WO2017146297A1 - Security system and method for preventing illegal leakage of hidden camera image and coping with crime in real-time - Google Patents

Security system and method for preventing illegal leakage of hidden camera image and coping with crime in real-time Download PDF

Info

Publication number
WO2017146297A1
WO2017146297A1 PCT/KR2016/004015 KR2016004015W WO2017146297A1 WO 2017146297 A1 WO2017146297 A1 WO 2017146297A1 KR 2016004015 W KR2016004015 W KR 2016004015W WO 2017146297 A1 WO2017146297 A1 WO 2017146297A1
Authority
WO
WIPO (PCT)
Prior art keywords
image
user
police
real
time
Prior art date
Application number
PCT/KR2016/004015
Other languages
French (fr)
Korean (ko)
Inventor
신현해
Original Assignee
신현해
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 신현해 filed Critical 신현해
Publication of WO2017146297A1 publication Critical patent/WO2017146297A1/en

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q50/00Information and communication technology [ICT] specially adapted for implementation of business processes of specific business sectors, e.g. utilities or tourism
    • G06Q50/10Services
    • G06Q50/26Government or public services
    • GPHYSICS
    • G08SIGNALLING
    • G08BSIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
    • G08B21/00Alarms responsive to a single specified undesired or abnormal condition and not otherwise provided for
    • G08B21/02Alarms for ensuring the safety of persons
    • G08B21/04Alarms for ensuring the safety of persons responsive to non-activity, e.g. of elderly persons
    • G08B21/0438Sensor means for detecting
    • G08B21/0476Cameras to detect unsafe condition, e.g. video cameras
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N23/00Cameras or camera modules comprising electronic image sensors; Control thereof
    • H04N23/60Control of cameras or camera modules
    • H04N23/66Remote control of cameras or camera parts, e.g. by remote control devices
    • GPHYSICS
    • G08SIGNALLING
    • G08BSIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
    • G08B13/00Burglar, theft or intruder alarms
    • G08B13/18Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength
    • G08B13/189Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength using passive radiation detection systems
    • G08B13/194Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength using passive radiation detection systems using image scanning and comparing systems
    • G08B13/196Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength using passive radiation detection systems using image scanning and comparing systems using television cameras
    • GPHYSICS
    • G08SIGNALLING
    • G08BSIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
    • G08B25/00Alarm systems in which the location of the alarm condition is signalled to a central station, e.g. fire or police telegraphic systems
    • G08B25/01Alarm systems in which the location of the alarm condition is signalled to a central station, e.g. fire or police telegraphic systems characterised by the transmission medium
    • G08B25/10Alarm systems in which the location of the alarm condition is signalled to a central station, e.g. fire or police telegraphic systems characterised by the transmission medium using wireless transmission systems
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N21/00Selective content distribution, e.g. interactive television or video on demand [VOD]
    • H04N21/20Servers specifically adapted for the distribution of content, e.g. VOD servers; Operations thereof
    • H04N21/23Processing of content or additional data; Elementary server operations; Server middleware
    • H04N21/234Processing of video elementary streams, e.g. splicing of video streams or manipulating encoded video stream scene graphs
    • H04N21/2347Processing of video elementary streams, e.g. splicing of video streams or manipulating encoded video stream scene graphs involving video stream encryption
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N21/00Selective content distribution, e.g. interactive television or video on demand [VOD]
    • H04N21/20Servers specifically adapted for the distribution of content, e.g. VOD servers; Operations thereof
    • H04N21/23Processing of content or additional data; Elementary server operations; Server middleware
    • H04N21/24Monitoring of processes or resources, e.g. monitoring of server load, available bandwidth, upstream requests
    • H04N21/2407Monitoring of transmitted content, e.g. distribution time, number of downloads
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N21/00Selective content distribution, e.g. interactive television or video on demand [VOD]
    • H04N21/40Client devices specifically adapted for the reception of or interaction with content, e.g. set-top-box [STB]; Operations thereof
    • H04N21/43Processing of content or additional data, e.g. demultiplexing additional data from a digital video stream; Elementary client operations, e.g. monitoring of home network or synchronising decoder's clock; Client middleware
    • H04N21/441Acquiring end-user identification, e.g. using personal code sent by the remote control or by inserting a card
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N7/00Television systems
    • H04N7/18Closed-circuit television [CCTV] systems, i.e. systems in which the video signal is not broadcast
    • H04N7/183Closed-circuit television [CCTV] systems, i.e. systems in which the video signal is not broadcast for receiving images from a single remote source
    • H04N7/185Closed-circuit television [CCTV] systems, i.e. systems in which the video signal is not broadcast for receiving images from a single remote source from a mobile camera, e.g. for remote control

