WO2011108784A1 - 네트워크를 이용한 무인경비시스템, 무인경비서비스의 제공방법 및 무인경비시스템의 설정방법 - Google Patents
네트워크를 이용한 무인경비시스템, 무인경비서비스의 제공방법 및 무인경비시스템의 설정방법 Download PDFInfo
- Publication number
- WO2011108784A1 WO2011108784A1 PCT/KR2010/005068 KR2010005068W WO2011108784A1 WO 2011108784 A1 WO2011108784 A1 WO 2011108784A1 KR 2010005068 W KR2010005068 W KR 2010005068W WO 2011108784 A1 WO2011108784 A1 WO 2011108784A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- network
- camera
- boundary
- server
- security system
- Prior art date
Links
Images
Classifications
-
- G—PHYSICS
- G08—SIGNALLING
- G08B—SIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
- G08B25/00—Alarm systems in which the location of the alarm condition is signalled to a central station, e.g. fire or police telegraphic systems
- G08B25/01—Alarm systems in which the location of the alarm condition is signalled to a central station, e.g. fire or police telegraphic systems characterised by the transmission medium
- G08B25/08—Alarm systems in which the location of the alarm condition is signalled to a central station, e.g. fire or police telegraphic systems characterised by the transmission medium using communication transmission lines
- G08B25/085—Alarm systems in which the location of the alarm condition is signalled to a central station, e.g. fire or police telegraphic systems characterised by the transmission medium using communication transmission lines using central distribution transmission lines
-
- G—PHYSICS
- G08—SIGNALLING
- G08B—SIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
- G08B13/00—Burglar, theft or intruder alarms
- G08B13/18—Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength
- G08B13/189—Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength using passive radiation detection systems
- G08B13/194—Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength using passive radiation detection systems using image scanning and comparing systems
- G08B13/196—Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength using passive radiation detection systems using image scanning and comparing systems using television cameras
- G08B13/19654—Details concerning communication with a camera
- G08B13/19656—Network used to communicate with a camera, e.g. WAN, LAN, Internet
-
- G—PHYSICS
- G08—SIGNALLING
- G08B—SIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
- G08B13/00—Burglar, theft or intruder alarms
- G08B13/18—Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength
- G08B13/189—Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength using passive radiation detection systems
- G08B13/194—Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength using passive radiation detection systems using image scanning and comparing systems
- G08B13/196—Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength using passive radiation detection systems using image scanning and comparing systems using television cameras
- G08B13/19678—User interface
- G08B13/19682—Graphic User Interface [GUI] presenting system data to the user, e.g. information on a screen helping a user interacting with an alarm system
-
- G—PHYSICS
- G08—SIGNALLING
- G08B—SIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
- G08B25/00—Alarm systems in which the location of the alarm condition is signalled to a central station, e.g. fire or police telegraphic systems
- G08B25/005—Alarm destination chosen according to a hierarchy of available destinations, e.g. if hospital does not answer send to police station
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04N—PICTORIAL COMMUNICATION, e.g. TELEVISION
- H04N7/00—Television systems
- H04N7/18—Closed-circuit television [CCTV] systems, i.e. systems in which the video signal is not broadcast
- H04N7/181—Closed-circuit television [CCTV] systems, i.e. systems in which the video signal is not broadcast for receiving images from a plurality of remote sources
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04N—PICTORIAL COMMUNICATION, e.g. TELEVISION
- H04N7/00—Television systems
- H04N7/18—Closed-circuit television [CCTV] systems, i.e. systems in which the video signal is not broadcast
- H04N7/183—Closed-circuit television [CCTV] systems, i.e. systems in which the video signal is not broadcast for receiving images from a single remote source
- H04N7/185—Closed-circuit television [CCTV] systems, i.e. systems in which the video signal is not broadcast for receiving images from a single remote source from a mobile camera, e.g. for remote control
Definitions
- the present invention relates to an unmanned security system using a network, a method of providing an unmanned security service, and a method of setting up an unmanned security system, and more specifically, to detect a intruder and quickly deal with a situation before the intruder escapes without time delay.
- the present invention relates to an unmanned security system, a method of providing an unmanned security service, and a method of setting up an unmanned security system using a wireless network.
- the unmanned security system is to be installed in the office, store, etc. when you are away from home for a long time at night, to detect when an unauthorized intrusion from the outside and to alert or call the set place or location.
- the unmanned security system detects or monitors fire, theft, gas leakage, etc. by using sensors or surveillance cameras, and generates an alarm sound or recognizes it in a security service company, security office or management room through a leased line. For example, you can automatically call or contact a fire or police station.
- Such an unmanned security system is equipped with a camera or various sensors that can detect them at a place or location requiring security and security in each home, household, apartment building, company, etc. Detect the input signal detected.
- the customer can not monitor and respond to the emergency situation until the remote control center takes action, and also has a limitation that can not directly monitor the site situation.
- an unmanned security system that enables the customer to monitor or remotely control the situation of the place requested by the customer at any place in the Internet environment.
- the monitoring area is monitored through various sensors, and the monitored information is provided to the main server through the Internet to check the alarm situation at the control center connected to the main server, and the customer can access the main server through the network. It consists of managing and monitoring the system.
- Such an unmanned security system enables dual monitoring by customers and service providers, so that customers can directly monitor the surveillance area, and if there is a problem with security and security in the surveillance area, a rapid expense to the surveillance area of the service provider is provided. To make it happen.
