Description
METHOD FOR PROVIDING SECURITY SERVICE USING
INTERNET
Technical Field
[1] The present invention relates to a method for providing a security service using the
Internet. More particularly, the present invention is directed to an Internet-based security service providing method for protecting a user in a situation where a visitor got into the user's house with entrance permission suddenly acts as an offender such as a robber. Background Art
[2] A conventional Internet-based security system is schematically shown in Fig. 1. The security system includes a user terminal 1 connected to the Internet through a communication network, a security server 3 for making sure the safety of a user based on the data received from the user terminal 1 and providing a necessary security service, and a network 10 for interconnecting the user terminal 1 and the security server 3. The network 10 includes a public telephone communication network 11, an Internet communication network 12, a mobile communication network 13 and a gateway for interconnecting different communication networks. The user terminal 1 is connected to the security server 3 through a communication network which varies with the kind of the user terminal 1. The user terminal 1 is installed within a general house, an office or other locations where a security service needs to be provided while a user is absent. The user terminal 1 includes a sensor for detecting an intruder, a camera for taking an image of the intruder detected by the sensor and a communication means for transmitting the image data on the intruder to the security server 3. An infrared sensor may be used as the sensor for detecting an intruder. Alternatively, it may be possible to determine the intrusion by analyzing the image taken by the camera or sensing the motion of the intruder. Upon receiving the image data or an intrusion message from the user terminal 1, the security server 3 transmits a warning message to a specified third party terminal 5 to inquire the safety of the user. Alternatively or additionally, the security server 3 may transmit the warning message to a server 8 of a guard company so that security personnel 9 can be dispatched to the user's house or office.
[3] The security service is indeed necessary in order to cope with a situation where a visitor disguised as a door-to-door delivery man or a postman gets into the house under the permission of a housewife or an old or weak person in the daytime and suddenly acts as an offender such as a robber, rather than to avoid a situation where a thief breaks into an empty house to steal articles. The conventional security system as
shown in Fig. 1, however, cannot effectively cope with the former situation. This is because, if the visitor gets into the user's house with entrance permission, the user terminal 1 does not work or fails to provide a suitable means for coping with the situation that the visitor suddenly acts as an offender. Furthermore, the conventional security system is designed to transmit indoor images to the server of a guard company in case where the user terminal 1 is installed within a house. Therefore, there is a fear that the privacy may be invaded. This is particularly true if the security system erroneously issues a warning signal and the manager of a security server inspects the indoor images. Disclosure of Invention Technical Problem
[4] It is an object of the present invention to provide an Internet-based security service providing method capable of effectively protecting a user in a situation where a visitor got into the user's house with entrance permission suddenly acts as an offender.
[5] Another object of the present invention is to provide an Internet-based security service providing method capable of protecting the user'S privacy by allowing only a designated person (or an authorized person) to inspect indoor image data transmitted in case of emergency and to dispatch security personnel when there is a need to provide a rescue service. Technical Solution
[6] In accordance with the present invention, there is provided a method for providing a security service in a security server connected to the Internet, including the steps of: storing image data transmitted from a user terminal; sending a safety confirmation request message to the user terminal in a predetermined time interval after the storage of the image data is started; determining whether a safety confirmation response message is received from the user terminal within a specified time period; sending a warning message to a terminal or a server designated previously if the safety confirmation response message is not received from the user terminal within the specified time period; and repeating the image data storing step and the safety confirmation request message sending step until a security cancellation message is received from the user terminal.
[7] Preferably, the warning message sending step may include the steps of: transmitting a first warning message to the designated terminal if the safety confirmation response message is not received from the user terminal within the specified time period; and if the safety confirmation response message or the security cancellation message is not received from the user terminal within a specified time period after transmission of the first warning message, transmitting a second warning message by which to request
security personnel to move to a location of the user for confirmation of the user's safety. It is preferred that the first warning message contains a one-time password for use in gaining access to the security server and receiving the image data stored in the security server.
