WO2020213058A1 - Digital smart defense security system, method, and program - Google Patents

Digital smart defense security system, method, and program Download PDF

Info

Publication number
WO2020213058A1
WO2020213058A1 PCT/JP2019/016324 JP2019016324W WO2020213058A1 WO 2020213058 A1 WO2020213058 A1 WO 2020213058A1 JP 2019016324 W JP2019016324 W JP 2019016324W WO 2020213058 A1 WO2020213058 A1 WO 2020213058A1
Authority
WO
WIPO (PCT)
Prior art keywords
person
suspicious
digital smart
security
security system
Prior art date
Application number
PCT/JP2019/016324
Other languages
French (fr)
Japanese (ja)
Inventor
和夫 三輪
Original Assignee
株式会社 テクノミライ
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 株式会社 テクノミライ filed Critical 株式会社 テクノミライ
Priority to PCT/JP2019/016324 priority Critical patent/WO2020213058A1/en
Priority to JP2019547539A priority patent/JPWO2020213058A1/en
Publication of WO2020213058A1 publication Critical patent/WO2020213058A1/en

Links

Images

Classifications

    • GPHYSICS
    • G08SIGNALLING
    • G08BSIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
    • G08B13/00Burglar, theft or intruder alarms
    • G08B13/16Actuation by interference with mechanical vibrations in air or other fluid
    • GPHYSICS
    • G08SIGNALLING
    • G08BSIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
    • G08B15/00Identifying, scaring or incapacitating burglars, thieves or intruders, e.g. by explosives
    • GPHYSICS
    • G08SIGNALLING
    • G08BSIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
    • G08B25/00Alarm systems in which the location of the alarm condition is signalled to a central station, e.g. fire or police telegraphic systems
    • G08B25/01Alarm systems in which the location of the alarm condition is signalled to a central station, e.g. fire or police telegraphic systems characterised by the transmission medium
    • G08B25/04Alarm systems in which the location of the alarm condition is signalled to a central station, e.g. fire or police telegraphic systems characterised by the transmission medium using a single signalling line, e.g. in a closed loop

Definitions

  • the present invention relates to a digital smart defense security system, a method and a program for taking a picture of a security area with a surveillance camera to prevent crime.
  • Patent Document 1 states, "As an alarm device for detecting a picking action, a picking action detection sensor (vibration sensor) detects a vibration sound due to the picking action, and when such a vibration sound is detected, an alarm is given. Was output to call the attention of those around (paragraph 0002). " The technique of Patent Document 1 relates to an alarm device that outputs an alarm through a built-in speaker when a picking action is detected.
  • An object of the present invention is to provide a digital smart defense security system, method and program capable of outputting a prompt and appropriate alarm according to the position of a person in a security area.
  • the digital smart defense security system provides a person detecting means for detecting a person in a security area in which a plurality of areas are set according to the degree of danger, and a person detected by the person detecting means. It is characterized by providing a notification means for notifying the presence of a suspicious person while giving a warning by voice corresponding to the area.
  • a person in a security area set according to the degree of danger is determined and a voice warning is given according to the degree of danger, so a quick and appropriate alarm is output according to the position of the person in the security area.
  • a suspicious person impersonating a courier, a salesman, a bank clerk, etc. may visit the house.
  • the suspicious person since a voice corresponding to the degree of danger is given according to the position of the suspicious person, the suspicious person can hesitate the suspicious act or repel the suspicious person.
  • a voice recognition means for acquiring the voice of the conversation and determining that the content of the conversation is suspicious is provided, and the reporting means is determined by the voice recognition means that the content of the conversation is suspicious. In response to this, by reporting the existence of a suspicious person, it is possible to prevent the suspicious person from entering the house. Even if it cannot be determined that the person is a suspicious person only by determining the position of the suspicious person in the security area, it can be determined that the person is a suspicious person from the conversation with the suspicious person.
  • Conversations are not limited to people within the security zone, as do telephone conversations.
  • the voice recognition means recognizes the voice of the conversation of the intercom installed at the entrance, and determines that the visitor impersonating a delivery person, a salesman, a bank employee, etc. is a suspicious person through the conversation of the intercom. It is possible to prevent suspicious persons from entering the house.
  • An ID terminal detecting means for detecting an ID (Identification) terminal possessed by a non-intruder is provided, and the reporting means does not report a person who possesses the ID terminal detected by the ID terminal detecting means, for example. It is possible to detect the smartphones of family members and related persons and exclude them from suspicious persons, reduce unnecessary reports, and effectively monitor them. In addition, resources for monitoring can be reduced to reduce costs.
  • the voice recognition means can determine a suspicious person from a telephone conversation by recognizing the voice of a telephone call, and can prevent apo-den robbery and transfer fraud.
  • a suspicious vocabulary storage means for storing a vocabulary used in a suspicious conversation is provided, and the voice recognition means collates the acquired word appearing in the voice with the vocabulary of the suspicious vocabulary storage means, and the content of the conversation is By determining that it is suspicious, the accuracy of suspicious person determination can be improved, and apo-electric robbery and transfer fraud can be reliably prevented.
  • the digital smart defense security method of the present invention has a person detection step for detecting a person in a security area in which a plurality of areas are set according to the degree of danger, and a person detected by the person detection step. It is characterized by providing a notification step for notifying the presence of a suspicious person while giving a warning by voice corresponding to the area.
  • the present invention relates a computer to a person detecting means for detecting a person in a security area in which a plurality of areas are set according to a degree of danger, and a person detected by the person detecting means in the area. It is a program to function as a digital smart defense security system equipped with a notification means for notifying the existence of a suspicious person while giving a warning with a corresponding voice.
  • FIG. 5 is a flowchart showing a function of determining the attention level of a call partner by voice recognition in Application Example 7 of the digital smart defense security system according to the embodiment of the present invention.
  • FIG. 1 is a block diagram showing a configuration of a digital smart defense security system according to an embodiment of the present invention.
  • This digital smart defense security system is suitable for application to business establishments that require a high degree of management, such as residences, corporate offices, factories, research institutes, information processing rooms, and money collection rooms.
  • the digital smart defense security system 1000 includes one surveillance camera 11 (photographing means) installed in each of the security areas, a human sensor 20, and Wi-installed in the security area.
  • Fi Wireless Fidelity
  • Wi-Fi master unit 30, beacon master unit 40, mobile terminal device 50 (ID (Identification) terminal) carried by related parties (family members), and the entire system It includes a monitoring device 100 to control and an AI (Artificial Intelligence) accelerator (Accelerator) 200 (human detection means).
  • the security area is a security area (security target area), and includes, for example, a site, a front door and a balcony for a residence, and an elevator hall, a balcony and a window for an office.
  • the monitoring device 100 is installed in the security area, it may be installed outside via a network (not shown).
  • a network not shown.
  • the monitoring device 100 is installed on a server on the network, a plurality of security areas can be monitored.
  • the surveillance camera 11 captures an image (two-dimensional) of the security area specified in two or three dimensions.
  • a part or all of the surveillance camera 11 is a PTZ camera having a PTZ (pan / tilt / zoom) function, and is remotely controlled by the surveillance device 100.
  • the surveillance cameras 11 are installed around the outer wall of the security target building, for example, at the entrance / exit where an intruder can enter / exit, the window opening, the outer periphery of the site boundary, and the corresponding site area.
  • the image taken by the surveillance camera 11 is output to the surveillance device 100 and recorded in the recording unit 160.
  • the motion sensor 20 is a thermo camera, an infrared camera, or the like, and detects the temperature of a sensing object in the security area to detect a suspicious person in the security area.
  • the Wi-Fi master unit 30 uses Wi-Fi to exchange information with the Wi-Fi slave unit 51 of the mobile terminal device 50. Further, the Wi-Fi master unit 30 can acquire position information by Wi-Fi positioning, that is, can acquire position information using a Wi-Fi access point and a predetermined position information service.
  • the beacon master unit 40 is a BLE transmitter installed at an entrance or the like and sends a beacon signal containing an individual identification code by BLE (Bluetooth Low Energy).
  • BLE is a wireless technology that detects proximity.
  • BLE is composed of a combination of a beacon master unit 40, which is a beacon device on the transmitting side, and an application of a mobile terminal device 50 (corresponding to the beacon slave unit 52 described later) that supports radio wave reception from the beacon master unit 40.
  • the BLE transmits unique ID information necessary for identification, and responds only to the application associated with the ID information of the mobile terminal device 50.
  • the application of the mobile terminal device 50 registers the same identifier as the beacon master unit 40.
  • the application (beacon slave unit 52) of the mobile terminal device 50 stands by in the background by executing an application equipped with a BLE function, and excites a predetermined action when approaching the beacon of the beacon master unit 40.
  • the mobile terminal device 50 is carried by a family member or the like.
  • the mobile terminal device 50 is, for example, a smartphone 50a, a tablet 50b, a notebook computer 50c, or the like.
  • the mobile terminal device 50 is also a mobile phone, a PHS (Personal Handy-Phone System), a PDA (Personal Digital Assistants), a dedicated terminal, or the like.
  • the mobile terminal device 50 can be used by a family member or the like in various places (that is, the current position), and receives an e-mail or a video including a moving image from the monitoring device 100 via a telephone line (not shown). It is possible.
  • the mobile terminal device 50 assumes the use of a smartphone 50a (ID terminal), and each individual can use it in various places (that is, the current position).
  • One of the mobile terminal devices 50 is located at a security company (not shown).
  • the smartphone 50a has a digital smart defense security application (hereinafter referred to as "security application”). If the security application is started by the background processing of each application, for example, it is via the communication carrier network (fixed network), the web service cloud 300 (see Fig. 3 below), or the Internet 303 (see Fig. 3 below). , The cloud server 301 on the web service cloud 300 (see FIG. 3 below) can be connected, and the telop about the suspicious person can be received from the cloud server 301. The smartphone 50a can notify a telop in which a suspicious person is detected on a standby screen or the like.
  • security application a digital smart defense security application
  • the smartphone 50a includes a Wi-Fi individual identification device (hereinafter referred to as a "Wi-Fi slave unit") 51, and a GPS 53 that captures the positions of related parties.
  • the smartphone 50a may be provided with the beacon slave unit 52.
  • the smartphone 50a may include any one of the Wi-Fi slave unit 51, the beacon slave unit 52, and the GPS 53.
  • the Wi-Fi slave unit 51 receives and individually identifies the radio waves of the Wi-Fi master unit 30 installed in the business facility.
  • the monitoring device 100 stores the arrangement information of the Wi-Fi master unit 30 installed in the facility as safety-related information.
  • the Wi-Fi slave unit 51 approaches the Wi-Fi master unit 30, it is possible to determine the ID and position of the person who carries the mobile terminal device 50.
  • the beacon slave unit 52 is an application of the mobile terminal device 50 that supports reception of radio waves from the beacon master unit 40.
  • the beacon master unit 40 transmits a beacon (unique ID information necessary for identification), and the application (beacon slave unit 52) of the mobile terminal device 50 excites a predetermined action when approaching the beacon of the beacon master unit 40. To do.
  • the GPS 53 receives radio waves of position information from GPS satellites and the like.
  • the GPS 53 acquires the position information by calculating the current position information as three parameters of latitude, longitude and altitude from the information received via the GPS antenna.
  • the acquired position information is timely transmitted to the monitoring device 100.
  • an example using GPS satellites is shown as a means for acquiring position information, but a method using a positional relationship with a base station other than GPS may also be used.
  • a method using a positional relationship with a base station other than GPS may also be used.
  • the mobile terminal device 50 which is a mobile terminal
  • a base station and a mobile phone communication network are used in place of or in combination with GPS53. It is also possible to send and receive information to and from the mobile phone company server via the mobile phone company and acquire the current location information of the own terminal from the proximity confirmation.
  • location information acquisition by Wi-Fi positioning that is, location information acquisition using a Wi-Fi access point and a predetermined location information service may be used.
  • the monitoring device 100 is installed in the residence of a person concerned (for example, a family member) and centrally manages the security area.
  • the monitoring device 100 may be a general server computer, a personal computer, or the like.
  • the monitoring device 100 includes a control unit 110, an input unit 120, a storage unit 130, a dictionary 135 with appearance frequency (suspicious vocabulary storage means), a display unit 140, an output unit 150, and a recording unit 160 (recording means).
  • a registrant information DB (database) 165, an image processing unit 170, an interface (I / F) unit 180, and a communication unit 190 are provided, and each unit is connected by a bus 195.
