WO2015030279A1 - Procédé de localisation des criminels en temps réel basé sur le p2p et utilisant un dispositif intelligent doté d'une fonction gps - Google Patents

Procédé de localisation des criminels en temps réel basé sur le p2p et utilisant un dispositif intelligent doté d'une fonction gps Download PDF

Info

Publication number
WO2015030279A1
WO2015030279A1 PCT/KR2013/007846 KR2013007846W WO2015030279A1 WO 2015030279 A1 WO2015030279 A1 WO 2015030279A1 KR 2013007846 W KR2013007846 W KR 2013007846W WO 2015030279 A1 WO2015030279 A1 WO 2015030279A1
Authority
WO
WIPO (PCT)
Prior art keywords
criminal
information
tracking
search
user
Prior art date
Application number
PCT/KR2013/007846
Other languages
English (en)
Korean (ko)
Inventor
조성훈
Original Assignee
Jo Sung Hoon
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Jo Sung Hoon filed Critical Jo Sung Hoon
Publication of WO2015030279A1 publication Critical patent/WO2015030279A1/fr

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W4/00Services specially adapted for wireless communication networks; Facilities therefor
    • H04W4/02Services making use of location information
    • H04W4/029Location-based management or tracking services
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W4/00Services specially adapted for wireless communication networks; Facilities therefor
    • H04W4/02Services making use of location information
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W4/00Services specially adapted for wireless communication networks; Facilities therefor
    • H04W4/70Services for machine-to-machine communication [M2M] or machine type communication [MTC]

