WO2002015143A1 - Systeme de securite utilisant une communication bidirectionnelle, notamment sur l'internet - Google Patents

Systeme de securite utilisant une communication bidirectionnelle, notamment sur l'internet Download PDF

Info

Publication number
WO2002015143A1
WO2002015143A1 PCT/JP2001/001066 JP0101066W WO0215143A1 WO 2002015143 A1 WO2002015143 A1 WO 2002015143A1 JP 0101066 W JP0101066 W JP 0101066W WO 0215143 A1 WO0215143 A1 WO 0215143A1
Authority
WO
WIPO (PCT)
Prior art keywords
security
emergency
emergency report
terminal system
command center
Prior art date
Application number
PCT/JP2001/001066
Other languages
English (en)
Japanese (ja)
Inventor
Hidetoshi Takada
Original Assignee
Future Amenity Line Kabushiki Kaisha
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Priority claimed from JP2000287733A external-priority patent/JP2004341565A/ja
Application filed by Future Amenity Line Kabushiki Kaisha filed Critical Future Amenity Line Kabushiki Kaisha
Publication of WO2002015143A1 publication Critical patent/WO2002015143A1/fr

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N7/00Television systems
    • H04N7/18Closed-circuit television [CCTV] systems, i.e. systems in which the video signal is not broadcast
    • H04N7/183Closed-circuit television [CCTV] systems, i.e. systems in which the video signal is not broadcast for receiving images from a single remote source
    • GPHYSICS
    • G08SIGNALLING
    • G08BSIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
    • G08B13/00Burglar, theft or intruder alarms
    • G08B13/18Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength
    • G08B13/189Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength using passive radiation detection systems
    • G08B13/194Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength using passive radiation detection systems using image scanning and comparing systems
    • G08B13/196Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength using passive radiation detection systems using image scanning and comparing systems using television cameras
    • G08B13/19654Details concerning communication with a camera
    • G08B13/19656Network used to communicate with a camera, e.g. WAN, LAN, Internet
    • GPHYSICS
    • G08SIGNALLING
    • G08BSIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
    • G08B25/00Alarm systems in which the location of the alarm condition is signalled to a central station, e.g. fire or police telegraphic systems
    • G08B25/01Alarm systems in which the location of the alarm condition is signalled to a central station, e.g. fire or police telegraphic systems characterised by the transmission medium
    • G08B25/08Alarm systems in which the location of the alarm condition is signalled to a central station, e.g. fire or police telegraphic systems characterised by the transmission medium using communication transmission lines