  • control unit 110 shall read each program from the ROM as necessary, load it into the RAM, and execute each function (described later).
  • Each program may be stored in the storage unit 130 in advance, or may be incorporated into the monitoring device 100 when necessary via another storage medium or communication medium.
  • the control unit 110 is composed of a CPU (Central Processing Unit) and the like, controls the entire monitoring device 100, executes a control program, and functions as a digital smart defense security system. The detailed configuration of the control unit 110 will be described later.
  • CPU Central Processing Unit
  • the input unit 120 is an input device for the user of the monitoring device 100 to input instructions and the like, such as a keyboard, a mouse, a touch panel provided on the screen of the display unit 140, and a microphone.
  • the storage unit 130 is composed of memories such as ROM (ReadOnlyMemory), RAM (RandomAccessMemory), and EEPROM (ElectricallyErasableProgrammableRead-OnlyMemory), and stores various data and programs used by the control unit 110.
  • the storage unit 130 stores still images or moving images received from the surveillance camera 11, various data and programs used by the control unit 110, and the like.
  • the dictionary 135 with frequency of appearance is a dictionary with frequency of appearance of vocabulary used in special fraud, apoden robbery, foreclosure, foreclosure and burglary (hereinafter referred to as "special fraud / apoden robbery") (FIG. 12). reference).
  • the frequency-appearing dictionary 135 stores vocabulary used in suspicious conversations such as special fraud and apo-den robbery.
  • the dictionary 135 with appearance frequency may use a part of the memory area of the storage unit 130.
  • the display unit 140 displays the operating status of the monitoring device 100, the image received from the monitoring camera 11, the GUI (Graphical User Interface) for operating the monitoring device 100, and the like.
  • the output unit 150 is, for example, an audio interface, and outputs an audio signal from the monitoring device 100 to the sound system 158 in the security area.
  • an audio signal output from the monitoring device 100 to the acoustic system 158 for example, an audio signal input from an audio input device such as a microphone provided in the input unit 120, or music data stored in the storage unit 130 is controlled by the control unit. 110 may be the reproduced audio signal.
  • the sound system 158 includes an amplifier and a plurality of speakers arranged on the premises, and emits a signal input from the monitoring device 100 on the premises.
  • the recording unit 160 is composed of an external storage device such as an HDD (Hard Disk Drive), and records an image in the security area taken by the surveillance camera 11.
  • the recording unit 160 records high image quality for a predetermined short time after shooting, converts it to low image quality after the predetermined short time elapses, and records for a predetermined long time.
  • the registrant information DB 165 stores registrant information such as family members, parents, managers, and visitors.
  • a face information DB (not shown) may be set up separately from the registrant information DB 165 to store face images (face information) of suspicious persons, store personnel, and the like.
  • Basic data such as the face of a person registered in this face information DB is obtained from a headquarters, a head office, a security company, etc. (not shown) via the I / F unit 180, and a face information DB is constructed.
  • mutual face information DB can be updated to the latest face image (face information) by exchanging information with the headquarters, head office, security company, etc. (not shown).
  • an image correspondence DB (not shown) that stores each position in two dimensions of the image taken by the surveillance camera 11 and each position in the three-dimensional space taken by the surveillance camera 11 in association with each other.
  • the control unit 110 stores the shape defined in the three-dimensional space in the image correspondence DB in association with it by a projection transformation that projects it on a two-dimensional surface.
  • the image-corresponding DB may use a part of the memory area of the storage unit 130.
  • the image processing unit 170 is composed of a DSP (Digital Signal Processor) or the like, and performs predetermined processing on the received image. Predetermined processing includes contour extraction, image resizing, resolution conversion processing, and the like.
  • DSP Digital Signal Processor
  • the image captured by the surveillance camera 11 in 1 second is, for example, a 5-frame image, the 1/5 second image, the 2/5 second image, the 3/5 second image, the 4/5 second image, and the 5/5 second image.
  • the size of the moving object can be known by inputting the outer shape line of the object in the motion of 10 images.
  • the image processing unit 170 processes the image data taken by the surveillance camera 11 and outputs the image in the security area.
  • the I / F unit 180 connects each surveillance camera 11 arranged in the security area with the surveillance device 100. Further, the I / F unit 180 is connected to a headquarters, a head office, a security company, etc. (not shown) by a network or a dedicated line.
  • the communication unit 190 transmits / receives data to / from the mobile terminal device 50 via the base station.
  • the communication unit 190 has a wireless communication function, and is connected to a control board using, for example, a UART (Universal Asynchronous Receiver Transmitter).
  • FIG. 2 is a block diagram of the control unit 110 of the digital smart defense security system according to the embodiment of the present invention.
  • the control unit 110 is configured by a CPU (Central Processing Unit) or the like, controls the entire monitoring device 100, executes a control program, and functions as a digital smart defense security system.
  • the control unit 110 includes a person detection unit 111 (person detection means), a voice recognition unit 112 (voice recognition means), an ID terminal detection unit 113 (ID terminal detection means), and an ID terminal registration unit 114 (ID terminal registration means). ) And a reporting unit 115 (reporting means).
  • the control unit 110 determines whether or not the person has the ID terminal (mobile terminal device 50; smartphone 50a) detected by the ID terminal detection unit 113 (a person who has a predetermined ID such as a family member). ..
  • the control unit 110 excludes the person who possesses the ID terminal detected by the ID terminal detection unit 113 from the suspicious person.
  • the control unit 110 refers to the registrant information DB 165 to determine whether or not the person has the ID terminal (ID of the visitor or the like) registered by the ID terminal registration unit 114, and determines whether or not the person has the ID terminal (ID of the visitor or the like). ) Is excluded from suspicious persons.
  • the control unit 110 determines the risk of intrusion based on the position of a person in the security area. For example, the risk of intrusion is determined based on where the intruder is on the security belts, the yellow belt Y, the orange belt O, and the red belt R (see the upper parts of FIGS. 8 to 9).
  • the control unit 110 performs an image / voice dialogue or a voice warning according to the degree of danger.
  • the control unit 110 is based on the two-dimensional position of the person and the size of the person (particularly the size of the head of the person) detected by the person detection, and the three-dimensional space of the person by the image correspondence DB (not shown). Detect the position inside. Specifically, the control unit 110 reads the projected shape that has been defined and stored in advance as the shape projected in the three-dimensional space from the image correspondence DB. The control unit 110 performs the inverse conversion of the projection transformation that projects the shape defined in the three-dimensional space onto the two-dimensional plane based on the two-dimensional image of the person detected in the security area and the size of the person. The control unit 110 detects the three-dimensional position by performing the inverse conversion of the projection conversion from the image of one surveillance camera 11.
  • the three-dimensional position can be detected based on the two-dimensional image taken by one surveillance camera 11 and the size information of the detected person.
  • the person detection unit 111 detects a person from the image taken by the surveillance camera 11 and detects the size of the person. Specifically, the person detection unit 111 detects a person in the security area by using the AI accelerator 200 (described later). The human detection unit 111 issues a human detection request to the AI accelerator 200, and the AI accelerator 200 executes an AI calculation other than the CPU and transmits the human detection result to the human detection unit 111. Since high speed is required for human detection, the AI accelerator 200 is used for human detection.
  • the digital smart defense security system 1000 detects an intruder in the security area by detecting a person using the AI accelerator 200.
  • the digital smart defense security system 1000 is extremely high in deep learning by the AI accelerator 200, in particular, by targeting only people, as compared with image recognition by a conventional motion detection type surveillance camera using image difference. Intruder can be detected with high accuracy.
  • the person detection unit 111 detects a person by using the AI accelerator 200, but the person may be detected by the thermo camera (or the motion sensor 20). That is, the motion sensor 20 detects the temperature in the security area. Then, the human detection unit 111 detects the presence of a person (suspicious person candidate) by detecting the body temperature of the person by the motion sensor 20 and detecting the change in the captured image by the surveillance camera 11.
  • the person detection unit 111 may combine the person detection using the AI accelerator 200 and the person detection using the thermo camera (or motion sensor).
  • AI accelerator 200 is used for the entrance, veranda, and windows where high speed of human detection is required, and the site of the boundary between the site and the outside where high speed of human detection is not required is a thermo.
  • the voice recognition unit 112 acquires the voice of the conversation and determines that the content of the conversation is suspicious.
  • the voice recognition unit 112 collates the words appearing in the acquired voice with the vocabulary of the dictionary 135 with appearance frequency, and determines that the content of the conversation is suspicious.
  • the ID terminal detection unit 113 detects an ID (Identification) terminal possessed by a non-intruder.
  • the ID terminal registration unit 114 registers the ID terminal possessed by the visitor or the like in the registrant information DB 165.
  • the reporting unit 115 warns the person detected by the person detecting unit 111 with a voice corresponding to the area, and also notifies the existence of a suspicious person.
  • the reporting unit 115 makes a report according to the degree of danger (degree of caution, degree of urgency).
  • the reporting unit 115 reports the existence of a suspicious person after the voice recognition unit 112 determines that the content of the conversation is suspicious.
  • the reporting unit 115 does not report the person who possesses the ID terminal detected by the ID terminal detecting unit 113.
  • the AI accelerator 200 is a dedicated processor that detects a person, and uses a computing resource other than the CPU.
  • the AI accelerator 200 is, for example, an accelerator for image processing by a processor enhanced with a GPU (Graphics Processing Unit) and signal processing using an FPGA (Field Programmable Gate Array). Further, the AI accelerator 200 executes the calculation of AI (Artificial Intelligence) on a dedicated hardware (for example, GPU).
  • AI Artificial Intelligence
  • the AI accelerator 200 which is a human detection processor
  • the performance of the computer processing by the PC is about 10 times higher, and the intrusion detection is executed quickly.
  • the calculation of AI which has a high calculation load, is left to the AI accelerator 200, which is a dedicated hardware.
  • FIG. 3 is a configuration diagram showing the whole using the digital smart defense security system according to the embodiment of the present invention.
  • the digital smart defense security system 1000 actively cooperates with the cloud server (commercial server) 301 and the cloud server 301 that provide the digital smart defense security service on the web service cloud 300.
  • It has a Push notification server 302 that acquires information and notifies the user's smartphone 50a (portable terminal device; ID terminal).
  • the web service cloud 300 is connected to the Internet 303.
  • the smartphone 50a can transmit texts and images to the cloud server 301 on the web service cloud 300 via the Internet 303.
  • the smartphone 50a receives the push notification from the push notification server 302 via the Internet 303.
  • the cloud server 301 and the push notification server 302 are connected to the smartphone 50a equipped with the security application via a communication carrier network (fixed network) (not shown) such as an LTE / 3G network.
  • a communication carrier network fixed network
  • the digital smart defense security system 1000 detects an intrusion of a suspicious person into the premises and push-notifies the smartphone 50a owned by the person, his / her family, or the like.
  • the security application is activated and the zoom screen of the suspicious person is displayed, and the telop "A suspicious person has been detected at the entrance on the 1st floor" is played.
  • the content is read aloud.
  • the suspicious person is notified by the telop and voice on the screen of the smartphone 50a.
  • the related organizations for example, in an emergency, the related organizations (police, fire department) are notified. In this case, the security company and the head office of the affiliated company are also automatically notified. Also, if there is no urgency or if you want to confirm, only the security company will be notified.
  • FIG. 4 is a diagram showing a security application operation of the digital smart defense security system according to the embodiment of the present invention.
  • a telop that detects a suspicious person is notified on the standby screen or the like of the smartphone 50a.
  • the display of the smartphone 50a is switched to the security application operation display, the zoom screen of the suspicious person is displayed, and the position and situation of the suspicious person "suspicious person at the entrance on the 1st floor" is displayed. ..
  • this telop is read aloud by automatic voice.
  • the display of the smartphone 50a is displayed on four time-series screens as shown on the right side of FIG.
  • FIG. 5 is a flowchart showing a security mode setting process of the monitoring device 100 of the digital smart defense security system 1000. This flow is executed by the control unit 110 (see FIG. 2) of the monitoring device 100.
  • FIG. 6 is a diagram illustrating a security mode.
  • step S1 the security mode (home security, outing security, constant security, etc.) is defined. It is possible to provide a security function according to the security mode.
  • the upper part of FIG. 6 shows the "always-on security mode". When set to the "always-on security mode", the digital smart defense security system 1000 can constantly monitor the status of the security area and prompt people to take appropriate measures. It also has the advantage of not requiring switching of security modes.
