WO2018198385A1 - Système, procédé et programme de sécurité de caisse enregistreuse numérique - Google Patents

Système, procédé et programme de sécurité de caisse enregistreuse numérique Download PDF

Info

Publication number
WO2018198385A1
WO2018198385A1 PCT/JP2017/019801 JP2017019801W WO2018198385A1 WO 2018198385 A1 WO2018198385 A1 WO 2018198385A1 JP 2017019801 W JP2017019801 W JP 2017019801W WO 2018198385 A1 WO2018198385 A1 WO 2018198385A1
Authority
WO
WIPO (PCT)
Prior art keywords
face
product
customer
image
suspicious person
Prior art date
Application number
PCT/JP2017/019801
Other languages
English (en)
Japanese (ja)
Inventor
和夫 三輪
Original Assignee
株式会社 テクノミライ
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 株式会社 テクノミライ filed Critical 株式会社 テクノミライ
Priority to JP2017538255A priority Critical patent/JP6245626B1/ja
Publication of WO2018198385A1 publication Critical patent/WO2018198385A1/fr

Links

Images

Classifications

    • GPHYSICS
    • G08SIGNALLING
    • G08BSIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
    • G08B13/00Burglar, theft or intruder alarms
    • G08B13/02Mechanical actuation
    • G08B13/14Mechanical actuation by lifting or attempted removal of hand-portable articles
    • GPHYSICS
    • G08SIGNALLING
    • G08BSIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
    • G08B13/00Burglar, theft or intruder alarms
    • G08B13/18Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength
    • G08B13/189Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength using passive radiation detection systems
    • G08B13/194Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength using passive radiation detection systems using image scanning and comparing systems
    • G08B13/196Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength using passive radiation detection systems using image scanning and comparing systems using television cameras
    • GPHYSICS
    • G08SIGNALLING
    • G08BSIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
    • G08B13/00Burglar, theft or intruder alarms
    • G08B13/22Electrical actuation
    • GPHYSICS
    • G08SIGNALLING
    • G08BSIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
    • G08B13/00Burglar, theft or intruder alarms
    • G08B13/22Electrical actuation
    • G08B13/24Electrical actuation by interference with electromagnetic field distribution
    • GPHYSICS
    • G08SIGNALLING
    • G08BSIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
    • G08B25/00Alarm systems in which the location of the alarm condition is signalled to a central station, e.g. fire or police telegraphic systems
    • G08B25/01Alarm systems in which the location of the alarm condition is signalled to a central station, e.g. fire or police telegraphic systems characterised by the transmission medium
    • G08B25/04Alarm systems in which the location of the alarm condition is signalled to a central station, e.g. fire or police telegraphic systems characterised by the transmission medium using a single signalling line, e.g. in a closed loop
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N7/00Television systems
    • H04N7/18Closed-circuit television [CCTV] systems, i.e. systems in which the video signal is not broadcast