Definitions

  • an emergency state occurring in a security target property including a moving state contracted with a security company is automatically reported to the security company and the contractor.
  • Security system using the Internet
  • the present invention provides a mobile phone with crime prevention and disaster prevention functions that can use a mobile phone in hand to seek help when a crisis is encountered.
  • a mobile phone is provided with a pair of buttons No. 110 and No. 119 at predetermined positions on the main unit, and a safety device such as a cover to prevent these buttons from being inadvertently or accidentally pressed.
  • a safety device such as a cover to prevent these buttons from being inadvertently or accidentally pressed.
  • command mail in the conventional mailing list allows the server to execute various programs by sending a predetermined mail.
  • an object of the present invention is to provide a computer network to which a computer, a mobile terminal, or the like is connected, in the event of an emergency occurring in a security target property including a moving state contracted with a security company.
  • the purpose is to provide a security system using the Internet to automatically notify the security company and the contractor.
  • the purpose is to provide a system that can perform notification and respond to it. It is still another object of the present invention to provide a system capable of two-way communication of downloading of a predetermined emergency program or the like and subsequent exchange of emergency notification information by simple operation such as operation of an emergency button.
  • a command center with communication means capable of two-way communication including the Internet One terminal system, a related security company terminal system installed at a networked related security company, and a security object terminal provided for security objects Is a security system composed of
  • Emergency report receiving means for the command center terminal system to receive emergency reports from the security target terminal system
  • Nearest security company search means to search for the nearest security company that is closest to the security target property from the related security companies where the command center is networked, and a chat program from the command center to the security target property and the latest security company
  • Emergency reporting program transmission means for transmitting an emergency reporting program such as a command center terminal system, a security target terminal, and a related security company terminal system provided in the latest security company. This is a program for bi-directionally exchanging emergency report items by means of text, voice or video such as e-mail, videophone or browser, etc.
  • the command center terminal system which receives an emergency report from the security target terminal system, automatically searches for the latest security company based on the contents of the emergency report, and executes an emergency report program from the command center to the security target property and the latest security company. And processing to send,
  • the emergency reporting program is automatically executed or manually executed by pressing a button, etc. between the command center one terminal system, the security target terminal system, and the related security company terminal system provided by the latest security company. It is characterized by being a security system using two-way communication, characterized by being able to communicate in both directions.
  • a command center with communication means capable of two-way communication including the Internet One terminal system, a networked security company terminal system installed at a related security company, and a security object terminal installed in a security object Is a security system composed of three parties,
  • Emergency notification receiving means for the command center to receive an emergency notification from the security target terminal system
  • Nearest security company search means to search for the nearest security company that is closest to the security target property from the networked related security companies with the command center, and the terminal system and the latest security company from the command center
  • Emergency reporting program transmitting means for transmitting an emergency reporting program such as a chat program to a related security company terminal system provided in
  • the emergency report program described above uses a command center terminal system, a security target terminal, and a related security company terminal system provided by the latest security company to send emergency reports via email, videophone, browser, etc. Is a program that communicates bidirectionally as a means of communication,
  • the command center terminal system which receives an emergency report from the security target terminal system, automatically searches for the latest security company based on the contents of the emergency report, and executes an emergency report program from the command center to the security target property and the latest security company. And processing to send,
  • the emergency report program is automatically executed or the emergency report items are manually executed by pressing a button between the command center terminal system, the security target terminal system, and the related security company terminal system provided for the latest security company. It is characterized by being a security system using two-way communication, characterized by being able to communicate in two directions.
  • a command center having a communication means capable of two-way communication such as the Internet, a terminal system, and a networked related security company are installed.
  • the security system consists of four terminals: a security system terminal system, a security device terminal provided for the security object, and a security object contractor terminal provided by the security object contractor on the move. hand,
  • the above-mentioned security-equipped property terminals include equipment that can automatically perform two-way communication, such as the Internet, from the security-eligible property when the security-eligible property terminal detects an emergency using a sensor or other emergency detection means.
  • An emergency report transmission means for transmitting an emergency report to the command center terminal system using
  • Emergency notification receiving means for the command center to receive an emergency notification from the security target terminal system
  • the related security company terminal system provided for the latest security company, and the emergency report program receiving means for transmitting the emergency report program such as the chat program to the security target contractor.
  • the emergency report program described above consists of a command center terminal system, a security target terminal, and an emergency report between the last security company and the security target contractor via email, videophone, or a browser, etc. Is a program that exchanges information in two directions using
  • the command center terminal system that receives an emergency report from the security target terminal system, the process of automatically searching for the latest security company from the contents of the emergency report, and the security target property, security property contractor, and the latest security company from the command center Sending emergency reporting program to