Definitions

  • the present invention relates to a criminal tracking method, and relates to a method for tracking a criminal by transmitting and receiving real-time tracking information and a device having criminal tracking information retrieved by GPS information.
  • the problem to be solved by the present invention is to provide a criminal tracking method for tracking the criminal by sending and receiving the real-time tracking information and the device with the criminal tracking information retrieved by the GPS information in real time.
  • the present invention to solve the above problems, generating a search information file containing the GPS information and the user information; Receiving a criminal tracking information request through a device-to-device query using the search information file; And transmitting the criminal tracking information of the criminal who has received the criminal tracking information request to the device that has transmitted the criminal tracking information request, wherein the device-to-device query is performed by searching the search information file. It provides a criminal tracking method.
  • the criminal tracking information request includes at least one of the impression of the criminal to be tracked, vehicle information, criminal photo, escape route, or criminal content, or the criminal tracking information, Including at least one of sighting, criminal location, criminal shooting image, or escape route, and the criminal location of the criminal tracking information includes a location input by a user on a map, a location of a building recognized according to the captured image, or It may be a criminal tracking method characterized in that the position specified by one or more of the orientation and distance with respect to the user input by the user.
  • the criminal tracking information request is transmitted to devices located in a predetermined range from an expected escape route of the criminal derived from the criminal tracking information, or the criminal tracking information request and the criminal tracking.
  • the device that has transmitted and received information may be a criminal tracking method characterized in that the criminal tracking information request and the criminal tracking information are transmitted and received in real time.
  • the search information file further includes a criminal sighting tag generated according to a user's input that witnesses the criminal, and after a predetermined time the search information file including the criminal sighting tag, Transmitting to a central server; And receiving a criminal tracking information request from the central server, wherein the criminal tracking information request received from the central server searches for a search information file including a criminal tracking tag stored in the central server and selects a search information file. It may be a criminal tracking method characterized in that the request.
  • the search information file further includes emergency information generated according to a user's input of a dangerous situation, or the search information file is photographed according to a user's input of a witness. It may be a criminal tracking method characterized in that it further comprises a shooter shooting image.
  • a criminal tracking method characterized in that the transmission and reception of a message between the user who witnessed the culprit and the administrator managing the search information file, or the search information file search using an ontology search in consideration of an error. Can be.
  • the culprit can be tracked quickly and accurately in real time.
  • simply installing an Application Program on a smart device with existing GPS functionality without adding additional systems or additional equipment can dramatically reduce the time and cost of searching.
  • the information of the XML file can be used for the search of the consumer, so that the convenience can be more easily searched for the witnesses who can provide the criminal tracking information.
  • FIG. 1 is a block diagram illustrating a process of tracking a criminal in a criminal tracking method according to an embodiment of the present invention using a device and a server.
  • FIG. 2 is a flowchart of a criminal tracking method according to an embodiment of the present invention.
  • Figure 3 shows the tracking of the escape route of the criminal using the criminal tracking information.
  • FIG. 4 is a flowchart of a criminal tracking method according to another embodiment of the present invention.
  • a criminal tracking method comprising: generating a search information file including GPS information and user information; receiving a criminal tracking information request through a device-to-device query using the search information file; And transmitting the criminal tracking information about the criminal who has received the criminal tracking information request to the device that has transmitted the criminal tracking information request, wherein the device-to-device query is performed through the search information file search.
  • a criminal tracking method comprising: generating a search information file including GPS information and user information; receiving a criminal tracking information request through a device-to-device query using the search information file; And transmitting the criminal tracking information about the criminal who has received the criminal tracking information request to the device that has transmitted the criminal tracking information request, wherein the device-to-device query is performed through the search information file search.
  • FIG. 1 is a block diagram illustrating a process of tracking a criminal in a criminal tracking method according to an embodiment of the present invention using a device and a server.
  • the criminal tracking method mainly searches for a user who can provide criminal tracking information by using file transmission and reception between the device and the device 110, and transmits and receives criminal tracking information.
  • a user who can provide criminal tracking information by using file transmission and reception between the device and the device 110, and transmits and receives criminal tracking information.
  • In providing the tracking information when performing a search using a large amount of information, it is difficult to quickly track the tracking, so that the search can be carried out in a P2P manner using a search information file to reduce the load on the server and also Can be done quickly.
  • the search information file may be an XML file or a text file.
  • the device 110 may be a mobile terminal having a GPS function, such as a smart terminal.
  • the device 110 may be a wearable device, such as smart glasses or a smart watch. If you use smart glasses (Google Eyeglass, etc.), you can take a picture or video while watching the criminal and the map at the same time. If you use a smart watch (Galaxy Gear, etc.), If an emergency occurs, the application according to the method quickly Emergency information can be notified by starting.
  • FIG. 2 is a flowchart of a criminal tracking method according to an embodiment of the present invention.
  • step 210 a search information file including GPS information and user information is generated.
  • a search information file including GPS information and user information is generated.
  • the GPS information includes GPS coordinates and time
  • the user information may include personal information of the user, a function of a terminal used by the user, or vehicle information of the user.
