices. Because of their small space, only one webcam is installed, which is a webcam. 402, 404, 406, 408, 410, 412, 444, 446, 448, 450, 452, and the like. In addition, the 'area 346 is a gallery, and it is not appropriate to install a network camera' to avoid infringement of personal privacy, so it is not installed. The area 304, 306, 308, 310 is the walk 12 201037637. Because of its narrow and long space structure, two network cameras are installed respectively, namely web cameras 414, 416, 418, 420, 422, 424. 436, 438, 440, 442, etc. The area 332 and the area 334 are equipped with two or three network scale cameras, respectively, which are network cameras 426, 428, 430, 432, 434, and the like. Region 348 is the laboratory space with '_walkway regions' as regions 316, 318, respectively. Due to its large size, a number of network cameras are installed, namely, network cameras 454, 456, 458, 460, 464 and the like. In addition, Figure 3 also shows some fixed office equipment, for example, computer equipment 5〇2 〇 installed in the aforementioned room, storage cabinet 504, storage cabinet 506, work platform 508, etc., located in different areas. The configuration of such a webcam allows every corner of the workplace to be closely monitored. For example, in FIG. 3, when the user 901 is at the time T1, it is located in the area 308, that is, on the corridor, and the image thereof will be captured by six network cameras at the same time, which are the network cameras 414, 416, 418, 420, respectively. 422, 424. The six webcams will each generate mobile data 'transferred to the monitoring center via the Internet (whether regional or remote) for storage in the database. At the same time, since the user 901 has an RFID with a representative identity, some of the network cameras will sense the presence of the RFID. The data is transmitted to the monitoring center via the network for storage in the database. If multiple network cameras capture RHD data at the same time, it is more likely to cause the burden on the system. Therefore, it is more appropriate to use the active RFIDS radio power with a limited transmission range and match the distance that the network camera's infrared sensing can capture. For example, in general, 'infrared sensing can detect 5 meters', and the RFID transmitting distance is preferably 5 meters. Of course, other sensing distances can also achieve the effects of the present invention. 13 201037637 So, in the T1 time of Figure 3, although there are six webcams to capture the user 901 ', but because of the limitation of the distance, it is better to only have three cameras 416, 418, 422 It can simultaneously generate mobile data and rfid identity data representing the user's 9〇1. Next, please refer to FIG. 4, which is an example of the erection of a network camera rack installed in a physical place in the present invention, at time T2. At Ding 2, the user 9〇1 moved from the position of the 到 to the other side of the corridor. At this time, there were five webcams to capture the images of the user 901, namely the network camera 436, 438 , 440, 442, 424. Due to the aforementioned distance limitation, there are four webcams that capture the RFID identity data of the user 901, namely the network cameras 438, 440, 424, 422, but only three webcams. The mobile station retrieves the mobile data of the user 901, which are the network cameras 438, 440, and 424, respectively. The reason for this difference is that the webcam has its view angle, which is not visible at 36 degrees. Therefore, although the user 9〇1 has left the visible range of the webcam 422, it has not left its RF|D sense. Measure the range, so 'when the webcam 422 should leave', the mobile data will disappear, but the RFID identity will still be generated until it leaves the sensing range of the RHD. 〇 Next, please refer to Figure 5, It is an example of the erection of a network camera rack in a physical location in the present invention, at the time of T3. At T3, the user 901 moves from the position of the T2 to the portion of the area 348 and approaches the corridor of the area 316. At this time, the six network cameras in the area 348 will capture the user 9〇1. The images are webcam 458, 460, 462, 464. Due to the aforementioned distance limit (4), there are two webcams that get the RFID identity data of the user 901 'network camera 460, 462 respectively, and the same two web cameras will also capture Mobile data to user 〇1. Next, please refer to Fig. 6, which is a case of the erection example of the 201037637 installation of the network camera rack in a physical place at the time of T4. At T4, the user 9〇1 is moved from the position of T3 to the area 332 representing the conference. At this time, there are three webcams to capture the images of the user 9〇1, which are the network cameras 426, 428, respectively. 43〇. Due to the aforementioned distance limitation, there is a webcam that fetches the user's RFID identity data, which is the webcam 430', while it retrieves the mobile data of the user 901. Next, please refer to Section 7 ® ', which is another example of the sling example of the invention of the road photography age set in a physical place at time T4. At T4, the user 〇1 is moved from the position T of the T3 to the area 346 representing the toilet, and then moved to the area 332 representing the conference room. Since the user 901 loses the RFID in the gallery, different sensing situations occur. j The webcam 442 next to the temple will continue to sense the RF丨D representing the user's identity and continue to transmit the identity information to the monitoring center; 2. The user will pass through the process from the area 346 to the area 332. Areas 312, 308, 304, with webcams 442, 440, 438, 436, 424, 422, 416, 414, 418, 420, 430, 428, 426, etc., will capture their images, but the distance is closer The number of photographic opportunities is fine, and the shifting (four) materials are generated, which are network cameras 442, 420, 424, 422, 416, 430, and so on. These webcams continue to capture images of the user 901 'and' some of the web cameras continue to transmit mobile data. However, because the user 901 does not carry the RFID, the identity data is not retrieved. In this case, it can be easily discriminated by the method of the present invention and achieves strict monitoring purposes. Next, please refer to Fig. 8, which is an example of the movement of the object moving in the period from T1 to T4 according to the figures 3 to 7. The technology of f knows to rely on the phase _ Li, ‘is to use the artificial method to read the image and discriminate. With the present invention, various monitoring requirements can be easily accomplished. The user 901 enters the moving line from the gate 302. In the process, the identity data and the mobile identity representing the identity of the user are obtained by different network cameras. Since both identity data and mobile data are included in the data stream, the image captured with the Internet is deleted and stored in the data