  • Command center terminal system security target terminal system, related security company terminal system provided for the latest security company, security target property contractor terminal on the move Emergency notification items can be exchanged bidirectionally by automatic execution of It is a security system that uses two-way communication.
  • the security object terminal is provided with a surveillance camera for photographing the security object or its surroundings, and image recording means for recording image data taken by the surveillance camera,
  • the emergency report program includes an emergency report item having an Internet communication function and including at least the identification data of the security target object,
  • Telephone lineWired communication line including dedicated line or wireless communicationWireless communication line including satellite communication
  • the terminal In the processing, when a signal input from the emergency detection sensor is received, the terminal is connected to the Internet, and the emergency notification items and before and / or after the signal input read from the image recording unit are input. It is a security system using two-way communication, characterized by transmitting still image data to a terminal of the latest security company.
  • the security object terminal is provided with a surveillance camera for photographing the security object or its surroundings, and image recording means for recording image data taken by the surveillance camera,
  • the emergency report program includes an emergency report item having an Internet communication function and including at least the identification data of the security target object,
  • Telephone lineWired communication line including dedicated line or wireless communicationWireless communication line including satellite communication
  • the terminal In the processing, when a signal input from the emergency detection sensor is received, the terminal is connected to the Internet, and the emergency notification items and the signal read before and after the signal input from the image recording unit and Z or after the signal input are read.
  • the still image data is transmitted to the terminal of the latest security company, and then the current image captured by the surveillance camera is transmitted to the latest security company. It is characterized by transmitting to terminals of the company, and is characterized by security using two-way communication.
  • the security object terminal includes a surveillance camera for photographing the security object or its surroundings, and image recording means for recording image data taken by the surveillance power camera,
  • the emergency report program includes an emergency report item having an Internet communication function and including at least the identification data of the security target object,
  • Telephone lineWired communication line including dedicated line or wireless communicationWireless communication line including satellite communication
  • the emergency report items include a plurality of emergency report messages according to the type of the emergency report,
  • the emergency report program is characterized in that, when the emergency report transmission means is activated, a search is made for an emergency report message corresponding to the type of the emergency detection sensor from the emergency report message and transmitted.
  • the security system according to any one of claims 1 to 6, wherein the security system uses two-way communication.
  • the two-way interactive system according to any one of claims 1 to 7, wherein the emergency report program is configured so that at least the first emergency report to be transmitted to a security company is performed by chat information. It is characterized by a security system using communication.
  • FIG. 1 is a system configuration diagram showing an example of a basic configuration of a system according to the present invention.
  • FIG. 2 is a flowchart showing a basic flow of the present invention.
  • FIG. 3 is a flowchart showing a basic processing flow of the present invention.
  • FIG. 4 is a flowchart showing a basic processing flow of the present invention.
  • FIG. 5 is a flowchart showing a basic processing flow of the present invention.
  • FIG. 6 is a flowchart showing a basic processing flow of the present invention.
  • FIG. 7 is a flowchart showing a basic processing flow of the present invention. BEST MODE FOR CARRYING OUT THE INVENTION
  • FIG. 1 is a system configuration diagram showing an example of a basic configuration of a system according to the present invention.
  • a system configuration in a case where the security target property is in a fixed state like a building or a house is shown.
  • the security object has a computer terminal or the like.
  • computer terminals and the like include mobile phones that can be connected to the Internet, which are rapidly spreading in recent years, including mobile phones.
  • the computer terminal includes a computer that is fixedly used as a desktop type and a notebook type computer.
  • the security system using two-way communication such as the Internet according to the present invention can be operated by operating a predetermined button such as an emergency button or a detection function of an emergency sensor-one terminal system on a computer terminal or the like provided in the security object. It has an emergency report transmission function that transmits an emergency report signal to the command center and one terminal system.
  • the emergency notification transmission function allows the security target object to be manually or automatically commanded by a predetermined button operation or emergency sensor detection function.
  • Send an emergency report signal to The emergency sensor has a function of detecting a fire or theft.
  • the emergency notification signal has an ID number that identifies the security target property. For example, when sending an emergency report signal using the mail function, the mail address in the mail header becomes the identification ID number of the security target object, and the emergency report signal is transmitted by pressing the emergency button on the mobile terminal In such a case, the phone number of the mobile terminal becomes the identification ID number of the security object. In addition, in the case where the IP address given to the security object by the DHCP function is undefined, the ID of the security object given at the time of contract is added to the emergency report signal and transmitted.
  • the emergency report items include a plurality of emergency report messages according to the type of the emergency report
  • the emergency report program includes a When the system is activated, it can search for an emergency report message that matches the type of the emergency sensor and send it.
  • the combination of multiple emergency button operations and button press selections will be the identification ID number of the emergency report type .
  • the security system using two-way communication such as the Internet according to the present invention is provided with an emergency report receiving function for the command center to receive an emergency report signal sent from the security target property.