  • the lower part of FIG. 6 shows the “outing / home security mode”. "Outing / home security mode” switches between outing security mode and home security mode. For example, the home security mode automatically turns on and off from 23:00 to 5:00. The outing security mode is turned on when going out and turned off when returning home. In the following, the case of "going out / home security mode" will be taken as an example.
  • step S3 it is determined whether or not a change in the security mode has been received from the smartphone 50a (mobile terminal device 50).
  • step S3: Yes security is executed in the security mode instructed in step S4.
  • step S3: No this flow is terminated and the security mode by time is executed in the defined security mode.
  • the "outing / home security mode" of the digital smart defense security system 1000 will be described. As shown in the lower part of FIG. 6, the “outing / home security mode” is set so that the user switches between the outing security mode and the home security mode depending on the time of day. For example, the home security mode automatically turns on and off from 23:00 to 5:00. The outing security mode is turned on when going out and turned off when returning home. By switching the security mode, the user can take measures such as increasing the security strength while going out and lowering the security strength while at home.
  • the digital smart defense security system 1000 can execute security according to the actual situation of the user, and can effectively utilize the resources of the curity system.
  • the "always-on security mode" of the digital smart defense security system 1000 has the following functions. -A function to pre-register smartphone apps for notification and dialogue possessed by parents and managers of children's parents, elderly sons and couples, grandchildren, etc. -Register the visitor in the registrant information DB 165 in advance by designating a schedule such as the date and time. In addition, a verification function using a QR code or the like to indicate to this system that the visitor is a regular visitor. ⁇ When a visitor (courier, postman, neighbor, salesman, bank clerk, etc.) enters the premises of the house, whether the visitor is a pre-registered visitor or neighbor A function to confirm by verification using a QR code or the like (see FIGS. 9 and 29). -If the visitor is unregistered, a function to notify the smartphone of the guardian who has been registered in advance that an unregistered visitor has arrived with an image (see FIG. 29).
  • -A function for performing image / voice dialogue between a doorphone type dialogue system installed at the entrance and a smartphone dialogue system owned by a guardian (see FIGS. 9 and 29).
  • -A function to automatically detect and register unregistered or suspicious calls to the house, and a function to transfer to a guardian's smartphone when it is necessary to judge whether the other party can be trusted (Figs. 11 and 11). See 30).
  • -A function of determining the attention level of the other party by voice recognition see FIGS. 10, 11, 30, and 31).
  • -A function that controls electronic locks at the entrance of a house, etc., and the system detects that a certain period of time, for example, 30 minutes has passed, and automatically locks the housewife when he / she goes out without locking.
  • the guardian is remote. A function to unlock the lock remotely after confirming that the housewife, etc. is the person himself / herself and that no one has threatened him / her with a surveillance camera.
  • FIG. 7 is a diagram showing an example of security in a private house.
  • the digital smart defense security system provides security systems for individuals / apartments, offices, stores, offices, research institutes, information materials rooms, and financial institutions.
  • the main functions are as follows.
  • a security mode home security, outing security, etc.
  • a security function is provided according to the security mode. It has a function to change the security mode depending on the time.
  • An intruder is detected and registered from the image of the surveillance camera 11 installed around the outside of the house.
  • the detected intruder's risk (attention, urgency) is determined, and the user is notified according to the risk (attention, urgency).
  • the security mode is changed from the outdoors by the smartphone 50a. A warning is notified to an intruder through a smartphone 50a, a speaker of a surveillance camera 11, or the like.
  • FIG. 8 is a diagram showing an example of security in an apartment house.
  • a security mode is defined and a security function is provided according to the security mode. It has a function to change the security mode depending on the time.
  • An intruder is detected and registered from the image of the surveillance camera 11 installed on the outer periphery of the living area.
  • the detected intruder's risk (attention, urgency) is determined, and the user is notified according to the risk (attention, urgency).
  • the security mode is changed from the outdoors by the smartphone 50a.
  • a warning is notified to an intruder through a smartphone 50a, a speaker of a surveillance camera 11, or the like.
  • FIG. 9 is a diagram for explaining a warning by automatic voice and a remote dialogue function by image / voice according to the position of an intruder.
  • FIG. 9 shows an "automatic voice warning" of the Digital Smart Defense Security System 1000.
  • FIG. 9 shows a “doorphone type dialogue system” for explanation in comparison with the “automatic voice warning” of the digital smart defense security system 1000 on FIG. 9, and
  • FIG. 9 bottom shows a “security camera type dialogue”. Indicates "system”.
  • the "doorphone type dialogue system” conducts two-way dialogue between the visitor and the guardian by the doorphone by image and voice.
  • the "doorphone type dialogue system” executes a smartphone dialogue application of a mobile terminal (smartphone 50a) carried by a guardian via a cloud dialogue relay system to perform two-way dialogue by image and voice.
  • the "security camera type dialogue system” captures and collects sound of an intruder with a security camera equipped with a microphone, and the family engages in two-way dialogue with the intruder by image and voice.
  • the "security camera type dialogue system” executes a smartphone dialogue application of a mobile terminal carried by a family member via a cloud dialogue relay system to perform two-way dialogue by speaker voice.
  • the digital smart defense security system 1000 accurately positions the position of an intruder who has invaded the security area as X, Y, and Z coordinates based on the image of the camera. Then, the digital smart defense security system 1000 determines that there is a person in the security area and warns with a voice according to the degree of danger (for example, according to the yellow belt Y, the orange belt O, and the red belt R). .. In the above example of FIG. 9, it is determined that the intruder is on the yellow belt Y, the orange belt O, and the red belt R, and an automatic voice warning is given by sending an automatic voice message according to the degree of danger or the situation. Details will be described later in the flow of FIG. 29.
  • the digital smart defense security system 1000 can accurately position the position of an intruder who has invaded the security area as X, Y, and Z coordinates based on the image of the camera.
  • the digital smart defense security processing of the digital smart defense security system 1000 includes (I) "warning by automatic voice according to the position of the intruder, remote dialogue processing by image and voice", and (II) “conversation”. There is “suspicious judgment processing based on the content”.
  • the above (I) and the above (II) may be executed individually or in combination.
  • FIG. 10 is a flowchart showing (I) “remote dialogue processing according to the position of an intruder” of the digital smart defense security system. This flow is executed by the control unit 110 (see FIG. 2) of the monitoring device 100 in the “always-on security mode” set in FIG.
  • step S11 an image of the security area (specific area) specified in three dimensions is taken.
  • the surveillance camera 11 is, for example, a PTZ camera and is remotely controlled by the surveillance device 100.
  • the image taken by the surveillance camera 11 is output to the surveillance device 100.
  • step S12 the person detection unit 111 of the control unit 110 detects a person from the image captured by the surveillance camera 11.
  • the person detection unit 111 requests the AI accelerator 200 to perform [human detection processing] by AI, and the person detection unit 111 waits for the detection result of the person from the AI accelerator 200.
  • the person detection unit 111 may also use the person detection by the thermo camera (or the motion sensor 20).
  • step S13 the control unit 110 determines whether or not a person has been detected in the image captured by the surveillance camera 11.
  • step S13: Yes the process proceeds to step S14. If no person is detected in the image captured by the surveillance camera 11 (step S13: No), this flow ends.
  • control unit 110 determines whether or not the control unit 110 is a person (a person having a predetermined ID such as a family member) who has an ID terminal (mobile terminal device 50; smartphone 50a) detected by the ID terminal detection unit 113 in step S14. To determine. The control unit 110 excludes the person who possesses the ID terminal detected by the ID terminal detection unit 113 from the suspicious person (step S14: No), and proceeds to step S15.
  • step S15 the control unit 110 refers to the registrant information DB 165 and determines whether or not the person has the ID terminal (ID such as a visitor) registered by the ID terminal registration unit 114.
  • the control unit 110 excludes the person who has registered the ID terminal (ID such as a visitor) from the suspicious person (step S15: No), and proceeds to step S16. In this way, when a family member or the like has an ID terminal or when an ID terminal such as a visitor is registered in advance, the subsequent processing is skipped to speed up the processing.
  • step S16 the control unit 110 determines the risk of intrusion based on the position of a person in the security area. For example, the risk of intrusion is determined based on where the intruder is in the yellow belt Y, the orange belt O, or the red belt R (see the upper part of FIGS. 8 to 9). Specifically, the risk of intrusion is determined as follows.
  • the degree of danger can be determined by the movement of a suspicious person.
  • the movements of the suspicious person are, for example, the movement of the eyes and the movement of the neck (detailed later) and the movement of the arm (detailed later). If the movement of the suspicious person is unnatural, it can be determined that the degree of danger (attention, urgency) is high.
  • step S17 the control unit 110 performs an image / voice dialogue or a voice warning according to the degree of danger.
  • the reporting unit 115 makes a report according to the degree of danger (degree of caution, degree of urgency).
  • the report transmits information about the suspicious person to, for example, the smartphone 50a of the person concerned.
  • a message, a mark, highlighted letters, and a color code indicating the degree of danger should be attached according to the degree of danger of the intrusion crime (classification of the degree of danger).
  • change the report destination according to the degree of danger or urgency For example, when an intruder (suspicious person) invades from the roof of the parking lot of the next house over the fence, the intruder is judged to be dangerous and urgent, and the most urgent telop about the intruder is notified. To do.
  • the police will be included in the relevant organizations to be reported. And this report is given priority over the automatic registration process of the suspicious person.
  • a telop with a high urgency of invasion is notified, and when a person is detected outside the yellow belt Y, a telop with a moderate urgency of invasion is notified (Fig. 4).
  • a telop for notifying the existence of a suspicious person is transmitted to the standby screen or the like of the smartphone 50a shown on the left side of FIG.
  • the zoom screen of the suspicious person is displayed, the position and situation of the suspicious person "suspicious person at the entrance on the 1st floor” is displayed, and this telop is read out by automatic voice.
  • step S19 the control unit 110 registers the information of the suspicious person in the security area in the storage unit 130 and ends the process of this flow. As a result, intrusion information of a suspicious person is recorded, which is useful information for crime prevention. If no person is detected from the image taken by the surveillance camera 11 in step S13, if the person has an ID terminal such as a family member in step S14, or if the ID terminal such as a visitor is registered in step S15. If you are the person who did, end this flow.
  • FIG. 11 is a flowchart showing (II) “suspicious determination processing based on the content of conversation” of the digital smart defense security system. This flow is executed by the control unit 110 (see FIG. 2) of the monitoring device 100 in the “always-on security mode” set in FIG.
  • the control unit 110 acquires the voice of the conversation between the intercom and the telephone (details will be described later).
  • the voice recognition unit 112 (see FIG. 2) of the control unit 110 determines the degree of attention of the acquired conversation content by voice recognition.
  • the voice recognition unit 112 determines the degree of attention based on the frequency of appearance of suspicious vocabulary in the contents of conversations on the intercom or telephone (see FIG. 12).
  • the voice recognition unit 112 refers to the dictionary 135 with appearance frequency and determines the content of the conversation by collating words.
  • the collated words are weighted according to their frequency of occurrence. When the frequency of occurrence of words is less than a predetermined threshold value, it is determined that the degree of attention is low. When the frequency of appearance of words is equal to or higher than a predetermined threshold value, it is determined that the degree of attention is high, and when the degree of attention is equal to or higher than a predetermined value, it is determined that the content of the conversation is suspicious.
  • step S22: Yes When the caution level is equal to or higher than the predetermined threshold value (step S22: Yes), the control unit 110 shifts to the alert control in step S23.
  • step S22: No When the degree of attention is smaller than the predetermined threshold value (step S22: No), it is determined that it is normal, and the processing of this flow ends.
  • step S24 the control unit 110 determines whether the acquired voice is that of the intercom. If the acquired voice is not that of the intercom (step S24: No), the process proceeds to step S27. When the acquired voice is that of the intercom (step S24: Yes), in step S25, the control unit 110 refers to the registrant information DB 165 and determines whether or not the registered terminal exists.
  • step S26 the control unit 110 releases the alert control and ends the process of this flow.
  • step S26 the control unit 110 determines in step S27 whether or not the acquired voice is a telephone.
  • step S28 the control unit 110 determines whether or not the content of the conversation is suspicious by collating the content of the conversation with words.
  • step S27: No it is determined that the acquired voice is neither an intercom nor a telephone and is not subject to control, and the processing of this flow is terminated.
  • step S28 the control unit 110 continues the alert control and saves this conversation in step S29.
  • step S30 the control unit 110 notifies the guardian or the like that the content of the conversation is suspicious, and ends the process of this flow.