Definitions

  • the present invention relates to a security system and method, and more particularly, to a security system and method using a sneak camera attached to or possessed by a person's body or clothes, and more specifically to the illegal leakage of the sneak camera image. It also relates to a security system and method for preventing a police officer and coping with a crime in real time.
  • GPS global positioning system
  • Publication 10-2012-0089141 illustrates such a configuration.
  • Microsoft's SenseCam is configured to wirelessly transmit captured images using a miniature camera.
  • Miniature cameras have the advantage of notifying the criminals of the crime situation. However, there are side effects thereby.
  • voyeurs or sneak shots are taken by a miniature camera to infringe personal privacy or cause illegal images to be distributed.
  • An object of the present invention is to provide a security system for preventing illegal leakage of hidden camera image and coping with real-time crime.
  • Another object of the present invention is to provide a security method for preventing illegal leakage of hidden camera video and coping with real-time crime.
  • Security system for preventing illegal leakage of the sneak camera image and the real-time crime countermeasure according to the object of the present invention is attached to or carried on the body, clothes, hats or bags of the user, switch to the shooting mode by the user's operation
  • a sneak camera which starts photographing and transmits the image by photographing in real time in a short range wireless communication method
  • the sneak camera is configured to be switched to the emergency mode by the user's operation, the sneak camera image server, when the sneak camera is switched to the emergency mode by encrypting the image, the user, IP It may be configured to transmit in real time to the police authentication control center terminal with information on the storage address, the shooting time.
  • a security method for preventing illegal leakage of a hidden camera image and dealing with crime in real time comprising: sneaking the camera into a shooting mode or an emergency mode by a user's operation to start shooting; Transmitting, by the hidden camera, the captured image to the user mobile terminal in real time through a short range wireless communication method;
  • the user mobile terminal receives the image from the sneak camera in real time in a short range wireless communication method and stores the sneak camera image in 3G / 4G (3 ⁇ / 4 ⁇ generation) mobile communication method without storing the image in a form capable of playing the real time received image.
  • Transmitting in real time to a server Receiving, by the hidden camera image server, an image from the user mobile terminal in real time, and encrypting and storing the image received in real time;
  • the hidden camera image server releases the encrypted and stored image by the user's user approval and the police approval of the user and transmits to the police authentication control center terminal or releases the encryption.
  • the police authentication control center terminal may be configured to include a step of receiving or streaming the image of the decrypted decryption from the sneak shot video server to play.
  • the hidden camera image server receives the image from the user mobile terminal in real time and encrypts and stores the received image in real time
  • the user approval and the police approval of the corresponding user are performed.
  • the police authentication control center terminal may be configured to further comprise the step of receiving or streaming the image of the encryption is released from the sneak camera image server to play.
  • the sneak-camera is photographed in case of emergency to secure evidence of the criminal or criminal's actions, and then encrypted and stored in real-time. Since the user's mobile terminal is configured not to be stored in a reproducible form, the sneak-camera image is used only as a material for coping with crime, and there is an effect of preventing side effects used for illegal voyeur.
  • the encrypted image stored in the hidden camera image server is configured to be decrypted and reproduced only under the joint approval of the user and the police, there is an effect that the inquiry or illegal dissemination of the hidden camera image is blocked.
  • FIG. 1 is a block diagram of a security system for preventing illegal outflow of sneak-camera images and coping with real-time crimes according to an embodiment of the present invention.
  • FIG. 2 is a flowchart illustrating a security method for preventing illegal leakage of a sneak camera image and dealing with real-time crime according to an embodiment of the present invention.
  • first, second, A, and B may be used to describe various components, but the components should not be limited by the terms. The terms are used only for the purpose of distinguishing one component from another.
  • the first component may be referred to as the second component, and similarly, the second component may also be referred to as the first component.
  • FIG. 1 is a block diagram of a security system for preventing illegal outflow of sneak-camera images and coping with real-time crimes according to an embodiment of the present invention.
  • a security system 100 for preventing illegal leakage of a hidden camera image and real-time crime coping includes a hidden camera 110 and a user mobile.
  • the terminal 120 may be configured to include a hidden camera image server 130 and a police authentication control center terminal 140.
  • the security system 100 is configured to use the sneak shot camera 110 to secure a sneak camera image without being recognized by a criminal.
  • the security system 100 is configured to encrypt and store the hidden camera image in the hidden camera image server 130 without storing it in a form that can be reproduced in the user terminal 120, thereby illegally distributing the hidden camera image by illegal voyeur. The source is blocked.
  • it is configured to search the hidden camera image through the joint approval of the police and the user, and is used only for the user's crime coping and security.
  • the hidden camera 110 is configured to be attached to or possessed by the user's body or clothes, hats or bags.
  • the hidden camera 110 may be configured to further include a user manipulation button and a short range wireless communication module.
  • the hidden camera 110 may be switched to a shooting mode or an emergency mode when the user presses a user manipulation button. For example, it may be configured to switch to the shooting mode by pressing the user operation button for 1 second and to the emergency mode by pressing the user operation button for 3 seconds or more.
  • Emergency mode can be used in very urgent situations where crime is determined to be certain.
  • the sneak shot camera 110 may start shooting in a shooting mode or an emergency mode, and the captured sneak shot video may be configured to be transmitted in real time to the user mobile terminal 120 through a short range wireless communication module.
  • the user mobile terminal 120 may be configured to receive an image from the hidden camera 110 in real time in a short range wireless communication method.
  • the user mobile terminal 120 may be configured to transmit in real time to the hidden camera image server 130 in a 3G / 4G (3 ⁇ / 4 ⁇ generation) mobile communication scheme without storing the received hidden camera image in a reproducible form. have.
  • the user mobile terminal 120 may be configured to secretly transmit current GPS location information to the camera image server 130.
  • the hidden camera image server 130 may be configured to receive an image in real time from the user mobile terminal 120.
  • the hidden camera image server 130 may be configured to encrypt and store the received image in real time.
  • the hidden camera image server 130 may be configured to release encryption by encrypting the stored image by user approval and police approval of the corresponding user.
  • the reason for encrypting and storing is also to prevent illegal dissemination of hidden camera images.
  • the user may access the hidden camera image server 130 to delete the previously stored hidden camera image once a month or periodically. However, without the police's approval, the user can never play.
  • the hidden camera image server 130 may be configured to decrypt the hidden camera image and transmit or stream it to the police authentication control center terminal 140 when the user and the police have joint approval.
  • the police authentication control center terminal 140 may be configured to receive or stream an image from which encryption is released from the sneak camera image server 130 or play it by streaming.
  • the hidden camera video server 130 is configured to decode the hidden camera image in real time and transmit the hidden camera image in real time to the police authentication control center terminal 140 in real time together with information on the user, IP storage address, and shooting time. Can be.
  • the hidden camera image server 130 may be configured to transmit the GPS position information to the police authentication control center terminal 140 in real time in the emergency mode.
  • the police certification control center terminal 140 may be configured to receive and display the CCTV image near the GPS position in real time to the CCTV image server 10 using the GPS position information.
  • the police authentication control center terminal 140 may receive and reproduce a CCTV image of a location changing from the CCTV image server 10 in real time based on the GPS location information.
  • the police can be used to accurately detect crime in various directions, even through CCTV images, and can be recognized in real time.
  • the police authentication control center terminal 140 may be configured to automatically extract the vehicle license plate that is continuously captured even if the CCTV changes according to the moving position when moving to the vehicle. This configuration makes it possible to cope more quickly in an emergency situation such as when a user is abducted.
  • FIG. 2 is a flowchart illustrating a security method for preventing illegal leakage of a sneak camera image and dealing with real-time crime according to an embodiment of the present invention.
  • the hidden camera 110 is switched to a shooting mode or an emergency mode by a user's operation to start shooting (S101).
  • the sneak shot camera 110 transmits the captured image in real time to the user mobile terminal 120 in a short range wireless communication method (S102).
  • the user mobile terminal 120 receives the image from the hidden camera 110 in real time in a short-range wireless communication method and stores the 3G / 4G (3 ⁇ / 4 ⁇ generation) without storing the image in a form capable of playing the real-time received image.
  • the sneak shot image transmission server 130 transmits in real time in a mobile communication method (S103).
  • the hidden camera image server 130 receives the image in real time from the user mobile terminal 120 and stores the encrypted image in real time (S104).
  • the sneak camera image server 130 encrypts the stored image by releasing the encryption by the user's user approval and police approval of the police authentication control center terminal 140 ) Or by decrypting the stream to the police authentication control center terminal 140 (streaming) (S105).
  • the police authentication control center terminal 140 receives or streams the encrypted image from the secret camera image server 130 to reproduce or reproduce (S106).
  • the following step may be further added after the above step S104.
  • the sneak camera image server 130 releases the encryption of the image without the user's user approval and the police approval to the police authentication control center terminal 140 in real time with information on the user, IP storage address, and shooting time.
  • Real time transmission (S107).
  • the police authentication control center terminal 140 receives or streams an image from which encryption is released from the hidden camera image server 130 and reproduces it by streaming (S108).
  • the present invention relates to a security system and method, and may be applied to the enterprise and personal security industry.

Landscapes

  • Engineering & Computer Science (AREA)
  • Business, Economics & Management (AREA)
  • Multimedia (AREA)
  • Signal Processing (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Tourism & Hospitality (AREA)
  • General Health & Medical Sciences (AREA)
  • Health & Medical Sciences (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Emergency Management (AREA)
  • Strategic Management (AREA)
  • Theoretical Computer Science (AREA)
  • Economics (AREA)
  • Development Economics (AREA)
  • Human Resources & Organizations (AREA)
  • Marketing (AREA)
  • Primary Health Care (AREA)
  • Educational Administration (AREA)
  • General Business, Economics & Management (AREA)
  • Databases & Information Systems (AREA)
  • Gerontology & Geriatric Medicine (AREA)
  • Alarm Systems (AREA)
  • Computer Security & Cryptography (AREA)
  • Telephonic Communication Services (AREA)

Abstract

A security system and method for preventing illegal leakage of a hidden camera image and coping with crime in real-time are disclosed. The security system comprises: a hidden camera attached to or carried on the body, clothing, hat, or bag of a user, and switched to a photographing mode by an operation of the user so as to start photographing, and transmitting, through a short-range wireless communication method in real-time, an image obtained by photographing; a user mobile terminal for receiving, through a short-range wireless communication method, the image from the hidden camera in real-time, and transmitting, through a 3σδ/4υθ generation (3G/4G) mobile communication method, in real-time, the image received in real-time without storing the received image in a playable format; a hidden camera image server for receiving, from the user mobile terminal, the image in real-time, encrypting the image received in real-time, storing the encrypted image, and decrypting the encrypted and stored image by user authorization of a corresponding user and police authorization and transmitting the image, or decrypting the encrypted and stored image and streaming-transmitting the image; and a police authorization control center terminal for performing user authorization and police authorization for the playing of the stored image with respect to the hidden camera image server, and receiving or streaming-receiving the decrypted image from the hidden camera image server and playing the received image.