[8] With the present invention, the security server continues to store the image data received from the user terminal and periodically determines the safety of the user based on the safety confirmation request message and the safety confirmation response message repeatedly sent and received between the security server and the user terminal. If the safety confirmation response message is not received from the user terminal, the security server transmits a warning message to a designated terminal. The manager of the designated terminal that receives the warning message can take a measure for making sure the safety of the user. In addition, the manager of the designated terminal can confirm the security state of the user based on the images transmitted from the security server through the Internet. Therefore, the manager of the designated terminal can immediately make sure the safety of the user in case where the visitor got into the user's house with entrance permission suddenly acts as an offender. It is also possible to protect the user's privacy because only the manager of the designated terminal is permitted to review the images stored in the security server.
[9] With the present invention, the safety of the user is periodically confirmed based on the safety confirmation request message and the safety confirmation response message repeatedly sent and received between the security server and the user terminal. If the safety confirmation response message is not received, the security server provides a designated third party with a warning message to thereby protect the user from the visitor who suddenly acts as an offender after getting into the user's house with entrance permission.
[10] With the present invention, a first warning message and a second warning message are transmitted one after another to the designated third party terminal and the server of the guard company that provides a security personnel dispatching service. This makes it possible to avoid unnecessarily dispatching security personnel when a warning message is erroneously sent by the user.
[11] With the present invention, a limited number of persons are permitted to view the indoor images stored in the security server. This makes it possible to provide the security service while protecting the user's privacy to the greatest possible degree. Brief Description of Drawings
[12] Fig. 1 is a schematic view illustrating a conventional Internet-based security service providing system.
[13] Fig. 2 is a schematic view showing an Internet-based security service providing
system in accordance with the present invention.
[14] Fig. 3 is a flowchart for explaining one example of the sequence through which a security service providing method in accordance with the present invention is performed by the system shown in Fig. 2.
[15] Fig. 4 is a flowchart for explaining one example of the sequence performed in a security server.
[16] Fig. 5 is a flowchart concretely illustrating the step of receiving and storing image data in the security service providing method of the present invention.
[17] Fig. 6 is a flowchart concretely illustrating the step of transmitting a warning message in the security service providing method of the present invention.
[18] Fig. 7 is a flowchart concretely illustrating the step of selecting security personnel in the security service providing method of the present invention.
[19] Fig. 8 is a flowchart illustrating another example of the step of transmitting a warning message in the security service providing method of the present invention.
[20] Fig. 9 is a flowchart illustrating how to manage the image data stored in the security server in the security service providing method of the present invention. Best Mode for Carrying out the Invention
[21] Hereinafter, a security service providing system in accordance with the present invention will be described in detail with reference to the accompanying drawings.
[22] Fig. 2 schematically shows a security service providing system in accordance with the present invention. Referring to Fig. 2, the present security service providing system includes a user terminal 20, a security server 50 for storing the image data received from the user terminal 20 and providing a security service to a user of the user terminal 20 based on a safety confirmation request message and a safety confirmation response message sent to and received from the user terminal 20, and a wire/wireless network 30 for interconnecting the user terminal 20 and the security server 50.
[23] Connected to the network 30 are a third party mobile terminal 40 designated by the user, a personal computer 41 designated by the user and a mobilization service server 60 of a guard company that provides the user with a mobilization service through which to dispatch security personnel 61 to the place where the user is located. The user of the user terminal 20, the third party person holding the designated third party mobile terminal 40 and the manager of the security server 50 are permitted to gain access to the security server 50 through the third party mobile terminal 40 or the personal computer 41 or 51, to receive and inspect the images stored in the security server 50 within a limited extent and to manage the records of security data stored in the security server 50.