  • step S28 If the content of the conversation is not a suspicious determination result in step S28 (step S28: No), the alert control is released in step S26 and the present flow ends.
  • FIG. 12 is a diagram illustrating the function of the voice recognition unit 112 of the digital smart defense security system 1000.
  • the digital smart defense security system 1000 acquires the voice of the telephone, and the voice recognition unit 112 refers to the dictionary 135 with the frequency of appearance and determines the content of the conversation by collating words.
  • the dictionary 135 with frequency of appearance is a dictionary with frequency of appearance of vocabulary used in special fraud, apoden robbery, etc.
  • words are associated with the frequency of occurrence of (good_freq / bad_freq).
  • good_freq is the frequency of appearance of vocabulary that appears in a normal call, and the frequency of appearance of vocabulary that appears in a call of bad_freq: special fraud / apo-den robbery.
  • the dictionary 135 with frequency of appearance stores the following vocabulary and the like.
  • vocabularies such as cash (1,000 / 100,000), PIN (100 / 100,000), and account (200 / 90,000) rarely appear. If these bad_freq vocabularies appear, special fraud and apo-den robbery are suspected. If they appear in combination, it can be judged that there is a higher possibility of fraud.
  • the digital smart defense security system 1000 has a technology for determining intrusion in a plane, a technology for determining intrusion in an elevation, and a technology for detecting intrusion in a plane and an elevation as a site intrusion detection and registration function. , Use one or a combination of techniques to verify intrusion over time. The details will be described below.
  • To detect a suspicious person first determine from the camera image whether a human has invaded the premises. After this judgment, it is verified whether the person is a suspicious person and registered / notified.
  • the warning area is inspected in 2D, 3D, and 4D (3D + time) to evaluate and register the degree of risk.
  • the area within the boundary of the site is categorized into the following three according to the degree of risk.
  • ⁇ Yellow belt Y For example, 30 cm to 4 m inside the boundary of the site
  • Orange belt O Between yellow belt Y and red belt R
  • Red belt R For example, 30 cm to 4 m from the wall surface of the house
  • the yellow belt Y (hereinafter referred to as Y in the figure) is in the state of early warning level. Intrusion into this part is notified with a yellow risk, but by adding 3D and 4D additional information and verifying, and notifying if there is an intrusion as a result of verification, detection accuracy and early It becomes possible to deal with.
  • the red belt R (hereinafter, indicated by R in the figure) is a level at which it is necessary to immediately notify when there is an intrusion into the area.
  • FIG. 13 is a diagram showing an example of intruder detection in a plane, in which the left side of FIG. 13 shows a normal state in a plane and the right side of FIG. 13 shows an abnormal state in a plane.
  • a yellow belt Y is set inside the boundary of the site, and a red belt R is set so as to surround the wall surface of the house having the entrance door and the window with the orange belt O which is the security zone sandwiched. ..
  • the right side of FIG. 13 shows an abnormal state in a plane. An intruder has invaded beyond the yellow belt Y to the outside of the red belt R.
  • the inclusion relationship between the intruder and the boundary is evaluated. For example, as shown by the symbol a on the right side of FIG. 13, if the surveillance camera 11 shoots at 10 frames / second, an intruded moving object is detected from the images of 10 frames (see the frame on the right side of FIG. 13). Calculate its position on the plane. If the intruder is certainly detected within the 10 frames (5 frames for a surveillance camera with 5 frames per second), it is determined that the intruder may exist.
  • FIG. 14 is a diagram showing an example of intruder detection on an elevation.
  • FIG. 14 left shows a normal state on an elevation
  • FIG. 14 right shows an abnormal state on an elevation.
  • a yellow belt Y is set inside the boundary of the site
  • a red belt R is set so as to surround the wall surface of the house with the orange belt O sandwiched between them.
  • the height is evaluated from the image of the surveillance camera 11. Evaluate whether this height is a standard human height. For example, as shown by reference numeral b on the right side of FIG.
  • the number of images per second of the surveillance camera 11 is evaluated, and it is certainly determined that the intruder is a human being.
  • By detecting intruders on the elevation it is possible to eliminate the invasion of animals and the false detection of movement due to the wind of planting.
  • FIG. 15 is a diagram showing an example of intruder verification by time, in which the left side of FIG. 15 shows a normal state in time and the right side of FIG. 15 shows an abnormal state in time.
  • the digital smart defense security system 1000 repeats the evaluation every second for the detection of the intruder obtained by the intruder detection on the elevation.
  • an intruder is walking on the yellow belt Y.
  • the digital smart defense security system 1000 determines that the intruder has certainly invaded after the intruder has been continuously detected on the yellow belt Y.
  • FIG. 16 is a diagram showing an example of mapping the site boundary to the camera image
  • FIG. 16 left shows a plan view of the site boundary
  • FIG. 16 right shows an example of mapping the site boundary to the camera image.
  • Mapping is a technique for synthesizing an image generated by CG (Computer Graphics) with a photographic image. When compositing, the CG can be naturally superimposed and composited on the photographic image by making the background portion of the CG transparent.
  • CG Computer Graphics
  • the rotation around the X-axis is called roll
  • the rotation around the Y-axis is called pitch
  • the rotation around the Z-axis is called yaw.
  • the right side of FIG. 16 shows an example of mapping the image of the surveillance camera of reference numeral d on the left side of FIG.
  • the position information of the caution area is projected from the parameters of the camera and clipped by the viewport to find out what part of the image obtained from the surveillance camera is on the site (see the right side of FIG. 16).
  • the viewport represents a two-dimensional limit when recognizing a three-dimensional space as two-dimensional. This corresponds to the range that appears in the picture when the picture is taken with a surveillance camera.
  • the viewport represents the range that can be captured by the surveillance camera.
  • the clipping refers to a process of cutting out an object such as computer graphics represented by three-dimensional data to the size of a viewport.
  • ⁇ Technology for determining intrusion from an elevation size comparison with a pre-registered object>
  • Known security areas such as gate height, car height, vegetation height, and human height (head size, upright height, crouching height, etc.) within the site, which is a mapped security area. Compare the size of a person).
  • FIG. 17 is a diagram illustrating an example of registering the height of something that is in advance on the site.
  • the height of the gate, the height of the car, and the height of the vegetation in the site, which is the mapped security area are registered.
  • the standard size that a person has that is, the height of the person (the size of a known person such as the size of the head, the height of standing upright, the height of crouching, etc.) is an image-compatible DB (not shown).
  • image-compatible DB not shown.
  • the intruder is determined by the image of.
  • FIG. 18 is a diagram illustrating a change in height due to a human condition.
  • Reference numeral e in FIG. 18 indicates an abnormal state in which the height changes.
  • Reference numeral f in FIG. 18 indicates an object (gate, etc.) of various heights registered in the image correspondence DB
  • reference numeral g in FIG. 18 indicates the size of a person in a normal state registered in the image correspondence DB. Indicates the height.
  • FIG. 18 in order to determine the position and three-dimensional height of a human (a prone posture, a sitting posture, a mid-waist posture, a standing posture, etc.), five human bodies, that is, head and face parts.
  • the height of a human is determined by the height of a box in an area (primary line) (see the frame in FIG. 17) surrounding a moving object in an image obtained from a surveillance camera.
  • FIG. 19 is a diagram illustrating a change in height depending on a human condition.
  • Reference numeral h in FIG. 19 indicates a state in which the intruder is stopped
  • reference numeral i in FIG. 19 indicates a state in which the intruder is slowly moving
  • reference numeral j in FIG. 19 indicates a state in which the intruder is moving quickly. Each is shown.
  • the digital smart defense security system 1000 evaluates the alertness of the detected intruder and notifies the user according to the alertness. Corresponds to the above-mentioned “report according to the degree of danger (degree of caution, degree of urgency)" in step S19 of the flow of FIG. Specifically, a judgment technique based on the movement of the eyes and a judgment technique based on the movement of the neck are used. As a result, the digital smart defense security system can evaluate the psychological state of the target whose intrusion is detected in the caution area as a risk level.
  • FIG. 20 is a diagram for explaining the judgment based on the movement of the pupil (left and right).
  • the face can acquire the position of the eyes, nose and mouth by "Facial Landmark Detection".
  • the location of the pupil is determined by the following technique. First, the first image is cut out. This is called a primary line. (2) Next, the image is binarized. The eyes turn black and the white eyes turn white. (3) Divide the eyes into three horizontal areas (right, center, left). The black pixels in each of these areas are counted. This most abundant area is called a secondary line. It is judged that there is a pupil in this secondary line. In other words, it is possible to determine whether the pupil is to the right, to the left, or in the center.
  • FIG. 20 is a diagram for explaining the judgment based on the movement of the neck (left and right). People move their necks when they look to the left or right or look up. This movement of the neck is expressed in the form of the direction of the face. If the rectangle containing the points obtained by facial organ detection is the primary line and the rectangle containing the eyes, nose and mouth is the secondary line, the orientation of the face is determined by the distance between the primary line and the center of gravity of the area surrounded by the secondary line. It can be expressed numerically as a vector.
  • the face By extracting the contours of the eyes, eyebrows, nose, mouth, and chin with respect to the position of the entire face shown in the rectangular frame in the middle of Fig. 20, the face can be turned to the left from the neutral state in the center of Fig. 20.
  • the state of moving the neck to the right and the state of moving the neck so as to turn the face to the right are determined step by step. It should be noted that this technique can also be used to generate a face image in a neutral state based on a face image taken from a certain angle.
  • FIG. 20 is a diagram for explaining the judgment based on the movement of the neck (up and down). This neck movement (up and down) can be judged in the same way as the neck movement (left and right).
  • the state in a short time is tracked. For example, when the position information of the eyes is acquired and recorded at 5 frames or 10 frames per second and the situations of right, center, and left are mixed, it can be determined that the eyes are moving violently. As a result, the digital smart defense security system can determine a state in which it is considered that "a person has moved his eyes violently due to malicious intent" and can register the state.
  • the movement can be determined by using the change in the movement time of the neck. For example, when the vector changes from right to left or from top to bottom in a short time of 2 seconds, it can be determined that the neck has moved violently. As a result, the digital smart defense security system can determine a state in which it is considered that "a person has moved his or her neck violently due to malicious intent" and can register the state. The determination process based on the change in the movement of the pupil and the neck in FIG. 20 will be described later in Application Example 4 in FIG. 28.
  • FIG. 21 is a diagram illustrating temporary security release by BLE.
  • BLE Bluetooth Low Energy
  • the digital smart defense security system has a function of allowing the user and his / her family to invade the alert range by installing an application dedicated to the digital smart defense security system on the smartphone.
  • the user has a predetermined unlock code (installed in the app), and when it detects proximity, this unlock code is sent to the Digital Smart Defense Security System to temporarily cancel the alert mode ( See step S3 in FIG. 5).
  • this unlock code is sent to the Digital Smart Defense Security System to temporarily cancel the alert mode ( See step S3 in FIG. 5).
  • FIG. 22 is a diagram illustrating application example 1 of intrusion detection by the digital smart defense security system 1000.
  • a yellow belt Y is set inside the boundary of the site, and a red belt R is set so as to surround the wall surface of the house having the entrance door and the window with the orange belt O sandwiched between them.
  • FIG. 22 is a plan view, but in order to show the detection of an intruder by an elevation, the intruder is (1) a horizontal position (X-axis, Y-axis) and (2) a vertical position perpendicular to the horizontal position. (Z axis) is represented by a broken line.
  • the intruder detects the above-mentioned "position in the three-dimensional space by the control unit 110". Similarly, intruder detection on the elevation is executed for the suspicious persons (crouching suspicious person, prone suspicious person) in the security zones of the western space and the southern space of FIG. 22.
  • FIG. 23 is a flowchart showing an outline of the operations of the digital smart defense security system 1000, the family, and the suspicious person in the application example 1 of FIG.
  • the flow of the family and the suspicious person in FIG. 23 is not CPU processing, but will be described with step numbers for convenience.
  • the family has step F, and the suspicious person has step SP.
  • step S101 the digital smart defense security system 1000 starts security (step S1).
  • the security mode is changed according to the time in step S102 (step S2) (corresponding to step S2 in FIG. 5).
  • Arbitrary set condition determination is performed (step S103). If the whole family has returned home, such as after 22:00, home security is automatically started in step S104. At 23:00 at night, home security is automatically started in step S105. In the case of 5:00 in the morning, the home security is automatically canceled in step S106.