repository. Therefore, each identity, video and mobile data contains time to remember. Because the webcam has a network address, the data stream also contains the data of the network address 'so'. Every data stream has its data slot that can be retrieved. Time, network address (representing a specific network camera), identity data (representing the operation of the thorns), and mobile data users to save the information stored in the database, this Invention 0 allows for a variety of different monitoring applications. BRIEF DESCRIPTION OF THE DRAWINGS FIG. 9 is a first specific flowchart of a method for object monitoring by identity identification according to the present invention, comprising the following steps: Step 601: Receive and store approved identity data. The monitoring software in the monitoring system can be designed to be a user interface, so that the shooting person can sneak into the hoof. _ _ _, Yu Wei Weiren (four) of the person then 'through the operator's input, all need to be equipped with an RFID, so that the control of the personnel, the monitoring software will be received by the operator and the identity information is received and stored in the data In the library, for subsequent monitoring actions. Step 602 ·· Fine to the data stream with identity data. The orphan control software will continue to process the data stream transmitted by each network camera with identity data. Step 603: Generate - the object appears with a message and alerts. A warning is given once the data stream has miscellaneous information. There are several methods for warning, such as the 'screen jumping sign', the picture of the ship, the warning signal, the warning sound, 16 201037637 or any combination of the above several actions can be used. The various warning methods described above can be adjusted by the designer. In addition, the warning voice can be transmitted from the monitor of the monitoring center computer or externally to the speaker system of the monitoring center to generate a stronger warning function. Step 604: Unauthorized identity data is detected. The identity data detected in step 602 may be the identity information that is not logged in step 6〇1. In this case, the operator may be logged in incorrectly, or someone may bring other unregistered RFID into the sire, etc., in various possible situations. At this point, this event can be shown by this step. Step 605: Generate an illegal identity entry message and perform a warning. The method of warning is as described above and will not be described again. Step 606: The mobile data is still not detected after the T1 time. The length of this T1 time can be designed according to the environment of the site. For example, if the distance of the network camera is relatively short, it can be set to a shorter time. On the contrary, when the distance of the network camera is far, it can be set for a long time β Q. Step 607: An object disappearing message is generated and a warning is issued. The method of warning is as described above and will not be described again. Step 608: It is detected that the identity data disappears. When the identity data detected by the original source stream disappears, the monitoring software can also detect it. Step 609: Generate an object leaving message and perform a warning for 3 times. The length of this Τ3 time can be designed according to actual needs. Among them, the long-point time, for example, 3 to 5 seconds, can achieve a more sustained warning; in a shorter time, the burden of the person can be reduced, for example, less than 3 seconds. Different lengths of time, there is no effect, can be adjusted by the actual needs. The hybrid diagram of Fig. 9 illustrates the basic Wei of the present invention, that is, the use of a dragon library that simultaneously stores image data, miscellaneous (four), mobile data, and time stamp data can be used for various monitoring applications. In the following, various monitoring warnings or application functions will be introduced separately. Please refer to FIG. 10 , which is a second specific flowchart of the method for monitoring the object by identity according to the present invention, which illustrates a method for disposing a month when the user moves but does not carry the RFID, and includes the following steps: 611: Receive and store the approved identity data. The monitoring software of the monitoring center can design an interface for the operator to log in the identity data when entering the place to be monitored. Generally speaking, each person entering the monitoring site needs to be equipped with an RFID to control the personnel. Therefore, through the input of the operator, the monitoring software receives the identity data input by the operator and stores it in the database for subsequent monitoring actions. Q Step 612 W detects that the data stream has mobile data. When the user moves, if the network camera's heat source detection monitoring range is entered, the network camera will generate mobile data. At this point, the data stream will contain mobile data, and the monitoring software will perform this monitoring at any time. Step 613: Generate an object movement message and perform a warning. When a mobile data is detected, an object movement message is generated. Similarly, the method of warning is as described above and will not be described again. Step 614: The identity data is still not detected after the T4 time. 18 201037637 If Τ4 _ ’ is still not married, it means that the user does not carry RF丨D. This D4 time is calculated by the possible difference between the distance when the mobile data is generated and the distance to the RFID. For example, in the case of Fig. 3, when the user walks from the gate 3〇2 to the area 308, the webcam 422 may first detect the heat source of the user 9〇1 and first • generate the mobile data. Unless the maker 901 stops at the big mouth, the result of the user's continuous advancement 'should reach the RFID range in a very short period of time. Generally speaking, the walking speed of the person is about 2 steps per second. The distance is about 75 cm, the woman is about the centimeters of the conversion, the 'fruit man is about every 1.5 meters, and the woman is about 12 meters. Therefore, it depends on the actual RFID reading distance and the distance detected by the infrared heat source. Step 615. Generate - Unknown object breaks in the message and alerts.