[24] The user terminal 20 includes a sensor (not shown) for detecting a visitor to the user's
house, a camera for taking an indoor image of the user's house, a communication unit for transmitting the taken image or an inputted message to the security server 50 and receiving a message from the security server 50 through the network 30 and a user interface through which to notify the user of the message received from the security server 50 or to input a user's command. Instead of employing the sensor for detecting a visitor, it may be possible to detect movement of a visitor by processing the image taken by the camera. Upon detecting such movement, the user terminal 20 starts communication with the security server 50. It is preferred that the user terminal 20 encodes the image data and then transmits the same to the security server 50.
[25] In the present embodiment, the network 30 is a combined network including a mobile communication network 31, an Internet communication network 32 and a public telephone communication network 33. The user terminal 20 is connected to the security server 50 through the mobile communication network 31 and the Internet communication network 32 or through the public telephone communication network 33 and the Internet communication network 32. Alternatively, the user terminal 20 may be directly connected to the security server 50 through the Internet communication network 32.
[26] Fig. 3 is a flowchart for explaining one example of the sequence through which the security service providing method in accordance with the present invention is performed by the system shown in Fig. 2. Referring to Fig. 3, the user terminal 20 takes an indoor image, when a visitor is detected by the sensor, and sends data of the image to the security server 50 (step Sl). In case where the sensor is not used, a command may be inputted through the user interface to start communication with the security server 50. In case where the camera is set to continuously take indoor images, the user terminal 20 may make communication with the security server 50 if the movement of a visitor is detected through image processing. In this case, the camera may chase the movement and take the image of the moving visitor. The security server 50 stores the image data received from the user terminal 20 and sends a safety confirmation request message to the user terminal 20 in a specified time interval to make sure the safety of the user (step S2).
[27] Upon receiving the safety confirmation request message, the user terminal 20 notifies the user of the receipt of that message through the user interface. Responsive to the safety confirmation request message, the user inputs a safety confirmation signal into the user terminal 20 through the user interface. The user terminal 20 generates a safety confirmation response message and sends the same to the security server 50 (step S3). The safety confirmation response message refers to a secret key preliminarily defined by the user and stored in the security server 50. The secret key is known to only the user. When receiving the safety confirmation request message, the user terminal 20
displays such a request on a display device or notifies the user of such a request with a specified sound, thereby urging the user to input a safety confirmation response message into the display device.
[28] The security server 50 determines whether a safety confirmation response message is sent back from the user terminal 20 within a specified time period after transmission of the safety confirmation request message. If the safety confirmation response message is received within the specified time period, the flow returns to step S2. If the security server 50 fails to receive the safety confirmation response message from the user terminal 20 within the specified time period, it sends a first warning message, which requests confirmation of the safety of the user, to the third party terminal 40 preliminarily designated the user (step S4).
[29] The first warning message contains a one-time password needed to receive the image data stored in the security server 50. Responsive to the first warning message, the holder of the third party terminal 40 calls the user at once to make sure the safety of the user and to urge the user to input a safety confirmation response message (step S6). Alternatively, the holder of the third party terminal 40 may log in the security server 50 using the one-time password contained in the first warning message. Then the holder of the third party terminal 40 may inspect the images stored in the security server 50 (step S5) to make sure the safety of the user. Thereafter, the holder of the third party terminal 40 may contact the user to urge him or her to input a safety confirmation response message (step S6). Although not shown in the drawings, if the inspection of the images stored in the security server 50 reveals that the user is in a dangerous situation, the holder of the third party terminal 40 may directly contact a police station or a guard company or may request the security server 50 to dispatch security personnel. If the user is in a safe state and inputs a secret key through the user interface pursuant to the demand of the holder of the third party terminal 40, the user terminal 20 generates a safety confirmation response message according to the secret key thus inputted and sends the message to the security server 50 (step S7).