  • the GPS information is used.
  • the GPS information may be GPS information of a terminal generating the search information terminal.
  • the GPS information may be received by an external terminal, such as a vehicle navigation.
  • the function of the terminal used by the user may include whether a camera is mounted on the terminal, the quality of the mounted camera, a communication method optimized for the terminal, and the like.
  • the search information file may be an XML or text file.
  • the XML is a web service standard that can directly retrieve and verify information on a browser such as Internet Explorer.
  • Semantic Web has an advantage that machine can obtain information by using XML file.
  • the GPS information and the image information may be generated as an XML file so that a quick information search may be performed while reducing the load on the server.
  • the search information file may further include a criminal witness tag generated according to a user's input that witnesses the criminal.
  • the user who witnesses the culprit may include the culprit tag in the XML and generate the tag, thereby facilitating a search for a terminal that can quickly provide the culprit tracking information.
  • the culprit tracking tag when confirmed by the manager of the culprit tracking system, it may serve as a reminder for notifying the culprit tracking information consumer, such as the information.
  • the criminal sighting tag may also be used as a method of finding a witness.
  • the search information file may further include emergency information generated according to a user's input of a dangerous situation. If the user himself or herself is a crime, there is a risk of other crimes, or if there is a danger in the process of tracking the culprit, the emergency information indicating that a dangerous situation has occurred may be further included in the search information. .
  • the search information file may further include a criminal image captured by the user who witnessed the criminal.
  • a criminal photographing image of the suspected suspect or suspected suspect may be further included in the search information file. It is easy to identify the criminal to be tracked using the photo or video information, and when tracking a plurality of criminals, it can be used to specify the criminal.
  • step 220 a request for tracking information is received through a device-to-device query using the search information file.
  • the criminal tracking information request may be received through a device-to-device query from the criminal tracking information consumer tracking the criminal.
  • the device-to-device query may be performed by searching the search information file. It may be searched using the GPS information, and may be performed by searching for the criminal sighting tag or the photograph of the criminal shooting.
  • the search information file search may use an ontology search in consideration of an error. That is, in consideration of the error of the GPS information, the search may be performed by the ontology method. The accurate search can be performed by using the ontology search in consideration of the error.
  • the criminal tracking information request may include one or more of a criminal's impression, vehicle information, criminal photo, escape route, or crime content to be tracked.
  • a criminal's impression By providing information about the criminal to the user of the device selected by the GPS information, it is possible to specify the criminal among the people around. In a location such as a downtown area, even if the user in the place where the killer is located has a high probability of not knowing who is the killer, if the killer escapes using the vehicle to identify who is the killer, the vehicle information
  • the criminal information including one or more of a criminal photo, montage, escape route, or criminal content may be included in the criminal tracking information request.
  • the culprit may be first sent to a small sized image to reduce the amount of data, and if a small sized image is selected, the original may be downloaded. Impressions can be provided as a text file.
  • the escape route can be displayed on the map.
  • the crime content may be a file summarizing the suspects received from the police, investigative agencies, and the like. Users can download suspect information in advance, so that the suspects can be recognized, found and reported in advance. The suspect information may be confirmed by searching.
  • the criminal tracking information request may be transmitted to devices located in a predetermined range from the expected escape route of the criminal derived from the criminal tracking information. Through the search, the request for tracking information may be transmitted not only to the location of the criminal but also to devices located within a predetermined range from an expected escape route. By providing information to the users who are located in the expected escape route in advance, the time required to receive the criminal tracking information request and confirm the criminal can be reduced.
  • the expected escape route of the criminal derived from the criminal tracking information will be described in detail with reference to FIG. 3.
  • the predicted escape route of the criminal may be set as the criminal's main activity site.
  • step 230 the criminal tracking information for the criminal who has received the criminal tracking information request is transmitted to the device that sent the criminal tracking information request.
  • the device receiving the request for tracking information transmits the tracking information generated by the information that the user has or information input from the user, to the device that sent the tracking information request.
  • the device transmitting the criminal tracking information request may be a device used by a police officer, an investigation agency, a security company, or the like.
  • the criminal tracking information may include one or more of criminal witness, criminal location, criminal image, or escape route. If you have witnessed the culprit, you can provide a movement path by providing information that the culprit has passed through the location, and can provide the culprit witnessing, and confirmed the location of the culprit, photographed shooter, or escape The path may be provided as the tracking information. Tracking information input from the user may be input through voice recognition.
  • the criminal location of the criminal tracking information is a location specified by one or more of a location input by a user on a map, a location of a building recognized according to a photographed image, or an orientation and distance with respect to the user input by the user. Can be. Tracking is time-critical because the location you enter on the map after viewing the map, the location of a specific building recognized by shooting a specific building, or the user entered It may be a position according to the orientation and distance with respect to the center. A map around the user may be displayed to the user, and the user's input selected as the location of the criminal may be transmitted as the criminal location. Alternatively, the perpetrator location can be specified through building recognition using cameras and pre-built databases.