- the time may be delayed by notifying the occurrence of the accident to several people, such as security companies, customers, and police.
- such an unmanned security system also has a problem that can not be easily used by a user in a mobile terminal, such as a rapidly increasing use due to the problem of processing speed, and also managed by only a reserved person, such as near-neighbor, near Despite the situation that can be helped, such as the police station, there is a problem that does not receive help to cause great damage.
- the present invention is to solve the above-mentioned problems, it is a flexible, complementary, and immediate use of the surrounding infrastructure, such as neighboring and nearby police station to detect the intruder and quickly cope with the situation before the intruder escape without delay.
- the boundary setting can be changed, and a simple boundary setting window can be easily used in a mobile terminal, and the method for providing an unmanned security system and an unmanned security service using a network that can change the boundary setting according to circumstances. And to provide a method of setting up the unmanned security system has its purpose.
- the present invention provides a plurality of detection sensors for detecting an abnormal state of a specific position and outputting a detection signal; At least one camera installed at the specific position and generating and outputting image data and audio data; A Dynamic Domain Name Service (DDNS) server that manages an Internet address for accessing the Internet to provide image data and audio data of the camera;
- DDNS Dynamic Domain Name Service
- SMS sending DB server for transmitting a message for;
- a web server constituting security related information in the form of a web page;
- a management control server that manages the state of the sensor and the camera, receives and stores the image data and the audio data from the camera, and integrates and manages the DDNS server, the SMS sending DB server and the web server;
- a terminal for receiving the web page through a network. It provides an unmanned security system using a network comprising a.
- the simultaneous notification of crime is notified by sending multiple simultaneous messages in real time, so that a person in the best environment can respond promptly without missing important transmission, and can immediately grasp the situation on the site. In response, there is an effect that can quickly deal with the situation.
- FIG. 1 is a schematic block diagram of an unmanned security system using a network according to an embodiment of the present invention.
- FIG. 2 illustrates an interface screen of a mobile terminal supported by an unmanned security system using a network according to an embodiment of the present invention.
- FIG. 3 is a schematic flowchart of a method of providing an unmanned security service using a network according to an embodiment of the present invention.
- FIG. 4 is a schematic flowchart of a method of setting up an unmanned security system using a network according to an embodiment of the present invention.
- 5 to 10 are each a screen example for explaining a method of setting up an unmanned security system using a network according to an embodiment of the present invention.
- 11 is a screen example showing a boundary setting list window in an unmanned security system using a network according to an embodiment of the present invention.
- FIG. 1 is a schematic block diagram of an unmanned security system using a network according to an embodiment of the present invention.
- the unmanned security system 100 using the network 10 includes a sensor 110, a camera 120, a dynamic domain name service (DDNS) server 190, It is configured to include a management control server 130, SMS sending DB server 140, web server 150, built-in web server 151, alarm server 160, file server 170 and the terminal 180.
- DDNS dynamic domain name service
- the sensor 110 is composed of a variety of sensors, such as infrared sensor, shock sensor, door sensor, glass breakage sensor, smoke sensor, entrance detection sensor, fire detection sensor, a specific location requiring security or surveillance and security, For example, it detects an abnormal condition in the entrance, window, parking lot or company building and outputs a detection signal.
- sensors such as infrared sensor, shock sensor, door sensor, glass breakage sensor, smoke sensor, entrance detection sensor, fire detection sensor, a specific location requiring security or surveillance and security, For example, it detects an abnormal condition in the entrance, window, parking lot or company building and outputs a detection signal.
- the detection sensor 110 is connected to the camera 120 in a cross manner.
- the camera 120 is composed of one or more, is installed at the specific position, and generates and outputs the image data and audio data as equipped with a speaker and a microphone.
- two-way audio support enables real-time conversation with remote sites and on-site situation sounds.
- the camera 120 is a wireless IP camera, irrespective of the number of floors wherever the radio waves can reach WI-FI settings without the need for LAN construction and cable construction, the first floor of all the floors connected wirelessly
- the advantage is that you can see the status in real time.
- image data generated in an internal memory of the camera 120 may be stored.
- the camera 120 is installed in the window direction to maintain the stability of the radio, wireless signal encryption to enable complete security maintenance, at least eight infrared LEDs are installed at night to obtain a high quality image at night It is desirable to widen the viewing distance.
- the camera 120 can rotate 360 degrees in the horizontal direction, 80 degrees in the vertical direction, there is no blind spot when attached to the ceiling, remote control the rotation angle through the homepage to manage the unmanned security system in real time Characterized in that can be grasped.
- the user can check the image transmitted in real time through the camera 120 to the terminal 180 and at the same time listen to the voice, and the voice can be sent out, if the intruder intrudes appropriate to respond to the intrusion situation You can respond in real time, such as alert broadcasting.
- the user may access the web server 150 through the terminal 180 and check the image, and the image upload may be set in the camera 120.
- the camera 120 is capable of tracking theft, so that when another person uses the camera 120 after theft, the backtracking management management server 130 informs the original user of the access information by SMS. It features.
- the DDNS server 190 manages an Internet address for internet access in order to provide image data and audio data of the camera.
- the DDNS server 190 allows a user to access the camera 120 and change or change settings at will, regardless of the management control server 130.