警 When the situation of step 614 occurs, the warning of such an event is performed, and the method of warning is as described above, and will not be described again. Next, π refers to FIG. 11 , which is a third specific flowchart of the method for object monitoring by ID for the month of the present invention, which illustrates the monitoring measures applied by the present invention in the control area, and includes the following steps: • Steps 621. Receive and store the set control area network camera 丨p. , i control software can provide an operating platform for the operator to operate, to enter the network area / machine IP in the control area, each network camera has a network address, so as long as the plan Configure 'as in the example in Figure 3, you can correspond to the network camera in the control area. With the operator H, the data can be stored in the control area of the network camera. Step 622. Receive and store the identity data allowed to enter the control area. The monitoring software of the monitoring center can design a user interface, allowing the operator to log in to the identity data when entering the control site. Generally speaking, each person entering the monitoring site is required to have an RFID for the control of personnel. Therefore, through the input of the operator, the monitoring software inputs the identity data input by the operator and stores it in the database for subsequent monitoring actions. Step 623: The data stream is detailed to include the set control zone network camera |p and the unauthorized identity data. Step 624: Generate an illegal intrusion message and perform an alert. The method of 〇 (4) is as described above, the section of the section. This can be designed according to the needs of on-site control. Since the control of the control area is heavily valued by companies that value confidentiality measures, strict control is particularly needed. For the related control method, refer to the method in Figure 12. Please refer to FIG. 12, which is a fourth specific flowchart of the method for monitoring object by green identification according to the present invention. The method for controlling the active active personnel of the present invention includes the following steps: Step 631: Receive a warning Event selection instruction. When the animal has a warning event such as the first warning, the operator can select the police relay according to the interface proposed by the monitoring software. When the Jews are selected, the monitoring software receives a police officer + a lion. The webcam used in the invention has the function of broadcasting pepper, and the ability to have a microphone. Therefore, the network camera used in the present invention can perform a two-way conversation with the monitoring center. When selecting a contender, the object is fine, rotten-to-one for wider broadcasting or two-way communication. Steps: According to the axis, the age is passed (four) Xie _ event sent to the camera to connect. 20 201037637 S When selecting a special network camera, the monitoring software sends a warning command to the relevant network camera, and performs the quasi-reliance action of the detailed (4). Step 633: Receive the broadcast dialogue command. The next operator starts the broadcast dialogue button, that is, the broadcast dialogue command is issued to the monitoring software 'monitoring software, that is, the control of the two-way communication of the private and microphone interfaces of the selected camera is obtained 〇❹ step 634 . The voice playing unit is activated by the voice dialing unit that generates the warning event. Thus, the monitoring soft break can be made through the network, allowing the operator to capture the sound of the selected network camera and 'playing the pronunciation of the operator of the monitoring center by the selected network camera. Figure 13 illustrates the function of the active alert by the method of the present invention. This function is used to promptly remind the operator of the monitoring center to alert the occurrence of the event through the method of the present invention. After the offer, the operator performs on-the-spot monitoring in accordance with the method of the present invention to achieve warning, deterrence, and S-month. Force can immediately prevent a hazardous event or misunderstand the situation in the controlled area. Next, please refer to FIG. 13 , which is a fifth process diagram of the method for object monitoring by identity according to the present invention, which illustrates how the present invention can achieve the function of playing or burning the movement course of the object, including the following. Step: Step 641: Receive the hidden information to be searched. The monitoring software can be used for the interface of the system, and the person who wants to search for it. Step 642 ··Search database t contains the data stream of the identity data. When the monitoring software is thin, the __ class, the special item search, finds 21 201037637 data stream containing the identity data. Step 643: The shirt performs an event burning. The monitoring software can provide - the option for the operator to lick the pie lining if it is necessary to carry out the lining for subsequent evidence preservation. Step 644: fetch the data stream with the identity data and perform the stream merge according to the chronological order to perform the burning. When the operator selects to burn, the data can be burned. Since the data stream is 0 with a time stamp, the monitoring software can be provided to the burning software to burn the disc in chronological order, or 'stored as a data file for easy access later. Step 645: Capture the data stream with the identity data, and play in accordance with the chronological order. When the operator does not select to burn, the mobile history of the identity data can be played. The process of playing may be the picture of a single webcam, which may be based on the number of web cameras that actually capture the identity data. Ο The method of the above 9th to 13th drawings can be briefly explained by the screen of Fig. 14, which is a simulation method of the object monitoring method using the network monitoring system using the radio frequency identification function of the present invention. . On the monitoring platform 700, there are 16 monitoring screens 70W16. In the upper left corner of each monitor screen, there is an event message display screen, and the upper right (four) may jump out of the warning symbol. Among them, the example in Figure 14 makes the event message in the upper left corner contain the ID, time, and event. Among them, the monitoring screen 707 and the monitoring screen 708 are network cameras of the control area. Taking the 14th circle as an example, there are 4 events, which occur on the monitoring screen 7〇3, % 22 201037637 711. The status displays are: screen 7〇3, 丨D: 〇〇〇1111, time: 12: 31: 56, event: 丨D no personnel, red warning symbol; screen 7〇6, 丨D: 〇〇〇 1234, time a % 56, event and personnel enter the 'blue warning symbol; face 7〇7, 丨D: 〇〇〇4321, time: secretion, event: illegal entry into the control area, red warning symbol; screen 711, | D: N/A, time: 12: 31: 56, event: no ID, red warning symbol; with the operator of the monitoring center in Figure 14 can clearly know the status of each screen, and according to the situation The picture is directly related to h, and according to the method of the first step, all the movements of the deaf person can be easily touched, and there is no need to access a large number of video broadcasts. Thus, the effect of close monitoring can be achieved by the present invention.