  • An image is obtained from the surveillance camera (step S107). Obtain a rectangle that surrounds a human in the image (step S108). An intruder is detected and registered from the image of the surveillance camera 11 installed around the outside of the house (step S109). Send a BLE signal to the family's smartphone (step S110).
  • step S111 It is determined whether or not the security is temporarily released by BLE (step S111).
  • the security is temporarily released (step S112). If the security is not temporarily released, the horizontal position and the vertical position of the intruder are acquired in step S113.
  • step S114 It is determined whether or not a suspicious person has invaded the site (step S114).
  • the intruder's caution level detected in step S115 (corresponding to the “risk level determination” in step S17 in FIG. 10) is evaluated and used according to the caution level. Create information to notify the person.
  • step S116 the family's smartphone is notified and notified (corresponding to the “report” in step S18 of FIG. 10), and the process returns to step S102.
  • step F1 A family member or a related person sets the security mode (step F1). When the family is absent, use out-of-home security, and when the family is at home, use home security (see the bottom of Fig. 6).
  • the family security mode setting (step F1) information is transmitted to the digital smart defense security system 1000, and the digital smart defense security system 1000 starts security (step S1).
  • An intruder invades the yellow belt Y (step F2). For example, a suspicious person invades the yellow belt Y on the north side shown in FIG.
  • the digital smart defense security system 1000 obtains an image from a surveillance camera (step S107).
  • step F3 It is determined whether the intruder is a family member (step F3). If the intruder is a family member, the family member is inside the yellow belt Y (step F4). For example, a family is in the yellow belt Y on the north side shown in FIG.
  • the digital smart defense security system 1000 sends a BLE signal to the family's smartphone (step S110), and the family's smartphone receives the BLE signal (step F5).
  • step F6 the family member or the person concerned changes the security mode from the outdoors using the smartphone. This is because even if the family is in Yellow Belt Y, they are not suspicious, so the security is temporarily released. Act freely on the premises (step F7).
  • step F8 Receive a notification from the Digital Smart Defense Security System 1000 on your smartphone (step F8).
  • a warning is notified to an intruder from the speaker of the smartphone or the surveillance camera (step F9).
  • a suspicious person has entered the yellow belt Y (step SP1).
  • a suspicious person takes a prone posture, a sitting posture, a mid-waist posture, a standing posture, etc. on the premises (step SP2).
  • the suspicious person's eyes wander left and right (step SP3).
  • a suspicious person quickly shakes his head from side to side (step SP4).
  • a suspicious person quickly shakes his head up and down (step SP5).
  • the movements of these suspicious persons are sent to the digital smart defense security system 1000, and the digital smart defense security system 1000 determines the degree of danger (attention, urgency) based on the movements of the suspicious person.
  • the digital smart defense security system 1000 can notify family members and related organizations of the level according to the degree of danger (degree of caution, degree of urgency).
  • FIG. 24 is a diagram illustrating application example 2 of intrusion detection by the digital smart defense security system 1000.
  • FIG. 24 shows an example of detecting and registering an intruder from the image of a surveillance camera installed around the outside of the house.
  • FIG. 25 is a flowchart showing the operation of the digital smart defense security system 1000 in the application example 2 of FIG. 24.
  • the left side of FIG. 24 is an image in the case of 10 frames per second before the intrusion of a suspicious person (Before). As shown on the left side of FIG. 24, the suspicious person has not invaded the yellow belt Y.
  • the right side of FIG. 24 is an image of 10 frames per second after the intrusion of a suspicious person (After). As shown on the right side of FIG. 24, the suspicious person invaded the yellow belt Y.
  • the person detection unit 111 of the control unit 110 (see FIG. 2) of the digital smart defense security system 1000 detects a person (suspicious person) from the image taken by the surveillance camera 11.
  • the suspicious person detected on the right side of FIG. 24 is indicated by a rectangular frame, and the approximate two-dimensional distance to the red belt R is indicated by a broken line. As shown on the right side of FIG. 24, a suspicious person who has invaded beyond the yellow belt Y is approaching the red belt R.
  • step S201 an intruder into the red belt R is detected in step S201.
  • the person detection unit 111 of the control unit 110 (see FIG. 2) of the digital smart defense security system 1000 detects a person from the image taken by the surveillance camera 11.
  • step S202 detection of an intruder on the red belt R (for example, in the range of 30 cm to 4 m from the wall surface of the house) is started.
  • the intruder is detected on each of the elevation and the plane by branching into the intruder detection on the elevation (step S203 to S209) and the intruder detection on the plane (step S210 to S214).
  • the control unit 110 refers to the image correspondence DB based on the two-dimensional position of the person and the size of the person detected by the person detection, and is in the three-dimensional space of the person. Detect the position. Then, the control unit 110 is characterized in that the presence of the suspicious person is notified in response to the fact that the position of the detected person in the three-dimensional space is within the three-dimensional security area. Therefore, intruder detection on the elevation is the main operation, and FIG. 24 also shows an image of the intruder on the elevation.
  • step S203 intruder detection on the elevation is started (5 to 10 frames of images per second).
  • step S204 an image for 1 second, for example, an image of 1/10 to 10/10 in the case of 10 frames / second is inspected on an elevation.
  • step S205 It is determined in step S205 whether or not the intrusion is detected. If the intrusion is not detected in step S205, it is determined in step S206 that there is no intrusion, and in step S207 it is determined to be normal, and the processing of this flow is terminated. When an intrusion is detected in step S205, it is determined in step S208 that there is an intrusion, and in step S209, it is determined that there is an abnormality (need attention), and the processing of this flow ends.
  • step S210 intruder detection on a flat surface is started (5 to 10 frames of images per second).
  • step S211 an image for 1 second, for example, an image of 1/10 to 10/10 in the case of 10 frames per second is inspected on a flat surface.
  • step S212 It is determined in step S212 whether or not the intrusion is detected. If the intrusion is not detected in step S212, it is determined in step S213 that there is no intrusion, and in step S207 it is determined that the intrusion is normal, and the processing of this flow ends. When an intrusion is detected in step S212, it is determined in step S214 that there is an intrusion, and in step S209, it is determined that there is an abnormality (need attention), and the processing of this flow ends.
  • FIG. 26 is a diagram illustrating application example 3 of intrusion detection by the digital smart defense security system 1000.
  • FIG. 26 left is a plan view showing intruder detection on a plane
  • FIG. 26 right is an elevation view showing intruder detection on an elevation.
  • FIG. 26 On the right side of FIG. 26, the plan view on the left side of FIG. 26 is projected and converted into a three-dimensional space for detecting an intruder by an elevation by the above-mentioned "technology for determining intrusion in an elevation (see FIGS. 16 to 17)". It is an elevation view.
  • the right side of FIG. 26 shows an intruder inside the car gate.
  • An intruder is represented by a broken line in a horizontal position (X-axis, Y-axis) and a vertical position (Z-axis).
  • FIG. 27 is a flowchart showing an operation in which the digital smart defense security system 1000 detects and registers an intruder from the image of a surveillance camera installed around the outside of the house in the third application of FIG. 26.
  • step S301 intruder detection to the yellow belt Y (within the security applicable site, road boundary, adjacent land boundary, for example, in a range of 30 cm to 4 m) is started.
  • the intruder is detected on each of the elevation and the plane by branching into the intruder detection on the elevation (step S302 to S311) and the intruder detection on the plane (step S210 to S214).
  • step S302 intruder detection on the elevation is started (image of 5 to 10 frames / sec).
  • step S303 an image for 1 second (for example, an image of 1/10 to 10/10 in the case of 10 frames per second) is inspected on an elevation.
  • step S304 an image for 1 second (for example, an image of 10 frames) from 1 second to 2 seconds is inspected on an elevation.
  • step S305 After 1 second has elapsed in step S305, it is determined whether or not two or more frames are detected within 2 seconds. If two or more frames are not detected within 2 seconds after 1 second elapses, it is determined in step S306 that there is no intrusion, and in step S307, it is determined to be normal, and the processing of this flow ends.
  • step S305 If two or more frames are detected within 2 seconds after 1 second has elapsed in step S305, it is determined that there is a possibility of intrusion in step S308, and temporal verification is started in step S309.
  • the temporal verification on the elevation is as follows. That is, in step S310, the next 1-second image (for example, 10 frames) is inspected on an elevation. Next, in step S311, the temporal verification of step S310 is repeated for 1 to 2 minutes to improve the accuracy.
  • step S312 it is determined whether or not the image showing the intruder detection is continuously detected for a certain period of time. If it is continuously detected for a certain period of time, it is determined in step S313 that it is abnormal (need attention), and the processing of this flow is terminated.
  • step S314 intruder detection on a plane is started (image of 5 to 10 frames / sec).
  • step S315 an image for 1 second (for example, an image of 1/10 to 10/10 in the case of 10 frames per second) is inspected on a flat surface.
  • step S316 an image for 1 second (for example, an image of 10 frames) from 1 second to 2 seconds is inspected on a flat surface.
  • step S317 After 1 second has elapsed in step S317, it is determined whether or not two or more frames are detected within 2 seconds. If two or more frames are not detected within 2 seconds after 1 second has elapsed, it is determined in step S319 that there is no intrusion, and in step S307, it is determined to be normal, and the processing of this flow is terminated.
  • step S317 If two or more frames are detected within 2 seconds after 1 second has elapsed in step S317, it is determined that there is a possibility of intrusion in step S319, and temporal verification is started in step S309.
  • the temporal verification on the plane is as follows. That is, in step S320, the next 1-second image (for example, 10 frames) is inspected on a flat surface. Next, in step S321, the temporal verification of step S320 is repeated for 1 to 2 minutes to improve the accuracy.
  • step S312 it is determined whether or not the image showing the intruder detection is continuously detected for a certain period of time. If it is continuously detected for a certain period of time, it is determined in step S313 that it is abnormal (need attention), and the processing of this flow is terminated.
  • the digital smart defense security system 1000 is based on the technology of accurately positioning the position of an intruder who has invaded the security area as X, Y, and Z coordinates based on the image of the camera, and is based on the conventional security. It is possible to solve the problem of false positives in the system.
  • FIG. 28 is a flowchart showing a process of notifying the user according to the degree of attention of the digital smart defense security system 1000 in the application example 4.
  • the flow of FIG. 28 shows the determination process based on the change in the movement of the pupil and the neck of FIG.
  • the facial organ is detected in step S401.
  • the intruder is detected by branching into an intruder detection by the movement of the pupil, an intruder detection by the left / right movement of the neck, and an intruder detection by the up / down movement of the neck.
  • the left and right positions of the pupil are determined based on the images of 5 to 10 frames per second.
  • an image for 1 second for example, an image of 1/10 to 10/10 in the case of 10 frames per second is inspected.
  • an image (for example, 10 frames) for 1 second from 1 second to 2 seconds is inspected.
  • step S405 After 1 second has elapsed in step S405, it is determined whether or not two or more frames are detected within 2 seconds. If two or more frames are not detected within 2 seconds after 1 second has elapsed, it is determined in step S406 that it is normal, and the processing of this flow is terminated.
  • step S407 If two or more frames are detected within 2 seconds after 1 second has elapsed in step S405, it is determined in step S407 that there is a possibility of abnormality, and the process proceeds to step S408.
  • Temporal verification is started in step S408.
  • the temporal verification by the movement of the pupil is as follows. That is, in step S409, the next 1-second image (for example, 10 frames) is inspected. Next, in step S410, the temporal verification of step S409 is repeated for 1 to 2 minutes to improve the accuracy.
  • step S411 it is determined whether or not the image showing the intruder detection is continuously detected for a certain period of time. If it is not continuously detected for a certain period of time, it is determined in step S412 that it is normal, and the processing of this flow ends. If it is continuously detected for a certain period of time, it is determined in step S413 that it is abnormal (need attention), and the processing of this flow is terminated.
  • step S414 the left and right positions of the neck are determined based on the images of 5 to 10 frames per second.
  • step S415 an image for 1 second, for example, an image of 1/10 to 10/10 in the case of 10 frames per second is inspected.
  • step S416 an image (for example, 10 frames) for 1 second from 1 second to 2 seconds is inspected.
  • step S417 After 1 second has elapsed in step S417, it is determined whether or not two or more frames are detected within 2 seconds. If two or more frames are not detected within 2 seconds after 1 second has elapsed, it is determined in step S418 to be normal, and the processing of this flow is terminated.
  • step S419 If two or more frames are detected within 2 seconds after 1 second has elapsed in step S419, it is determined in step S419 that there is a possibility of abnormality, and the process proceeds to step S408.
  • Temporal verification is started in step S408.