  • the number of emergency calls received by telephone is 119, but the number of emergency calls that can be processed at the same time is limited to the number of telephone operators. Continuing to do this not only requires enormous costs, but also causes a temporary load on the line in the event of a major earthquake, which may make it impossible to make emergency calls. possible. Fortunately, if peaceful days continue, human resources in the entire industry will be wasted. However, with the spread of the Internet as it is today, servers can be entrusted with some tasks instead of exchanges, and the number of emergency messages that can be processed simultaneously per server can increase dramatically. We can expect it to be enough. In addition, the cost of installing one server is less than the cost of training a single operator. Considering the running cost, there is not much difference, and considering the running cost, the labor cost of the operator is high, but in the case of the server, only one administrator is required, and it costs a little more for electricity.
  • the emergency report program used in the present invention is a command center terminal system, a security target terminal, and a security system terminal system provided for the latest security company. It is a program that exchanges audio or video bidirectionally as a transmission means.
  • at least the first emergency report item to be sent to the security guard is an emergency charter program configured to perform the chat information, and the like.
  • the flow of processing using this mode will be described, but the present invention is not limited to this.
  • the sending of the emergency charter by the command center is first performed when the emergency center is first notified.
  • the command center has server functions such as a mail server, web server, file server, database server, etc., and is connected to each security object regardless of whether it is wired or wireless, satellite or terrestrial via communication lines such as the Internet.
  • the database server includes an emergency report database, a security contractor database, and a related security company database.
  • Step 1 “Receive an emergency alert signal.” ⁇ ⁇ 'The command center has a port open at all times to wait for an emergency alert signal. This condition lasts 24 hours a day. Proceed to Receiving-2 for the emergency report signal transmitted from the property subject to the banquet.
  • Step 2 "Is the case ID set in the emergency call signal?"
  • the emergency notification signal transmitted from the security object in the event of a situation is sent to the command center by the above means.
  • the command center searches for the case ID in the emergency report signal, and if there is no case ID, determines that this is the first emergency report and proceeds to step 3.
  • Step 3 “Set the case ID in the emergency call signal.” ⁇ ⁇ ⁇ Set the case ID in the emergency call signal, and proceed to Step 4.
  • Step 4 “Obtain the location information of the incident site.” ⁇ ⁇ ⁇ Obtain the identification ID of the security target object included in the emergency report signal and obtain the position information of the security target object from the security contractor database. Proceed to.
  • Step 5 Search for the nearest security company. ⁇ ⁇ ⁇ Search the relevant security company database using the location information of the incident site obtained in Step 4 and search for the closest related security company from the incident site. Proceed to 6.
  • Step 6 Record details in the emergency report database. ⁇ ⁇ ⁇ The ID of the security target object included in the emergency report signal, the case ID set in step 3, and the latest security company searched in step 5, Record in the emergency report database and proceed to step 7.
  • Step 7 “Secure and open channel” ⁇ ⁇ ⁇ Secure a channel for exchanging chat information and proceed to step 8.
  • the channel only needs to be able to communicate with the command center, the latest security company, and the property to be guarded, which are the parties concerned, while excluding other persons.Three-way telephone calls, video conferencing systems, and IP address A bulletin board system using a browser that exchanges character information by designating it may be used.
  • Step 8 Send the emergency chat program. ⁇ ⁇ ⁇ Set the incident ID and the above-mentioned channel in the emergency chat program in the file server, and set the emergency chat program to the latest security company and the security target property. Submit and step 1 people.
  • the emergency chat program After the emergency chat program is transmitted from the command center, it shall be operated on the channel specified by the emergency chat program.
  • the channel for exchanging chat information can only communicate with the command center, the latest security company, and the property to be guarded, which are the parties concerned, while excluding other people.
  • a three-party call via a telephone line, a video conference system, or a bulletin board system using a browser that exchanges text information by specifying an IP address may be used.
  • basic information such as the location information of the incident site, the attributes of the security target property, and the details of the nearest security company in charge of the incident are set in the channel in advance.
  • FIG. 2 to FIG. 7 are flowcharts showing the basic processing flow of the present invention.
  • Step 1 “Channel is in standby” ⁇ ⁇ ⁇
  • the channel opened in step 7 of [Emergency Chat Program Transmission Process] above displays the location information of the incident site, the attributes of the security object, etc., and then waits It is in a state. This standby state remains open 24 hours a day until the closing process is performed. If the command center and the property to be guarded have access to the channel, go to step 5; if the security company has recently accessed the channel, go to step 2.
  • Step 2 "Execute the emergency chat program received by the latest security company" ⁇ ⁇ ⁇ Upon receiving the emergency chat program, the latest security company accesses the channel specified in the program. Go to step 3.
  • Step 3 “Is the first security company accessed for the first time?” ⁇ ⁇ ⁇ If the security company has been accessed for the first time, the emergency reporting database in Fig. 1 records the recognition time of the latest security company and proceeds to step 4. If not, go to step 5.
  • Step 4 "Acquire the location information of the latest security company.” ⁇ ⁇ ⁇ ⁇ After the latest security company recognizes the incident, the command center automatically acquires location information at regular intervals using the location information recognition system described below. Then, record the location information in the emergency report database and return to step 1.
  • the latest security company grasps the location information of the incident site and the attributes of the security target property from the relevant channel and immediately rushes to the site, but in the meantime, by using the location information recognition system, for example, every two minutes A certain time
  • Step 5 “Enter or get chat information.” ⁇ ⁇ ⁇
  • the command center, security object, or the nearest security company, which is the subject of the incident, will automatically or manually access the emergency case at the time. Detailed information of the report can be grasped for each entity in chronological order. In addition, each entity inputs changes in the situation and the like as detailed information, and the command center stores the input contents in the emergency report database. The command center then proceeds to step 6, and the security object and the nearest security company return to step 1.
  • Step 6 “Close processing?” ⁇ ⁇ ⁇