  • the location of the criminal can be specified by illuminating the camera in a building around the criminal. By operating the camera, the camera can identify a building in the light of a building around the criminal, and transmit the GPS coordinates of the building as the location of the criminal. Further, the criminal location can be specified using the direction and distance from the user.
  • the orientation can be measured automatically using the automatic direction recognition system. Programs such as object recognition in the Opencv library can be used to extract direction information about where a user is moving. If you specify the location of the killer while chasing the killer, the orientation can be measured automatically.
  • the distance from the user may be input by the user.
  • an approximate distance to a criminal may be input in units of 10 meters.
  • the criminal tracking information including the criminal location may be transmitted to the device that transmitted the criminal tracking information request.
  • the device for transmitting and receiving the criminal tracking information request and the criminal tracking information may transmit and receive the criminal tracking information request and the criminal tracking information in real time.
  • the tracking information may be transmitted and received in real time. Receiving criminal tracking information from a user who is pursuing the criminal can be performed more quickly than receiving criminal tracking information from a new user, so the criminal tracking information can be transmitted and received in real time until the criminal is missed.
  • a message may be transmitted and received between the user who witnessed the culprit and the administrator who manages the search information file.
  • the message function can be used to accurately send and receive criminal tracking information. By using messages in addition to the search information file, fast and accurate tracking information can be transmitted and received.
  • the user can send and receive messages to the culprit tracking user. If GPS doesn't work well, or if you have witnessed the culprit without using GPS, you can use the message to provide tracing information.
  • the captured image may be transmitted along with the message. Alternatively, it may be transmitted by voice mail. In tracking the culprit, the message can be sent via voice mail so that the message can be provided quickly with people who are difficult to manipulate the messenger.
  • the criminal tracking method of the present invention can be used not only for criminals but also for searching for missing persons, in emergency situations, and in response to rescue requests in emergency situations.
  • the tracking method of the present invention can be used for missing persons rather than criminals.
  • through the tracking method of the present invention it can be used for rescue requests and response in emergency or disaster situations.
  • police, investigative agencies, and security companies can be used to order arrests and to track offenders to available personnel adjacent to them for arrest.
  • Figure 3 shows the tracking of the escape route of the criminal using the criminal tracking information.
  • the culprit escape route 330 can be derived. Further, by tracking the escape route, it is possible to predict the expected escape route of the criminal. In other words, it is possible to derive the criminal escape route by tracking the locations of the devices providing the information that witnessed the criminal. In predicting the escape route of the criminal, it is possible to analyze and predict by searching the ontology considering the error, and to send the query to the users who are in the predicted route to keep track in real time and cooperate with the police, investigative agencies, and security companies. You can arrest.
  • FIG. 4 is a flowchart of a criminal tracking method according to another embodiment of the present invention.
  • step 410 the search information file including the criminal eye tag is transmitted to the central server after a predetermined time.
  • the search information file generated in step 210 may be directly searched and provided through device-to-device communication, but may be used when the network is not connected to the central server. Or, even if the crime is not tracked in real time, witnesses or criminal confirmation evidences may be needed. Using the central server, criminal tracking information can be searched and used. To this end, the search information file including the criminal sighting tag may be transmitted to the central server and stored in the central server. Or, if there is a risk of personal information leakage and do not want device-to-device communication, the generated XML file may be transmitted to the central server after a predetermined time in order to respond to the video request using only the central server.
  • the criminal tracking information request received from the central server may be a request for a selected device by searching for a search information file including a criminal witness tag stored in the central server. That is, when the search is made through the central server and there is a request for tracking information, the tracking information request may be received from the central server.
  • the criminal tracking information corresponding to the criminal tracking information request may be transmitted.
  • a criminal tracking device includes a processing unit for generating a search information file including GPS information and user information using the device, and criminal tracking information through a device-to-device query using the search information file.
  • a communication unit configured to receive a request and transmit the criminal tracking information corresponding to the received criminal tracking information request to a device that has transmitted the criminal tracking information request, wherein the device-to-device query is a query for requesting the criminal tracking information. It may be characterized in that the self is performed through the search information file search.
  • the tracking device may further include a camera for photographing the outside, a GPS unit for detecting GPS information, a storage unit for storing an image and each information, or an input unit for inputting each information.
  • Smart Tab and Phone are already connected to the network via 3G or 4G, and anyone using a messenger program like KakaoTalk is using it.
  • the application program When the application program is executed, it checks if there is a file to find on the smart device and responds to the query, so that the user does not have to inconvenience on the server and can search immediately in real time. In other words, if a consumer requests the operator to provide information related to criminal tracking (GPS coordinates or location, time of day) and information that can identify the criminal (such as a lift, the characteristics of the vehicle in case of a car escape, etc.) The business operator searches a candidate group by sending a query to the current users who have the current application program installed.
  • GPS coordinates or location, time of day information that can identify the criminal
  • the accuracy of the search value can be improved by using Ontology search considering the error.
  • the candidates are sent information related to the perpetrators from the query and consumer.
  • it informs the user that a small notification window pops up when it is locked, and when it is in use, it configures the application program which just generated the XML file (or text file) in the background to fully open and open the popup window. Or, when he sees the crime scene, touch the screen to configure the application program to open a pop-up window while fully launching.