Definitions

  • the present invention relates to a digital register security system, a method, and a program for performing crime prevention by photographing the inside of a store with a surveillance camera.
  • Patent Document 1 states that “the presence or absence of a mismatch is determined based on a product existing in a store and a product confirmed to be sold by the POS server, and when it is determined that there is a mismatch, The face information of the store clerk photographed by the store closing camera before the start-up of this time is recorded in the face information recording unit, and the suspicious person is specified.
  • Japanese Patent Application Laid-Open No. 2004-228867 describes that “when the adjusted imaging data from the adjustment imaging device and the moving imaging data from the commodity shelf imaging device match, the adjusted imaging data and the moving imaging data that are matched from the recording device are deleted.” It is described.
  • Patent Document 3 states that “the face information acquired by the face detection unit from the image captured by the camera in the vicinity of the timing at which the gate detects the tag is captured before the timing by the monitoring camera. In other words, an image including a face that is determined to be the same as the face represented by the face information is searched.
  • Patent Document 4 states that “It is activated by an artificial external command after closing a store, and a shoplifter's visual verification screen is automatically generated. The video taken during business hours is read from the customer review site video file unit 510. Originally, the customer video that settled the price of the product and the video of the shoplifter are included, but the video related to the product that was cashed out at this point is deleted and only the video equivalent to the shoplifting site video is displayed. Has been.
  • shoplifting is prevented by attaching a tag to a product in a store such as a convenience store.
  • shoplifting cannot be prevented if the tag is removed from the product or the tag is wrapped in an electromagnetic shield sheet.
  • An object of the present invention is to provide a digital register security system, method, and program capable of preventing shoplifting even when a tag is removed from a product or the tag is invalidated.
  • the digital register security system has a product detection means for detecting that a product with a tag is taken from a display shelf, and when the product detection means detects that a product is taken from a display shelf.
  • a face photographing means for photographing the face of the customer who has taken out the product
  • a storage means for temporarily storing a face image photographed by the face photographing means
  • a liquidation for determining that the commodity has been liquidated.
  • the result of collation between the judging means and the image of the face of the customer leaving the store and the image stored in the storage means match, and it is not judged that the product taken out by the customer has been settled by the clearing judging means
  • a suspicious person registration means for registering an image of the customer's face as the suspicious person's face.
  • the product detection means detects that the product once taken from the display shelf has been restored again.
  • the product detection means includes a control means for deleting an image of the customer's face stored in the storage means. The number of images can be reduced, and the number of images collated at the store exit can be reduced.
  • the clearing means determines that all products taken by the customer from the display shelf have been cleared
  • the clearing means includes control means for deleting the image of the customer's face stored in the storage means.
  • the suspicious person registering means does not determine that the product has been liquidated by the liquidation determining means even if a predetermined time has elapsed since the merchandise detecting means detected that the merchandise was taken from the display shelf.
  • the face image of the suspicious person is registered. can do.
  • a customer movement detection means for detecting a customer who moves with the tagged product
  • Tag abnormality determination means for determining that the product with the tag attached is stopped for a predetermined time at a place other than a predetermined location and that the tag becomes undetectable
  • the suspicious person registering means registers the face image of the customer photographed by the surveillance camera as the suspicious person's face when the tag abnormality determining means determines that the tag has stopped moving or cannot be detected. Even if the tag is removed from the product or the tag is invalidated, the image of the customer's face can be registered as that of the suspicious person.
  • the tag can be attached to any product. For this reason, a number of products can be monitored at once, and a security system that can be easily adopted can be constructed even in stores where the number of products sold and the number of products sold are large.
  • the digital register security method of the present invention detects a product detection step of detecting that a tagged product is taken from the display shelf, and the product detection step detects that the product is taken from the display shelf.
  • a face photographing step for photographing the face of the customer who has taken out the product
  • a storage step for temporarily storing an image of the face photographed by the face photographing step
  • determining that the product has been settled
  • the result of collation between the liquidation determination step and the face image of the customer leaving the store and the image stored in the storage step match, and it is determined that the product taken out by the customer has been liquidated in the liquidation determination step. If not, a suspicious person registration step of registering an image of the customer's face as a suspicious person's face is provided.
  • the present invention provides a product detection means for detecting that a product with a tag is taken from the display shelf, and the product detection means detects that the product is taken from the display shelf.
  • a face photographing means for photographing the face of the customer who has taken out the product, a storage means for temporarily storing a face image photographed by the face photographing means, and a liquidation determination for judging that the commodity has been liquidated
  • a program for causing a customer to function as a digital register security system including suspicious person registration means for registering an image of the customer's face as a suspicious person's face.
  • FIG. 1 is a block diagram showing a configuration of a digital register security system according to the first embodiment of the present invention.
  • This system can be used in department stores, supermarkets, convenience stores, shopping malls, airports, airplanes, stations, trains, ships, restaurants, underground malls, specialty stores, precious metal stores, luxury boutiques, complex facilities, offices, theaters, gathering venues, It can be applied to schools, hospitals, factories, financial institutions, government offices, hotels, museums, art galleries, stadiums, event venues, new product announcement venues, and skyscrapers.
  • the digital register security system 1000 includes a plurality of surveillance cameras 11 installed on the ceiling of a product sales floor and an RFID (Radio Frequency Identification) 20 installed on a product shelf on the product sales floor.
  • An authentication tag 21 carried by a store clerk (employee) and authenticated by the RFID reader 20, a Wi-Fi (Wireless Fidelity) terminal (hereinafter referred to as Wi-Fi master) 30 installed in a business facility, an i-beacon ( iBeacon) (registered trademark) base unit 40, a portable terminal device 50 carried by a store clerk (employee), a monitoring device 100 for controlling the entire system, a POS (Point Of Sale) server 200, and a POS A cash register 300 and an EOS (Electronic Ordering System) 400 are provided.
  • Wi-Fi Wireless Fidelity
  • iBeacon registered trademark
  • a portable terminal device 50 carried by a store clerk (employee)
  • a monitoring device 100 for controlling
  • the digital register security system 1000 monitors the video from the monitoring camera 11 (face photographing means) installed on the product sales floor, and notifies the portable terminal device 50 carried by the store clerk (employee) of the suspicious person's information. This system prevents shoplifters (employees) from shoplifting by suspicious individuals.
  • a part or all of the monitoring camera 11 is a PTZ camera (also an authentication camera for photographing and authenticating a person's face) having a PTZ (pan / tilt / zoom) function, and is remotely operated by the monitoring device 100.
  • the Surveillance cameras 11 are installed at various places on the product sales floor such as in a store and take pictures of a person's face. An image captured by the monitoring camera 11 is output to the monitoring device 100.
  • the surveillance camera 11 may shoot a moving image at all times, or may shoot a still image every certain time (for example, several seconds).
  • a plurality of surveillance cameras 11 are installed in a store or the like, and a predetermined surveillance area can be photographed. In addition, there is one that causes a specific person to be tracked by the monitoring camera 11. Even if the surveillance camera does not track a specific person, a plurality of surveillance cameras 11 are installed, so that a person or the like can be photographed from various angles.
  • RFID readers 20 are installed at predetermined intervals on the display shelf of the store. The RFID reader 20 detects that the product attached with the RF tag has left the display shelf depending on whether or not there is a response to transmission to the RF tag attached to the product.
  • the RFID reader 20 installed in the POS cash register 300 detects whether there is a response to the transmission to the RF tag attached to the product, thereby managing the settlement of the product with the RF tag attached.
  • the RFID reader 20 is an RFID tag compatible handy terminal or reader / writer.
  • the communicable distance with the RFID tag is, for example, 3 to 7 m.
  • the specification which makes a communicable distance about 400 m is also possible by using the active tag which incorporates a battery.
  • the tag may be an optically readable optical tag. In particular, an optical tag that reads with invisible light is suitable.
  • the RFID reader 20 can also be installed in a shopping cart.
  • the I / F unit 180 is connected wirelessly. The position of the RFID reader 20 installed in the shopping cart is detected and tracked by the monitoring device 100.
  • the RF tag is removed or invalidated from an article that can be properly taken out of the store by purchasing it.
  • the RFID reader 20 authenticates the authentication tag 21 possessed by the store clerk (employee).
  • the RFID reader 20 captures the position of the store clerk (employee) carrying the authentication tag 21 by authenticating the authentication tag 21 possessed by the store clerk (employee).
  • the Wi-Fi master device 30 exchanges information with the Wi-Fi slave device 51 of the mobile terminal device 50 using Wi-Fi.
  • the Wi-Fi master device 30 can acquire position information acquisition by Wi-Fi positioning, that is, position information acquisition using a Wi-Fi access point and a predetermined position information service.
  • iBeacon is a wireless technology that uses Bluetooth Low Energy.