Description

몰래카메라 영상 불법 유출 방지 및 실시간 범죄 대처를 위한 보안 시스템 및 방법Security system and method for preventing illegal leakage of hidden camera image and coping with real-time crime
본 발명은 보안 시스템 및 방법에 관한 것으로서, 구체적으로는 사람의 몸이나 옷에 부착 또는 소지하게 되는 몰래카메라를 이용한 보안 시스템 및 방법에 관한 것이며, 좀 더 구체적으로는 상기 몰래카메라 영상의 불법 유출을 방지하고 아울러 경찰이 실시간으로 범죄에 대처할 수 있도록 하기 위한 보안 시스템 및 방법에 관한 것이다.The present invention relates to a security system and method, and more particularly, to a security system and method using a sneak camera attached to or possessed by a person's body or clothes, and more specifically to the illegal leakage of the sneak camera image. It also relates to a security system and method for preventing a police officer and coping with a crime in real time.
최근 어린이나 여성을 대상으로 하는 강력 범죄가 지속적으로 증가하고 있다.Recently, the number of violent crimes against children and women continues to increase.
이러한 추세에 맞추어 위험한 상황을 실시간으로 알려주고 도움을 받도록 하는 다양한 IT 기술이 활용되고 있다.In response to this trend, a variety of IT technologies are utilized to inform and help in real time of dangerous situations.
대표적으로는 스마트 폰을 이용하여 GPS(global positioning system) 위치 정보를 실시간으로 송신하거나 카메라를 이용한 영상을 스마트 폰에 저장하거나 실시간으로 서버나 지인에게 송신하는 구성이 있다.Representatively, there is a configuration in which a global positioning system (GPS) location information is transmitted in real time using a smart phone, an image using a camera is stored in the smart phone, or transmitted to a server or an acquaintance in real time.
공개특허공보 10-2012-0089141은 이러한 구성을 예시하고 있다.Publication 10-2012-0089141 illustrates such a configuration.
그런데, 이러한 구성은 범죄자에게 들키지 않고 촬영하는 것이 쉽지 않다는 단점이 있다.However, this configuration has a disadvantage that it is not easy to shoot without being caught by criminals.
한편, MS(Microsoft)사의 센스캠(SenseCam)은 초소형 카메라를 이용하여 촬영 영상을 무선 전송하도록 구성되어 있다.Meanwhile, Microsoft's SenseCam is configured to wirelessly transmit captured images using a miniature camera.
초소형 카메라는 범죄자에게 들키지 않고 범죄 상황을 알릴 수 있는 장점이 있다. 그러나, 그로 인한 부작용이 있다.Miniature cameras have the advantage of notifying the criminals of the crime situation. However, there are side effects thereby.
예를 들어, 초소형 카메라에 의해 도촬 내지는 몰래카메라 촬영을 하여 개인 프라이버시(privacy)를 침해하거나 불법 영상을 유포하게 되는 피해가 생기게 된다.For example, voyeurs or sneak shots are taken by a miniature camera to infringe personal privacy or cause illegal images to be distributed.
이러한 사회적 부작용을 방지하고 범죄자가 인식하지 못하게 영상을 촬영할 수 있는 방안이 요구된다.There is a need for a method to prevent such social side effects and to take images so that criminals cannot recognize them.
본 발명의 목적은 몰래카메라 영상 불법 유출 방지 및 실시간 범죄 대처를 위한 보안 시스템을 제공하는 데 있다.Disclosure of Invention An object of the present invention is to provide a security system for preventing illegal leakage of hidden camera image and coping with real-time crime.
본 발명의 다른 목적은 몰래카메라 영상 불법 유출 방지 및 실시간 범죄 대처를 위한 보안 방법을 제공하는 데 있다.Another object of the present invention is to provide a security method for preventing illegal leakage of hidden camera video and coping with real-time crime.
상술한 본 발명의 목적에 따른 몰래카메라 영상 불법 유출 방지 및 실시간 범죄 대처를 위한 보안 시스템은, 사용자의 몸이나 옷, 모자 또는 가방에 부착 또는 소지하게 되며, 상기 사용자의 조작에 의해 촬영 모드로 전환되어 촬영을 개시하고 촬영에 의한 영상을 근거리 무선 통신 방식으로 실시간 송신하는 몰래카메라; 상기 몰래카메라로부터 영상을 근거리 무선 통신 방식으로 실시간 수신하고 실시간 수신된 영상을 재생할 수 있는 형태로 저장하지 않고 3G/4G(3σδ/4υθ generation) 모바일 통신 방식으로 실시간 송신하는 사용자 모바일 단말; 상기 사용자 모바일 단말로부터 영상을 실시간 수신하고 실시간 수신된 영상을 암호화하여 저장하고, 암호화하여 저장된 영상을 해당 사용자의 사용자 승인 및 경찰 승인에 의해서 암호화를 해제하여 송신하거나 암호화를 해제하여 스트리밍(streaming) 송신하는 몰래카메라 영상 서버; 상기 몰래카메라 영상 서버에 대해 상기 저장된 영상의 재생에 대한 사용자 승인 및 경찰 승인을 실행하고, 상기 몰래카메라 영상 서버로부터 상기 암호화가 해제된 영상을 수신하거나 스트리밍 수신하여 재생하는 경찰인증 관제 센터 단말을 포함하도록 구성될 수 있다.Security system for preventing illegal leakage of the sneak camera image and the real-time crime countermeasure according to the object of the present invention is attached to or carried on the body, clothes, hats or bags of the user, switch to the shooting mode by the user's operation A sneak camera which starts photographing and transmits the image by photographing in real time in a short range wireless communication method; A user mobile terminal for real-time reception of an image from the sneaky camera in a short-range wireless communication method and real-time transmission in a 3G / 4G (3 σδ / 4 νθ generation) mobile communication method without storing the image in a form capable of reproducing the real-time received image; Receives images from the user's mobile terminal in real time, encrypts and stores the received images in real time, and transmits the encrypted and stored images by decrypting them by user approval and police approval of the user or by decrypting the streaming. A hidden camera video server; And a police authentication control center terminal for executing the user approval and the police approval for the reproduction of the stored image to the hidden camera image server, and receiving or streaming the encrypted decrypted image from the hidden camera image server. It can be configured to.
여기서, 상기 몰래카메라는, 상기 사용자의 조작에 의해 비상 모드로 전환될 수 있도록 구성되며, 상기 몰래카메라 영상 서버는, 상기 몰래카메라에 의해 비상 모드로 전환되는 경우, 해당 영상을 암호화하여 사용자, IP 저장 주소, 촬영 시간에 대한 정보와 함께 실시간으로 경찰인증 관제 센터 단말로 실시간 송신하도록 구성될 수 있다.Here, the sneak camera is configured to be switched to the emergency mode by the user's operation, the sneak camera image server, when the sneak camera is switched to the emergency mode by encrypting the image, the user, IP It may be configured to transmit in real time to the police authentication control center terminal with information on the storage address, the shooting time.
상술한 본 발명의 다른 목적에 따른 몰래카메라 영상 불법 유출 방지 및 실시간 범죄 대처를 위한 보안 방법은, 몰래카메라가 사용자의 조작에 의해 촬영 모드 또는 비상 모드로 전환되어 촬영을 개시하는 단계; 상기 몰래카메라가 촬영에 의한 영상을 근거리 무선 통신 방식으로 사용자 모바일 단말로 실시간 송신하는 단계; 상기 사용자 모바일 단말이 상기 몰래카메라로부터 영상을 근거리 무선 통신 방식으로 실시간 수신하고 실시간 수신된 영상을 재생할 수 있는 형태로 저장하지 않고 3G/4G(3σδ/4υθ generation) 모바일 통신 방식으로 몰래카메라 영상 서버로 실시간 송신하는 단계; 상기 몰래카메라 영상 서버가 상기 사용자 모바일 단말로부터 영상을 실시간 수신하고 실시간 수신된 영상을 암호화하여 저장하는 단계; 상기 몰래카메라가 촬영 모드로 전환된 경우, 상기 몰래카메라 영상 서버가 상기 암호화하여 저장된 영상을 해당 사용자의 사용자 승인 및 경찰 승인에 의해서 암호화를 해제하여 경찰인증 관제 센터 단말로 송신하거나 암호화를 해제하여 상기 경찰인증 관제 센터 단말로 스트리밍(streaming) 송신하는 단계; 상기 경찰인증 관제 센터 단말이 상기 몰래카메라 영상 서버에 대해 상기 저장된 영상의 재생에 대한 사용자 승인 및 경찰 승인을 실행하는 단계; 상기 사용자 승인 및 경찰 승인이 완료된 경우, 상기 경찰인증 관제 센터 단말이 상기 몰래카메라 영상 서버로부터 상기 암호화가 해제된 영상을 수신하거나 스트리밍 수신하여 재생하는 단계를 포함하도록 구성될 수 있다.According to another object of the present invention, there is provided a security method for preventing illegal leakage of a hidden camera image and dealing with crime in real time, the method comprising: sneaking the camera into a shooting mode or an emergency mode by a user's operation to start shooting; Transmitting, by the hidden camera, the captured image to the user mobile terminal in real time through a short range wireless communication method; The user mobile terminal receives the image from the sneak camera in real time in a short range wireless