接下來,凊參考f 15圖係為本發明之以身份識別進行物件監控之方法 第六具體流程圖’其制了本發鴨網路簡串流中包含有身份資料與移 動資料_,進行人員追蹤的例子。第9圖〜第13圖的五個流程圖實施 例中’係說明了本發_到各種物件監控的方法,其中,在不同的事件 狀況下,可能會需要進行事件的持續監控,並進行魏。獅本發明第Μ 圖的方法,即可直接進行物件之追蹤,其包含以下步驟: 麵651 :提供網路攝影卿之關聯㈣每台網路攝影機的丨P,均 可事先透過平面_配置而得知其__賴雜之丨p。預先建立此關 聯資料’將可贿地精相輯频_㈣面警示。 步驟:接收-物件追縱指令。第㈣圖的方法中,有物件出現、物 =件物件消失、非法身份進入、物件移動、不嘯件闖入、非法聞入 絲事件綠度’監控人貞可據雜不_警示動作。其 中’物件追断為第15_财者。監控人胃可選取料,釘達物件追 23 201037637 縱指令,系統即可據以動作。其中,下達物件追縱指令者,可設計一追縱 選項於軟艎,顯示於螢幕供監控人員操作。追縱選項可採用圖示、文字不 等。 步驟653 :依據該物件追蹤指令選取待追蹤網路攝影機ιρ,並進行追蹤 警示。在下達物件追縱指令的同時,必須選取待追蹤的網路攝影機丨p。其 中,可能選取的是一個’或者多個,端視拍攝到該事件的網路攝影機的數 目而定。被選取到的網路攝影機,將會顯示成追蹤狀態。 〇 步驟6541依據該關聯資料進行該網路攝影機鄰近之網路攝影機追縱畫 面顯示。此時,即可依據關聯資料,選取拍攝到該事件的網路攝影機相鄰 的網路攝影機,讓其同步進行晝面追縱,以方便監控人貞進行監控。例如, 採用畫面持續跳出或同步顯示警示的方式。 步驟655 :接收到停止追縱指令。系統在追縱的狀態下,可提供一停止 追縱指令’讓監控人員可進行停止追縱的動作 步驟656 :被追蹤物件移動到其他的謂路_機。當被追蹤物件移動到 〇其他網路攝影機時,亦即,相鄰的網路攝影機時,該被移動到的網_影 .機即會產生代表該物件㈣份資料或者移動資料。藉由綠資料或者移動 .資料的鱗,即可確認被追蹤物件移動到其他的網路攝影機。 步驟6S7:依據產生被追蹤物件之網路攝影機之該身份資料或移動資料 進行移動後進行網路攝職之切換,並_轉654,㈣進行監控。一旦 發生了步驟656,即可將警示主畫面切換到追蹤到的網路攝職。同樣地, 可能有一台或者多台同時抓到資料。 請參考第16圖,其為運用本發明之第15圖之方法’於監控平台7〇〇 24 201037637 上之模擬圖,為採用同步顯示警示的方式。從圖中可以看到,監控畫面707 * _有非法進入管制區的事件發生此時,在事件的人員旁或其他部位, 可產生追縱的子樣,或者圓案等等,以供監控人員進行選擇。一旦監控 員l取追賴選項’即下達了追蹤的指令。祕此断可開始進行追縱, 並於監控畫面707相鄰的網路攝影機,如财的監控畫面7G6、汹、7〇3、 711等喃純改變,並有黃色的警示燈進行警示。當發生事件的人員不 斷移動時,監控畫面也會不斷地切換至被追蹤者。如此,即可達到持續追 蹤的目的。 採用畫面跳出的方式,亦可達到持續追蹤的目的。 雖然本發_技術内容已經讀佳實施例揭露如上,然其並非用以限 定本發明’任何熟習此技藝者,在不脫離本發明之精神所作些許之更動與 潤飾,皆應涵蓋於本發明的範相,因此本㈣之健範时視後附之申 請專利範圍所界定者為準。Next, the reference to the f 15 figure is the sixth specific flow chart of the method for monitoring the object by identification of the present invention, which has the identity data and the mobile data contained in the hairline network of the hair duck. An example of tracking. The five flowcharts in the figures 9 to 13 illustrate the method of monitoring the various objects, wherein under different event conditions, continuous monitoring of events may be required, and Wei is performed. . The lion's method of the invention can directly track the object, and the following steps are included: Face 651: Providing a network photography association (4) Each network camera 丨P can be previously configured through the plane _ I learned that it is __ 杂 丨 。. Pre-establishing this related information will be able to confiscate the __4 face warning. Step: Receive - Object Tracking Instructions. In the method of Figure (4), there are objects appearing, objects = objects disappearing, illegal identity entering, moving objects, not breaking into pieces, illegally smelling the incident greenness 'monitoring people can not be _ warning action. Among them, the object is chased as the 15th. Monitor the human stomach to select materials, nail the object to chase 23 201037637 vertical command, the system can be acted upon. Among them, the person who orders the object tracking can design a tracking option to be displayed on the screen for the monitoring personnel to operate. The tracking options can be icon or text. Step 653: Select the network camera ιρ to be tracked according to the object tracking instruction, and perform tracking warning. At the same time as the object tracking instruction is issued, the webcam to be tracked must be selected. Among them, one or more may be selected depending on the number of webcams that captured the event. The selected webcam will be displayed as a tracking status. 〇 Step 6541 performs a screen display of the webcam adjacent to the webcam based on the associated data. At this point, based on the associated data, the network camera adjacent to the webcam that captured the event can be selected to synchronize the tracking to facilitate monitoring and monitoring. For example, the way the screen continues to pop up or the alert is displayed synchronously. Step 655: Receive a stop tracking instruction. The system can provide a stop tracking command in the state of tracking, so that the monitoring personnel can stop the tracking operation. Step 656: The tracked object moves to another forward path machine. When the tracked object is moved to another network camera, that is, when the adjacent network camera is moved, the network to which the object is moved is generated to represent the object (four) of the data or the mobile data. By moving the green data or moving the data, you can confirm that the tracked object is moved to another webcam. Step 6S7: The mobile phone is switched according to the identity data or the mobile data of the network camera that generates the tracked object, and is switched to 654, (4) for monitoring. Once step 656 has occurred, the alert home screen can be switched to the tracked network call. Similarly, there may be one or more units that capture data at the same time. Please refer to Fig. 16, which is a simulation diagram on the monitoring platform 7〇〇 24 201037637 using the method of Fig. 15 of the present invention, in order to adopt a synchronous display warning. As can be seen from the figure, the monitoring screen 707 * _ has an illegal entry into the control area. At this time, at the side of the event or other parts, a sub-sample can be generated, or a round case, etc., for monitoring personnel. Make a choice. Once the monitor has taken the follow-up option, the tracking instruction is issued. The secret can be started to trace, and the network camera adjacent to the monitoring screen 707, such as the financial monitoring screen 7G6, 汹, 7〇3, 711, etc., is changed, and a yellow warning light is used for warning. When the person who has the event keeps moving, the monitor screen will continue to switch to the tracked person. In this way, the purpose of continuous tracking can be achieved. By using the screen to jump out, it is also possible to achieve continuous tracking. Although the present invention has been described above, it is not intended to limit the invention, and any modifications and refinements made without departing from the spirit of the invention are encompassed by the present invention. Fan Xiang, therefore, the health of this (4) is subject to the definition of the scope of the patent application.