  • the command center executes the close processing and stores it in the emergency report database. Executing the closing process does not delete the information from the emergency report database in order to adopt evidence in a subsequent trial.
  • the location information recognition system in step 4 uses the GPS function to detect the location information of the latest security company, and the base station that captures radio waves from mobile phones and PHS, etc. Can be measured by For example, Japanese Unexamined Patent Application Publication No. 113-17974, "Position information detection system and method” ⁇ Japanese Unexamined Patent Application Publication No. 117-17804" Wireless portable terminal and position information acquisition system of the terminal ", These techniques are disclosed in, for example, Kaihei 10-10—1 3 6 4 3 4 “Method and system for collecting location information for terminal connection”. With these technologies, it is possible to acquire the position information of the user's wireless terminal.
  • step 5 “Enter or obtain chat information” in step 5 above, in particular, by taking this step, the property to be guarded will remain unaffected until the latest security company arrives at the incident site. It becomes possible to inform the channel of the case summary from each security-targeted property, and depending on the nature of the case, the police or fire The latest security company or dispatch center will determine which is the case, and a faster case resolution can be expected.
  • the command center can manage multiple channels with a small number of people, it can be operated more finely than it is now, and it can be operated at a lower cost, making it possible to simultaneously guard security-targeted properties more than ever before. It can prevent the increase of negative assets of the people or industry.
  • This system is applicable not only to private security companies, but also to all public and private security systems such as police, fire departments, emergency medical services, etc. under the jurisdiction of national or local governments.
  • the processing of the two-way communication when a signal is input from the emergency detection sensor, it is connected to the Internet, and the emergency notification items and the signal input before and Z or the signal read from the image recording means are read
  • the still image data after the signal input can be transmitted to the terminal of the latest security company.
  • the apparatus when a signal is input from the emergency detection sensor, the apparatus is connected to the Internet, and the emergency notification items and the still image data read from the image recording unit before and / or after the signal input are read. May be transmitted to the terminal of the latest security company, and then the current video captured by the surveillance camera may be transmitted to the terminal of the latest security company.
  • the security object is not in a fixed state like a building or a house, but is moving like a taxi or a person.
  • the following modifications are made to FIGS. 2 and 3.
  • FIG. 4 is a modification of the transmission processing method of the emergency chat program of FIG.
  • This emergency chart program transmission method is shown in Fig. 2.
  • the only difference from the transmission method of the security program is that the guarded object is not in a fixed state like a building or a house, but is in a mobile state. Therefore, the description will be made only for these different steps, and the other steps will be assigned the same step numbers as those in FIG. 2 and the explanation will be omitted.
  • step 1 From step 1 to step 2, the same steps as in FIG. 2 are performed, and the process proceeds to step 3.
  • Step 3 “Set the case ID in the emergency call signal.” ⁇ ⁇ ⁇ Set the case ID in the emergency call signal, and proceed to step 41.
  • Step 4 "Get the location information of the incident site.” ⁇ ⁇ ⁇ Emergency notification of a security-targeted property while moving The location of the security contractor database because the location is not fixed like a building or a house Information is not useful. Therefore, the position information of the security object being moved is acquired by using the position information recognition system in step 4 in the above [Operation of the chat program after transmitting the emergency chat program], and the process proceeds to step 42.
  • Step 4 Search for the nearest security company. ⁇ ⁇ ⁇ Search the relevant security company database using the location information of the incident site obtained in step 4 1 and search for the closest related security company from the incident site. Then go to step 43.
  • Step 4 “Record details in the emergency report database.” ⁇ ⁇ ⁇ The ID of the security target property included in the emergency report signal, the case ID set in step 3 and the security ID of the security property acquired in step 41 Record the location information and the latest security company searched in step 42 in the emergency report database and proceed to step 44.
  • Step 4 "Secure and open the channel.” ⁇ ⁇ 'Secure a channel for exchanging chat information and go to step 45. This channel only needs to be able to communicate with the command center, the latest security company, and the property to be guarded, which are the parties involved, while excluding other people.
  • Step 4 Send the emergency chat program. ⁇ Set the incident ID and the aforementioned channel, Send to the target property and return to step 1.
  • FIG. 5 is a modified example of the operation method of the emergency chat program of FIG.
  • the operation method of this emergency chat program differs from the operation method of the emergency chat program shown in Fig. 3 in that the security target property is not in a fixed state like a building or house, but is a security target property. Is in a moving state.
  • Step 5 “The channel acquires the location information of the security target property and the nearest security company at regular intervals, and is on standby at other times.”
  • [Transmission of the emergency chat program in the first modified example]
  • the channel opened in step 4 of [Processing] displays the location information of the incident site, the location information and attributes of the security target property, and then stands by.
  • the position of the security target property is not always fixed from the time of occurrence.
  • the position of the security-targeted property would move with the passage of time from the time of the incident.
  • the most recent security company grasps the location information of the security target property and the case summary from the relevant channel and immediately rushes to the site, but in the meantime, by using the location information recognition system, for example, every two minutes
  • the location information recognition system for example, every two minutes
  • the channel is waiting for access from each entity. This standby state remains open 24 hours a day until the closing process is performed. If the command center and the property to be guarded have access to the channel, go to step 54. If the security company has recently accessed the channel, go to step 52.
  • Step 5 “Execute the emergency chat program received by the latest security company” ⁇ ⁇ ⁇ The latest security company, upon receiving the emergency chat program,
  • Step 6 Access the channel specified by the program. Proceed to step 53. Step 5 3. “Is the first security company accessing for the first time?” ⁇ ⁇ ⁇ If this is the first access for the latest security company, the emergency security database shown in Fig. 1 records the latest security company's recognition time and proceeds to step 54. If it is not the first time, proceed to step 54 without any special processing.