communication method and stores the sneak camera image in 3G / 4G (3 σδ / 4 νθ generation) mobile communication method without storing the image in a form capable of playing the real time received image. Transmitting in real time to a server; Receiving, by the hidden camera image server, an image from the user mobile terminal in real time, and encrypting and storing the image received in real time; When the hidden camera is switched to the shooting mode, the hidden camera image server releases the encrypted and stored image by the user's user approval and the police approval of the user and transmits to the police authentication control center terminal or releases the encryption. Streaming transmission to the police authentication control center terminal; Executing, by the police authentication control center terminal, a user approval and a police approval for the reproduction of the stored image to the sneak camera image server; When the user approval and the police approval is completed, the police authentication control center terminal may be configured to include a step of receiving or streaming the image of the decrypted decryption from the sneak shot video server to play.
여기서, 상기 몰래카메라 영상 서버가 상기 사용자 모바일 단말로부터 영상을 실시간 수신하고 실시간 수신된 영상을 암호화하여 저장하는 단계 이후, 상기 몰래카메라가 비상 모드로 전환된 경우, 해당 사용자의 사용자 승인 및 경찰 승인이 없이도 상기 몰래카메라 영상 서버가 해당 영상의 암호화를 해제하여 사용자, IP 저장 주소, 촬영 시간에 대한 정보와 함께 실시간으로 경찰인증 관제 센터 단말로 실시간 송신하는 단계; 상기 경찰인증 관제 센터 단말이 상기 몰래카메라 영상 서버로부터 상기 암호화가 해제된 영상을 수신하거나 스트리밍 수신하여 재생하는 단계를 더 포함하도록 구성될 수 있다.Here, after the hidden camera image server receives the image from the user mobile terminal in real time and encrypts and stores the received image in real time, when the hidden camera is switched to the emergency mode, the user approval and the police approval of the corresponding user are performed. Releasing the encryption of the video by the hidden camera image server without transmitting the information to the police authentication control center terminal in real time together with information on a user, an IP storage address, and a shooting time; The police authentication control center terminal may be configured to further comprise the step of receiving or streaming the image of the encryption is released from the sneak camera image server to play.
상술한 몰래카메라 영상 불법 유출 방지 및 실시간 범죄 대처를 위한 보안 시스템 및 방법에 의하면, 비상시에 몰래카메라 촬영을 하여 범죄자나 범죄자의 행위에 대한 증거를 확보하여 실시간으로 몰래카메라 영상 서버에 암호화하여 저장하되 사용자 모바일 단말에는 재생할 수 있는 형태로 저장하지 않도록 구성됨으로써, 몰래카메라 영상을 범죄 대처를 위한 자료로서만 활용하고 불법 도촬 등에 사용되는 부작용을 방지할 수 있는 효과가 있다.According to the security system and method for preventing illegal outflow of sneak-camera image and coping with real-time crime, the sneak-camera is photographed in case of emergency to secure evidence of the criminal or criminal's actions, and then encrypted and stored in real-time. Since the user's mobile terminal is configured not to be stored in a reproducible form, the sneak-camera image is used only as a material for coping with crime, and there is an effect of preventing side effects used for illegal voyeur.
특히, 몰래카메라 영상 서버에 저장된 암호화 영상은 사용자와 경찰의 공동 승인하에서만 암호화가 해제되고 재생될 수 있도록 구성됨으로써, 몰래카메라 영상의 조회나 불법 유포가 원천 차단되는 효과가 있다.In particular, since the encrypted image stored in the hidden camera image server is configured to be decrypted and reproduced only under the joint approval of the user and the police, there is an effect that the inquiry or illegal dissemination of the hidden camera image is blocked.
한편, 비상시에는 몰래카메라 영상이 실시간으로 경찰인증 관제 센터 단말로 암호화 해제되어 제공되도록 구성됨으로써, 실시간으로 범죄 대처에 대한 효율성을 높일 수 있는 효과가 있다.On the other hand, in case of emergency, since the hidden camera image is provided to be decrypted in real time to the police authentication control center terminal, there is an effect that can increase the efficiency in dealing with crime in real time.
도 1은 본 발명의 일 실시예에 따른 몰래카메라 영상 불법 유출 방지 및 실시간 범죄 대처를 위한 보안 시스템의 블록 구성도이다.1 is a block diagram of a security system for preventing illegal outflow of sneak-camera images and coping with real-time crimes according to an embodiment of the present invention.
도 2는 본 발명의 일 실시예에 따른 몰래카메라 영상 불법 유출 방지 및 실시간 범죄 대처를 위한 보안 방법의 흐름도이다.2 is a flowchart illustrating a security method for preventing illegal leakage of a sneak camera image and dealing with real-time crime according to an embodiment of the present invention.
본 발명은 다양한 변경을 가할 수 있고 여러 가지 실시예를 가질 수 있는 바, 특정 실시 예들을 도면에 예시하고 발명을 실시하기 위한 구체적인 내용에 상세하게 설명하고자 한다. 그러나, 이는 본 발명을 특정한 실시 형태에 대해 한정하려는 것이 아니며, 본 발명의 사상 및 기술 범위에 포함되는 모든 변경, 균등물 내지 대체물을 포함하는 것으로 이해되어야 한다. 각 도면을 설명하면서 유사한 참조부호를 유사한 구성요소에 대해 사용하였다.As the inventive concept allows for various changes and numerous embodiments, particular embodiments will be illustrated in the drawings and described in detail in the written description. However, this is not intended to limit the present invention to specific embodiments, it should be understood to include all modifications, equivalents, and substitutes included in the spirit and scope of the present invention. In describing the drawings, similar reference numerals are used for similar elements.
제1, 제2, A, B 등의 용어는 다양한 구성요소들을 설명하는데 사용될 수 있지만, 상기 구성요소들은 상기 용어들에 의해 한정되어서는 안 된다. 상기 용어들은 하나의 구성요소를 다른 구성요소로부터 구별하는 목적으로만 사용된다. 예를 들어, 본 발명의 권리 범위를 벗어나지 않으면서 제1 구성요소는 제2 구성요소로 명명될 수 있고, 유사하게 제2 구성요소도 제1 구성요소로 명명될 수 있다. 및/또는 이라는 용어는 복수의 관련된 기재된 항목들의 조합 또는 복수의 관련된 기재된 항목들 중의 어느 항목을 포함한다.Terms such as first, second, A, and B may be used to describe various components, but the components should not be limited by the terms. The terms are used only for the purpose of distinguishing one component from another. For example, without departing from the scope of the present invention, the first component may be referred to as the second component, and similarly, the second component may also be referred to as the first component. The term and / or includes a combination of a plurality of related items or any item of a plurality of related items.
어떤 구성요소가 다른 구성요소에 "연결되어" 있다거나 "접속되어" 있다고 언급된 때에는, 그 다른 구성요소에 직접적으로 연결되어 있거나 또는 접속되어 있을 수도 있지만, 중간에 다른 구성요소가 존재할 수도 있다고 이해되어야 할 것이다. 반면에, 어떤 구성요소가 다른 구성요소에 "직접 연결되어" 있다거나 "직접 접속되어" 있다고 언급된 때에는, 중간에 다른 구성요소가 존재하지 않는 것으로 이해되어야 할 것이다.When a component is referred to as being "connected" or "connected" to another component, it may be directly connected to or connected to that other component, but it may be understood that other components may be present in between. Should be. On the other hand, when a component is said to be "directly connected" or "directly connected" to another component, it should be understood that there is no other component in between.