25 201037637 【圖式簡單說明】 第1圖係為習知之網路攝影機之功能方塊圖; 第2圖係為本發明之網路攝影機之功能方塊圖; 第3 ©係為本翻運_路攝影機架設於實體場所之架設範例,於们時 • 間之情形; • 第4圖係為本發明運用網路攝影機架設於實體場所之架設範例,於T2時 間之情形; 〇 帛5 _為本翻運_路腳機架設於雜場所之架設綱,於丁3時 間之情形; 第6圖係為本發明運用網路攝影機架設於實體場所之架設範例,於丁4時 間之情形; 第7圖係為本發明運用網路攝影機架設於實體場所之架設範例,於丁5時 間之情形; 第8圖係為第3〜7圖,Ή〜T5時間内所緣製之物件移動動線圖範例; 〇 帛9 ®係為本發明之以身份翻進行物件監控之方料-具體流程圖; • 第1G ®係為本發明之以身份削進補件監控之方法第二減流程圖; 第11 ®係為本發明之《身份酬進行物雜控之方法第三具體流程圖; 第12圖係為本發明之叫份朗進行物件雜之綠第E3具體流程圖; 第13圖係為本發明之以身份識別進行物件監控之方法第五具體流程圖; 第14圖係為運用本發明之以身份識別進行物件監控之方法,於監控平台 700上之模擬圖; 第15圖係為轉明之以身份姻進行物件監控之方料六錢流程圖; 26 201037637 及 第16圖係為運用本發明之第15圖之方法,於監控平台700上之模擬圖 【主要元件符號說明】 10 網路攝影機 * 11 鏡頭組 ' 12 偏光片 13 影像感測器 〇 14 影像處理單元 15 控制單元 16 記憶單元 17 紅外線發射器 18 網路介面單元 19 外殼 100 網路攝影機 〇 1〇1 外殼 • 110 鏡頭組 120 偏光片 130 影像感測器 140 影像處理單元 150 控制單元 160 記憶單元 171 紅外線發射器 27 201037637 172 紅外線接收器 173 音效處理單元 174 音源輸出介面 175 音源輸入介面 180 網路介面單元 * 190 RFID讀取單元 302 大門 〇 304 區域 306、308 、310、312、314、316、318、320、322、324、326、328、 330、332、334、336、338、340、342、344、346、348、 區域 402、404 、406、408、410、412、414、416、418、420、422、424、 426、428 、430、432、434、436、438、440、442、444、446、448、 450、452 ' > 454、456、458、460、462、464 網路攝影機 602 電腦設備 〇 504 置物櫃 506 •. 置物櫃 508 工作平台 700 監控平台 701、702、703、704、705、706、707、708、709、710、711、712、 713、714、715、716 監控畫面 901 使用者 RFID 射頻識別標籤(Radio Frequency 丨dentity) 2825 201037637 [Simple description of the diagram] Figure 1 is a functional block diagram of a conventional network camera; Figure 2 is a functional block diagram of the network camera of the present invention; Example of erection in a physical place, in the case of time; • Figure 4 is an example of the erection of a network camera rack in a physical location, in the case of T2 time; 〇帛5 _ _The foot rack is set up in the miscellaneous place, in the case of Ding 3; Figure 6 is an example of the erection of the network camera rack in the physical place, in the case of Ding 4; The invention uses the example of setting up the network camera rack in the physical place, in the case of Ding 5 time; the figure 8 is the example of the moving moving line diagram of the object which is made in the period of 3~T5; 9 ® is the material for the object to be monitored by the identity of the invention - a specific flow chart; • 1G ® is the second reduction flowchart of the method for identity correction of the identification of the invention; the 11 ® is the Invented The third specific flow chart of the method; the 12th figure is the specific flow chart of the invention according to the invention, and the third embodiment of the method for monitoring the object by the identification of the present invention; Figure 14 is a simulation diagram of the object to be monitored by the method of identification using the present invention on the monitoring platform 700; Figure 15 is a flowchart of the six-money of the object of monitoring the object by the identity; 201037637 and Fig. 16 are simulation diagrams on the monitoring platform 700 using the method of Fig. 15 of the present invention. [Main component symbol description] 10 Network camera* 11 lens group '12 Polarizer 13 Image sensor 〇14 Image processing unit 15 Control unit 16 Memory unit 17 Infrared transmitter 18 Network interface unit 19 Enclosure 100 Network camera 〇1〇1 Enclosure • 110 Lens group 120 Polarizer 130 Image sensor 140 Image processing unit 150 Control unit 160 Memory Unit 171 Infrared Emitter 27 201037637 172 Infrared Receiver 173 Sound Processing Unit 174 Audio Output Interface 175 Source Interface 180 network interface unit * 190 RFID reading unit 302 large threshold 304 area 306, 308, 310, 312, 314, 316, 318, 320, 322, 324, 326, 328, 330, 332, 334, 336, 338, 340, 342, 344, 346, 348, regions 402, 404, 406, 408, 410, 412, 414, 416, 418, 420, 422, 424, 426, 428, 430, 432, 434, 436, 438 440, 442, 444, 446, 448, 450, 452 ' > 454, 456, 458, 460, 462, 464 webcam 602 computer equipment 〇 504 locker 506 •. locker 508 work platform 700 monitor platform 701 702, 703, 704, 705, 706, 707, 708, 709, 710, 711, 712, 713, 714, 715, 716 monitoring screen 901 user RFID radio frequency identification tag (Radio Frequency 丨dentity) 28