- the built-in web server 151 is provided, and the ID and port of the camera 120 are stored in the built-in web server 151.
- the user when the user wants to view the image information generated by the camera 120, if a user inputs a predetermined address in the address window of the web page, the user can directly access the built-in web server 151 to check the image information.
- the management control server 130 does not provide the image information of the camera 120, but directly provided by the camera 120, that is, the management in the middle in a peer-to-peer manner. It provides a direct connection without going through the control server (130).
- the management control server 130 manages the state of the sensor 110 and the camera 120, receives and stores the image data and audio data from the camera 120, the DDNS server 190, SMS management DB server 140 and web server 150 is integrated management.
- the SMS sending DB server 140 if an abnormality occurs in the specific position through any one or more of the sensor 110 and the camera 120, voice guidance, text messages, At least two or more of e-mails and faxes are used to transmit a message about the abnormality of the particular location.
- the data is sent by comparing the data with the condition values stored in the management control server 130.
- the DB server 140 notifies the plurality of users of the crime notification.
- the plurality of users may directly log in through the terminal 180 to check the image data and the audio data generated by the camera 120 and cope with the identified information.
- the SMS sending DB server 140 is notified three times by voice guidance, text message, fax, and transmits the image data by email.
- the SMS integrated server 200 classifies the number of carriers by number and performs the communication billing.
- the SMS sending DB server 140 is characterized in that to selectively transmit the message according to the boundary importance according to the method set in advance by the user, so that the user can set various scenarios according to the situation and environment desired by the user. Save the condition values.
- the SMS sending DB server 140 may transmit a message according to the setting logic of telephone, fax, and SMS for each user when an abnormal detection signal occurs in a corresponding time zone according to the user's setting.
- the setting is made by using a web page for managing the unmanned security system 100 through the terminal 180 or Wizwick, a shortcut button for facilitating access thereof. Notification by phone, fax, e-mail, etc. will be described in detail below.
- the web server 150 configures security-related information in the form of a web page, and when the detection sensor 110 detects an abnormal state, about 100 video images are left in the history gallery, which is used for debt collection in an emergency. This is possible.
- the alarm server 160 checks the normal operation approximately 2880 times a day while sending and receiving a signal with the camera 120 at a predetermined interval (30 seconds), such as a power failure or disconnection such as a breakdown, a network error, or a switch off.
- a power failure or disconnection such as a breakdown, a network error, or a switch off.
- the file server 170 stores the image data separately, and transmits the image data to the file server 170 while the image data is stored in the camera 120 when an intruder intrudes.
- the terminal 180 may be configured as a general PC, a portable terminal such as a WI-FI iPhone, a PDA, etc., and may receive the web page through the network 10, even if the user does not access through the web page. It can be easily accessed using the simple setting window using icons, shortcut buckets, and Wizwick.
- the network 10 includes a general telephone network, an ISDN, a LAN, and the like, and is used as a communication medium capable of remotely detecting a situation of a location or a place where the camera 120 and the sensor 110 are installed.
- the user can manage and monitor the operation state of the camera 120 and the sensor 110 through the input of the ID and password on the opened homepage, it is also possible to check the boundary record, notification details, entry and exit records.
- the user can monitor through the Internet regardless of time and region, such as continuous monitoring and remote control using the network 10, and in the event of an abnormality, the police station is located near the most It can be controlled immediately, such as asking for help from an acquaintance, which is effective for criminal arrest.
- the boundary can be easily changed on the intuitive interface by logging in as if checking the e-mail when changes occur.
- the same effect can be achieved by only software without hardware or mechanical change or installation, and the boundary can be changed more flexibly.
- FIG. 3 is a schematic flowchart of a method of providing an unmanned security service using a network according to an embodiment of the present invention
- FIG. 4 is a schematic flowchart of a method of setting up an unmanned security system using a network according to an embodiment of the present invention
- 5 to 11 are screen exemplary views for explaining a method of setting an unmanned security system using a network according to an embodiment of the present invention
- FIG. 8 is a screen exemplary view showing a boundary setting list window.
- the method of providing an unmanned security service using a network proceeds to the following steps.
- one or more cameras 120 generates and outputs image data and audio data (S203). ).
- management control server 130 manages the state of the sensor 110 and the camera 120, and receives and stores the image data and audio data from the camera 120 (S204).
- the SMS sending DB server 140 transmits a message for the abnormality of the specific location to the plurality of users associated with the specific location by using at least two or more of voice guidance, text message, e-mail and fax (S205).
- the web server 150 configures security related information in the form of a web page (S206), and the web server 150 provides the web page to the terminal 180 through the network 10 (S207).
- the user may check the built-in web server 151.
- the above procedure provides the unmanned security service to the user, which will be omitted since it is similar to that described in the description of the system.
- step S205 of the above steps the user needs to set the unmanned security system 100 on a web page in advance. Referring to FIG. 4 to FIG.
- a homepage for managing an unmanned security system 100 using a network is accessed (S301), and when authentication is required, a user ID and a password are input (S302).
- a boundary of a specific location is set according to at least two setting of day, night and situation.
- the user can set various scenarios according to the situation and environment desired by the user.
- according to the situation can be set step by step, it is possible to set about 500 or more situations, and when an abnormal condition occurs, it is possible to select a contact for each situation according to the situation and send a message. .