본 출원에서 사용한 용어는 단지 특정한 실시예를 설명하기 위해 사용된 것으로, 본 발명을 한정하려는 의도가 아니다. 단수의 표현은 문맥상 명백하게 다르게 뜻하지 않는 한, 복수의 표현을 포함한다. 본 출원에서, "포함하다" 또는 "가지다" 등의 용어는 명세서상에 기재된 특징, 숫자, 단계, 동작, 구성요소, 부품 또는 이들을 조합한 것이 존재함을 지정하려는 것이지, 하나 또는 그 이상의 다른 특징들이나 숫자, 단계, 동작, 구성요소, 부품 또는 이들을 조합한 것들의 존재 또는 부가 가능성을 미리 배제하지 않는 것으로 이해되어야 한다.The terminology used herein is for the purpose of describing particular example embodiments only and is not intended to be limiting of the present invention. Singular expressions include plural expressions unless the context clearly indicates otherwise. In this application, the terms "comprise" or "have" are intended to indicate that there is a feature, number, step, operation, component, part, or combination thereof described in the specification, and one or more other features. It is to be understood that the present invention does not exclude the possibility of the presence or the addition of numbers, steps, operations, components, components, or a combination thereof.
다르게 정의되지 않는 한, 기술적이거나 과학적인 용어를 포함해서 여기서 사용되는 모든 용어들은 본 발명이 속하는 기술 분야에서 통상의 지식을 가진 자에 의해 일반적으로 이해되는 것과 동일한 의미를 가지고 있다. 일반적으로 사용되는 사전에 정의되어 있는 것과 같은 용어들은 관련 기술의 문맥상 가지는 의미와 일치하는 의미를 가지는 것으로 해석되어야 하며, 본 출원에서 명백하게 정의하지 않는 한, 이상적이거나 과도하게 형식적인 의미로 해석되지 않는다.Unless defined otherwise, all terms used herein, including technical or scientific terms, have the same meaning as commonly understood by one of ordinary skill in the art. Terms such as those defined in the commonly used dictionaries should be construed as having meanings consistent with the meanings in the context of the related art, and are not construed in ideal or excessively formal meanings unless expressly defined in this application. Do not.
이하, 본 발명에 따른 바람직한 실시예를 첨부된 도면을 참조하여 상세하게 설명한다.Hereinafter, exemplary embodiments of the present invention will be described in detail with reference to the accompanying drawings.
도 1은 본 발명의 일 실시예에 따른 몰래카메라 영상 불법 유출 방지 및 실시간 범죄 대처를 위한 보안 시스템의 블록 구성도이다.1 is a block diagram of a security system for preventing illegal outflow of sneak-camera images and coping with real-time crimes according to an embodiment of the present invention.
도 1을 참조하면, 본 발명의 일 실시예에 따른 몰래카메라 영상 불법 유출 방지 및 실시간 범죄 대처를 위한 보안 시스템(이하, '보안 시스템'이라 함)(100)은 몰래카메라(110), 사용자 모바일 단말(120), 몰래카메라 영상 서버(130), 경찰인증 관제 센터 단말(140)을 포함하도록 구성될 수 있다.Referring to FIG. 1, a security system (hereinafter referred to as a “security system”) 100 for preventing illegal leakage of a hidden camera image and real-time crime coping according to an embodiment of the present invention includes a hidden camera 110 and a user mobile. The terminal 120 may be configured to include a hidden camera image server 130 and a police authentication control center terminal 140.
보안 시스템(100)은 몰래카메라(110)를 이용하여 범죄자가 인식하지 못한채 몰래카메라 영상을 확보할 수 있도록 구성된다.The security system 100 is configured to use the sneak shot camera 110 to secure a sneak camera image without being recognized by a criminal.
보안 시스템(100)은 몰래카메라 영상을 사용자 단말(120)에는 재생할 수 있는 형태로 저장하지 않고 몰래카메라 영상 서버(130)에 암호화하여 저장하도록 구성됨으로써, 불법 도촬에 의한 몰래카메라 영상의 불법 배포가 원천 차단된다.The security system 100 is configured to encrypt and store the hidden camera image in the hidden camera image server 130 without storing it in a form that can be reproduced in the user terminal 120, thereby illegally distributing the hidden camera image by illegal voyeur. The source is blocked.
특히, 경찰과 사용자의 공동 승인을 통해 몰래카메라 영상을 조회하도록 구성되어 철저하게 사용자의 범죄 대처와 보안을 위해서만 사용된다.In particular, it is configured to search the hidden camera image through the joint approval of the police and the user, and is used only for the user's crime coping and security.
이하, 세부적인 구성에 대하여 설명한다.Hereinafter, the detailed structure is demonstrated.
* 몰래카메라(110)는 사용자의 몸이나 옷, 모자 또는 가방에 부착 또는 소지될 수 있도록 구성된다.* The hidden camera 110 is configured to be attached to or possessed by the user's body or clothes, hats or bags.
몰래카메라(110)는 사용자 조작 버튼(button), 근거리 무선 통신 모듈을 더 구비하도록 구성될 수 있다. The hidden camera 110 may be configured to further include a user manipulation button and a short range wireless communication module.
몰래카메라(110)는 사용자가 사용자 조작 버튼을 누르면 촬영 모드 또는 비상 모드로 전환될 수 있다. 예를 들어, 사용자 조작 버튼을 1초 누르면 촬영 모드로 전환하고 3초 이상 누르면 비상 모드로 전환되도록 구성될 수 있다. The hidden camera 110 may be switched to a shooting mode or an emergency mode when the user presses a user manipulation button. For example, it may be configured to switch to the shooting mode by pressing the user operation button for 1 second and to the emergency mode by pressing the user operation button for 3 seconds or more.
비상 모드는 범죄가 확실하다고 판단되는 아주 긴박한 상황에서 사용될 수 있다.Emergency mode can be used in very urgent situations where crime is determined to be certain.
몰래카메라(110)는 촬영 모드이든 비상 모드이든 촬영을 개시하고 촬영된 몰래카메라 영상은 근거리 무선 통신 모듈을 통해 사용자 모바일 단말(120)로 실시간 송신되도록 구성될 수 있다. The sneak shot camera 110 may start shooting in a shooting mode or an emergency mode, and the captured sneak shot video may be configured to be transmitted in real time to the user mobile terminal 120 through a short range wireless communication module.
사용자 모바일 단말(120)은 몰래카메라(110)로부터 영상을 근거리 무선 통신 방식으로 실시간 수신하도록 구성될 수 있다.The user mobile terminal 120 may be configured to receive an image from the hidden camera 110 in real time in a short range wireless communication method.
사용자 모바일 단말(120)은 수신된 몰래카메라 영상을 재생할 수 있는 형태로 저장하지는 않고 3G/4G(3σδ/4υθ generation) 모바일 통신 방식으로 몰래카메라 영상 서버(130)로 실시간 송신하도록 구성될 수 있다.The user mobile terminal 120 may be configured to transmit in real time to the hidden camera image server 130 in a 3G / 4G (3 σδ / 4 νθ generation) mobile communication scheme without storing the received hidden camera image in a reproducible form. have.
사용자 모바일 단말(120)에 재생할 수 있는 형태로 저장되는 경우 불법 유포에 악용될 수 있기 때문이다.This is because when stored in a form that can be reproduced in the user mobile terminal 120 can be exploited for illegal distribution.
한편, 사용자 모바일 단말(120)은 비상 모드의 경우 현재 GPS 위치 정보를 함께 몰래카메라 영상 서버(130)로 송신하도록 구성될 수 있다.Meanwhile, in the emergency mode, the user mobile terminal 120 may be configured to secretly transmit current GPS location information to the camera image server 130.
몰래카메라 영상 서버(130)는 사용자 모바일 단말(120)로부터 영상을 실시간 수신하도록 구성될 수 있다. 그리고 몰래카메라 영상 서버(130)는 실시간 수신된 영상을 암호화하여 저장하도록 구성될 수 있다.The hidden camera image server 130 may be configured to receive an image in real time from the user mobile terminal 120. The hidden camera image server 130 may be configured to encrypt and store the received image in real time.
몰래카메라 영상 서버(130)는 암호화하여 저장된 영상을 해당 사용자의 사용자 승인 및 경찰 승인에 의해서 암호화를 해제할 수 있도록 구성될 수 있다.The hidden camera image server 130 may be configured to release encryption by encrypting the stored image by user approval and police approval of the corresponding user.
암호화하여 저장하는 이유 역시 몰래카메라 영상의 불법 유포를 방지하기 위함이다.The reason for encrypting and storing is also to prevent illegal dissemination of hidden camera images.
사용자는 몰래카메라 영상 서버(130)에 접속하여 한 달에 한 번 또는 주기적으로 기 저장된 몰래카메라 영상을 삭제할 수 있다. 그러나, 경찰 승인이 없으면 사용자 단독으로는 절대 재생을 할 수 없다.The user may access the hidden camera image server 130 to delete the previously stored hidden camera image once a month or periodically. However, without the police's approval, the user can never play.