  • An i-beacon is a combination of an i-beacon parent device 40 that is a beacon device on the transmission side and an application (corresponding to an i-beacon child device 52 described later) of the mobile terminal device 50 that supports radio wave reception from the i-beacon parent device 40. Composed.
  • the i-beacon transmits unique ID information necessary for identification, and reacts only to an application associated with the ID information of the mobile terminal device 50.
  • the application of the portable terminal device 50 registers the same identifier as that of the i-beacon parent device 40.
  • the application (i-beacon handset 52) of the mobile terminal device 50 stands by in the background by executing an application equipped with the i-beacon function, and excites a predetermined action when approaching the beacon of the i-beacon base unit 40.
  • position information such as “position” and “direction” of the mobile terminal device 50 from Wi-Fi or GPS.
  • the POS server 200 collects and analyzes information on the best-selling products based on sales information at the time of sale of the POS system.
  • the POS server 200 records and holds information such as the accounting time (sales time) of the product registered by the POS cash register 300 as POS data.
  • the POS server 200 varies depending on the corresponding POS system and model, etc., but records and manages functions (sales management function) of product sales performance information (sales information), records and manages merchandise inventory information (stock information), etc.
  • Function inventory management function
  • attribute management function the function of inputting and recording the purchaser's attribute information (gender, age group, etc.) by the store clerk.
  • the POS server 200 may be an information processing system including a store computer, a network communication device, and the like, or is connected and linked to an external inventory management system or an electronic money system (for example, a system using an IC card). It may be a system. For example, point-of-sale information may be recorded as POS data in accordance with accounting operations and processing using an IC card.
  • the POS cash register 300 is a cash register device having a function corresponding to the POS server 200.
  • the POS register 300 includes a handy scanner and an input device (not shown).
  • the handy scanner reads a product code attached to a product, that is, a bar code, and transmits it to the POS register 300.
  • key input data is input from this input device.
  • the key input data is data by key button input.
  • a plurality of key input data are input according to the sales of a plurality of products.
  • EOS400> The EOS inputs the product category, type, product name, quantity, etc., and sends the order data to the manufacturer and wholesaler via EDI (Eietric Date Interchhange: electronic data exchange) to place an order.
  • EDI is a mechanism that unifies information related to commerce into a standard format and exchanges it electronically between companies. Data related to ordering is digitized according to a predetermined format and sent and received via communication lines, etc. To do.
  • the monitoring apparatus 100 is installed in the store, you may install outside via the network which is not shown in figure.
  • the monitoring device 100 is installed on a server on a network, a plurality of stores can be set as security targets.
  • the portable terminal device 50 is carried by each of a plurality of shop assistants (employees) in the store.
  • the mobile terminal device 50 is, for example, a smartphone 50a, a tablet 50b, or a notebook computer 50c.
  • the mobile terminal device 50 includes a mobile phone, PHS (Personal Handy-Phone System), PDA (Personal Digital Assistants) or dedicated terminals.
  • the mobile terminal device 50 can be used by each store clerk (employee) at various places (that is, the current position), and includes a mail or a video from the monitoring device 100 via a telephone line (not shown). Video and the like can be received.
  • the mobile terminal device 50 is assumed to be used by the smartphone 50a and the tablet 50b, and each individual can use the device at various locations (that is, the current location).
  • One of the portable terminal devices 50 is arranged at a headquarter or a head office (not shown).
  • the mobile terminal device 50 includes a Wi-Fi individual identification device (hereinafter referred to as Wi-Fi slave device) 51, an i-beacon slave device 52, and a GPS (Global Positioning System) that captures the position of a store clerk (employee) on the product sales floor. 53).
  • Wi-Fi slave device a Wi-Fi individual identification device
  • i-beacon slave device a Wi-Fi slave device
  • GPS Global Positioning System
  • the Wi-Fi slave device 51 receives and individually identifies the radio waves of the Wi-Fi master device 30 installed in the business facility.
  • the monitoring device 100 stores arrangement information of the Wi-Fi master device 30 installed in the facility as safety related information. When the Wi-Fi slave device 51 comes close to the Wi-Fi master device 30, it is possible to determine the ID and position of the person who carries the mobile terminal device 50.
  • the i-beacon slave device 52 is an application of the mobile terminal device 50 that supports reception of radio waves from the i-beacon master device 40.
  • the i-beacon parent device 40 transmits a beacon (unique ID information necessary for identification), and the application of the mobile terminal device 50 (i-beacon child device 52) is predetermined when the beacon of the i-beacon parent device 40 approaches.
  • Excites action As described above, by using the i-beacon, the “position”, “direction”, and the like of the mobile terminal device 50 can be accurately transmitted to the monitoring device 100 from Wi-Fi or GPS.
  • the GPS 53 receives a radio wave of position information from a GPS satellite or the like.
  • the GPS 53 calculates the current position information from the information received via the GPS antenna as three parameters of latitude, longitude, and altitude, and acquires the position information.
  • the acquired position information is transmitted to the monitoring device 100 in a timely manner.
  • GPS satellites as means for acquiring position information
  • a system using a positional relationship with a base station other than GPS may be used.
  • a base station and a mobile phone communication network (not shown) are used instead of or in combination with the GPS 53. It is also possible to send / receive information to / from the mobile phone company server via the mobile phone and acquire the current location information of the terminal from the approach confirmation.
  • position information acquisition by Wi-Fi positioning that is, position information acquisition using a Wi-Fi access point and a predetermined position information service may be used.
  • the monitoring device 100 is installed, for example, in a store management room, and centrally manages the product sales floor in the store.
  • the monitoring device 100 may be a general server computer or a personal computer.
  • the monitoring apparatus 100 includes a control unit 110 (control unit), an input unit 120, a storage unit 130 (storage unit), a display unit 140, an output unit 150, a face information database (DB) 153, and an image processing unit. 170, an interface (I / F) unit 180, and a communication unit 190, and each unit is connected by a bus 195.
  • the monitoring device 100 monitors whether a suspicious person who performs shoplifting acts appears in a store.
  • the monitoring device 100 When it is detected that the suspicious person has appeared in the store, the monitoring device 100 notifies the headquarters, the head office, or the security company system of the person information and the store information through the network.
  • control section 110 reads each program from the ROM as necessary, loads it into the RAM, and executes each function (described later).
  • Each program may be stored in the storage unit 130 in advance, or may be taken into the monitoring apparatus 100 when necessary via another storage medium or communication medium.
  • the control unit 110 is configured by a CPU (Central Processing Unit) or the like, and controls the entire monitoring apparatus 100 and executes a control program to function as a digital register security system. The detailed configuration of the control unit 110 will be described later.
  • a CPU Central Processing Unit
  • the input unit 120 is an input device for the user of the monitoring apparatus 100 to input instructions and the like, such as a keyboard, a mouse, a touch panel provided on the screen of the display unit 140, and a microphone.
  • the storage unit 130 stores still images or moving images received from the monitoring camera 11, various data and programs used by the control unit 110, and the like.
  • the display unit 140 displays an operation status of the monitoring apparatus 100, an image received from the monitoring camera 11, a GUI (Graphical User Interface) for operating the monitoring apparatus 100, and the like.
  • GUI Graphic User Interface
  • the output unit 150 is an audio interface, for example, and outputs an audio signal from the monitoring device 100 to the acoustic system 158 in the store.
  • an audio signal output from the monitoring apparatus 100 to the acoustic system 158 for example, an audio signal input from an audio input device such as a microphone provided in the input unit 120 or music data stored in the storage unit 130 is controlled. 110 may be a reproduced audio signal.
  • the acoustic system 158 includes an amplifier and a plurality of speakers arranged in the store, and broadcasts an audio signal input from the monitoring device 100 into the store.
  • the face information DB 160 accumulates face images (face information) of suspicious persons and store personnel.
  • Basic data such as a person's face registered in the face information DB 160 is obtained from the headquarters, head office, or security company (not shown) via the I / F unit 180, and the face information DB 160 is constructed.
  • the face information DB can be updated to the latest face image (face information) by exchanging information with the headquarters, the head office or the security company (not shown).
  • the image processing unit 170 performs a predetermined process on the received image.
  • Examples of the predetermined processing include contour extraction, image resizing, and resolution conversion processing.
  • the I / F unit 180 connects each monitoring camera 11 and the monitoring device 100 arranged in the product sales floor. In addition, the I / F unit 180 connects each RFID reader 20 arranged in the product sales floor, and monitors the result of authentication of the authentication tag 21 possessed by a store clerk (employee) close to the RFID reader 20 To 100.
  • the I / F unit 180 is connected to a headquarter, head office, security company, or the like (not shown) via a network or a dedicated line.
  • the security company is not an essential component of the digital register security system according to the present embodiment.
  • the communication unit 190 transmits / receives data to / from the mobile terminal device 50 via the base station.
  • the communication unit 190 receives position information of each portable terminal device 50 at regular intervals via the base station, and information on the suspicious person (e-mail transmission, video including video) when the suspicious person is recognized. Etc.).
  • FIG. 2 is a block diagram of the control unit 110 of the monitoring apparatus 100 of the digital register security system according to the first embodiment of the present invention.