  • Step 5 4. obtain the latest security company and the location information of the security object.
  • the command center automatically acquires the location information of the nearest security company and the property to be guarded by the location information recognition system in step 4 of the above [Operation of the chat program after sending the emergency chat program] and makes an emergency report. Record the location information in the database and proceed to step 55.
  • Step 5 "Enter or get chat information" ⁇ ⁇ ⁇
  • the command center, the security object, or the nearest security company, which is the subject of the case, will automatically or manually access the emergency report on the case at that time. Detailed information of each subject can be grasped in chronological order for each subject.
  • each entity inputs changes in the situation as detailed information, and the command center stores the input in the emergency report database. Thereafter, the command center proceeds to step 56, and the property to be guarded and the nearest security company return to step 51.
  • Step 5 “Close processing?” ⁇ ⁇ ⁇ When the case is resolved, the command center executes the close processing and stores it in the emergency report database. Executing the closing process does not delete the information from the emergency report database in order to adopt evidence in a subsequent trial.
  • FIG. 6 is a modified example of [Emergency Chart Program Transmission Processing Method in First Modified Example] of FIG.
  • the parties involved were the command center, the security target property, and the latest security company. But a security contract
  • Step 1 the same steps as in FIG. 4 are performed from Step 1 to Step 44, and the process proceeds to Step 65.
  • Step 6 Send the emergency chat program.
  • Set the incident ID and the above-mentioned channel in the emergency chat program in the file server, and set the emergency chat program to the nearest security company and the security object. Send to security contractor and return to step 1.
  • FIG. 7 is a modified example of the operation method of the emergency chat program of FIG.
  • the operation method of this emergency chat program is different from the operation method of the emergency chat program shown in Fig. 5 in that the parties involved were the command center, the security target property, and the latest security company. The only difference is that the contractor will add four people.
  • Step 7 1. “The channel obtains the location information of the security target property and the nearest security company at regular intervals and is in a standby state at other times.” [Transmission of the emergency chat program in the second modified example] The channel opened in step 4 of process (4) displays the location information of the incident site, the location information and attributes of the security target property, and then stands by.
  • the position of the security target property is not always fixed from the time of occurrence. Considering the case of a taxi being intimidated by a passenger and being jacked, it is highly likely that the location of the security subject property will move over time from the time of the incident.
  • the latest security company grasps the location information and the summary of the incident from the channel concerned and immediately rushes to the site, while using the location information recognition system, for example, every two minutes. However, it is possible to make the parties aware that the latest security company is rushing to the incident site at regular intervals. At other times, the channel is waiting for access from each entity. This standby status is set to 2 It remains open for 4 hours. If the command center, the security object and the security contractor have access to the channel, go to step 74. If the security company has recently accessed the channel, go to step 72.
  • Step 7 "Execute the emergency chat program received by the latest security company" ⁇ ⁇ ⁇ ⁇ Upon receiving the emergency chat program, the latest security company accesses the channel specified in the program. Proceed to step 73. Step 7 3. “Is the first security company accessed for the first time?” ⁇ ⁇ ⁇ If this is the first access by the latest security company, the emergency security database of Fig. 1 records the recognition time of the latest security company, and proceeds to step 74. If it is not the first time, proceed to Step 74 without any special processing.
  • Step 7 "Get the location information of the security company and the security target property
  • the command center automatically obtains the position information of the latest security company and security right by the position information recognition system in step 4 in the above [Operation of the chat program after sending the emergency chat program] Record the relevant location information in Step 5 and proceed to Step 75.
  • Step 7 “Enter or obtain chat information.” ⁇ ⁇
  • the command center, security object, security contractor, or the latest security company, which is the subject of the case, will automatically or manually access the information at that time.
  • Detailed information on the emergency report related to the case can be grasped in chronological order for each entity.
  • each entity inputs changes in the situation as detailed information, and the command center stores the input in the emergency report database.
  • the dispatch center proceeds to step 76, and the security object and the nearest security company return to step 71.
  • Step 7 6. “Close processing?” ⁇ ⁇ ⁇
  • the command center executes the close processing and stores it in the emergency report database. Executing the closing process does not delete the information from the emergency report database in order to adopt evidence in a subsequent trial.
  • the present invention is not limited to this embodiment.
  • the specific configuration is not limited to this embodiment, and even if there is a design change without departing from the gist of the present invention, the present invention is not limited to this embodiment.
  • the present invention is not limited to this embodiment. include.
  • the summary and progress of the case Regardless of the type of channel used the purpose does not change regardless of the type of channel used, such as a channel using a video conference system or a channel using a telephone with a three-way calling function.
  • the present invention assumes that the position will change, including the command center, and will cover not only private for-profit security companies, but also police, fire departments, the national and local governments, and all others. Since the system can be widely used by organizations, the command center and the latest security company referred to in the present invention include all the organizations mentioned above in this section. Industrial applicability
  • an emergency that has occurred in a security object including a moving state contracted with a security company
  • a security system using the Internet can be provided to automatically notify the user.
  • by connecting the contract security company contracted by the user and the related security companies in other places by a computer network when the emergency report is transmitted, the normal operation of the contract security company is performed. It is possible to provide a system capable of performing emergency calls and responding to them beyond the scope.