Claims (1)

201037637 七、申請專利範圍: 1、一種行麟雜之綠,運麟包 一網路監控系統,包含下列步驟: 由該些網路攝影機產生一資料串流; . 當該些網路攝影機讀取—射頻識別標籤時,產生-身份資料並匿 • 入該資料串流; 當該些網路影賴_-熱源時,產生1崎料並匯入該資料 串流; 偵測該資料串流是否帶有該身份資料; 若該資料幅帶有該身份資料,產生—物件出現訊息; 偵測該資料串流是否帶有該移動資料;及 若該資料争流帶有該移動資料,產生—物件移動訊息。 2、如請求項i之方法,更包含以下步驟:#產生該㈣現訊息時進行 一警示動作。 〇 3、如請求項2之方法,其中該警示動作係選自畫面跳出警示符號、畫面 • 岭轉息、產生料聲、產«示語音、社動麵任意組合等所 成之群組。 指令後,停止該 4、如凊求項2之方法,更包含以下步驟:接收—警示停止 警示動作。 5、 如^ 1 W,嫩町緣《娜件軸息時,進行 一警示動作。 6、 如物5之枝,㈣㈣蝴自畫面崎彻' 畫面跳 29 201037637 出警示訊息、產生警示聲、產生警示語音、以上動作的任意組合等所組 成之群組。 7如明求項5之方法,更包含以下步驟:接收一警示停止指令後停止該 警示動作。 8、如請求項1之方法,S包含以下步驟: #偵測_資料核帶有該身份細,經過-倾_後仍未於 產生該網路攝影機所傳來之資料串流翻到該移動資料,產生一物件 〇 消失訊息。 9'如清求項8之方法,更包含以下步驟:當產生該物件消失訊息時,進行 —警示動作。 如請求項9之方法,其中該警示動作係選自畫面跳出警示符號、畫面 厂、5 4產生警示聲、產生警示語音、以上動作的任意組合等所 組成之群組。 11、如請求項9夕士、、+ 〇 ,更包含以下步驟:接收一警示停止指令後,停止 該警示動作。 2如清切彳之方法更包含町步驟: 帶瓣峨,輯—職概嫩產生 訊息。機所傳來之資料技侧到該身份資料,產生-不明物件聞入 13、如請求項12之古、 ^ 法’更包含以下步驟:當產生該不明物件闖入訊息時, 進行—警示動作。 、如請求項13之方、 法’其中該警示動作係選自畫面跳出警示符號、畫面 30 201037637 跳出警示訊息、產生警示聲、產生警示語音、以上動作的任意組合等所 組成之群組。 15、如請求項13之方法,更包含町步驟:接收—警示停止指令後,停止 該警示動作。 16 '如請求項彳之方法,更包含以下步驟: 長1供經核准之一身份碼; ❹ 當細到該資料核帶有該身份倾,且該身份f料非為該身份 碼時,產生-麵身份進入訊息。 17、如請她6之轉’撤以下轉:#綱編份進入訊息時, 進行一警示動作。 求項Ί7之方法’其中該警示動作係選自畫面跳出警示符號、晝面 跳出警不訊息'產生警示聲、產生警示語音、以上動作的任意组 組成之群組。 19、如請求項17之方法 _ 步驟·接收一警示停止指令後,停止 〇 該警示動作。 仔止 • 20、如請求項彳之方法,更包含以下麵: 痛件_訊息麵行警錢,侧賴雜資料消失 時’產生-物件離開訊息。 21行如=20娜,齡_ :饱獅觸 仃一警不動作。 疋 a跳=2 <⑽巾輸咖獅_衫符號、畫面 跳出警順、產生警示聲、蝴示語音、以.的任意組合等所 31 201037637 組成之群組。 如印求項21之方法,更包含以下步驟:接收—警示停止指令後,停止 該警示動作。 24、 如請求項1之方法,更包含下列步称 接收並儲存所設定之一管制區内所包含之該些網路攝影機之該網 路位址; 接收並錯存經允許進入該管制區内之一身份碼; 债測該資料串流是否同時帶有該管制區内之該網路位址與非為該 身份碼之該身份資料;及 右該資料串流是否同時帶有該管制區内之該網路位址與非為該身 份碼之該身份資料,產生一物件非法闖入訊息。 25、 如請求項24之方法,更包含以下步驟:當產生該物件非法闖人訊息時, 進行一警示動作。 26、 如請求項25之方法,其中該警示動作係選自畫面跳出警示符號畫面 桃出警不訊息、產生警示聲、產生警示語音、以上動作的任意組合等所 組成之群組。 27、 如請求項25之方法,更包含以下步驟:接收__警示停止指令後停止 該警示動作。 28、 如請求項1之方法,更包含下列步驟: 接收欲搜尋之該身份資料; 搜尋該資料庫中包含有該身份資料之該資料串流;及 擷取具有該資料串流,並依據該時間戳記之先後順序進行播放。 32 201037637 29、 如請求項1之方法,更包含下列步驟: 接收欲搜尋之該身份資料; 搜尋該資料庫中包含有該身份資料之該資料串流;及 擷取具有該資料串流,並依據該時間戳記之先後順序進行燒錄。 30、 -種以身份朗進行物件監控之方法’運包含複數侧輯影機 之一網路監控系統,包含下列步驟: 由該些網路攝影機產生一資料串流; 〇 當該些網路攝影機讀取一射頻識別標藏時,產生一身份資料並匯 入該資料串流; 當該些網路影射機制一熱源時,產生一移動資料並匯入該資料 串流; 依偵測該身份資料與該移動豁之結果,產生—警示訊息; 接收該警示訊息之一選取指令; 依據該選取^令傳送—警示齡至產生該警示事狀細路攝影 機之該網路位址以進行連線; 接收一播音對話指令,·及. 由產生該警不事件之該網路攝影機之該語音撥放單元進行警示 播音動作》 3Q t Μ ’每個該複數個網路攝影機更包含-語音輸入單 70 ’ __彻_彻;爾㈣含下列步驟: =由產生該警示事件之該網路攝影機進行雙向之語音對話。 身伤識別進仃物件監控之方法,運用於包含複數細路攝影機 33 201037637 之一網路監控系統,包含下列步驟: 由該些網路攝影機產生—資料串流. 當該些網路攝影機讀取一射痴 識別標籤時,產生-身份資料並匯 入該資料串流; 產生一移動資料並匯入該資料 當該些網路影射機偵測—熱源時 串流; Ο β、匕網路攝雜之—關聯資料,簡聯資料係為每個該網路 攝影機之相鄰網路攝影機之該網路位址; 依姻該雜餅無狀結果,產生—警示訊息; 接收該警示訊息之一追縱指令; 依據該追_令翁觀歡_輯频,並—追縱警示 動作; 依_關聯資料進㈣线衫事叙綱賴織_之該些 網路攝影機之晝面顯示;及 »〇警示事件移動至該網路攝影機關聯之該些網路攝影機時,進 行追縱警示之切換。 3如"f求項32之方法’更包含以下步驟: 於進行該追縱警示動作後,當接收到一停止追蹤之指令時,停止該 追蹤警示動作。 乂 糾、如請求項32之方法’其中該接收該追職令之步驟係由提供一追蹤 選項於該監控錢之步驟執行。 35、如清求項34之方法,其中該追蹤選項係選 自一圓示、—文字所k组成之 34 201037637 群組。 36、如請求項34之方法,其中該進行發生該警示事件之該網路攝影機關聯 之該些網路攝影機之畫面顯示之步驟,係選自畫面同步顯示、警示晝面 跳出之警示方法所組成之群組。201037637 VII. The scope of application for patents: 1. A kind of green network, Yunlin package network monitoring system, including the following steps: Generate a data stream from the network cameras; . When the network cameras read - when the RFID tag is generated, the identity data is generated and entered into the data stream; when the networks are dependent on the heat source, 1 raw material is generated and imported into the data stream; detecting whether the data stream is detected Carrying the identity data; if the data frame carries the identity data, generating an object occurrence message; detecting whether the data stream carries the mobile data; and if the data contention carries the mobile data, generating an object Move the message. 2. The method of claim i further includes the following steps: # Performing a warning action when generating the (four) current message. 〇 3. The method of claim 2, wherein the alert action is selected from the group consisting of a screen jumping out warning symbol, a screen, a ridge shift, a material sound, a production voice, and any combination of social motion surfaces. After the instruction, stop the method of claim 2, and further include the following steps: receiving - warning stop warning action. 5, such as ^ 1 W, the tender town edge "Na Na axis, a warning action. 6, the branch of the object 5, (four) (four) from the picture of the smoothness of the screen jump 29 201037637 out of the warning message, generate warning sounds, generate warning voice, any combination of the above actions, etc. 7 The method of claim 5, further comprising the step of: stopping the alert action after receiving an alert stop command. 8. The method of claim 1, the S includes the following steps: #Detecting_The data core carries the identity fine, and after passing through the tilting_, the data stream transmitted by the network camera is not yet turned to the mobile Data, resulting in an object 〇 disappear message. 9' The method of claim 8, further comprising the step of: performing a warning action when the object disappear message is generated. The method of claim 9, wherein the alert action is selected from the group consisting of a screen jumping out warning symbol, a screen factory, a warning sound generated, a warning voice generated, and any combination of the above actions. 11. If the request item 9 s, , + 〇, further includes the following steps: after receiving an alert stop command, stopping the alert action. 2 If the method of clearing and cutting, it also includes the steps of the town: with the flaps, the series - the job will produce a message. The data technology sent by the machine is sent to the identity data, and the unidentified object is smothered. 13. If the request item 12 is ancient, the method 'includes' includes the following steps: when the unidentified object is generated, the warning action is performed. For example, in the case of claim 13, the warning action is selected from the group consisting of a screen jumping out warning symbol, a screen 30 201037637 jumping out of a warning message, generating a warning sound, generating a warning voice, and any combination of the above actions. 15. The method of claim 13, further comprising the step of: receiving - alerting the stop command, stopping the alert action. 