  • the control unit 110 includes a tag movement determination unit 111 (trademark detection unit, customer movement detection unit), a customer position information acquisition unit 112 (customer movement detection unit), and a monitoring target setting unit 113 (customer Movement detection means), monitoring target tracking section 114 (customer movement detection means), suspicious person determination section 115 (tag abnormality determination means, suspicious person registration means), face authentication function section 116 (face authentication means), position A determination unit 117 (control unit), a suspicious person tracking unit 118 (control unit), and a transmission control unit 119 (control unit) are provided.
  • tag movement determination unit 111 trademark detection unit, customer movement detection unit
  • customer position information acquisition unit 112 customer movement detection unit
  • monitoring target setting unit 113 customer Movement detection means
  • monitoring target tracking section 114 customer movement detection means
  • suspicious person determination section 115 tag abnormality determination means, suspicious person registration means
  • face authentication function section 116 face authentication means
  • position A determination unit 117 control unit
  • a suspicious person tracking unit 118 control unit
  • a transmission control unit 119 control unit
  • the control unit 110 captures the face of the customer when the product to which the tag is attached is taken from the display shelf by the monitoring camera 11.
  • the control unit 110 temporarily stores in the storage unit 130 (see FIG. 1) an image of the customer's face taken when the product is taken from the display shelf.
  • the control unit 110 determines whether the face image of the customer leaving the store matches the customer face image stored in the storage unit 130.
  • the control unit 110 has a function as a settlement determination unit that determines that a product has been settled.
  • the control unit 110 uses the monitoring camera 11 to move the product with the product and the customer's face image and the customer's scene image (still image or moving image). Is temporarily stored in the storage unit 130.
  • the tag movement determination unit 111 detects whether or not a product with a tag (RF tag) is taken from the display shelf.
  • the tag movement determination unit 111 tracks the tag and detects that the product has been taken from the display shelf.
  • the tag movement determination unit 111 detects that a product has been taken from the display shelf based on the state of the product on the display shelf photographed by a plurality of wide-angle lens cameras that photograph the entire store.
  • the tag movement determination unit 111 detects that the product once taken from the display shelf has been restored again.
  • the tag movement determination unit 111 determines whether or not the tag (RF tag) attached to the product has moved away from the display shelf.
  • RFID readers 20 are installed on the display shelf at predetermined intervals.
  • the RFID reader 20 detects that a product to which an RF tag is attached (hereinafter referred to as a product as appropriate) has left the display shelf depending on whether or not there is a response to transmission to an RF tag attached to the product.
  • the RFID reader 20 transmits detection information to the control unit 110 of the monitoring apparatus 100 after a predetermined time (for example, 10 seconds) has elapsed.
  • the tag movement determination unit 111 determines whether the product has started moving. The start of the movement of the product is detected by another adjacent RFID reader 20 when the product leaves the display shelf.
  • the customer location information acquisition unit 112 acquires location information of customers who move with this product.
  • the customer location information acquisition unit 112 for example, captures the surroundings of the corresponding display shelf with the monitoring camera 11, and acquires the customer location information by superimposing the customer captured by the monitoring camera 11 with the store layout information.
  • the monitoring target setting unit 113 sets the monitoring target P by combining the product with the RF tag and the customer position information.
  • the monitoring target P is a combination of customer position information and a plurality of RF tags. Further, the store clerk (employee) is excluded from the customer and does not form the monitoring target P.
  • the monitoring target tracking unit 114 tracks the monitoring target P set by the monitoring target setting unit 113.
  • the customer movement detection means to detect is comprised.
  • the display shelf may be anything such as a display case or a product storage box as long as it displays or stores products.
  • the suspicious person determination unit 115 determines whether or not a predetermined time (for example, 10 minutes to 6 hours depending on the category of the store) has elapsed since the product was taken from the display shelf.
  • the suspicious person determination unit 115 authenticates the face of the customer leaving the store, and when the customer leaves the store even though the merchandise is not settled, the image of the customer's face taken by the face photographing means is displayed. Register as a suspicious person's face.
  • the suspicious person determination unit 115 determines whether or not the monitoring target P has been stopped for a predetermined time or longer in a place other than the POS cash register 300 and whether or not the tag forming the monitoring target P has become undetectable.
  • the suspicious person determination unit 115 displays the image of the customer's face when the monitoring target P stops for a predetermined time or longer in a place other than the POS register 300 or when the tag forming the monitoring target P becomes undetectable. Register as a thing.
  • the suspicious person determination unit 115 does not perform the determination at the monitoring exclusion spot even if the monitoring target P is the location of the POS cash register 300.
  • the face authentication function unit 116 performs face authentication by comparing a person's face image captured by the monitoring camera 11 with a suspicious person's face image registered in the face information DB 160.
  • the face authentication function unit 116 performs face authentication to determine whether the face of a person included in the image received from the monitoring camera 11 is a suspicious person's face registered in the face information DB 160. Face authentication can be performed based on the similarity between the face information extracted from the received image and the suspicious person's face information registered in the face information DB 160.
  • the position determination unit 117 determines the position of the mobile terminal device 50 closest to the suspicious person.
  • the position determination unit 117 acquires the position information of the plurality of mobile terminal devices 50 in the product sales floor using the GPS position information and the RFID reader 20. Specifically, the position determination unit 117 obtains the position information of the store clerk (employee) on the product sales floor by authenticating the authentication tag carried by the store clerk (employee) by the plurality of RFID readers 20 installed on the product sales floor. get. In this case, the position determination unit 117 determines the position of the suspicious person against the installation position of the monitoring camera 11.
  • the position determination unit 117 corresponds to the store clerk (employee) by authenticating each RFID reader 20 of the authentication tag 21 possessed by the store clerk (employee). It is determined that the RFID reader 20 is in proximity. Since the installation position of the RFID reader 20 is registered in advance, the position of the store clerk (employee) can be determined.
  • the position determination unit 117 acquires position information from the GPS function unit included in the mobile terminal device 50.
  • the suspicious person tracking unit 118 tracks the movement of the suspicious person on the product sales floor.
  • the suspicious person tracking unit 118 tracks and detects a person who is recognized as a suspicious person by the plurality of monitoring cameras 11 and confirms the movement history in the product sales floor.
  • the suspicious person tracking unit 118 tracks the movement of the suspicious person on the product sales floor.
  • the transmission control unit 119 transmits information related to the suspicious person (an image or a moving image of the suspicious person's scene) to a store clerk (employee) close to the position of the suspicious person. For example, the transmission control unit 119 transmits voice, video, and suspicious person location information (for example, information marked on the sales floor layout) by e-mail. The transmission control unit 119 determines the position of the mobile terminal device 50 closest to the suspicious person, and transmits information related to the suspicious person to the mobile terminal device 50.
  • the transmission control unit 119 selects a second store clerk (employee) related person and performs retransmission. .
  • the second clerk (employee) related person is the clerk second closest to the suspicious person.
  • FIG. 3 is a flowchart showing the suspicious person's face registration process of the control unit 110 of the monitoring apparatus 100 of the digital register security system. This flow is executed by the control unit 110 (see FIG. 2) of the monitoring apparatus 100.
  • step S1 the tag movement determination unit 111 (product detection means) of the control unit 110 detects whether or not a product with a tag (RF tag) is taken from the display shelf.
  • RFID readers 20 are installed on the display shelf at predetermined intervals.
  • the RFID reader 20 detects that a product with an RF tag (hereinafter referred to as a product as appropriate) has left the display shelf depending on whether or not there is a response to transmission to an RF tag attached to the product.
  • the tag movement determination unit 111 tracks the tag and detects that the product has been taken from the display shelf.
  • the tag movement determination unit 111 detects that a product has been taken from the display shelf based on the state of the product on the display shelf photographed by a plurality of wide-angle lens cameras that photograph the entire store.
  • step S1: No When the tag is not away from the display shelf (step S1: No), the process of this flow is terminated.
  • step S2 the control unit 110 detects the customer when the product to which the tag is attached is taken from the display shelf by the monitoring camera 11.
  • the monitoring camera 11 is a PTZ camera, for example, and is remotely operated by the monitoring device 100.
  • the surveillance camera 11 is an authentication camera that photographs a person's face. An image captured by the monitoring camera 11 is output to the monitoring device 100.
  • step S ⁇ b> 3 the control unit 110 temporarily stores in the storage unit 130 (see FIG. 1) an image of the customer's face taken when the product is taken from the display shelf.
  • the tag movement determination unit 111 once detects that the product taken from the display shelf has been restored again, the control unit 110 displays the image of the customer's face stored in the storage unit 130. delete.
  • step S ⁇ b> 4 the control unit 110 determines whether all products have been settled at the POS cash register 300. If all the products have not been settled at the POS register 300 (step S4: No), it is determined that there is a possibility of continuing shopping and the process proceeds to step S6.
  • step S4: Yes the suspicious person determination unit 115 of the control unit 110 displays the image of the customer's face stored in the storage unit 130 in step S5. delete. That is, the customer's face image stored in the storage unit 130 is deleted from the storage unit 130 when all the products taken by the customer are settled. As a result, the number of customer face images to be collated at the store exit can be reduced.