[30] After sending the first warning message, the security server 50 determines whether a safety confirmation response message is sent back from the user terminal 20 within a specified time period. If the security server 50 succeeds in receiving the safety confirmation response message, the flow returns back to step S2. In contrast, if the security server 50 fails to receive the safety confirmation response message, it sends a second warning message to the mobilization service server 60, thereby requesting the mobilization service server 60 to dispatch security personnel (step S8).
[31] Fig. 4 is a flowchart for explaining one example of the sequence performed in the security server. Referring to Fig. 4, the security server 50 stores the image data received from the user terminal 20 (step SlO) and sends a safety confirmation request
message to the user terminal 20 after a predetermined time period has lapsed from the storage of image data (step S20). Then the security server 50 determines whether a safety confirmation response message is sent back from the user terminal 20 within a specified time period (step S30). If the security server 50 fails to receive the safety confirmation response message, it determines where a security cancellation message is issued from the user terminal 20 (step S40). In case where the security server 50 fails to receive any one of the safety confirmation response message and the security cancellation message, it sends a user's safety confirmation request message, i.e., a warning message, to the third party terminal 40 designated by the user, the security personnel 61 or the mobilization service server 60 (step S50). If the safety confirmation response message is received from the user terminal 20, the flow returns to the initial step. Examples of the user's safety confirmation request message include text messages or multimedia messages transmitted from an SMS server or an MMS server of the mobile communication network 31 to the mobile terminals 40 and 61 held by the third party person or the security personnel. As the user's safety confirmation request message, it may be possible to use electronic mails transmitted to the third party personal computer 41 through a web server of the Internet communication network 32. The security server 50 repeatedly performs the afore-mentioned sequence until and unless a security cancellation message is received from the user terminal 20.
[32] If the security server 50 receives the security cancellation message from the user terminal 20, it updates the user database with the user's security records and terminates the flow (step S60). The user's security records include: 1) the start and end time of connection between the user terminal 20 and thee security server 50; 2) the transmission and reception time of the safety confirmation request message and the safety confirmation response message; 3) the transmission time of the warning message of sent to the third party terminal 40, the mobilization service server 60 and the security personnel terminal 61; and 4) the meta information on the image data received from the user terminal 20.
[33] Fig. 5 is a flowchart concretely illustrating the step of receiving and storing the image data in the security service providing method of the present invention. Referring to Fig. 5, the security server 50 receives a storage request message from the user terminal 20 (step SI l) and extracts a user ID from the storage request message thus received (step S 12). Examples of the user ID include the serial number allotted to the user terminal 20 when the user becomes a member of the security server 50 and the electronic serial number (ESN) specific to the user terminal 20. Other kinds of user ID may be used depending on the applications of the present invention. Based on the user ID thus extracted, the security server 50 performs an initialization task to store the image data of the user (step S 13). The security server 50 extracts a user's database from the
internal database and, based on the user's database, allots a storage space in which to store the received image data. After finishing the initialization task, the security server 50 transmits to the user terminal 20 a storage standby message which requests the user terminal 20 to send an image data (step S 14). Then the security server 50 receives an image data from the user terminal 20 (step S 15) and stores the image data in the storage space allotted as above (step S 16).
[34] Fig. 6 is a flowchart concretely illustrating the step of transmitting the warning message in the security service providing method of the present invention. Referring to Fig. 6, if the security server 50 fails to receive any one of the safety confirmation response message and the security cancellation message, it sends a first warning message for confirmation of the user's safety to the third party terminal 40 designated by the user (step S51). If the safety confirmation response message is received from the user terminal 20 within a specified time period (step S52), the flow returns to step SlO mentioned above. If the security cancellation message, instead of the safety confirmation response message, is received from the user terminal 20 within a specified time period (step S53), the flow returns to step S60 mentioned above.