몰래카메라 영상 서버(130)는 사용자와 경찰의 공동 승인이 있으면 몰래카메라 영상을 암호화 해제하고 경찰인증 관제 센터 단말(140)로 송신하거나 스트리밍(streaming) 송신하도록 구성될 수 있다.The hidden camera image server 130 may be configured to decrypt the hidden camera image and transmit or stream it to the police authentication control center terminal 140 when the user and the police have joint approval.
경찰인증 관제 센터 단말(140)은 몰래카메라 영상 서버(130)로부터 암호화가 해제된 영상을 수신하거나 스트리밍 수신하여 재생하도록 구성될 수 있다.The police authentication control center terminal 140 may be configured to receive or stream an image from which encryption is released from the sneak camera image server 130 or play it by streaming.
한편, 비상 모드에서는 몰래카메라 영상 서버(130)가 몰래카메라 영상을 실시간으로 암호화 해제하여 사용자, IP 저장 주소, 촬영 시간에 대한 정보와 함께 실시간으로 경찰인증 관제 센터 단말(140)로 실시간 송신하도록 구성될 수 있다.Meanwhile, in the emergency mode, the hidden camera video server 130 is configured to decode the hidden camera image in real time and transmit the hidden camera image in real time to the police authentication control center terminal 140 in real time together with information on the user, IP storage address, and shooting time. Can be.
또한, 몰래카메라 영상 서버(130)는 비상 모드에서는 GPS 위치 정보를 경찰인증 관제 센터 단말(140)로 실시간 송신하도록 구성될 수 있다.In addition, the hidden camera image server 130 may be configured to transmit the GPS position information to the police authentication control center terminal 140 in real time in the emergency mode.
경찰인증 관제 센터 단말(140)은 GPS 위치 정보를 이용하여 CCTV 영상 서버(10)로 해당 GPS 위치 근처의 CCTV 영상을 실시간으로 수신하여 디스플레이하도록 구성될 수 있다.The police certification control center terminal 140 may be configured to receive and display the CCTV image near the GPS position in real time to the CCTV image server 10 using the GPS position information.
GPS 위치 정보가 실시간으로 변경되어 수신되는 경우, 경찰인증 관제 센터 단말(140)은 해당 GPS 위치 정보에 기반하여 CCTV 영상 서버(10)로부터 변동하는 위치의 CCTV 영상을 실시간 수신하여 재생할 수 있다. 경찰은 범죄 행위를 CCTV 영상을 통해서도 보다 다양한 방향에서 정확하게 파악할 수 있으며, 실시간으로 이를 인식할 수 있다는 점에서 매우 유용하다.When the GPS location information is changed in real time and received, the police authentication control center terminal 140 may receive and reproduce a CCTV image of a location changing from the CCTV image server 10 in real time based on the GPS location information. The police can be used to accurately detect crime in various directions, even through CCTV images, and can be recognized in real time.
이때, 경찰인증 관제 센터 단말(140)은 차량으로 이동하는 경우, 이동 위치에 따라 CCTV가 바뀌어도 지속적으로 포착되는 차량 번호판을 자동으로 추출하도록 구성될 수 있다. 이러한 구성에 의해, 사용자가 납치되는 등의 위급한 상황에서 보다 신속하게 대처할 수 있게 된다.In this case, the police authentication control center terminal 140 may be configured to automatically extract the vehicle license plate that is continuously captured even if the CCTV changes according to the moving position when moving to the vehicle. This configuration makes it possible to cope more quickly in an emergency situation such as when a user is abducted.
도 2는 본 발명의 일 실시예에 따른 몰래카메라 영상 불법 유출 방지 및 실시간 범죄 대처를 위한 보안 방법의 흐름도이다.2 is a flowchart illustrating a security method for preventing illegal leakage of a sneak camera image and dealing with real-time crime according to an embodiment of the present invention.
도 2를 참조하면, 몰래카메라(110)가 사용자의 조작에 의해 촬영 모드 또는 비상 모드로 전환되어 촬영을 개시한다(S101).Referring to FIG. 2, the hidden camera 110 is switched to a shooting mode or an emergency mode by a user's operation to start shooting (S101).
다음으로, 몰래카메라(110)가 촬영에 의한 영상을 근거리 무선 통신 방식으로 사용자 모바일 단말(120)로 실시간 송신한다(S102).Next, the sneak shot camera 110 transmits the captured image in real time to the user mobile terminal 120 in a short range wireless communication method (S102).
다음으로, 사용자 모바일 단말(120)이 몰래카메라(110)로부터 영상을 근거리 무선 통신 방식으로 실시간 수신하고 실시간 수신된 영상을 재생할 수 있는 형태로 저장하지 않고 3G/4G(3σδ/4υθ generation) 모바일 통신 방식으로 몰래카메라 영상 서버(130)로 실시간 송신한다(S103).Next, the user mobile terminal 120 receives the image from the hidden camera 110 in real time in a short-range wireless communication method and stores the 3G / 4G (3 σδ / 4 υθ generation) without storing the image in a form capable of playing the real-time received image. The sneak shot image transmission server 130 transmits in real time in a mobile communication method (S103).
다음으로, 몰래카메라 영상 서버(130)가 사용자 모바일 단말(120)로부터 영상을 실시간 수신하고 실시간 수신된 영상을 암호화하여 저장한다(S104).Next, the hidden camera image server 130 receives the image in real time from the user mobile terminal 120 and stores the encrypted image in real time (S104).
다음으로, 몰래카메라(110)가 촬영 모드로 전환된 경우, 몰래카메라 영상 서버(130)가 암호화하여 저장된 영상을 해당 사용자의 사용자 승인 및 경찰 승인에 의해서 암호화를 해제하여 경찰인증 관제 센터 단말(140)로 송신하거나 암호화를 해제하여 경찰인증 관제 센터 단말(140)로 스트리밍(streaming) 송신한다(S105).Next, when the sneak camera 110 is switched to the shooting mode, the sneak camera image server 130 encrypts the stored image by releasing the encryption by the user's user approval and police approval of the police authentication control center terminal 140 ) Or by decrypting the stream to the police authentication control center terminal 140 (streaming) (S105).
다음으로, 사용자 승인 및 경찰 승인이 완료된 경우, 경찰인증 관제 센터 단말(140)이 몰래카메라 영상 서버(130)로부터 암호화가 해제된 영상을 수신하거나 스트리밍 수신하여 재생한다(S106).Next, when the user approval and the police approval is completed, the police authentication control center terminal 140 receives or streams the encrypted image from the secret camera image server 130 to reproduce or reproduce (S106).
한편, 몰래카메라(110)가 비상 모드로 전환된 경우에는 위 단계 S104 이후에 다음의 단계가 더 추가될 수 있다.On the other hand, when the hidden camera 110 is switched to the emergency mode, the following step may be further added after the above step S104.
먼저 해당 사용자의 사용자 승인 및 경찰 승인이 없이도 몰래카메라 영상 서버(130)가 해당 영상의 암호화를 해제하여 사용자, IP 저장 주소, 촬영 시간에 대한 정보와 함께 실시간으로 경찰인증 관제 센터 단말(140)로 실시간 송신한다(S107).First, the sneak camera image server 130 releases the encryption of the image without the user's user approval and the police approval to the police authentication control center terminal 140 in real time with information on the user, IP storage address, and shooting time. Real time transmission (S107).
*다음으로, 경찰인증 관제 센터 단말(140)이 몰래카메라 영상 서버(130)로부터 암호화가 해제된 영상을 수신하거나 스트리밍 수신하여 재생한다(S108).Next, the police authentication control center terminal 140 receives or streams an image from which encryption is released from the hidden camera image server 130 and reproduces it by streaming (S108).
이상 실시예를 참조하여 설명하였지만, 해당 기술 분야의 숙련된 당업자는 하기의 특허청구범위에 기재된 본 발명의 사상 및 영역으로부터 벗어나지 않는 범위 내에서 본 발명을 다양하게 수정 및 변경시킬 수 있음을 이해할 수 있을 것이다.Although described with reference to the above embodiments, those skilled in the art can understand that the present invention can be variously modified and changed without departing from the spirit and scope of the invention described in the claims below. There will be.
본 발명은 보안 시스템 및 방법에 관한 것으로서, 기업 및 개인 보안 산업분야에 적용될 수 있다.The present invention relates to a security system and method, and may be applied to the enterprise and personal security industry.