- a commute alarm may be set to transmit a commute message to the user (S307), and the image generated by the camera 120 A time interval for uploading the image data to the file server 170 may be set to store data separately (S308).
- the user can check the commute through the alarm, and can set the upload time interval of the image data as needed.
- the present invention is characterized in that the contents of the voice guidance, text message, message transmitted by email and fax can be set.
- the user when the commute alarm is set, the user can set the desired commute greeting as desired, and the contents of the informing message can be set by the user as well.
- Voice transmission is possible and can also be provided in English.
- the message may be set to continue to be transmitted from the time when the abnormal state of the specific location is detected, or may be set to transmit the message when the abnormal state is detected again after a predetermined time has elapsed from the time. Even if an abnormal condition occurs, a message is sent when the condition is correct according to the selected time and method.
- the present invention can select and set one of an existing schedule boundary and an immediate boundary, and error filtering is additionally configured.
- the error filtering is introduced in order to eliminate the inconvenience that can appear in reality.
- the error filtering is configured to detect a plurality of signals at least two to three times in the case of a true signal, and to ignore the first signal unconditionally.
- the user can adjust, for example, if there is no re-signal within 30 minutes, the first received signal disappears, if 30 minutes elapsed when the signal is received again as the primary signal.
- an error signal can be significantly reduced, and since only an intrinsic signal is detected, there is an advantage of increasing the reliability of the signal to a maximum value.
- the message can be set to be transmitted only once when the abnormal state is detected as shown in the first step boundary shown in FIGS. 5 to 8, but may be applied at the time of setting to go to work where the message is not continuously transmitted.
- an error filter is used to send an SMS 30 minutes or an hour after the message is sent when an abnormal condition is detected. do.
- the fourth stage boundary is set to continue to send messages from the second detection after the first hold when the abnormal state is detected, and the fifth stage boundary is to inform that the most urgent situation, and continue to send the message from the abnormal state detection.
- user boundary 1 or user boundary 2 either send a message when the primary signal is detected and continue to send the message each time it is rediscovered, or send a message when the primary signal is detected and then select the time (for example, , 10 minutes) can be set to continue sending messages when rediscovered.
- the N guardian setting window may include an unmanned boundary setting window that allows a user to quickly approach an unmanned boundary setting by Wizwick, a shortened bucket, and the like on the terminal 180.
- the N guard setting window can start the guard by pressing the start button, it can form a simple unmanned boundary setting window that can automatically set the end.
- the N guard setting window allows a user to directly start a boundary at the time of going to work or leaving work by using a predetermined icon on the terminal 180.
- the 15-second boundary is a button that allows the user to leave the room, for example, 15 minutes, and sets the boundary to start 15 minutes after the user is away. Can be.
- the immediate boundary is to enable the boundary to be carried out in a mobile or remote PC, and when someone visits the remote site can be the function of unlocking and re-locking the boundary.
- the release can be released immediately from the mobile or PC.
- Automatic boundary change at the scheduler boundary means that even if the scheduler boundary is in use, when a certain icon, for example, the Njikimi button is clicked, is automatically switched to the Njikimi boundary (manual boundary setting) and the boundary starts immediately. can do.
- the automatic alert release function is set up to be used at a certain time, and eliminates the disadvantage of having to release the alert automatically every time when entering the security zone at the set time without seeing it as an intrusion. You can also check the time automatically.
- the number of recipients varies depending on the level of alert, and usually the first and the fifth stages are used, so not all the recipients need to be entered. Can send out phone or sms.
- Contacts can include a regular phone or a mobile phone, and, in the case of an Internet phone or a mobile phone, you can receive sms and a phone at the same time. At this time, it is advisable to register a phone number in the daytime, such as a neighboring house, a neighboring store, a nearby office, etc. for short distance emergency contact. In addition, in the case of night, if you set the night time and night time zones can be a more flexible setting.
- security offices or disaster prevention rooms and building offices can be set up to be a complete service by setting the office or guard room and the employees living near the office.
- the emergency call setup window sends emergency calls in real time to up to seven places in real time at the moment of pressing the emergency call button, and inputs a telephone number such as a next door, a side store, a side office in advance, and is used in case of emergency. If you do not have day or night crime, you can help each other.
- a separate boundary setting list window is provided, and when there are three cameras for one ID, simple boundary setting, schedule boundary setting, presence of use, etc., using an icon such as N guardian, respectively. It can be set independently to set various borders while reducing the number of machines. You can also check the current border configuration status through the demarcation list window.
Abstract
Description
Claims (22)
- 특정 위치의 이상상태를 감지하여 감지신호를 출력하는 복수의 감지센서;상기 특정 위치에 설치되고, 영상데이터 및 음성데이터를 생성하여 출력하는 하나 이상의 카메라;상기 카메라의 영상데이터 및 음성데이터를 제공하기 위하여 인터넷 접속을 위한 인터넷 주소를 관리하는 DDNS(Dynamic Domain Name Service)서버;상기 감지센서 및 카메라 중 어느 하나 이상을 통해 상기 특정 위치에 이상이 발생되면, 상기 특정 위치와 관련된 복수의 사용자에게 음성안내, 문자메시지, 이메일 및 팩스 중 적어도 둘 이상을 이용하여 상기 특정 위치의 이상에 대한 메시지를 전송하는 SMS발송DB서버;보안관련 정보들을 웹페이지의 형태로 구성하는 웹서버;상기 감지센서 및 카메라의 상태를 관리하고, 상기 카메라로부터 상기 영상데이터 및 음성데이터를 수신하여 저장하며, 상기 DDNS서버, SMS발송DB서버 및 웹서버를 통합 관리하는 관리관제서버; 및네트워크를 통해 상기 웹페이지를 수신하는 단말기;를 포함하는 것을 특징으로 하는 네트워크를 이용한 무인경비시스템.