  • the temporal verification by the left and right movement of the neck is as follows. That is, in step S420, the next 1-second image (for example, 10 frames) is inspected. Next, in step S421, the temporal verification of step S409 is repeated for 1 to 2 minutes to improve the accuracy.
  • step S411 it is determined whether or not the image showing the intruder detection is continuously detected for a certain period of time. If it is not continuously detected for a certain period of time, it is determined in step S412 that it is normal, and the processing of this flow ends. If it is continuously detected for a certain period of time, it is determined in step S413 that it is abnormal (need attention), and the processing of this flow is terminated.
  • step S422 the upper and lower positions of the neck are determined based on the images of 5 to 10 frames per second.
  • step S423 an image for 1 second, for example, an image of 1/10 to 10/10 in the case of 10 frames per second is inspected.
  • step S424 an image (for example, 10 frames) for 1 second from 1 second to 2 seconds is inspected.
  • step S425 After 1 second has elapsed in step S425, it is determined whether or not two or more frames are detected within 2 seconds. If two or more frames are not detected within 2 seconds after 1 second has elapsed, it is determined in step S426 that it is normal, and the processing of this flow is terminated.
  • step S427 If two or more frames are detected within 2 seconds after 1 second has elapsed in step S425, it is determined in step S427 that there is a possibility of abnormality, and the process proceeds to step S408.
  • Temporal verification is started in step S408.
  • the temporal verification by the vertical movement of the neck is as follows. That is, in step S428, the next 1-second image (for example, 10 frames) is inspected. Next, in step S429, the temporal verification of step S428 is repeated for 1 to 2 minutes to improve the accuracy.
  • step S411 it is determined whether or not the image showing the intruder detection is continuously detected for a certain period of time. If it is not continuously detected for a certain period of time, it is determined in step S412 that it is normal, and the processing of this flow ends. If it is continuously detected for a certain period of time, it is determined in step S413 that it is abnormal (need attention), and the processing of this flow is terminated.
  • FIG. 29 is a flowchart showing an outline of the operation of the digital smart defense security system and the family / guardian of the automatic voice warning according to the person in the security area in the application example 5 of the digital smart defense security system 1000. .. This flow executes a function of performing dialogue and warning by image and voice.
  • the flow of ⁇ family / guardian >> in FIG. 29 is not CPU processing, but will be described with step number F for convenience.
  • the digital smart defense security system 1000 detects that a visitor has invaded the yellow belt Y (see the upper part of FIG. 9) (step S501). It is determined whether the security mode is the constant security mode or the outing / home security mode (see the bottom of FIG. 6) (step S502). In the case of the constant security mode, steps S503 to S511 are executed. Further, in the case of the outing / home security mode, steps S512 to S519 are executed.
  • an automatic voice is used to tell the user, "Please show the QR code to the camera of the doorphone" (step S503).
  • the QR code is identified and collated with the registrant information DB 165 (see FIG. 1) (step S504).
  • the visitor determines whether or not the information has been registered by collating with the registrant information DB 165 (step S505). If the visitor has already been registered (step S505: Yes), the visitor is notified by automatic voice that the visitor has been registered, and the flow process ends (step S506).
  • step S505 When the visitor is not registered in step S505 (step S505: No), the visit of the unregistered person is notified to the guardian's smartphone 50a (see FIG. 1) (step S507). The dialogue with the doorphone is switched to the dialogue with a remote guardian (step S508).
  • step S509 It is detected that a visitor has invaded the red belt R (see the upper part of FIG. 9) (step S509).
  • a message such as "Register your image and notify related organizations" is sent by automatic voice (step S510).
  • the response from the visitor is acquired by the microphone input and sent to the remote guardian's smartphone 50a (step S511).
  • step S512 a message such as "This area is currently being guarded” is sent by automatic voice (step S512). It is detected that a visitor has invaded the orange belt O (see the upper part of FIG. 9) (step S513). A message such as "Please move out of this area immediately” is sent by automatic voice (step S514). Notify the family's smartphone 50a that there is an intrusion (step S515). It is detected that a visitor has invaded the red belt R (see the upper part of FIG. 9) (step S516). A message such as "Register your image and notify related organizations” is sent by automatic voice (step S517). Using the "security camera type dialogue system” (see the bottom of FIG. 9), the response from the intruder is acquired by the microphone input and sent to the remote family smartphone 50a (step S518).
  • both the "doorphone type dialogue system” and the “security camera type dialogue system” are remote from the local system by interposing the cloud dialogue relay system.
  • the image and sound are relayed to and from the smartphone 50a of the above (step S519, step F13).
  • the family / guardian is notified by the Digital Smart Defense Security System 1000 that an unregistered person has visited (step F11). For example, a family member / guardian receives a message from the Digital Smart Defense Security System 1000 stating that a visitor who has invaded Orange Belt O has been warned that "Please leave this area immediately" (Ste S514).
  • the family / guardian is notified by the Digital Smart Defense Security System 1000 that an intruder has entered the premises (step F12).
  • a family member / guardian receives a notification that an unregistered person has visited the site, or a notification that an intruder has entered the premises, he / she uses the smartphone 50a app to "use the application of the smartphone 50a. Please say ", etc.” and listen to the response from the other party (step F13).
  • the family / guardian determines whether the visitor is okay (step F14). If there is no problem with the visitor, listen to the requirements and respond (step F15). If there is a problem with the visitor, attach an image and audio and notify the relevant organizations (step F16).
  • the digital smart defense security system 1000 warns by automatic voice according to the position of an intruder, and realizes a remote dialogue function by image and voice.
  • the Digital Smart Defense Security System 1000 provides the following image privacy protection features in all security modes.
  • -It has a function to protect privacy by applying a mosaic to the images of detected humans such as passers-by and neighboring residents outside the boundary line of the site (road / adjacent land), public roads, adjacent land, etc.
  • Y yellow belt Y
  • orange belt O orange belt
  • red belt R red belt
  • FIG. 30 is a flowchart showing an outline of detection, registration, and forwarding of a suspicious call in Application Example 6 of the Digital Smart Defense Security System 1000. This flow automatically detects suspicious calls, registers them, and forwards them to the guardian's smartphone when judgment is required.
  • the flow of ⁇ guardian >> in FIG. 30 is not CPU processing, but will be described with step number F for convenience.
  • the digital smart defense security system 1000 confirms a call made by a suspicious person to a home telephone targeting an elderly person or the like (step S601).
  • the digital smart defense security system 1000 responds before the elderly or the like picks up the home phone (step S602). It is determined whether or not the caller ID has been obtained (step S603).
  • step S604 the caller ID is collated with the telephone directory (step S604). It is determined whether it is registered or unregistered (step S605). In the case of normal registration, the home telephone is ringed (step S606). When registered as a suspicious person, it is determined that the person is a suspicious person (step S607) and the telephone is hung up (step S608). If not registered, the process proceeds to step S610.
  • step S603 if the caller ID cannot be obtained in step S603, it is determined that the other party is hiding the caller ID (there is a possibility of a suspicious person), and the process proceeds to step S610 (step S609).
  • step S610 you must be a suspicious person with an automatic message such as "You are in wire fraud countermeasure mode. Record this call .... Please tell us your name and business or your institution.” Send a message for those who are suspected of.
  • the caller ID (if obtained) is registered in a predetermined DB (not shown), and telephone recording is started (step S611). It is determined whether or not the name, the matter, and the institution to which the person belongs have been mentioned (step S612). If you do not say your name, requirements, or institution to which you belong, it is determined that you are an unregistered suspicious person (step S613), and you hang up (step S614).
  • step S615 it is determined whether or not the affiliated institution is a police, government office, financial institution, or the like. If the institution to which you belong is a police, government office, financial institution, etc., an automatic message such as "Call back" is sent (step S616) and the call is hung up (step S617).
  • the attention level of the other party is determined by voice recognition (step S618). Specific methods for determining the attention level of the other party by voice recognition have been described with reference to FIGS. 11 to 12.
  • Transfer to the parent's smartphone 50a through a cloud-type IP phone transfer system (not shown) (step S619).
  • a Hikari Denwa router, etc. is installed at home, and (2) a guardian installs an IP phone (VoIP: Voice over Internet Protocol) application on a smartphone. It is necessary to (3) contract services such as number display with the telephone company.
  • VoIP Voice over Internet Protocol
  • ⁇ Guardian ⁇ Receive the incoming call transferred to the smartphone 50a (step F21). Confirm the other party to call (step F22). It is determined whether or not the other party of the call can be trusted (step F23). If the other party on the phone can be trusted, it is judged to be normal (step F24) and the requirements are heard (step F25).
  • step F26 If the other party on the phone cannot be trusted, it is determined that the person is an unregistered suspicious person (step F26), the caller ID is registered as a suspicious person (step F27), and the call is hung up (step F28).
  • the digital smart defense security system 1000 responds before the elderly person or the like picks up the home phone and makes a suspicious call. Is automatically detected and registered, and when a judgment is required, it is transferred to the guardian's smartphone 50a. As a result, it is possible to prevent apo-den robbery and transfer fraud at the water's edge before the elderly or the like pick up the phone at home.
  • FIG. 31 is a flowchart showing a function of determining the attention level of the other party by voice recognition in the application example 7 of the digital smart defense security system 1000. This flow is a specific example of determining the attention level of the other party by voice recognition described in FIGS. 11 to 12.
  • the flow of ⁇ suspicious person >> in FIG. 31 is not CPU processing, but will be described with step number SP for convenience.
  • “Suspicious person” A suspicious person tries to impersonate a child, grandchild, etc. by aiming at an elderly person (step SP11). For example, in the so-called "Oreore fraud," you call by pretending to be your son or grandson and make them believe that you are a true relative, saying that "the phone number has changed” and "the voice has changed because you have a cold.” In some cases, they only tell them that their contact information has changed at the beginning, and after a while, they start talking about "actually, I need money ". After that, explain the situation where you need money right now, such as "I have a traffic accident and have to pay the settlement fee", and tell them to transfer it to the designated account.
  • a suspicious person tries to find out the PIN code of a cash card from an elderly person or the like (step SP12). For example, in the so-called “refund fraud”, the "social insurance secretariat” and “ ⁇ city withholding section” are called while pretending to be employees of a public institution, and "there is a refund of the pension” and "a part of the insurance premium”. Will be back. " Also, at this time, you can read the number of the target balance from the right by saying “It will be the number to receive", or ask for the account number.
  • a suspicious person tries to find out how much cash is in the house by aiming at elderly people (step SP13). For example, in so-called “loan insurance fraud” and “fictitious billing fraud", you send a postcard with a name and logo mark that resembles a major financial institution, and then say "a certain amount of deposit is required first" and so on. Request to transfer. In this way, the suspicious person skillfully guides the elderly and the like to ask for the PIN of the cash card or transfer it to a designated account.
  • the digital smart defense security system 1000 determines the degree of attention of the other party by voice recognition and determines a suspicious person from the telephone conversation to prevent transfer fraud and the like.
  • the digital smart defense security system 1000 sends the voice of the other party to the voice recognition unit 112 (see FIG. 12) (step S701). Time verification of special fraud, apo-den robbery, etc. is started (step S702). Acquire the voice (step S703).
  • the acquired voice is collated with the dictionary 135 (see FIG. 12) with the frequency of appearance of vocabulary used in special fraud, apo-den robbery, etc. (step S704).
  • the digital smart defense security system 1000 acquires the voice of the telephone, and the voice recognition unit 112 refers to the dictionary 135 with the frequency of appearance and determines the content of the conversation by collating words.
  • the vocabulary such as "I”, "phone number has changed”, “settlement fee”, “don't tell anyone”, “transfer”, “urgent”, “refund”, “account”, etc. is normal. When it appears more frequently than the vocabulary that appears in, it is judged that the other party's attention is high.
  • a vocabulary that is directly linked to special fraud such as a "password”
  • these vocabularies appear in combination, it is determined that the possibility of fraud is higher.
  • step S705 Find the probability of special fraud, apo-den robbery, etc. (step S705). It is determined whether or not the probability is above a certain level (for example, 0.9 or above) (step S706). If the probability does not reach a certain level, it is determined to be normal and this flow is processed (step S707).
  • a certain level for example, 0.9 or above
  • step S708 If the probability is above a certain level, it is determined that there is a possibility of abnormality (step S708).
  • the next voice is acquired and a new probability is obtained (step S709).
  • step S710 It is determined whether or not the maximum determination time (for example, 10 seconds) has been reached (step S710). If the maximum determination time has not been reached, the determination is continued and the process returns to step S707 (step S711).