  • step S6 the suspicious person determination unit 115 of the control unit 110 determines whether or not a predetermined time (for example, 10 minutes to 6 hours, depending on the store category) has elapsed since the product was removed from the display shelf. If the predetermined time has not elapsed since the product was removed from the display shelf (step S6: No), the process proceeds to step S7, and if the predetermined time has elapsed since the product was removed from the display shelf (step S6: Yes), step Proceed to S8.
  • a predetermined time for example, 10 minutes to 6 hours, depending on the store category
  • step S ⁇ b> 7 the control unit 110 compares the face image of the customer leaving the store at the store exit (or entrance) with the customer face image stored in the storage unit 130 to determine whether or not they match. Determine whether. If the face image of the customer leaving the store does not match the face image stored in the storage unit 130 (step S7: No), the process returns to step S4. If the face image of the customer leaving the store matches the customer face image stored in the storage unit 130 (step S7: Yes), the process proceeds to step S8.
  • step S8 when a predetermined time has elapsed since the item was taken from the display shelf in step S6, or the customer's face image stored in the storage unit 130 is the image of the customer's face leaving the store in step S7. If the image matches the image, the suspicious person determination unit 115 reads the customer's face image stored in the storage unit 130, registers it as the suspicious person's face, and ends this flow.
  • a predetermined time has elapsed since the product was taken from the display shelf, it is suspected that the customer who took the product from the display shelf is a suspicious person who performs shoplifting, product replacement, damage, or the like. Moreover, it is a case where all the products are left from the store even though they are not cleared at the POS cash register 300.
  • the suspicious person determination unit 115 reads the customer face image stored in the storage unit 130, registers it as the suspicious person face, and ends this flow. In this way, by registering the customer's face image after a predetermined time has passed since the product was taken from the display shelf, even if the verification / authentication at the store exit fails, the face of the suspicious person Images can be registered. If the face image of the customer leaving the store in step S8 does not match the face image of the customer stored in the storage unit 130 (for example, if the customer who was masking removed the mask), By returning to step S4, the processing after the settlement determination of the POS cash register 300 is repeated. With this flow, the face image of the suspicious person is registered in the face information DB 160.
  • FIG. 4 is a flowchart showing a security process of the control unit 110 of the monitoring apparatus 100 of the digital register security system. This flow is mainly executed by the control unit 110 (see FIG. 4) of the monitoring apparatus 100.
  • step S21 the control unit 110 captures the video of the monitoring camera 11.
  • the surveillance camera 11 can shoot the entire store with a plurality of wide-angle lens cameras.
  • step S22 the face authentication function unit 116 of the control unit 110 performs face authentication by comparing the face image of the person photographed by the monitoring camera 11 with the face image of the suspicious person registered in the face information DB 160.
  • step S23 it is determined whether or not the face image of the person photographed by the monitoring camera 11 matches the face image of the suspicious person registered in the face information DB 160 by the face authentication.
  • the face image of the person photographed by the monitoring camera 11 matches the face image of the suspicious person registered in the face information DB 160.
  • the exit gate can be closed when a suspicious person tries to leave the store.
  • step S23 the face image of the person photographed by the monitoring camera 11 matches the face image of the suspicious person registered in the face information DB 160 (step S23: Yes), in step S24, the position determination unit 117 of the control unit 110 determines the position of the mobile terminal device 50 closest to the suspicious person.
  • step S25 the suspicious person tracking unit 118 of the control unit 110 tracks the movement of the product sales floor of the suspicious person.
  • step S ⁇ b> 26 the transmission control unit 119 of the control unit 110 transmits information about the suspicious person (an image of the suspicious person's scene or a moving image) to the clerk (employee) close to the position of the suspicious person, and ends this flow.
  • the transmission control unit 119 transmits voice, video, and suspicious person location information (for example, information marked on the sales floor layout) by e-mail.
  • information related to shoplifting addicts may be transmitted to the mobile terminal device 50 of the headquarters, the head office, or a security company in addition to the response to the store clerk (employee).
  • FIG. 5 is a diagram for explaining an application example of the digital register security system, and is a diagram showing a store visitor and a sales floor layout (commodity sales floor).
  • FIG. 5 shows a sales floor of a store such as a convenience store.
  • the RFID reader 20 of FIG. 1 is the electronic tag reader of FIG. 5, and the electronic tag is an RF tag.
  • the Wi-Fi slave device 51 of FIG. 1 is connected to the Wi-Fi master device 30 via the Wi-Fi repeater 51A installed for each fixed distance unit or sales department in FIG. For customers in the store, position information and customer face images are detected by an electronic tag, i-beacon, Wi-Fi, smartphone, surveillance camera 11, electronic tag gate terminal, and the like.
  • the smartphone i.e., the application of the portable terminal device 50
  • the smartphone receives the radio wave transmitted by the i-beacon parent device 40 installed in the upper part of the display case, and responds with the ID, whereby the i-beacon.
  • the parent device acquires the location information of the smartphone.
  • the Wi-Fi handset 51 of the smartphone (mobile terminal device 50) possessed by the customer is transferred to the Wi-Fi master 30 of the monitoring device 100 via the Wi-Fi repeater 51A installed in the store.
  • a surveillance camera 11 is installed in each area such as a sales department, a sales corner, a passage, and a cash register, detects radio waves transmitted by the electronic tag reader 20, and installs (or shoots) the surveillance camera 11. In combination with information, the customer's location is identified. Further, the radio wave transmitted by the electronic tag reader 20 is detected to identify the year, month, day, hour, and minute of the location. Furthermore, images taken by the monitoring camera 11 installed in the corresponding area can be extracted in chronological order, and it can be detected that the customer is in the hall in front of the sales corner or the display case.
  • the electronic tag of the product When the customer enters the shopping basket and moves the electronic tag product, the electronic tag of the product responds to the radio wave transmitted by the electronic tag reader 20, and the electronic tag reader 20 can receive the responded radio wave. .
  • an electronic tag gate 12 is installed before the entrance, and when it is not settled, a warning is issued and the store clerk rushes. Further, single item management, ordering, sales, etc. of the product can be handled daily by product management by the handy scanner 250, the POS cash register 300, and the EOS 400. As measures against shoplifting and merchandise loss in such store sales activities, a surveillance camera 11 and an electronic tag gate 12 are installed, and a human guardman is introduced.
  • the problem is that the suspicious person has taken out the electronic tag from the display case (display shelf) for the purpose of shoplifting and has taken it away. This is because the electronic tag gate 12 cannot be detected. Therefore, a suspicious person will not be identified indefinitely.
  • the digital register security system 1000 includes a tag movement determination unit 111 that detects that a product with a tag is taken from the display shelf, Surveillance camera 11 that captures the face of the customer who has taken out the image, storage unit 130 that temporarily stores the captured face image, control unit 110 that determines that the product has been liquidated, and A suspicious person determination unit 115 that registers an image of the customer's face as the suspicious person's face when the customer leaves the store even though the product is not settled by matching the face.
  • a face authentication function unit 116 that performs face authentication for comparing a face image of a person photographed by the monitoring camera 11 with a face image of a suspicious person registered in the face information DB 160, and a salesclerk (employee) close to the position of the suspicious person
  • a transmission control unit 119 for transmitting information on the suspicious person.
  • the number of images to be collated at the store exit can be reduced by deleting the image of the customer's face when all the products taken by the customer are settled.
  • a predetermined time 10 minutes to 6 hours depending on the store category
  • the face image that is collated (stored) with the customer's face image taken at the store exit is only the face image of the customer who has taken the product from the display shelf and has not settled at the cash register. . That is, it is only the number of customers moving between the display shelf and the cash register, and it is considered that the number is small. In this case, most of the face images of the customers who took the goods from the display shelf are erased by liquidation. Moreover, since the customer is generally walking in the exit direction at the exit of the store, it is considered easy to capture the customer's face image from the front. This is particularly favorable when the store exit is an escalator. Further, even if the customer is masked, if the mask is kept masked while in the store, it can be processed as a masked face image.
  • FIG. 6 is a flowchart showing the suspicious person's face registration process of the control unit 110 of the monitoring apparatus 100 of the digital register security system according to the second embodiment of the present invention. This flow is executed by the control unit 110 (see FIG. 2) of the monitoring apparatus 100.
  • step S101 the tag movement determination unit 111 of the control unit 110 determines whether or not the tag (RF tag) attached to the product has started to move away from the display shelf.
  • RFID readers 20 are installed on the display shelf at predetermined intervals. The RFID reader 20 detects that a product to which an RF tag is attached (hereinafter referred to as a product as appropriate) has left the display shelf depending on whether or not there is a response to transmission to an RF tag attached to the product. When the RFID reader 20 detects that the product has left the display shelf, the RFID reader 20 transmits detection information to the control unit 110 of the monitoring apparatus 100 after a predetermined time (for example, 10 seconds) has elapsed.
  • a predetermined time for example, 10 seconds
  • the tag movement determination unit 111 of the control unit 110 detects that the product has left the display shelf, the tag movement determination unit 111 determines whether the product has started to move. The start of the movement of the product is detected by another adjacent RFID reader 20 when the product leaves the display shelf.