  • the criminal tracking device may display one pop-up window having four tabs to the user.
  • the first tab should contain the following:
  • the picture in the case of a picture, the preview technology is used to send the image to a smaller size first to reduce the amount of data, and when the small size image is clicked, the original can be downloaded.
  • impressions you can include textual information about impressions.
  • it may include a touch button to check the escape trajectory. It may be a touch button (a button capable of displaying the trajectory when receiving an XML file containing the anticipated movement position of the culprit from the criminal tracking system business operator) to display the escape trajectory of the criminal so far.
  • a touch button (composed of six or more) in which a short comment is written.
  • the first touch button triggers a crime
  • the second touch button captures the criminal (you can also take a picture automatically when you press it)
  • the third touch button is the criminal's escape (walking)
  • the fourth touch button is the criminal's car (vehicle)
  • the fifth touch button may be undetected
  • the sixth touch button may cause an accident
  • the seventh touch button may be an emergency (when you are in an emergency).
  • the emergency button may be placed next to the lock button to continuously transmit a predetermined time (eg, 3 seconds) during a crisis.
  • user specific information vehicle number, ID, etc.
  • GPS information GPS coordinates, time
  • a message file is created with a value including the message and automatically transmitted to a business operator.
  • voice recognition When voice recognition is activated, it can operate as voice instead of touch button.
  • it may include a touch button for taking an image, a picture.
  • it may include an image (video mark or red circle), recording completion (square), shooting (camera mark), etc., and when voice recognition is activated, it may operate as voice instead of touch button. .
  • it may include a touch button (indicated by a map icon) to bring up a map around the user.
  • a touch button indicated by a map icon
  • pressing the touch button brings up a map around the user (preinstalled on the smart device or only to download and load the relevant part around the user) on the screen.
  • the user's location is automatically centered and displayed on the map.
  • the GPS coordinates of the part are transmitted to the operator as the location of the criminal.
  • It may include a touch button (indicated by an eye [Eye] shape icon, etc.) for positioning through the camera and building recognition using a pre-built database.
  • a touch button indicated by an eye [Eye] shape icon, etc.
  • applications that identify buildings, structures, etc. are developed one after another by recognizing the characteristic parts of the exterior and comparing them with related databases.
  • the location of the criminal can be specified by illuminating the camera in a building around the criminal.
  • the touch button is pressed, the camera operates and the camera is identified in the building around the criminal, and the GPS coordinates of the building are transmitted to the operator as the location of the criminal.
  • It may include a touch button for specifying the location of the criminal using the distance from the user, the orientation (east, west, south, north).
  • the bearing (east, west, south, north) may be input as a touch button for automatic bearing recognition. That is, the direction can be automatically measured using an automatic direction recognition system. Programs such as object recognition in the Opencv library can be used to extract direction information about where a user is moving. When the touch button is pressed, the bearings measured using an automatic direction recognition system for user specific information (vehicle number, ID, etc.) and GPS information (GPS coordinates, time) are automatically transmitted to the operator. Or an arrow-shaped touch button (an icon having a compass-shaped eight-directional touch button) for manual transmission of the bearing. If the user is familiar with the surrounding geography, the user may be able to immediately check the bearing by looking at the surrounding buildings.
  • a message file is created with values including bearings in user specific information (vehicle number, ID, etc.) and GPS information (GPS coordinates, time) to be automatically sent to the operator. It may include a touch button that can transmit the approximate distance from the user to the criminal. Within 10m, 30m, 50m, 80m, 80m or more, including the approximate distance from the user to the criminal in user specific information (vehicle number, ID, etc.) and GPS information (GPS coordinates, time) Create a message file and send it automatically to the operator. In addition, it may include a touch button for taking an image, a picture.
  • it may include an image (video mark or red circle), recording completion (square), and shooting (camera mark).
  • image video mark or red circle
  • square recording completion
  • shooting camera mark
  • touch button for taking pictures and pictures so that you do not miss a good opportunity to shoot the criminal's face or the license plate of a criminal vehicle.
  • voice recognition When voice recognition is activated, it can operate as voice instead of touch button.
  • a messenger window opens so you can compose a detailed message or send a picture or short video taken from tabs 1, 2 and 4 with the message.
  • Voice mail can be sent by pressing the touch button (when voice recognition is activated, it can be written / sent by voice) to create and send voice mail.
  • voice recognition is activated, it can operate as voice instead of touch button.
  • a search function through a search word may be selected to select a desired case suspect. This allows users to recognize the suspects in advance and find and report the culprit.
  • Embodiments of the present invention may be implemented in the form of program instructions that can be executed by various computer means and recorded in a computer readable medium.
  • the computer readable medium may include program instructions, data files, data structures, etc. alone or in combination.
  • Program instructions recorded on the media may be those specially designed and constructed for the purposes of the present invention, or they may be of the kind well-known and available to those having skill in the computer software arts.
  • Examples of computer-readable recording media include magnetic media such as hard disks, floppy disks, and magnetic tape, optical media such as CD-ROMs, DVDs, and magnetic disks, such as floppy disks.
  • Examples of program instructions include not only machine code generated by a compiler, but also high-level language code that can be executed by a computer using an interpreter or the like.
  • the hardware device described above may be configured to operate as one or more software modules to perform the operations of the present invention, and vice versa.
  • the search information file including the GPS information and the user information is also implemented as a terminal that sends and receives criminal tracking information through the device-to-device query, it is possible to track the criminal in real time.
  • the terminal may be a mobile terminal or a smart terminal, or may be implemented as a criminal tracking terminal.