Claims (6)

  1. 사용자의 몸이나 옷, 모자 또는 가방에 부착 또는 소지하게 되며, 상기 사용자의 조작에 의해 촬영 모드로 전환되어 촬영을 개시하고 촬영에 의한 영상을 근거리 무선 통신 방식으로 실시간 송신하는 몰래카메라;A sneak camera attached to or possessed by a user's body or clothes, a hat, or a bag, switching to a shooting mode by the user's operation to start shooting, and real-time transmission of the image by shooting in a short range wireless communication method;
    상기 몰래카메라로부터 영상을 근거리 무선 통신 방식으로 실시간 수신하고 실시간 수신된 영상을 재생할 수 있는 형태로 저장하지 않고 3G/4G(3σδ/4υθ generation) 모바일 통신 방식으로 실시간 송신하는 사용자 모바일 단말;A user mobile terminal for real-time reception of an image from the sneaky camera in a short-range wireless communication method and real-time transmission in a 3G / 4G (3 σδ / 4 νθ generation) mobile communication method without storing the image in a form capable of reproducing the real-time received image;
    상기 사용자 모바일 단말로부터 영상을 실시간 수신하고 실시간 수신된 영상을 암호화하여 저장하고, 암호화하여 저장된 영상을 해당 사용자의 사용자 승인 및 경찰 승인에 의해서 암호화를 해제하여 송신하거나 암호화를 해제하여 스트리밍(streaming) 송신하는 몰래카메라 영상 서버;Receives images from the user's mobile terminal in real time, encrypts and stores the received images in real time, and transmits the encrypted and stored images by decrypting them by user approval and police approval of the user or by decrypting the streaming. A hidden camera video server;
    상기 몰래카메라 영상 서버에 대해 상기 저장된 영상의 재생에 대한 사용자 승인 및 경찰 승인을 실행하고, 상기 몰래카메라 영상 서버로부터 상기 암호화가 해제된 영상을 수신하거나 스트리밍 수신하여 재생하는 경찰인증 관제 센터 단말을 포함하는 몰래카메라 영상 불법 유출 방지 및 실시간 범죄 대처를 위한 보안 시스템.And a police authentication control center terminal for executing the user approval and the police approval for the reproduction of the stored image to the hidden camera image server, and receiving or streaming the encrypted decrypted image from the hidden camera image server. Security system for preventing illegal leakage of hidden camera images and real-time crime response.
  2. 제1항에 있어서,The method of claim 1,
    상기 몰래카메라는,The sneak shot,
    상기 사용자가 위급한 상황이라 판단할 때 상기 사용자의 조작에 의해 비상 모드로 전환될 수 있도록 구성되며,When the user determines that the emergency situation is configured to be switched to the emergency mode by the user's operation,
    상기 몰래카메라 영상 서버는,The hidden camera video server,
    상기 몰래카메라에 의해 비상 모드로 전환되는 경우, 해당 영상을 암호화하여 사용자, IP 저장 주소, 촬영 시간에 대한 정보와 함께 실시간으로 경찰인증 관제 센터 단말로 실시간 송신하도록 구성되는 것을 특징으로 하는 몰래카메라 영상 불법 유출 방지 및 실시간 범죄 대처를 위한 보안 시스템.When the camera is switched to the emergency mode by the sneak camera, the sneak camera image is configured to encrypt the video and transmit it to the police authentication control center terminal in real time with information on the user, IP storage address, and shooting time. Security system to prevent illegal leakage and deal with real-time crime.
  3. 몰래카메라가 사용자의 조작에 의해 촬영 모드 또는 비상 모드로 전환되어 촬영을 개시하는 단계;Sneaking the camera into a shooting mode or an emergency mode by a user's operation to start shooting;
    상기 몰래카메라가 촬영에 의한 영상을 근거리 무선 통신 방식으로 사용자 모바일 단말로 실시간 송신하는 단계;Transmitting, by the hidden camera, the captured image to the user mobile terminal in real time through a short range wireless communication method;
    상기 사용자 모바일 단말이 상기 몰래카메라로부터 영상을 근거리 무선 통신 방식으로 실시간 수신하고 실시간 수신된 영상을 재생할 수 있는 형태로 저장하지 않고 3G/4G(3σδ/4υθ generation) 모바일 통신 방식으로 몰래카메라 영상 서버로 실시간 송신하는 단계;The user mobile terminal receives the image from the sneak camera in real time in a short range wireless communication method and stores the sneak camera image in 3G / 4G (3 σδ / 4 νθ generation) mobile communication method without storing the image in a form capable of playing the real time received image. Transmitting in real time to a server;
    상기 몰래카메라 영상 서버가 상기 사용자 모바일 단말로부터 영상을 실시간 수신하고 실시간 수신된 영상을 암호화하여 저장하는 단계;Receiving, by the hidden camera image server, an image from the user mobile terminal in real time and encrypting and storing the image received in real time;
    상기 몰래카메라가 촬영 모드로 전환된 경우, 상기 몰래카메라 영상 서버가 상기 암호화하여 저장된 영상을 해당 사용자의 사용자 승인 및 경찰 승인에 의해서 암호화를 해제하여 경찰인증 관제 센터 단말로 송신하거나 암호화를 해제하여 상기 경찰인증 관제 센터 단말로 스트리밍(streaming) 송신하는 단계;When the hidden camera is switched to the shooting mode, the hidden camera image server releases the encrypted and stored image by the user's user approval and the police approval of the user and transmits to the police authentication control center terminal or releases the encryption. Streaming transmission to the police authentication control center terminal;
    상기 경찰인증 관제 센터 단말이 상기 몰래카메라 영상 서버에 대해 상기 저장된 영상의 재생에 대한 사용자 승인 및 경찰 승인을 실행하는 단계;Executing, by the police authentication control center terminal, a user approval and a police approval for the reproduction of the stored image to the sneak shot image server;
    상기 사용자 승인 및 경찰 승인이 완료된 경우, 상기 경찰인증 관제 센터 단말이 상기 몰래카메라 영상 서버로부터 상기 암호화가 해제된 영상을 수신하거나 스트리밍 수신하여 재생하는 단계를 포함하는 몰래카메라 영상 불법 유출 방지 및 실시간 범죄 대처를 위한 보안 방법.When the user approval and the police approval is completed, the police authentication control center terminal receives or streams the decrypted video from the hidden camera image server to receive the illegal video leakage prevention and real-time crime Security method for coping.
  4. 제3항에 있어서, 상기 몰래카메라 영상 서버가 상기 사용자 모바일 단말로부터 영상을 실시간 수신하고 실시간 수신된 영상을 암호화하여 저장하는 단계 이후,The method of claim 3, wherein after the sneak-camera video server receives an image in real time from the user mobile terminal and encrypts and stores the image received in real time,
    상기 몰래카메라가 비상 모드로 전환된 경우, 해당 사용자의 사용자 승인 및 경찰 승인이 없이도 상기 몰래카메라 영상 서버가 해당 영상의 암호화를 해제하여 사용자, IP 저장 주소, 촬영 시간에 대한 정보와 함께 실시간으로 경찰인증 관제 센터 단말로 실시간 송신하는 단계;When the hidden camera is switched to the emergency mode, the hidden camera image server decodes the corresponding image without the user's user approval and the police's approval, and the police in real time with information on the user, IP storage address, and shooting time. Real time transmission to the authentication control center terminal;
    상기 경찰인증 관제 센터 단말이 상기 몰래카메라 영상 서버로부터 상기 암호화가 해제된 영상을 수신하거나 스트리밍 수신하여 재생하는 단계를 더 포함하도록 구성되는 것을 특징으로 하는 몰래카메라 영상 불법 유출 방지 및 실시간 범죄 대처를 위한 보안 방법.The police authentication control center terminal is further configured to receive or stream the received video decrypted from the sneak camera image server to reproduce the hidden camera image illegal leakage prevention and real-time crime response Security method.
  5. 사용자의 몸이나 옷, 모자 또는 가방에 부착 또는 소지하게 되며, 상기 사용자의 조작에 의해 촬영 모드로 전환되어 촬영을 개시하고 촬영에 의한 영상을 송신하는 몰래카메라;A sneak camera attached to or possessed by a user's body or clothes, a hat or a bag, and switched to a shooting mode by the user's operation to start shooting and to transmit an image by shooting;
    상기 몰래카메라로부터 영상을 수신하고 암호화 시킨 후 상기 영상을 송신하는 사용자 모바일 단말;A user mobile terminal for transmitting the image after receiving and encrypting the image from the hidden camera;
    상기 사용자 모바일 단말로부터 영상을 수신한 후 암호화를 해제하여 송신하거나 암호화를 해제하여 스트리밍(streaming) 송신하는 몰래카메라 영상 서버;A sneak-camera video server for receiving an image from the user mobile terminal and then decrypting and transmitting the decryption or decrypting and transmitting the streaming;
    상기 몰래카메라 영상 서버로부터 상기 암호화가 해제된 영상을 수신하거나 스트리밍 수신하여 재생하는 경찰인증 관제 센터 단말;을 포함하는 몰래카메라 영상 불법 유출 방지 및 실시간 범죄 대처를 위한 보안 시스템.And a police authentication control center terminal that receives or streams the encrypted decrypted image from the hidden camera image server, and reproduces it.
  6. 촬영영상을 사용자의 모바일 단말에 암호화 저장시켜 사용자가 상기 촬영영상을 조회할 수 없도록 함과 동시에, 암호화된 상기 촬영 영상을 무선통신을 이용하여 몰래카메라 영상서버 또는 경찰인증 관제 센터 단말에 송신하는 것을 특징으로 하는 몰래카메라 영상 불법 유출 방지 및 실시간 범죄 대처를 위한 보안 시스템.Encrypting and storing the photographed image in the user's mobile terminal so that the user can not look up the photographed image, and at the same time to transmit the encrypted photographed image to the hidden camera image server or police authentication control center terminal using wireless communication A security system for preventing illegal leakage of hidden camera images and real-time crime response.
PCT/KR2016/004015 2016-02-22 2016-04-18 Security system and method for preventing illegal leakage of hidden camera image and coping with crime in real-time WO2017146297A1 (en)