- 제 1 항에 있어서,상기 카메라가 정상 동작하지 않은 경우, 이를 사용자에게 알려주는 알람서버; 를 더 포함하는 것을 특징으로 하는 네트워크를 이용한 무인경비시스템.
- 제 1 항에 있어서,상기 영상데이터를 별도로 보관하는 파일서버; 를 더 포함하는 것을 특징으로 하는 네트워크를 이용한 무인경비시스템.
- 제 1 항에 있어서,상기 카메라는 수평방향으로 360도, 수직방향으로 80도 회전이 가능한 것을 특징으로 하는 네트워크를 이용한 무인경비시스템.
- 제 1 항에 있어서,상기 카메라는 도난 트랙킹이 가능하여, 타인이 상기 카메라를 도난 후 사용할 시 상기 관리관제서버가 원 사용자에게 SMS로 접속정보를 알려주는 것을 특징으로 하는 네트워크를 이용한 무인경비시스템.
- 제 1 항에 있어서,상기 SMS발송DB서버는 사용자가 미리 설정한 경계중요도에 따라 선택적으로 메시지를 전송하는 것을 특징으로 하는 네트워크를 이용한 무인경비시스템.
- 제 6 항에 있어서,상기 웹서버는 무인경계 스케줄 설정창, 무인경계 간이설정창, 경비개시 및 비상호출 버튼창, 긴급호출 설정창 중 적어도 하나를 지원하며, 상기 SMS발송DB서버로부터 상기 특정위치의 이상을 수신한 사용자가 상황에 따라 상기 복수의 사용자의 연락처를 변경할 수 있도록 구성된 것을 특징으로 하는 네트워크를 이용한 무인경비시스템.
- 제 1 항에 있어서,상기 영상데이터 및 음성데이터를 피어 투 피어(peer-to-peer) 방식으로 제공하기 위해 구비되는 빌트인(Built-in)웹서버; 를 더 포함하는 것을 특징으로 하는 네트워크를 이용한 무인경비시스템.
- 복수의 감지센서가 특정 위치의 이상상태를 감지하여 감지신호를 출력하는 경우, 하나 이상의 카메라가 영상데이터 및 음성데이터를 생성하여 출력하는 단계;상기 감지센서와 카메라의 상태를 관리하고, 상기 카메라로부터 상기 영상데이터 및 음성데이터를 수신하여 저장하는 단계;상기 특정 위치와 관련된 복수의 사용자에게 음성안내, 문자메시지, 이메일 및 팩스 중 적어도 둘 이상을 이용하여 상기 특정 위치의 이상에 대한 메시지를 전송하는 단계;무인경계 스케줄 설정창, 무인경계 간이설정창, 경비개시 및 비상호출 버튼창, 긴급호출 설정창 중 적어도 하나를 지원하며, 보안관련 정보들을 웹페이지의 형태로 구성하는 단계; 및네트워크를 통해 상기 웹페이지를 단말기로 제공하는 단계; 를 포함하는 것을 특징으로 하는 네트워크를 이용한 무인경비서비스의 제공방법.
- 제 9 항에 있어서,상기 카메라가 정상 동작하지 않은 경우, 이를 사용자에게 알려주는 것을 특징으로 하는 네트워크를 이용한 무인경비서비스의 제공방법.
- 제 9 항에 있어서,상기 영상데이터를 파일서버에 별도로 보관하는 것을 특징으로 하는 네트워크를 이용한 무인경비서비스의 제공방법.
- 제 9 항에 있어서,상기 카메라는 수평방향으로 360도, 수직방향으로 80도 회전이 가능한 것을 특징으로 하는 네트워크를 이용한 무인경비서비스의 제공방법.
- 제 9 항에 있어서,상기 카메라는 도난 트랙킹이 가능하여, 타인이 상기 카메라를 도난 후 사용할 시 원 사용자에게 문자메시지로 접속정보를 알려주는 것을 특징으로 하는 네트워크를 이용한 무인경비서비스의 제공방법.
- 제 9 항에 있어서,상기 메시지를 전송하는 단계에서는 사용자가 미리 설정한 경계중요도에 따라 선택적으로 메시지를 전송하는 것을 특징으로 하는 네트워크를 이용한 무인경비서비스의 제공방법.
- 제 9 항에 있어서,상기 영상데이터 및 음성데이터는 피어 투 피어(peer-to-peer) 방식으로 제공되는 것을 특징으로 하는 네트워크를 이용한 무인경비서비스의 제공방법.