  • step S712 it is determined whether or not the probability is at a certain level or higher (for example, 0.9 or higher) (step S712). If the probability does not reach a certain level, it is determined to be normal and this flow is processed (step S713). If the probability is equal to or higher than a certain level, it is determined that the person is an unregistered suspicious person, and this flow is processed (step S714).
  • the digital smart defense security system 1000 detects a person in a security area in which a plurality of areas are set according to the degree of risk.
  • the person detection unit 111 and the person detected by the person detection unit 111 are warned by the voice corresponding to the area, and the notification unit 115 that reports the existence of the suspicious person and the voice of the conversation are acquired and the conversation is performed.
  • the reporting unit 115 includes a voice recognition unit 112 that determines that the content of the conversation is suspicious, and the reporting unit 115 receives that the voice recognition unit 112 determines that the content of the conversation is suspicious. Report the existence of.
  • a person in a security area set according to the degree of danger is determined and a voice warning is given according to the degree of danger, so a quick and appropriate alarm is output according to the position of the person in the security area.
  • a suspicious person impersonating a courier, a salesman, a bank clerk, etc. may visit the house.
  • the suspicious person since a voice corresponding to the degree of danger is given according to the position of the suspicious person, the suspicious person can hesitate the suspicious act or repel the suspicious person.
  • the voice recognition unit 112 recognizes the voice of the conversation of the intercom installed at the entrance, and through the conversation of the intercom, the visitor who pretends to be a delivery person, a salesman, a bank employee, etc. is a suspicious person. It can be determined that there is, and it is possible to prevent a suspicious person from entering the house.
  • the digital smart defense security system 1000 includes an ID terminal detection unit 113 that detects an ID terminal possessed by a non-intruder, and the reporting unit 115 possesses an ID terminal detected by the ID terminal detection unit 113.
  • the smartphones of family members and related persons can be detected and excluded from suspicious persons, unnecessary reports can be reduced, and monitoring can be effective.
  • resources for monitoring can be reduced to reduce costs.
  • the voice recognition unit 112 can determine a suspicious person from a telephone conversation by recognizing the voice of a telephone call, and can prevent apoden robbery and transfer fraud. It should be noted that telephone conversations can be similarly applied to words in emails.
  • the digital smart defense security system 1000 includes a dictionary 135 with an appearance frequency that stores vocabulary used in suspicious conversations, and the voice recognition unit 112 uses the words that appear in the acquired voice with the appearance frequency.
  • the voice recognition unit 112 uses the words that appear in the acquired voice with the appearance frequency.
  • the digital smart defense security system 1000 includes an AI accelerator 200 which is a computing resource other than the CPU, and the person detection unit 111 of the control unit 110 uses the AI accelerator 200 to detect a person in the security area.
  • the AI accelerator 200 can detect a person existing in a wide security area in real time by executing a person detection process on a dedicated hardware separately from the CPU process.
  • a person can be detected in real time even with a configuration using an inexpensive camera device.
  • the AI accelerator 200 can detect an intruder with extremely high accuracy as compared with image recognition by a moving object detection type surveillance camera using a conventional image difference.
  • the security mode is changed from the outside by using the smartphone 50a, but the user may manually change the security mode.
  • the digital smart defense security process of the digital smart defense security system 1000 includes (I) "warning by automatic voice according to the position of the intruder and remote dialogue processing by image / voice" ( There are (FIG. 9, FIG. 10, FIG. 29, etc.) and (II) "suspicious determination processing based on the content of the conversation" (FIG. 11, FIG. 30, FIG. 31, etc.).
  • the above (I) and the above (II) may be executed individually or in combination.
  • a quick and appropriate alarm can be output mainly according to the position of the person in the security area, and in the above (II), it is mainly determined that the person is a suspicious person with higher accuracy. Can be done.
  • the names of digital smart defense security system and method are used, but this is for convenience of explanation, and may be a monitoring system, a security system, a smart defense security method, or the like.
  • the digital smart defense security system and method of the present invention are also realized by a program for making a computer function as the digital smart defense security system or method of the present invention.
  • the program may be stored on a computer-readable recording medium.
  • the recording medium on which this program is recorded may be the ROM itself of the Digital Smart Defense Security System, or a program reading device such as a CD-ROM drive is provided as an external storage device, and the recording medium is placed therein. It may be a CD-ROM or the like that can be read by inserting it.
  • each of the above configurations, functions, processing units, processing means, etc. may be realized by hardware by designing a part or all of them by, for example, an integrated circuit.
  • each of the above configurations, functions, and the like may be realized by software for the processor to interpret and execute a program that realizes each function.
  • Information such as programs, tables, and files that realize each function can be stored in memory, hard disks, recording devices such as SSDs (Solid State Drives), IC (Integrated Circuit) cards, SD (Secure Digital) cards, optical disks, etc. It can be held on a recording medium.
  • the digital smart defense security system, method and program according to the present invention are expected to be installed in business establishments requiring a high degree of management such as residences, corporate offices, factories, research institutes, information processing rooms, and money counting rooms. Will be done.
  • residential, commercial facilities, offices, hospitals, hotels, financial institutions, factories, laboratories, power plants, air terminals, meeting places, stadiums, museums and other buildings indoors and outdoors, transportation trains, ferries, airplanes The inside of the car is also covered.

Abstract

Provided are a digital smart defense security system, method, and program capable of outputting a quick and appropriate alarm in accordance with the position of a person within a security zone. A digital smart defense security system (1000) comprises: a person detection unit (111) which detects a person present in a security zone in which a plurality of regions are set to correspond to degrees of risk; a reporting unit (115) which warns the person detected by the person detection unit (111), using a sound corresponding to the region in which the person is present, and reports the presence of that suspicious person; and a speech recognition unit (112) which acquires conversational speech and determines whether the content of the conversation is suspicious. If the speech recognition unit (112) determines that the content of the conversation is suspicious, the reporting unit (115) reports the presence of the suspicious person.

Description

デジタルスマート・ディフェンスセキュリティシステム、方法及びプログラムDigital Smart Defense Security Systems, Methods and Programs
 本発明は、監視カメラによりセキュリティ区域内を撮影して防犯を行うデジタルスマート・ディフェンスセキュリティシステム、方法及びプログラムに関する。 The present invention relates to a digital smart defense security system, a method and a program for taking a picture of a security area with a surveillance camera to prevent crime.
 特許文献1には、「ピッキング行為を検知するための警報装置としては、ピッキング行為による振動音をピッキング行為検知センサ(振動センサ)にて検知し、そのような振動音を検知したときに、警報を出力し、周囲にいる人の注意を喚起するようにした(段落0002)」と記載されている。特許文献1の技術は、ピッキング行為の検知時に内蔵スピーカを通じて警報を出力する警報装置に関するものである。 Patent Document 1 states, "As an alarm device for detecting a picking action, a picking action detection sensor (vibration sensor) detects a vibration sound due to the picking action, and when such a vibration sound is detected, an alarm is given. Was output to call the attention of those around (paragraph 0002). " The technique of Patent Document 1 relates to an alarm device that outputs an alarm through a built-in speaker when a picking action is detected.
特開2005-143004号公報Japanese Unexamined Patent Publication No. 2005-143004
 特許文献1に記載の警報装置では、セキュリティ区域内の人を検知したとしてもピッキング行為があるまで検知することがでず、警報を出力することができない。
 また、人が不審者であることをより精度良く判定することが求められている。
 本発明の目的は、セキュリティ区域内の人の位置に応じて迅速かつ適切な警報を出力することができるデジタルスマート・ディフェンスセキュリティシステム、方法及びプログラムを提供することにある。
In the alarm device described in Patent Document 1, even if a person in the security area is detected, it cannot be detected until there is a picking action, and an alarm cannot be output.
In addition, it is required to more accurately determine that a person is a suspicious person.
An object of the present invention is to provide a digital smart defense security system, method and program capable of outputting a prompt and appropriate alarm according to the position of a person in a security area.
 本発明に係るデジタルスマート・ディフェンスセキュリティシステムは、複数の領域が危険度に応じて設定されたセキュリティ区域にいる人を検出する人検出手段と、前記人検出手段によって検出された人に対して、前記領域に対応した音声で警告を行うとともに、不審者の存在を通報する通報手段とを備えることを特徴とする。 The digital smart defense security system according to the present invention provides a person detecting means for detecting a person in a security area in which a plurality of areas are set according to the degree of danger, and a person detected by the person detecting means. It is characterized by providing a notification means for notifying the presence of a suspicious person while giving a warning by voice corresponding to the area.
 この構成により、危険度に応じて設定されたセキュリティ区域にいる人を判定して、危険度に応じた音声で警告するので、セキュリティ区域内の人の位置に応じて迅速かつ適切な警報を出力することができる。例えば、宅配人、セールスマン、銀行員等に成りすました不審者が家に来訪する場合がある。この場合、不審者の位置に応じて危険度に対応した音声で警告するので、不審者であれば、不審行為を躊躇させる、又は不審者を撃退することができる。 With this configuration, a person in a security area set according to the degree of danger is determined and a voice warning is given according to the degree of danger, so a quick and appropriate alarm is output according to the position of the person in the security area. can do. For example, a suspicious person impersonating a courier, a salesman, a bank clerk, etc. may visit the house. In this case, since a voice corresponding to the degree of danger is given according to the position of the suspicious person, the suspicious person can hesitate the suspicious act or repel the suspicious person.
 会話の音声を取得し、前記会話の内容が不審なものであることを判定する音声認識手段を備え、前記通報手段は、前記音声認識手段によって前記会話の内容が不審なものであると判定されたことを受けて、不審者の存在を通報することで、不審者を家へ入れてしまうことを防止することができる。セキュリティ区域内の不審者の位置判定だけでは、不審者であると判断できなかった場合であっても、不審者との会話から不審者であることを判定することができる。会話は、セキュリティ区域内の人には限定されず、電話による会話についても同様である。 A voice recognition means for acquiring the voice of the conversation and determining that the content of the conversation is suspicious is provided, and the reporting means is determined by the voice recognition means that the content of the conversation is suspicious. In response to this, by reporting the existence of a suspicious person, it is possible to prevent the suspicious person from entering the house. Even if it cannot be determined that the person is a suspicious person only by determining the position of the suspicious person in the security area, it can be determined that the person is a suspicious person from the conversation with the suspicious person. Conversations are not limited to people within the security zone, as do telephone conversations.
 前記音声認識手段は、玄関に設置されたインターホンの会話の音声を認識することで、インターホンの会話を通じて、宅配者、セールスマン、銀行員等に成りすました来訪者を不審者であると判定することができ、不審者を家へ入れてしまうことを防止することができる。 The voice recognition means recognizes the voice of the conversation of the intercom installed at the entrance, and determines that the visitor impersonating a delivery person, a salesman, a bank employee, etc. is a suspicious person through the conversation of the intercom. It is possible to prevent suspicious persons from entering the house.
 非侵入者が所持するID(Identification)端末を検出するID端末検出手段を備え、前記通報手段は、前記ID端末検出手段が検出した前記ID端末を所持している人を通報しないことで、例えば家族及び関係者のスマートフォンを検出して不審者から除外し、無駄な通報を削減して監視の実効を図ることができる。また、監視におけるリソースを低減して、低コスト化を図ることができる。 An ID terminal detecting means for detecting an ID (Identification) terminal possessed by a non-intruder is provided, and the reporting means does not report a person who possesses the ID terminal detected by the ID terminal detecting means, for example. It is possible to detect the smartphones of family members and related persons and exclude them from suspicious persons, reduce unnecessary reports, and effectively monitor them. In addition, resources for monitoring can be reduced to reduce costs.
 前記音声認識手段は、電話の通話の音声を認識することで、電話による会話から不審者を判定することができ、アポ電強盗及び振込詐欺を未然に防止することができる。 The voice recognition means can determine a suspicious person from a telephone conversation by recognizing the voice of a telephone call, and can prevent apo-den robbery and transfer fraud.
 不審会話で使用される語彙を格納した不審語彙格納手段を備え、前記音声認識手段は、取得した前記音声に出現する単語を、前記不審語彙格納手段の語彙と照合して、前記会話の内容が不審なものであることを判定することで、不審者判定の精度を高めることができ、アポ電強盗及び振込詐欺を確実に防止することができる。 A suspicious vocabulary storage means for storing a vocabulary used in a suspicious conversation is provided, and the voice recognition means collates the acquired word appearing in the voice with the vocabulary of the suspicious vocabulary storage means, and the content of the conversation is By determining that it is suspicious, the accuracy of suspicious person determination can be improved, and apo-electric robbery and transfer fraud can be reliably prevented.