Abstract

Cette invention a trait à un système de sécurité utilisant l'Internet pour rendre compte automatiquement de la survenue d'une situation d'urgence concernant un objet protégé par une sécurité et pour lequel l'utilisateur a passé un contrat avec une compagnie de sécurité et ce, même si cet objet se déplace en direction de la compagnie de sécurité et de la partie contractante. Ce système de sécurité est constitué d'un terminal de centre d'instructions pourvu de moyens de communications bidirectionnelles, par exemple sur l'Internet, d'un terminal de compagnie de sécurité associée en réseau et installé au siège d'un compagnie de sécurité associée et d'un terminal d'objet protégé par une sécurité installé dans cet objet. Le terminal de centre d'instructions pourvu de moyens de communications bidirectionnelles est équipé d'un dispositif récepteur de rapports relatifs à une situation d'urgence lui permettant de recevoir un rapport émanant du terminal d'objet protégé par une sécurité ainsi que d'un dispositif de recherche de la compagnie de sécurité la plus proche afin de rechercher, parmi les compagnies de sécurité associées sur réseau, la compagnie de sécurité la plus proche de l'objet protégé par une sécurité. Le système de sécurité comporte également un dispositif de transmission de rapports relatifs à une situation d'urgence transmettant lesdits rapports, par exemple sous forme de programme de conversation, du centre d'instruction à l'objet protégé par une sécurité et à la compagnie de sécurité la plus proche.
PCT/JP2001/001066 2000-08-17 2001-02-14 Systeme de securite utilisant une communication bidirectionnelle, notamment sur l'internet WO2002015143A1 (fr)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
JP2000287733A JP2004341565A (ja) 1999-11-12 2000-08-17 インターネット利用による警備システム
JP2000/287733 2000-08-17