- 네트워크를 이용한 무인경비시스템을 관리하는 홈페이지에 접속하는 단계;인증이 필요한 경우, 사용자 ID 및 패스워드를 입력받는 단계;입력된 상기 사용자 ID 및 패스워드가 설정된 사용자 ID 및 패스워드와 일치하는지 판단하는 단계;상기 판단에 의해 인증이 이루어지면, 웹페이지를 통해 소정의 시간대, 카메라가 설치된 위치, 경계중요도, 주야 및 상황 중 적어도 둘 이상의 설정에 따라 특정 위치의 경계를 설정하는 단계; 및상기 특정 위치의 경계를 설정하는 단계에 따라 상기 복수의 사용자에게 음성안내, 문자메시지, 이메일 및 팩스 중 적어도 둘 이상을 이용하여 상기 특정 위치의 이상에 대한 메시지를 전송하도록 상기 복수의 사용자의 연락처, 이메일 및 팩스 중 적어도 하나 이상을 입력받는 단계; 를 포함하는 것을 특징으로 하는 네트워크를 이용한 무인경비시스템의 설정방법.
- 제 16 항에 있어서,상기 특정 위치의 이상상태를 감지하여 감지신호가 출력된 시간이 출퇴근 시간인 경우, 복수의 사용자에게 출퇴근 메시지를 전송하도록 출퇴근 알람을 설정하는 단계; 를 더 포함하는 것을 특징으로 하는 네트워크를 이용한 무인경비시스템의 설정방법.
- 제 16 항에 있어서,상기 카메라에 의해 생성된 영상데이터를 별도로 보관하도록 상기 영상데이터를 파일서버로 업로드하는 시간 간격을 설정하는 단계; 를 더 포함하는 것을 특징으로 하는 네트워크를 이용한 무인경비시스템의 설정방법.
- 제 16 항에 있어서,상기 음성안내, 문자메시지, 이메일 및 팩스로 전송되는 메시지의 내용을 설정할 수 있는 것을 특징으로 하는 네트워크를 이용한 무인경비시스템의 설정방법.
- 제 17 항에 있어서,상기 경계를 설정하는 단계에서는 상기 특정 위치의 이상상태를 감지한 시간부터 상기 메시지를 계속 전송하도록 설정하거나, 상기 시간부터 소정의 시간이 경과한 후 이상상태를 재감지할 때 상기 메시지를 전송하도록 설정하는 것을 특징으로 하는 네트워크를 이용한 무인경비시스템의 설정방법.
- 제 20 항에 있어서,상기 경계를 설정하는 단계는 무인경계 스케줄 설정창, 무인경계 간이설정창, 경비개시 및 비상호출 버튼창, 긴급호출 설정창 중 적어도 하나를 이용하여 설정되는 네트워크를 이용한 무인경비시스템의 설정방법.
- 제 21 항에 있어서,상기 무인경계 간이설정창에는 상기 이상상태 재감지시 상기 메시지를 설정하도록 오류필터링 전송이 포함되며, 즉시경계, 15분후 경계, 즉시해제, 스케줄러 경계에서 자동경계변경, 출근시 자동경계해제 중 적어도 하나가 포함되는 네트워크를 이용한 무인경비시스템의 설정방법.
Priority Applications (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN2010800366179A CN102473340A (zh) | 2010-03-02 | 2010-08-02 | 利用网络的无人警备系统、无人警备服务提供方法及无人警备系统的设定方法 |
US13/496,292 US20120176218A1 (en) | 2010-03-02 | 2010-08-02 | Unmanned security system using network, method for providing unmanned security service, and method for setting unmanned security system |
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
KR1020100018691A KR101072593B1 (ko) | 2010-03-02 | 2010-03-02 | 네트워크를 이용한 무인경비시스템, 무인경비서비스의 제공방법 및 무인경비시스템의 설정방법 |
KR10-2010-0018691 | 2010-03-02 |
Publications (1)
Publication Number | Publication Date |
---|---|
WO2011108784A1 true WO2011108784A1 (ko) | 2011-09-09 |
Family
ID=44542405
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/KR2010/005068 WO2011108784A1 (ko) | 2010-03-02 | 2010-08-02 | 네트워크를 이용한 무인경비시스템, 무인경비서비스의 제공방법 및 무인경비시스템의 설정방법 |
Country Status (4)
Country | Link |
---|---|
US (1) | US20120176218A1 (ko) |
KR (1) | KR101072593B1 (ko) |
CN (1) | CN102473340A (ko) |
WO (1) | WO2011108784A1 (ko) |
Families Citing this family (22)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US9457473B2 (en) * | 2012-06-20 | 2016-10-04 | Irobot Corporation | Suspended robot systems and methods for using same |
CN103021109A (zh) * | 2012-11-29 | 2013-04-03 | 西南交通大学 | 一种电力设施防盗监控系统 |
KR101302653B1 (ko) * | 2012-12-21 | 2013-09-03 | 김정수 | 홈 게이트웨이 동맹을 이용한 보안 시스템 및 방법 |
TWI479461B (zh) * | 2013-04-16 | 2015-04-01 | Hon Hai Prec Ind Co Ltd | 緊急狀況通報系統及方法 |
US20150022674A1 (en) * | 2013-07-18 | 2015-01-22 | Koss Corporation | Wireless video camera |
CN103440727B (zh) * | 2013-09-03 | 2015-11-25 | 苏州太谷电力股份有限公司 | 一种电气火灾预警方法和系统 |
CN103440725A (zh) * | 2013-09-03 | 2013-12-11 | 苏州太谷电力股份有限公司 | 电气火灾预警服务方法和系统 |
KR101421700B1 (ko) * | 2013-11-01 | 2014-07-22 | 주식회사 휴먼시스템 | 감시카메라의 지능형 분석기능을 이용한 실시간 위치추적 시스템 및 그 위치추적방법 |
JP5866557B1 (ja) * | 2014-11-20 | 2016-02-17 | パナソニックIpマネジメント株式会社 | 監視システム及び監視システムにおける監視方法 |
CN104635503A (zh) * | 2015-01-03 | 2015-05-20 | 叶春林 | 车辆居家单元类监控能够联管的方式 |
KR101726315B1 (ko) * | 2015-05-28 | 2017-04-12 | (주)지인테크 | 이벤트 알림 기능이 있는 네트워크 기반 감시 시스템 및 네트워크 기반 감시 카메라 |
CN105373062A (zh) * | 2015-12-22 | 2016-03-02 | 上海天跃科技股份有限公司 | 一种监控报警装置 |