  • step S101: No If the tag has moved away from the display shelf but has not started moving (step S101: No), it is determined that the customer is picking up and viewing the product, and the processing of this flow is terminated.
  • step S102 the customer location information acquisition unit 112 of the control unit 110 displays the location information of the customer who moves with the product. get.
  • the customer location information acquisition unit 112 captures the surroundings of the corresponding display shelf with the monitoring camera 11, and acquires the customer location information by superimposing the customer captured by the monitoring camera 11 with the store layout information. If the customer is a suspicious person, it is considered a rare case (the shoplifter does not usually notify his / her location information). However, if the suspicious person pretending to be a customer does not know the existence of the digital register security system, the Wi-Fi slave device 51 and the i-beacon slave device 52 may be carried. As described above, when position information from the Wi-Fi handset 51 or i-beacon handset 52 possessed by the customer can be acquired, the position information of the customer may be acquired from these pieces of information.
  • the control unit 110 uses the surveillance camera 11 to move the product with the product and the customer's face image and the customer's scene image. (Still image or moving image) is temporarily stored in the storage unit 130 (see FIG. 1).
  • the monitoring camera 11 is a PTZ camera, for example, and is remotely operated by the monitoring device 100.
  • the surveillance camera 11 is an authentication camera that photographs a person's face. An image captured by the monitoring camera 11 is output to the monitoring device 100.
  • step S104 the monitoring target setting unit 113 of the control unit 110 sets the monitoring target P by combining the product with the RF tag and the customer position information.
  • a customer may pick up multiple items.
  • the monitoring target P is a combination of customer location information and a plurality of RF tags. Further, the store clerk (employee) is excluded from the customer and does not form the monitoring target P.
  • step S105 the monitoring target tracking unit 114 of the control unit 110 tracks the monitoring target P set by the monitoring target setting unit 113.
  • step S106 the monitoring target tracking unit 114 determines whether or not the monitoring target P has moved to the POS cash register 300. If the monitoring target P has moved to the POS cash register 300 (step S106: Yes) (the arrow in FIG. 1) a), it is determined that the customer is not a suspicious person, and the processing of this flow is terminated.
  • step S106 When the monitoring target P has not moved to the POS register 300 (step S106: No) (see arrow b in FIG. 1), the process proceeds to step S107. If a customer (monitoring target P) having a tag attached to a product does not move to the POS register 300 for a long time, it is determined as a caution or abnormal state.
  • step S107 the suspicious person determination unit 115 of the control unit 110 determines whether or not the monitoring target P has been stopped at a place other than the POS register 300 for a predetermined time (for example, 10 minutes or 1 hour).
  • a predetermined time for example, 10 minutes or 1 hour.
  • the suspicious person determination unit 115 in step S108 determines that the place is a fitting room or a tasting corner where a store clerk (employee) can reach It is determined whether the spot is a spot excluded from monitoring.
  • Being a monitoring exclusion spot is not limited to the fact that the monitoring target P has moved to the monitoring exclusion spot, but is a condition that there is a store clerk (employee) at the monitoring exclusion spot.
  • step S108 Yes
  • the process returns to step S108.
  • step S108 If the monitoring target P is not in the monitoring exclusion spot (step S108: No), the process proceeds to step S109.
  • the suspicious person determination unit 115 determines whether or not the tag constituting the monitoring target P has become undetectable.
  • a suspicious person removes a tag from a product or covers the tag with an electromagnetic shield sheet, radio waves responding to the tag that has been detected until now cannot be detected. If it is not the location of the POS register 300 but the response of the tag that has been detected so far stops, it is determined as a caution or abnormal state.
  • step S109 If the RF tag forming the monitoring target P is not undetectable (step S109: No), the process returns to step S5 and the tracking of the monitoring target P is continued.
  • step S109 If the RF tag forming the monitoring target P is undetectable (step S109: Yes), the process proceeds to step S110.
  • step S110 the suspicious person determination unit 115 determines that the customer constituting the monitoring target P is suspected to be a shoplifter, product replacement, damage, and the like, and stores it in the storage unit 130.
  • the customer's face image is read out and registered as a suspicious person's face, and this flow ends.
  • the RF tag when the RF tag is removed, even if it is determined that the RF tag has stopped moving for a predetermined time or more and an attempt is made to register a face image, the customer has already left the place when the determination is made. Yes. Therefore, when the product tagged with the RF tag starts moving away from the display shelf in the above step S3, or when the movement is stopped for the predetermined time or longer, the image of the customer's face is stored. If it is determined in step S110 that the person is a suspicious person, the stored customer face image is registered as a suspicious person face image. With this flow, the face image of the suspicious person is registered in the face information DB 160.
  • the crime prevention control of the monitoring device 100 is the same as the crime prevention process flow of FIG. 4, and when the customer visits the store again, information on the suspicious person is transmitted to the clerk (employee).
  • the digital register security system 1000 determines whether the product has started moving.
  • Tag movement determination unit 111 customer position information acquisition unit 112 that acquires position information of a customer who moves with the product, and monitoring target that sets the monitoring target P by combining the product with the RF tag and the customer's position information
  • the setting unit 113, the monitoring target tracking unit 114 that tracks the monitoring target P set by the monitoring target setting unit 113, and when the monitoring target P stops at a place other than the POS cash register 300 for a predetermined time or more, or
  • a suspicious person determination unit 115 that registers an image of the customer's face as that of a suspicious person when the tag forming the mark becomes undetectable.
  • a face authentication function unit 116 that performs face authentication for comparing a face image of a person photographed by the monitoring camera 11 with a face image of a suspicious person registered in the face information DB 160, and a salesclerk (employee) close to the position of the suspicious person
  • a transmission control unit 119 for transmitting information on the suspicious person.
  • This configuration allows the customer's face image to be registered as a suspicious person even when the tag is removed from the product or the tag is invalidated.
  • the clerk employee
  • the clerk close to the position of the suspicious person Information on the suspicious person such as the suspicious person's face image is transmitted.
  • a nearby store clerk employee can rush to the site in real time.
  • the video of the suspicious person's face is registered. Therefore, after registration, the suspicious person can be immediately determined by face recognition. it can. Future shoplifting by the suspicious person, which was difficult with the prior art, can be prevented.
  • the monitoring target P is set by combining the product with the RF tag and the location information of the customer. Tags can be attached to any product. For this reason, by setting the monitoring target P, it is possible to monitor a number of products at once, and it is possible to construct a security system that can be easily adopted even in stores with a large number of sales varieties or sales numbers.
  • any face authentication technique of the control unit 110 using the monitoring camera 11 may be used.
  • it can replace with detecting with the RFID reader
  • customer tracking includes electronic tags, i-beacons, Wi-Fi, etc., and these may be combined as in the application example (see FIG. 5).
  • the mobile terminal device When a customer carries a mobile terminal device, the mobile terminal device is installed by installing Wi-Fi equipment in the store, and the mobile terminal device carried by the customer makes a Wi-Fi connection. The customer can be identified. Similarly, since the mobile terminal device can be identified by the equipment of the i-beacon, the customer carrying the mobile terminal device can be identified. In this way, when a customer is identified by the mobile terminal device, the position of the mobile terminal device can be detected by the response of the radio wave from the mobile terminal device, so that the customer carrying the mobile terminal device The position can be detected. To this end, suspicious behavior of customers (e.g. (1) .repetitively reciprocating round trips in specific areas, (2) .pausing unnaturally long before a cashier or display case (3).
  • suspicious behavior of customers e.g. (1) .repetitively reciprocating round trips in specific areas, (2) .pausing unnaturally long before a cashier or display case (3).
  • the surveillance camera 11 since the surveillance camera 11 is provided, it is possible to capture a suspicious appearance of a customer (for example, wearing a mask, sunglasses, or a lookout hat) and mark it as a person requiring attention. Further, since it is detected by the RFID reader 20 that the product to which the RF tag is attached has left the display shelf, if it is detected that the product has unnaturally separated from the display shelf in large quantities, A customer can be marked as a sensitive person. This function can also be realized by the monitoring camera 11. That is, if it is detected by the monitoring camera 11 that the product has disappeared from the display shelf, and it is detected that the product has unnaturally left a large amount, the customer who is present is marked as a person requiring attention. You can also.
  • the names digital register security system and method are used. However, this is for convenience of explanation, and may be a prevent system, a sales system, a security method, or the like.
  • the digital register security system and method of the present invention can also be realized by a program for causing a computer to function as the digital register security system or method.
  • This program may be stored in a computer-readable recording medium.
  • the recording medium on which this program is recorded may be the ROM itself of the digital register security system, or a program reading device such as a CD-ROM drive is provided as an external storage device, and the recording medium is inserted therein. It may be a readable CD-ROM or the like.
  • the recording medium may be a magnetic tape, a flexible disk, a hard disk, an MO / MD / DVD, or a semiconductor memory.
  • the digital register security system, method and program according to the present invention have a great effect when applied to a sales management system capable of effectively reducing shoplifting damage in commercial facilities. Installation in various stores is expected.