16 'If the method of requesting the item, the method further comprises the following steps: 1 for one of the approved identification codes; ❹ when the data is carried out with the identity, and the identity is not the identity code, - Face identity to enter the message. 17. If you ask her to turn around, please withdraw the following: When the catalogue enters the message, a warning action is taken. The method of claim 7 wherein the alert action is selected from the group consisting of a screen jumping out of a warning symbol, a blinking warning message, a warning sound, a warning voice, and any of the above actions. 19. The method of claim 17 _ Step · After receiving an alert stop command, stop 〇 the alert action. Aberdeen • 20, if the method of requesting the item, it also includes the following: painful _ message face police money, side of the data disappeared when the 'generate-object leave message. 21 lines such as = 20 Na, age _: full lion touch 仃 a police does not move.疋 a jump = 2 < (10) towel to lose the lion _ shirt symbol, screen jump out of the alert, produce a warning sound, a voice, any combination of. 31 201037637 group. The method of claim 21 further includes the following steps: receiving - alerting the stop command, stopping the alert action. 24. The method of claim 1, further comprising the step of receiving and storing the network address of the network cameras included in one of the set control zones; receiving and storing the permission to enter the control zone One of the identity codes; the debt test whether the data stream has both the network address in the control zone and the identity data that is not the identity code; and whether the data stream on the right side has the control zone The network address and the identity data that is not the identity code generate an object to enter the message illegally. 25. The method of claim 24, further comprising the step of: performing a warning action when the object is illegally smashed. 26. The method of claim 25, wherein the alert action is selected from the group consisting of a screen popping up a warning symbol screen, a peach alert message, a warning sound, a warning voice, any combination of the above actions, and the like. 27. The method of claim 25, further comprising the step of: stopping the alert action after receiving the __alarm stop command. 28. The method of claim 1, further comprising the steps of: receiving the identity data to be searched; searching for the data stream containing the identity data in the database; and extracting the data stream having the data, and The timestamps are played in the order in which they are played. 32 201037637 29. The method of claim 1, further comprising the steps of: receiving the identity data to be searched; searching for the data stream containing the identity data in the database; and capturing the data stream having the data stream, and The burning is performed according to the order of the time stamps. 30. - A method for monitoring the object by identity. 'The network monitoring system includes one of the plurality of side effects cameras, and includes the following steps: generating a data stream from the network cameras; 〇 When the network cameras When reading a radio frequency identification tag, generating an identity data and importing the data stream; when the network mapping mechanism is a heat source, generating a mobile data and importing the data stream; detecting the identity data As a result of the movement, a warning message is generated; a command for receiving the warning message is received; and the network address of the camera that generates the warning event is transmitted according to the selection command to connect; Receiving a broadcast dialogue command, and the alarm broadcast operation is performed by the voice dialing unit of the network camera that generates the alarm event. 3Q t Μ 'Each of the plurality of network cameras further includes a voice input sheet 70 '__彻_彻; (4) contains the following steps: = Two-way voice conversation by the webcam that generated the warning event. The method for detecting the injury object is used in a network monitoring system including a plurality of fine road cameras 33 201037637, comprising the following steps: generated by the network cameras - data stream. When the network cameras are read When an idiot identification tag is generated, the identity data is generated and imported into the data stream; a mobile data is generated and the data is imported into the network when the network mapper detects the heat source; Οβ, 匕 匕 摄Miscellaneous-related data, which is the network address of each adjacent webcam of the webcam; generates a warning message according to the result of the miscellaneous cake; receives one of the warning messages Follow-up instructions; according to the chasing _ order Weng Guanhuan _ frequency, and - tracking warning actions; according to _ related data into (four) line clothing 〗 〖Lai Zhi _ _ these network cameras display; and » 〇 warning When the event moves to the network cameras associated with the webcam, the tracking alert is switched. 3 The method of "f seeking 32 further includes the following steps: After performing the tracking warning action, when receiving an instruction to stop tracking, the tracking warning action is stopped. The method of claim 32, wherein the step of receiving the tracking order is performed by providing a tracking option to the step of monitoring the money. 35. The method of claim 34, wherein the tracking option is selected from the group consisting of a circle, a text group, and a group of 2010 20103737. 36. The method of claim 34, wherein the step of displaying the screen of the network cameras associated with the webcam in which the alert event occurs is selected from the group consisting of a screen synchronization display and a warning method for warning out of the screen. Group of. ❹ 35❹ 35
TW98111306A 2009-04-03 2009-04-03 Method of monitoring an object using ID recognization TW201037637A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
TW98111306A TW201037637A (en) 2009-04-03 2009-04-03 Method of monitoring an object using ID recognization