CN105635261A (zh) * | 2015-12-25 | 2016-06-01 | 江苏省交通规划设计院股份有限公司 | 触屏服务终端远程支持方法 |
CN106483917A (zh) * | 2016-11-07 | 2017-03-08 | 宁波精丰测控技术有限公司 | 电力设施远程监控系统及方法 |
WO2018108262A1 (en) * | 2016-12-14 | 2018-06-21 | Telefonaktiebolaget Lm Ericsson (Publ) | Methods and entities for alerting about failure of an unmanned aerial vehicle |
US10965899B1 (en) * | 2017-04-17 | 2021-03-30 | Alarm.Com Incorporated | System and method for integration of a television into a connected-home monitoring system |
US10984640B2 (en) * | 2017-04-20 | 2021-04-20 | Amazon Technologies, Inc. | Automatic adjusting of day-night sensitivity for motion detection in audio/video recording and communication devices |
KR101884652B1 (ko) | 2017-09-05 | 2018-08-29 | 지경호 | 공동주택의 용역 인력 관리 시스템 및 이를 이용한 공동주택의 용역 인력 관리 방법 |
CN109584503A (zh) * | 2018-11-15 | 2019-04-05 | 安徽盛联电力科技有限公司 | 一种语言紧急报警系统 |
US11080990B2 (en) | 2019-08-05 | 2021-08-03 | Factory Mutual Insurance Company | Portable 360-degree video-based fire and smoke detector and wireless alerting system |
CN110517442B (zh) * | 2019-08-29 | 2021-08-10 | 重庆金泓和瑞科技有限公司 | 一种用于智能安防系统的接警平台工作方法 |
CN112995342B (zh) * | 2021-04-22 | 2021-08-06 | 航天神舟智慧系统技术有限公司 | 基于公安内外网传输的举报监控方法和系统 |
Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP2003187343A (ja) * | 2001-12-14 | 2003-07-04 | Takanobu Deguchi | 防犯システム |
US20060161960A1 (en) * | 2005-01-20 | 2006-07-20 | Benoit Brian V | Network security system appliance and systems based thereon |
KR100757054B1 (ko) * | 2007-02-05 | 2007-09-07 | 주식회사 훠엔시스 | 이동통신 단말기를 위한 모바일 서버 장치와, 이를 적용한 원격 감시 시스템 및 원격 감시 방법 |
KR100833615B1 (ko) * | 2007-03-02 | 2008-05-30 | 주식회사 훠엔시스 | 원격 감시 시스템 및 원격 감시 방법 |
KR20100003658A (ko) * | 2008-07-01 | 2010-01-11 | 김태민 | 인터넷을 이용한 방범 시스템 및 그 제어 방법 |
Family Cites Families (17)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20070008099A1 (en) * | 1999-09-01 | 2007-01-11 | Nettalon Security Systems, Inc. | Method and apparatus for remotely monitoring a site |
GB0102355D0 (en) * | 2001-01-30 | 2001-03-14 | Mygard Plc | Security system |
KR20030013839A (ko) * | 2001-08-09 | 2003-02-15 | 쌍용정보통신 주식회사 | 그룹웨어를 이용한 보안 시스템 |
US6658091B1 (en) * | 2002-02-01 | 2003-12-02 | @Security Broadband Corp. | LIfestyle multimedia security system |
JP2006048174A (ja) * | 2004-07-30 | 2006-02-16 | A・T・Gジャパン株式会社 | ホームセキュリティシステム |
US7292142B2 (en) * | 2004-10-20 | 2007-11-06 | Honeywell International, Inc. | Method and apparatus for interfacing security systems by periodic check in with remote facility |
ATE445961T1 (de) * | 2005-02-16 | 2009-10-15 | Ivan Lovric | Intelligentes fern-mehrfachkommunikations- überwachungssystem und verfahren |
CA2539774A1 (en) * | 2005-03-10 | 2006-09-10 | Paul S. Schranz | Method and system for an insurance auditor to audit a premise alarm system |
CN1741079A (zh) * | 2005-09-15 | 2006-03-01 | 邹志尚 | 一种防偷盗防抢劫防丢失的可智能报警的照相机 |
US7671729B2 (en) * | 2006-11-14 | 2010-03-02 | Shmuel Hershkovitz | System and a method for remote monitoring customer security systems |
WO2008064270A2 (en) * | 2006-11-20 | 2008-05-29 | Micropower Appliance | Wireless network camera systems |
CN101266711B (zh) * | 2007-03-15 | 2011-02-23 | 中兴通讯股份有限公司 | 一种视频监控系统及告警录像网络存储方法 |
US20090122143A1 (en) * | 2007-11-14 | 2009-05-14 | Joel Pat Latham | Security system and network |
US9282297B2 (en) * | 2008-01-24 | 2016-03-08 | Micropower Technologies, Inc. | Video delivery systems using wireless cameras |
JP5319433B2 (ja) * | 2009-07-16 | 2013-10-16 | エンパイア テクノロジー ディベロップメント エルエルシー | 撮影システム、移動体、撮影制御方法 |