Applications Claiming Priority (4)

Application Number Priority Date Filing Date Title
KR10-2016-0020528 2016-02-22
KR20160020528 2016-02-22
KR20160042705 2016-04-07
KR10-2016-0042705 2016-04-07

Publications (1)

Publication Number Publication Date
WO2017146297A1 true WO2017146297A1 (en) 2017-08-31

Family

ID=59686280

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/KR2016/004015 WO2017146297A1 (en) 2016-02-22 2016-04-18 Security system and method for preventing illegal leakage of hidden camera image and coping with crime in real-time

Country Status (2)

Country Link
KR (1) KR101867215B1 (en)
WO (1) WO2017146297A1 (en)

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111372091A (en) * 2020-02-26 2020-07-03 广州趣丸网络科技有限公司 Live content risk information control method and system
CN111510656A (en) * 2020-07-02 2020-08-07 北京梦天门科技股份有限公司 Law enforcement video intercepting method, device, electronic device and storage medium
CN114898539A (en) * 2022-01-25 2022-08-12 中网道科技集团股份有限公司 High-safety self-help correction terminal
CN116129604A (en) * 2023-04-17 2023-05-16 成都睿瞳科技有限责任公司 Automatic alarm method, system and storage medium based on monitoring data

Families Citing this family (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108712570B (en) * 2018-05-16 2020-09-22 臧戈平 Method for enhancing live performance and reality of intelligent mobile device for detecting hidden image
US11321797B2 (en) 2020-08-25 2022-05-03 Kyndryl, Inc. Wearable watermarks
KR102336545B1 (en) * 2021-05-18 2021-12-07 황규성 Method and apparatus for acquiring image data for an accident using a delivery rider in a wireless communication system
KR102645614B1 (en) * 2021-09-29 2024-03-08 주식회사 인베트 Private sharing service system for video which is able to corfirm a fact
KR102458961B1 (en) 2021-10-29 2022-10-26 엠아이엠테크 주식회사 Video security system based on gps location information and method thereof

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
KR20120136221A (en) * 2011-06-08 2012-12-18 주식회사 케이티 Security service method and system for providing location based security service and real-time moving picture of camera
KR20120140518A (en) * 2011-06-21 2012-12-31 (주)유테크 Remote monitoring system and control method of smart phone base
KR20140024712A (en) * 2012-08-21 2014-03-03 홍순선 User location based monitoring service providing method for user surroundings image using smart device
KR20150041821A (en) * 2013-10-10 2015-04-20 권형석 smartphone control and position notification service by voice In emergency
JP2015191601A (en) * 2014-03-28 2015-11-02 セコム株式会社 Communication terminal, communication system, communication method and communication program

Family Cites Families (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
KR100842309B1 (en) * 2007-05-09 2008-06-30 주식회사 두성테크 A manless monitoring camera system using mobile phone
KR101215549B1 (en) 2011-02-01 2012-12-26 성현규 User centered remote monitoring safety system using radio camera module and mobile phone
KR101440362B1 (en) * 2013-04-04 2014-09-17 주식회사 이도링크 A smart watch and its control method
KR101533755B1 (en) * 2013-05-14 2015-07-06 전수진 Wearable mobile terminal and method for generating and transmitting evidance data using the same
KR101522088B1 (en) * 2013-06-28 2015-05-20 주식회사 포스코 Sever for using mobile phone camera in security area
JP6405711B2 (en) * 2014-05-30 2018-10-17 ブラザー工業株式会社 Control program and information processing apparatus
KR20160016490A (en) * 2014-07-31 2016-02-15 삼성전자주식회사 Method and system for providing information on a time zone of an external device
KR20160018282A (en) * 2014-08-08 2016-02-17 손호민 Monitoring System for IP-CCTV camera of U-City

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
KR20120136221A (en) * 2011-06-08 2012-12-18 주식회사 케이티 Security service method and system for providing location based security service and real-time moving picture of camera
KR20120140518A (en) * 2011-06-21 2012-12-31 (주)유테크 Remote monitoring system and control method of smart phone base
KR20140024712A (en) * 2012-08-21 2014-03-03 홍순선 User location based monitoring service providing method for user surroundings image using smart device
KR20150041821A (en) * 2013-10-10 2015-04-20 권형석 smartphone control and position notification service by voice In emergency
JP2015191601A (en) * 2014-03-28 2015-11-02 セコム株式会社 Communication terminal, communication system, communication method and communication program

Cited By (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111372091A (en) * 2020-02-26 2020-07-03 广州趣丸网络科技有限公司 Live content risk information control method and system
CN111510656A (en) * 2020-07-02 2020-08-07 北京梦天门科技股份有限公司 Law enforcement video intercepting method, device, electronic device and storage medium
CN111510656B (en) * 2020-07-02 2020-10-27 北京梦天门科技股份有限公司 Law enforcement video intercepting method, device, electronic device and storage medium
CN114898539A (en) * 2022-01-25 2022-08-12 中网道科技集团股份有限公司 High-safety self-help correction terminal
CN114898539B (en) * 2022-01-25 2024-04-09 中网道科技集团股份有限公司 Self-service correction terminal of high security
CN116129604A (en) * 2023-04-17 2023-05-16 成都睿瞳科技有限责任公司 Automatic alarm method, system and storage medium based on monitoring data

Also Published As

Publication number Publication date
KR20170098701A (en) 2017-08-30
KR101867215B1 (en) 2018-06-12

Similar Documents

Publication Publication Date Title
WO2017146297A1 (en) Security system and method for preventing illegal leakage of hidden camera image and coping with crime in real-time
US8364956B2 (en) Security management server and image data managing method thereof
KR102066778B1 (en) Image processing system comprising image transmitter and image receiver based on internet of things, and image processing method using the same
JP2005136535A (en) Information processing apparatus, mobile electronic apparatus, and photographing limitation system
CN108923931B (en) Electronic certificate processing method and device and computer readable storage medium
US7774023B2 (en) System and method for associating device information with digital images
EP2177006A1 (en) Drm scheme extension
CN104852800B (en) Data transmission method and device
CN106911718A (en) Secrecy intercom system and method based on quantum key service station
CN104980919B (en) The acquisition methods and equipment of information of network service
WO2021184264A1 (en) Data saving method, data access method, and related apparatus and device
WO2022089012A1 (en) Communication method, electronic device and computer-readable storage medium
WO2016125974A1 (en) Integrated image control system, and image transmitting and sharing method using same
CN109474426A (en) A kind of safe quantum communication system and communication means for multimedia data stream
JP2008199272A (en) Mobile phone
JP2006013980A (en) Portable electronic equipment and functional restriction system of portable electronic equipment
KR20120103806A (en) System for providing an individual black box
CN115329286A (en) Screen projection method and electronic equipment
CN113676440B (en) Authority negotiation method and device in communication process and electronic equipment
KR101902687B1 (en) Security system and method for image real name system
JP5225261B2 (en) RECORDING DEVICE, PORTABLE TERMINAL, RECORDING / REPRODUCING SYSTEM, AND RECORDING / REPRODUCING METHOD IN THE RECORDING DEVICE, PORTABLE TERMINAL, RECORDING / REPRODUCING SYSTEM
CN109673013A (en) A kind of law-enforcing recorder data transfer control method
WO2023201454A1 (en) Relay communication method and apparatus, communication device, and storage medium
WO2021227820A1 (en) Method and device for negotiating permission during communication process, and electronic apparatus
JP2006108977A (en) Wireless monitoring system

Legal Events

Date Code Title Description
NENP Non-entry into the national phase

Ref country code: DE

121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 16891701

Country of ref document: EP

Kind code of ref document: A1

122 Ep: pct application non-entry in european phase

Ref document number: 16891701

Country of ref document: EP

Kind code of ref document: A1