Publications (1)

Publication Number Publication Date
WO2002015143A1 true WO2002015143A1 (fr) 2002-02-21

Family

ID=18771443

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/JP2001/001066 WO2002015143A1 (fr) 2000-08-17 2001-02-14 Systeme de securite utilisant une communication bidirectionnelle, notamment sur l'internet

Country Status (1)

Country Link
WO (1) WO2002015143A1 (fr)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104506801A (zh) * 2014-12-17 2015-04-08 南京莱斯信息技术股份有限公司 基于3g和卫星链路的动中通应急通信指挥系统

Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JPH0856388A (ja) * 1994-08-10 1996-02-27 Omron Corp 遠隔監視装置
JPH1198278A (ja) * 1997-09-17 1999-04-09 Hitachi Building Systems Co Ltd ビル設備機器用保全情報自動通報システム

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JPH0856388A (ja) * 1994-08-10 1996-02-27 Omron Corp 遠隔監視装置
JPH1198278A (ja) * 1997-09-17 1999-04-09 Hitachi Building Systems Co Ltd ビル設備機器用保全情報自動通報システム

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104506801A (zh) * 2014-12-17 2015-04-08 南京莱斯信息技术股份有限公司 基于3g和卫星链路的动中通应急通信指挥系统

Similar Documents

Publication Publication Date Title
US6943682B1 (en) Home security administration platform
JP3701961B1 (ja) 緊急通報機能を備えた携帯無線機、緊急通報装置及び緊急通報システム
CN108100791A (zh) 电梯系统
KR20200028338A (ko) 모니터링 및 컨시어지 서비스를 위한 확장가능 시스템들 및 방법들
AU2005220228A1 (en) Method and apparatus for interfacing security systems by periodic check in with remote facility
US20070157018A1 (en) Method and apparatus for using SMS short code messaging to facilitate the transmission of a status update for a security system
JP2006323704A (ja) 通報システム
US20080125078A1 (en) Mobile information device for performing emergency notification
US6266396B1 (en) Digital control of a security system
WO2020036759A2 (fr) Procédé et système de surveillance d'un système de sécurité ou de détection d'incendie et support de stockage
JP4451840B2 (ja) 携帯端末から緊急通報先へ通報時の位置情報通知方法及び緊急通報システム
JP5022917B2 (ja) 移動端末および端末機能制御プログラム
JP2004341565A (ja) インターネット利用による警備システム
RU2460144C2 (ru) Система мониторинга
JP2002237908A (ja) インターネット等の双方向通信を利用した警備システム
CN201270083Y (zh) 基于3g移动通信终端的智能报警系统
RU99221U1 (ru) Система мониторинга
KR100343045B1 (ko) 인터넷을 이용한 방범 방법
JP2005284861A (ja) 警備システム及び警備方法
KR20150041821A (ko) 위급상황에서 음성에 의한 스마트폰 제어 및 위치 알림서비스 방법
US8344878B2 (en) Method and apparatus for the creation of an event-associated electronic device directory
JP2002165211A (ja) 通信ネットワークを用いた防犯監視システム及びコンピュータに防犯監視システムの基本機能を実行させるためのプログラム、そのプログラムを記憶した記録媒体
WO2002015143A1 (fr) Systeme de securite utilisant une communication bidirectionnelle, notamment sur l'internet
JP2017050615A (ja) システム間連携装置
JPH09186797A (ja) 音声通報応答装置

Legal Events

Date Code Title Description
AK Designated states

Kind code of ref document: A1

Designated state(s): CN KR SG US

AL Designated countries for regional patents

Kind code of ref document: A1

Designated state(s): AT BE CH CY DE DK ES FI FR GB GR IE IT LU MC NL PT SE TR

121 Ep: the epo has been informed by wipo that ep was designated in this application
DFPE Request for preliminary examination filed prior to expiration of 19th month from priority date (pct application filed before 20040101)
122 Ep: pct application non-entry in european phase