Abstract

L'invention concerne un système, un procédé et un programme de sécurité de caisse enregistreuse numérique permettant d'empêcher le vol à l'étalage même lorsqu'une étiquette a été désactivée ou retirée d'un produit. Ledit système de sécurité de caisse enregistreuse numérique (1000) comprend : une unité de détermination de mouvement d'étiquette (111) qui détecte quand un produit sur lequel est fixée une étiquette a été retiré d'une étagère de présentation ; une caméra de surveillance (11) qui capture une image du visage d'un client qui a pris le produit ; une unité de stockage (130) qui sauvegarde provisoirement l'image capturée du visage ; une unité de commande (110) qui détermine si le produit a été payé ; et une unité de détermination de personne suspecte (115) qui vérifie les visages des clients quittant un magasin et qui, si le client susmentionné quitte le magasin sans avoir payé le produit, enregistre l'image du visage du client en tant que visage d'une personne suspecte.
PCT/JP2017/019801 2017-04-28 2017-05-26 Système, procédé et programme de sécurité de caisse enregistreuse numérique WO2018198385A1 (fr)

Priority Applications (1)

Application Number Priority Date Filing Date Title
JP2017538255A JP6245626B1 (ja) 2017-04-28 2017-05-26 デジタルレジスタセキュリティシステム、方法及びプログラム

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
JPPCT/JP2017/017096 2017-04-28
PCT/JP2017/017096 WO2018198376A1 (fr) 2017-04-28 2017-04-28 Système et procédé de sécurité intelligents numériques, et programme

Publications (1)

Publication Number Publication Date
WO2018198385A1 true WO2018198385A1 (fr) 2018-11-01

Family

ID=59854919

Family Applications (2)