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Alarm Systems (AREA)

Abstract

La présente invention se rapporte à un procédé de localisation des criminels, qui comprend les étapes de : génération d'un fichier d'informations de recherche incluant des informations GPS et des informations utilisateur ; réception d'une demande d'informations de localisation de criminel par le biais d'une requête de dispositif à dispositif utilisant le fichier d'informations de recherche ; et transmission, à un dispositif de transmission de la demande d'informations de localisation de criminel, des informations de localisation de criminel relatives à un criminel qui correspond à la demande d'informations de localisation de criminel, la requête de dispositif à dispositif étant déposée par l'intermédiaire d'une recherche du fichier d'informations de recherche afin de localiser rapidement, correctement et en temps réel le criminel.
PCT/KR2013/007846 2013-08-26 2013-08-30 Procédé de localisation des criminels en temps réel basé sur le p2p et utilisant un dispositif intelligent doté d'une fonction gps WO2015030279A1 (fr)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
KR20130101168 2013-08-26
KR10-2013-0101168 2013-08-26

Publications (1)

Publication Number Publication Date
WO2015030279A1 true WO2015030279A1 (fr) 2015-03-05

Family

ID=52586818

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/KR2013/007846 WO2015030279A1 (fr) 2013-08-26 2013-08-30 Procédé de localisation des criminels en temps réel basé sur le p2p et utilisant un dispositif intelligent doté d'une fonction gps

Country Status (1)

Country Link
WO (1) WO2015030279A1 (fr)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105138779A (zh) * 2015-08-31 2015-12-09 武汉大学 车载gps时空轨迹大数据优选方法及系统