[35] In case where the security server 50 fails to receive any one of the safety confirmation response message and the security cancellation message within a specified time period after transmission of the first warning message, it selects the security personnel who should be dispatched to the user's location for confirmation of the user's safety (step S54) and then sends to the selected security personnel a second warning message which instructs the security personnel to move to the user's'socation (step S55). Thereafter, the security server 50 determines whether a mobilization confirmation message is received from the security personnel (step S56). If the security server 50 fails to receive the mobilization confirmation message, it periodically transmits the second warning message to the selected security personnel.
[36] Fig. 7 is a flowchart concretely illustrating the step of selecting security personnel in the security service providing method of the present invention. Referring to Fig. 7, if the security server 50 fails to receive any one of the safety confirmation response message and the security cancellation message from the user terminal 20, it searches a plurality of security personnel near the user based on the positional information of security personnel (step S61) and transmits to the plurality of security personnel a mobilization request message by which to inquire their availability to move to the user (step S62). Then the security server 50 receives mobilization availability messages from the plurality of security personnel (step S63) and, based on the mobilization availability messages, selects the security personnel to be dispatched to the user (step S64). Preferably, one or more of the security personnel may be selected depending on the mobilization availability messages received.
[37] Fig. 8 is a flowchart illustrating another example of the step of transmitting the warning message in the security service providing method of the present invention. Referring to Fig. 8, if the security server 50 fails to receive any one of the safety confirmation response message and the security cancellation message from the user terminal 20, it transmits a first warning message for confirmation of the user's safety to the third party terminal 40 designated by the user (step S71). If the security server 50 receives the safety confirmation response message from the user terminal 20 within a specified time period after transmission of the first warning message (step S72), the flow returns to step SlO mentioned earlier. If the security cancellation message, instead of the safety confirmation response message, is received from the user terminal 20 within a specified time period after transmission of the first warning message (step S73), the flow returns to step S60 mentioned above. In case where the security server 50 fails to receive any one of the safety confirmation response message and the security cancellation message within a specified time period after transmission of the first warning message, it transmits to the mobilization service server 60 a second warning message by which to request the security personnel to directly move to the user's location for confirmation of the user's safety (step S74). Thereafter, the security server 50 determines whether a mobilization confirmation message is received from the mobilization service server 60 (step S75). If the security server 50 fails to receive the mobilization confirmation message, it periodically transmits the second warning message to the mobilization service server 60.
[38] Fig. 9 is a flowchart illustrating how to manage the image data stored in the security server in the security service providing method of the present invention. Referring to Fig. 9, the user, the third party person, the security personnel and the manager of the mobilization service server 60, the latter three of which are in receipt of a one-time password, may log in the security server 50 by inputting the one-time password (step S81), if they want to manage or inspect the image data stored in the security server 50. The security server 50 determines whether the password inputted at the time of login is the user's password or the one-time password (step S82). If it is determined that the password was inputted by the user, the security server 50 transmits, deletes or corrects the stored user database or the stored image data according to the command inputted by the user (steps S83 and S84). In contrast, if it is determined that the password was inputted by the third party person, the security personnel or the manager of the mobilization service server 60, the security server 50 searches the image data whose inspection is authorized to the holder of the one-time password (step S85) and then transmits the searched image data to the terminals held by the third party person, the security personnel or the manager of the mobilization service server 60 (step S86). It is preferred that the one-time password is used as a secret key for decoding the image
data stored in an encoded state. In case where the login is made by inputting the onetime password, the transmission number and amount of the image data may be limited for protection of the user's privacy.
[39] The security service providing method of the present invention may be in the form of a computer-executable program and may be realized in a general-purpose computer capable of executing the program stored in a computer-readable recording medium. Examples of the computer-readable recording medium include a magnetic storage medium (e.g., a ROM, a floppy disk, a hard disk or the like), an optical recording medium (e.g., a CDROM, a DVD or the like) and a carrier wave (e.g., the Internet transmission). Industrial Applicability
[40] The present security service providing method can be used in protecting a user in a situation where a visitor got into the user's house with entrance permission suddenly acts as an offender such as a robber.