Application Number Title Priority Date Filing Date
PCT/JP2017/017096 WO2018198376A1 (fr) 2017-04-28 2017-04-28 Système et procédé de sécurité intelligents numériques, et programme
PCT/JP2017/019801 WO2018198385A1 (fr) 2017-04-28 2017-05-26 Système, procédé et programme de sécurité de caisse enregistreuse numérique

Family Applications Before (1)

Application Number Title Priority Date Filing Date
PCT/JP2017/017096 WO2018198376A1 (fr) 2017-04-28 2017-04-28 Système et procédé de sécurité intelligents numériques, et programme

Country Status (2)

Country Link
JP (1) JP6195331B1 (fr)
WO (2) WO2018198376A1 (fr)

Cited By (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2021015324A (ja) * 2019-07-10 2021-02-12 株式会社ユーボ 食品の注文受渡しシステム
JP2021093649A (ja) * 2019-12-11 2021-06-17 キヤノンマーケティングジャパン株式会社 情報処理装置、情報処理装置の制御方法及びプログラム
WO2021166810A1 (fr) * 2020-02-19 2021-08-26 ファナック株式会社 Système d'affichage ayant une fonction de transition d'affichage d'élément
JP2022518982A (ja) * 2019-12-31 2022-03-18 センスタイム インターナショナル プライベート リミテッド 画像認識方法および装置、ならびにコンピュータ可読記憶媒体
JPWO2022059500A1 (fr) * 2020-09-15 2022-03-24

Families Citing this family (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108289202A (zh) * 2018-01-29 2018-07-17 北京大椽科技有限公司 一种智能网络监控方法及系统
WO2020075283A1 (fr) * 2018-10-11 2020-04-16 株式会社オプティム Système de prédiction de personnes anormales, procédé de prédiction de personnes anormales, et programme
JP2020144738A (ja) * 2019-03-08 2020-09-10 三菱電機株式会社 防犯装置、及び、防犯方法
CA3165133A1 (fr) 2019-10-25 2021-04-29 Sailesh Bharathwaaj Krishnamurthy Suivi de positions en utilisant un systeme de suivi de position echelonnable
CN111260869B (zh) * 2020-01-19 2022-06-10 天翼数字生活科技有限公司 监控视频中视频帧的提取方法、装置和计算机设备
WO2023162041A1 (fr) * 2022-02-22 2023-08-31 日本電気株式会社 Dispositif serveur, système, procédé de commande de dispositif serveur et support de stockage
CN116631133A (zh) * 2023-07-21 2023-08-22 邹城市美安电子科技有限公司 一种基于行为识别的智能视频监控系统

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2004171240A (ja) * 2002-11-20 2004-06-17 Casio Comput Co Ltd 不正監視システムおよびプログラム
JP2005135313A (ja) * 2003-10-31 2005-05-26 Hitachi Ltd 商品管理システム
JP2012242912A (ja) * 2011-05-16 2012-12-10 Ishida Co Ltd 販売管理システム
JP2015176227A (ja) * 2014-03-13 2015-10-05 富士通株式会社 監視方法、監視装置および監視プログラム

Family Cites Families (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2015032230A (ja) * 2013-08-06 2015-02-16 株式会社日立製作所 Rfidと監視カメラを用いた万引き防止システム
JP5871296B1 (ja) * 2015-08-19 2016-03-01 株式会社 テクノミライ スマートセキュリティ・デジタルシステム、方法及びプログラム

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2004171240A (ja) * 2002-11-20 2004-06-17 Casio Comput Co Ltd 不正監視システムおよびプログラム
JP2005135313A (ja) * 2003-10-31 2005-05-26 Hitachi Ltd 商品管理システム
JP2012242912A (ja) * 2011-05-16 2012-12-10 Ishida Co Ltd 販売管理システム
JP2015176227A (ja) * 2014-03-13 2015-10-05 富士通株式会社 監視方法、監視装置および監視プログラム

Cited By (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2021015324A (ja) * 2019-07-10 2021-02-12 株式会社ユーボ 食品の注文受渡しシステム
JP2021093649A (ja) * 2019-12-11 2021-06-17 キヤノンマーケティングジャパン株式会社 情報処理装置、情報処理装置の制御方法及びプログラム
JP2022518982A (ja) * 2019-12-31 2022-03-18 センスタイム インターナショナル プライベート リミテッド 画像認識方法および装置、ならびにコンピュータ可読記憶媒体
JP7053856B2 (ja) 2019-12-31 2022-04-12 センスタイム インターナショナル プライベート リミテッド 画像認識方法および装置、ならびにコンピュータ可読記憶媒体
WO2021166810A1 (fr) * 2020-02-19 2021-08-26 ファナック株式会社 Système d'affichage ayant une fonction de transition d'affichage d'élément
JPWO2022059500A1 (fr) * 2020-09-15 2022-03-24
WO2022059500A1 (fr) * 2020-09-15 2022-03-24 株式会社日立国際電気 Système de surveillance et procédé de surveillance
JP7354461B2 (ja) 2020-09-15 2023-10-02 株式会社日立国際電気 監視システム及び監視方法

Also Published As

Publication number Publication date
JPWO2018198376A1 (ja) 2019-06-27
JP6195331B1 (ja) 2017-09-13
WO2018198376A1 (fr) 2018-11-01

Similar Documents

Publication Publication Date Title
JP6195331B1 (ja) デジタルスマートセキュリティシステム、方法及びプログラム
JP5871296B1 (ja) スマートセキュリティ・デジタルシステム、方法及びプログラム
US7239241B2 (en) Method and system for inventory control
US8477033B2 (en) Inventory control
JP5780570B1 (ja) デジタルロス・アクシデントデフェンスシステム、方法及びプログラム
US8773266B2 (en) RFID tag reader station with image capabilities
WO2016103332A1 (fr) Système, procédé et programme de sécurité numérique à localisation
JP5780569B1 (ja) デジタルロス・デフェンスセキュリティシステム、方法及びプログラム
US20080246613A1 (en) System and method for wireless security theft prevention
US11361642B2 (en) Building system with sensor-based automated checkout system
JP4925419B2 (ja) 情報収集システム、及び、モバイル端末
JP6245626B1 (ja) デジタルレジスタセキュリティシステム、方法及びプログラム
US10453318B1 (en) Reduction of theft in a venue based on a dynamically updated high-shrink item library
JP4865346B2 (ja) 監視システム及び監視方法
JP3979902B2 (ja) 監視映像配信システムおよび監視映像配信方法
JP4244221B2 (ja) 監視映像配信方法及び監視映像配信装置並びに監視映像配信システム
US10319204B1 (en) Systems and methods for retracing shrink events
JP3160430U (ja) 不審者警報システム
WO2018198250A1 (fr) Système, procédé et programme de gains/sécurité intelligents numériques
KR20140119368A (ko) 매장 관리 및 출입 통제 시스템
WO2021186751A1 (fr) Système, procédé, et programme de sécurité de fichage automatique numérique
CN114424262A (zh) 使用图像数据的射频识别(rfid)标签位置验证

Legal Events

Date Code Title Description
ENP Entry into the national phase

Ref document number: 2017538255

Country of ref document: JP

Kind code of ref document: A

121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 17907298

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 17907298

Country of ref document: EP

Kind code of ref document: A1