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
KR100225386B1 (ko) * 1996-09-12 1999-10-15 이인성 데이타베이스 기능을 갖는 수신전용 경찰용 무선 전자수첩(휴대용 무선단말기)과 이를 위한 문자정보 서비스 시스템
JP2007328490A (ja) * 2006-06-07 2007-12-20 Hitachi Software Eng Co Ltd 不審者通知システム
KR100968433B1 (ko) * 2010-04-07 2010-07-08 주식회사 비스타씨엔씨 차량번호 인식정보 저장 시스템과 그 시스템을 이용한 차량 영상정보 검색 시스템

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
KR100225386B1 (ko) * 1996-09-12 1999-10-15 이인성 데이타베이스 기능을 갖는 수신전용 경찰용 무선 전자수첩(휴대용 무선단말기)과 이를 위한 문자정보 서비스 시스템
JP2007328490A (ja) * 2006-06-07 2007-12-20 Hitachi Software Eng Co Ltd 不審者通知システム
KR100968433B1 (ko) * 2010-04-07 2010-07-08 주식회사 비스타씨엔씨 차량번호 인식정보 저장 시스템과 그 시스템을 이용한 차량 영상정보 검색 시스템

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105138779A (zh) * 2015-08-31 2015-12-09 武汉大学 车载gps时空轨迹大数据优选方法及系统
CN105138779B (zh) * 2015-08-31 2018-03-27 武汉大学 车载gps时空轨迹大数据优选方法及系统

Similar Documents

Publication Publication Date Title
CN103716878B (zh) 利用手机与视频监控设备进行定位的方法
KR101644857B1 (ko) 객체 감지 기반의 범죄 예방을 위한 cctv 장치 및 시스템, 이를 이용한 정보 수집 방법
US20150161877A1 (en) Systems And Methods For Event-Based Reporting and Surveillance and Publishing Event Information
CN105141915A (zh) 一种视频查找方法及系统
CN103473579A (zh) 室内区域定位方法
CN105898200A (zh) 一种对嫌疑目标定位轨迹跟踪的网络摄像机及系统
WO2014092380A1 (fr) Système de boîte noire pour véhicule et procédé pour son fonctionnement
CN106097220A (zh) 一种预案调派方法及装置
WO2019099321A1 (fr) Analyse d'une série de contenus multimédias collaboratifs
JPWO2018116485A1 (ja) 映像収集システム、映像収集サーバ、映像収集方法及びプログラム
CN113538825A (zh) 一种用于校园翻墙事件报警方法及系统
US11538332B2 (en) Enhanced situational awareness for emergency response
JP2009164968A (ja) 移動端末および端末機能制御プログラム
CN110580300A (zh) 基于人脸识别系统案发地点可疑目标自动查询方法
KR101466132B1 (ko) 카메라 통합 관리 시스템 및 그 방법
WO2017150781A1 (fr) Procédé de collaboration entre des dispositifs intelligents et serveur en nuage
KR101051692B1 (ko) Cctv e-맵 시스템
KR102356290B1 (ko) 모바일 긴급 재난 신고 및 처리 시스템
KR102141045B1 (ko) 긴급신고전화 현장대응 지원 시스템
US9641965B1 (en) Method, system and computer program product for law enforcement
WO2015030279A1 (fr) Procédé de localisation des criminels en temps réel basé sur le p2p et utilisant un dispositif intelligent doté d'une fonction gps
RU2693926C1 (ru) Система контроля и воздействия на объекты, представляющие интерес, и выполняемые ими процессы и соответствующий способ
JP2007328490A (ja) 不審者通知システム
CN105453149A (zh) 犯罪证据提供器兼辅助搜索器
JP2002237908A (ja) インターネット等の双方向通信を利用した警備システム

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 13892764

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

32PN Ep: public notification in the ep bulletin as address of the adressee cannot be established

Free format text: NOTING OF LOSS OF RIGHTS PURSUANT TO RULE 112(1) EPC (EPO FORM 1205A DATED 14/06/2016)

122 Ep: pct application non-entry in european phase

Ref document number: 13892764

Country of ref document: EP

Kind code of ref document: A1