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
TW98111306A TW201037637A (en) 2009-04-03 2009-04-03 Method of monitoring an object using ID recognization

Publications (1)

Publication Number Publication Date
TW201037637A true TW201037637A (en) 2010-10-16

Family

ID=44856777

Family Applications (1)

Application Number Title Priority Date Filing Date
TW98111306A TW201037637A (en) 2009-04-03 2009-04-03 Method of monitoring an object using ID recognization

Country Status (1)

Country Link
TW (1) TW201037637A (en)

Cited By (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
TWI547883B (en) * 2014-11-12 2016-09-01 拓連科技股份有限公司 Image capture methods and systems, and related computer program products
TWI628630B (en) * 2016-05-31 2018-07-01 群邁通訊股份有限公司 Monitoring system and method
TWI661396B (en) * 2014-07-09 2019-06-01 倬茂企業股份有限公司 Access control system combining image recognition
US10831184B2 (en) 2016-03-23 2020-11-10 Nec Corporation Data processing apparatus, data processing system, data processing method, and non-transitory storage medium
CN112001220A (en) * 2020-06-23 2020-11-27 江苏金动感智能设备有限公司 Method and system for searching target image

Cited By (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
TWI661396B (en) * 2014-07-09 2019-06-01 倬茂企業股份有限公司 Access control system combining image recognition
TWI547883B (en) * 2014-11-12 2016-09-01 拓連科技股份有限公司 Image capture methods and systems, and related computer program products
US10831184B2 (en) 2016-03-23 2020-11-10 Nec Corporation Data processing apparatus, data processing system, data processing method, and non-transitory storage medium
TWI628630B (en) * 2016-05-31 2018-07-01 群邁通訊股份有限公司 Monitoring system and method
CN112001220A (en) * 2020-06-23 2020-11-27 江苏金动感智能设备有限公司 Method and system for searching target image

Similar Documents

Publication Publication Date Title
US11741805B2 (en) Video monitoring and alarm verification technology
AU2023270262B2 (en) Doorbell call center
CN103268680B (en) A kind of family intelligent monitoring burglary-resisting system
US7015943B2 (en) Premises entry security system
US11115227B2 (en) Terminal and method for bidirectional live sharing and smart monitoring
CA3071669A1 (en) Supervising property access with portable camera
CN101610396A (en) Intellective video monitoring device module and system and method for supervising thereof with secret protection
KR101610026B1 (en) The hybrid security streetlamp system
CN209946967U (en) Entrance guard's equipment and access control system
CN106355714A (en) Fingerprint lockset management system and method
TW201037637A (en) Method of monitoring an object using ID recognization
US20160196703A1 (en) Smart door system and identification system background
US20200242911A1 (en) Information processing system, information processing apparatus, and information processing method
KR100760209B1 (en) Crime prevention System In Use Of Tile Sensing
CN102857734A (en) Network electronic invigilating system
US9705696B2 (en) Monitoring system
US10797755B1 (en) Communicating between devices in a doorbell system using AC power waveforms
KR20150041939A (en) A door monitoring system using real-time event detection and a method thereof
CN109842806A (en) Visual alert broadcasting, control method for playing back, device, equipment and storage medium
CN104952228A (en) Antitheft protection opening method, and apparatus and system thereof
CN105611236A (en) Doorbell system and monitoring method thereof
WO2023280273A1 (en) Control method and system
KR20150083614A (en) Visitor supervisory apparatus and system for notification service of visitor information having the same, and method thereof
KR101778863B1 (en) Household security system using home network
CN109068096A (en) Remote visible express system and method