US8908033B2 (en) * | 2009-09-29 | 2014-12-09 | Avaya Inc. | Utilizing presence information for the purpose of enhanced surveillance |
US8644795B2 (en) * | 2009-11-25 | 2014-02-04 | Centurylink Intellectual Property Llc | System and method for managing individual use of a mobile telecommunications account |
-
2010
- 2010-03-02 KR KR1020100018691A patent/KR101072593B1/ko not_active IP Right Cessation
- 2010-08-02 CN CN2010800366179A patent/CN102473340A/zh active Pending
- 2010-08-02 US US13/496,292 patent/US20120176218A1/en not_active Abandoned
- 2010-08-02 WO PCT/KR2010/005068 patent/WO2011108784A1/ko active Application Filing
Patent Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP2003187343A (ja) * | 2001-12-14 | 2003-07-04 | Takanobu Deguchi | 防犯システム |
US20060161960A1 (en) * | 2005-01-20 | 2006-07-20 | Benoit Brian V | Network security system appliance and systems based thereon |
KR100757054B1 (ko) * | 2007-02-05 | 2007-09-07 | 주식회사 훠엔시스 | 이동통신 단말기를 위한 모바일 서버 장치와, 이를 적용한 원격 감시 시스템 및 원격 감시 방법 |
KR100833615B1 (ko) * | 2007-03-02 | 2008-05-30 | 주식회사 훠엔시스 | 원격 감시 시스템 및 원격 감시 방법 |
KR20100003658A (ko) * | 2008-07-01 | 2010-01-11 | 김태민 | 인터넷을 이용한 방범 시스템 및 그 제어 방법 |
Also Published As
Publication number | Publication date |
---|---|
KR101072593B1 (ko) | 2011-10-11 |
CN102473340A (zh) | 2012-05-23 |
US20120176218A1 (en) | 2012-07-12 |
KR20110099584A (ko) | 2011-09-08 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
WO2011108784A1 (ko) | 네트워크를 이용한 무인경비시스템, 무인경비서비스의 제공방법 및 무인경비시스템의 설정방법 | |
US20080224862A1 (en) | Selectively enabled threat based information system | |
WO2016137118A1 (ko) | Sms 알림 서비스를 이용한 사전 침입 감지 시스템 그리고, 구조신호 통보 시스템 및 방법 | |
CA2704244A1 (en) | Security system | |
KR100857073B1 (ko) | 실시간 원격 감시 시스템 | |
RU2554549C2 (ru) | Интерактивный домофон | |
JP2008217438A (ja) | 緊急地震速報対応型集合住宅管理システム | |
JP4901400B2 (ja) | インターホンシステム | |
JP2000299740A (ja) | 転送機能付きインターホン | |
JPH11234432A (ja) | 警備システム | |
KR20070010554A (ko) | 실시간 비상벨 보안시스템 및 상기 시스템을 이용한 실시간보안감시방법 | |
KR100913310B1 (ko) | 비상 경보 시스템 | |
KR100591380B1 (ko) | 긴급재난에 대한 신속한 대처를 제공하는 지능형 긴급재난통합 관리시스템 | |
JP4620218B2 (ja) | ホームセキュリティシステム | |
JP2005208878A (ja) | セキュリティシステム | |
JP2003223603A (ja) | 事業所の異常事態防止集中管理システム | |
KR20200094315A (ko) | 네트워크를 이용한 무인경비시스템 및 무인경비시스템의 설정방법 | |
JP3550983B2 (ja) | 集合住宅用警報監視システム | |
JPH11144171A (ja) | 共同住宅管理システム | |
JPH1069591A (ja) | 集合住宅警報監視統合システム | |
KR200332862Y1 (ko) | 사용자 단말기를 이용한 사무실 원격감시장치 | |
JP2004070564A (ja) | セキュリティシステム | |
KR100609735B1 (ko) | 인터넷 망을 이용한 무인원격 화상경비 장치 | |
JP2005242980A (ja) | 通信システム、複合通信端末 | |
WO2010117112A1 (ko) | 구내 감시 시스템 |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
WWE | Wipo information: entry into national phase |
Ref document number: 201080036617.9 Country of ref document: CN |
|
121 | Ep: the epo has been informed by wipo that ep was designated in this application |
Ref document number: 10847082 Country of ref document: EP Kind code of ref document: A1 |
|
WWE | Wipo information: entry into national phase |
Ref document number: 13496292 Country of ref document: US |
|
NENP | Non-entry into the national phase |
Ref country code: DE |
|
32PN | Ep: public notification in the ep bulletin as address of the adressee cannot be established |
Free format text: NOTING OF LOSS OF RIGHTS PURSUANT TO RULE 112(1) EPC |
|
122 | Ep: pct application non-entry in european phase |
Ref document number: 10847082 Country of ref document: EP Kind code of ref document: A1 |