 また、本発明のデジタルスマート・ディフェンスセキュリティ方法は、複数の領域が危険度に応じて設定されたセキュリティ区域にいる人を検出する人検出ステップと、前記人検出ステップによって検出された人に対して、前記領域に対応した音声で警告を行うとともに、不審者の存在を通報する通報ステップとを備えることを特徴とする。 Further, the digital smart defense security method of the present invention has a person detection step for detecting a person in a security area in which a plurality of areas are set according to the degree of danger, and a person detected by the person detection step. It is characterized by providing a notification step for notifying the presence of a suspicious person while giving a warning by voice corresponding to the area.
 また、本発明は、コンピュータを、複数の領域が危険度に応じて設定されたセキュリティ区域にいる人を検出する人検出手段と、前記人検出手段によって検出された人に対して、前記領域に対応した音声で警告を行うとともに、不審者の存在を通報する通報手段とを備えるデジタルスマート・ディフェンスセキュリティシステムとして機能させるためのプログラムである。 Further, the present invention relates a computer to a person detecting means for detecting a person in a security area in which a plurality of areas are set according to a degree of danger, and a person detected by the person detecting means in the area. It is a program to function as a digital smart defense security system equipped with a notification means for notifying the existence of a suspicious person while giving a warning with a corresponding voice.
 本発明によれば、セキュリティ区域内の人の位置に応じて迅速かつ適切な警報を出力することができる。 According to the present invention, it is possible to output a prompt and appropriate alarm according to the position of a person in the security area.
本発明の実施の形態に係るデジタルスマート・ディフェンスセキュリティシステムの構成を示すブロック図である。It is a block diagram which shows the structure of the digital smart defense security system which concerns on embodiment of this invention. 本発明の実施の形態に係るデジタルスマート・ディフェンスセキュリティシステムの制御部のブロック図である。It is a block diagram of the control part of the digital smart defense security system which concerns on embodiment of this invention. 本発明の実施の形態に係るデジタルスマート・ディフェンスセキュリティシステムを用いた全体を示す構成図である。It is a block diagram which shows the whole using the digital smart defense security system which concerns on embodiment of this invention. 本発明の実施の形態に係るデジタルスマート・ディフェンスセキュリティシステムのセキュリティアプリ動作を示す図である。It is a figure which shows the security application operation of the digital smart defense security system which concerns on embodiment of this invention. 本発明の実施の形態に係るデジタルスマート・ディフェンスセキュリティシステムの警備モード設定処理を示すフローチャートである。It is a flowchart which shows the security mode setting process of the digital smart defense security system which concerns on embodiment of this invention. 本発明の実施の形態に係るデジタルスマート・ディフェンスセキュリティシステムの警備モードを説明する図である。It is a figure explaining the security mode of the digital smart defense security system which concerns on embodiment of this invention. 本発明の実施の形態に係るデジタルスマート・ディフェンスセキュリティシステムの個人住宅における警備の例を示す図である。It is a figure which shows the example of the security in the private house of the digital smart defense security system which concerns on embodiment of this invention. 本発明の実施の形態に係るデジタルスマート・ディフェンスセキュリティシステムの集合住宅における警備の例を示す図である。It is a figure which shows the example of the security in the apartment house of the digital smart defense security system which concerns on embodiment of this invention. 本発明の実施の形態に係るデジタルスマート・ディフェンスセキュリティシステムの侵入者の位置に応じて自動音声により警告及び画像・音声による遠隔からの対話機能を説明する図である。It is a figure explaining the warning by the automatic voice and the remote dialogue function by the image, voice according to the position of the intruder of the digital smart defense security system which concerns on embodiment of this invention. 本発明の実施の形態に係るデジタルスマート・ディフェンスセキュリティシステムのデジタルスマート・ディフェンスセキュリティ処理を示すフローチャートである。It is a flowchart which shows the digital smart defense security processing of the digital smart defense security system which concerns on embodiment of this invention. 本発明の実施の形態に係るデジタルスマート・ディフェンスセキュリティシステムのデジタルスマート・ディフェンスセキュリティ処理を示すフローチャートである。It is a flowchart which shows the digital smart defense security processing of the digital smart defense security system which concerns on embodiment of this invention. 本発明の実施の形態に係るデジタルスマート・ディフェンスセキュリティシステムの音声認識部の機能を説明する図である。It is a figure explaining the function of the voice recognition part of the digital smart defense security system which concerns on embodiment of this invention. 本発明の実施の形態に係るデジタルスマート・ディフェンスセキュリティシステムの平面における侵入者検出の例を示す図である。It is a figure which shows the example of the intruder detection in the plane of the digital smart defense security system which concerns on embodiment of this invention. 本発明の実施の形態に係るデジタルスマート・ディフェンスセキュリティシステムの立面における侵入者検出の例を示す図である。It is a figure which shows the example of the intruder detection in the elevation of the digital smart defense security system which concerns on embodiment of this invention. 本発明の実施の形態に係るデジタルスマート・ディフェンスセキュリティシステムの時間による侵入者検証の例を示す図である。It is a figure which shows the example of the intruder verification by time of the digital smart defense security system which concerns on embodiment of this invention. 本発明の実施の形態に係るデジタルスマート・ディフェンスセキュリティシステムが敷地境界をカメラ画像にマッピングする例を示す図である。It is a figure which shows the example which the digital smart defense security system which concerns on embodiment of this invention maps a site boundary to a camera image. 本発明の実施の形態に係るデジタルスマート・ディフェンスセキュリティシステムが敷地内にあらかじめあるものの高さを登録する例を説明する図である。It is a figure explaining an example of registering the height of the digital smart defense security system which concerns on embodiment of this invention in advance in the site. 本発明の実施の形態に係るデジタルスマート・ディフェンスセキュリティシステムにおける人間の状態による高さの変化を説明する図である。It is a figure explaining the change of height by a human state in the digital smart defense security system which concerns on embodiment of this invention. 本発明の実施の形態に係るデジタルスマート・ディフェンスセキュリティシステムにおける人間の状態による高さの変化を説明する図である。It is a figure explaining the change of height by a human state in the digital smart defense security system which concerns on embodiment of this invention. 本発明の実施の形態に係るデジタルスマート・ディフェンスセキュリティシステムにおける瞳と首の動きの変化による判断を説明する図である。It is a figure explaining the judgment by the change of the movement of the pupil and the neck in the digital smart defense security system which concerns on embodiment of this invention. 本発明の実施の形態に係るデジタルスマート・ディフェンスセキュリティシステムのBLEによる一時的な警備解除を説明する図である。It is a figure explaining the temporary security release by BLE of the digital smart defense security system which concerns on embodiment of this invention. 本発明の実施の形態に係るデジタルスマート・ディフェンスセキュリティシステムによる侵入検出の適用例1を説明する図である。It is a figure explaining the application example 1 of the intrusion detection by the digital smart defense security system which concerns on embodiment of this invention. 図22の適用例1において、デジタルスマート・ディフェンスセキュリティシステム、家族、不審者の動作の概要を示すフローチャートである。It is a flowchart which shows the outline of the operation of a digital smart defense security system, a family, and a suspicious person in the application example 1 of FIG. 本発明の実施の形態に係るデジタルスマート・ディフェンスセキュリティシステムによる侵入検出の適用例2を説明する図である。It is a figure explaining the application example 2 of the intrusion detection by the digital smart defense security system which concerns on embodiment of this invention. 図24の適用例2において、デジタルスマート・ディフェンスセキュリティシステムの動作を示すフローチャートである。It is a flowchart which shows the operation of the digital smart defense security system in the application example 2 of FIG. 本発明の実施の形態に係るデジタルスマート・ディフェンスセキュリティシステムによる侵入検出の適用例3を説明する図である。It is a figure explaining the application example 3 of the intrusion detection by the digital smart defense security system which concerns on embodiment of this invention. 図26の適用例3において、デジタルスマート・ディフェンスセキュリティシステムの動作を示すフローチャートである。It is a flowchart which shows the operation of the digital smart defense security system in the application example 3 of FIG. 本発明の実施の形態に係るデジタルスマート・ディフェンスセキュリティシステムの適用例4において、注意度に応じて利用者に通知する処理を示すフローチャートである。It is a flowchart which shows the process of notifying a user according to the degree of caution in the application example 4 of the digital smart defense security system which concerns on embodiment of this invention. 本発明の実施の形態に係るデジタルスマート・ディフェンスセキュリティシステムの適用例5において、セキュリティ区域内の人に応じた自動音声による警告のデジタルスマート・ディフェンスセキュリティシステム及び家族・保護者の動作の概要を示すフローチャートである。In the application example 5 of the digital smart defense security system according to the embodiment of the present invention, the outline of the operation of the digital smart defense security system and the family / guardian of the automatic voice warning according to the person in the security area is shown. It is a flowchart. 本発明の実施の形態に係るデジタルスマート・ディフェンスセキュリティシステムの適用例6において、不審な電話の検知、登録及び転送の概要を示すフローチャートである。It is a flowchart which shows the outline of detection, registration and transfer of a suspicious call in application example 6 of the digital smart defense security system which concerns on embodiment of this invention. 本発明の実施の形態に係るデジタルスマート・ディフェンスセキュリティシステムの適用例7において、音声認識により通話相手の注意度を判定する機能を示すフローチャートである。FIG. 5 is a flowchart showing a function of determining the attention level of a call partner by voice recognition in Application Example 7 of the digital smart defense security system according to the embodiment of the present invention.
 以下、添付図面を参照しながら本発明を実施するための形態について詳細に説明する。
(実施の形態)
 図1は、本発明の実施の形態に係るデジタルスマート・ディフェンスセキュリティシステムの構成を示すブロック図である。
 本デジタルスマート・ディフェンスセキュリティシステムは、住居、企業の事務所、工場、研究所、情報処理室、金銭集計室等の高度の管理を要する事業所等に適用して好適である。
Hereinafter, embodiments for carrying out the present invention will be described in detail with reference to the accompanying drawings.
(Embodiment)
FIG. 1 is a block diagram showing a configuration of a digital smart defense security system according to an embodiment of the present invention.
This digital smart defense security system is suitable for application to business establishments that require a high degree of management, such as residences, corporate offices, factories, research institutes, information processing rooms, and money collection rooms.
 図1に示すように、デジタルスマート・ディフェンスセキュリティシステム1000は、セキュリティ区域のそれぞれに設置された1つの監視カメラ11(撮影手段)と、人感センサ20と、セキュリティ区域内に設置されたWi-Fi(Wireless Fidelity)ターミナル(以下「Wi-Fi親機」という)30と、ビーコン親機40と、関係者(家族)が携帯する携帯端末装置50(ID(Identification)端末)と、システム全体を制御する監視装置100と、AI(Artificial Intelligence:人工知能)アクセラレータ(Accelerator)200(人検出手段)と、を備える。セキュリティ区域は、警戒エリア(警備対象エリア)であり、例えば、住居であれば敷地、玄関先及びベランダ、オフィスであればエレベータホール、ベランダ及び窓を含む。 As shown in FIG. 1, the digital smart defense security system 1000 includes one surveillance camera 11 (photographing means) installed in each of the security areas, a human sensor 20, and Wi-installed in the security area. Fi (Wireless Fidelity) terminal (hereinafter referred to as "Wi-Fi master unit") 30, beacon master unit 40, mobile terminal device 50 (ID (Identification) terminal) carried by related parties (family members), and the entire system It includes a monitoring device 100 to control and an AI (Artificial Intelligence) accelerator (Accelerator) 200 (human detection means). The security area is a security area (security target area), and includes, for example, a site, a front door and a balcony for a residence, and an elevator hall, a balcony and a window for an office.
 なお、監視装置100は、セキュリティ区域内に設置されているが、図示しないネットワークを介して外部に設置してもよい。監視装置100を、ネットワーク上のサーバに設置すると、複数のセキュリティ区域を監視対象とすることができる。 Although the monitoring device 100 is installed in the security area, it may be installed outside via a network (not shown). When the monitoring device 100 is installed on a server on the network, a plurality of security areas can be monitored.
<監視カメラ11>
 監視カメラ11は、2次元又は3次元で特定されるセキュリティ区域の画像(2次元)を撮影する。
 監視カメラ11の一部又は全部は、PTZ(パン・チルト・ズーム)機能を有するPTZカメラであり、監視装置100により遠隔操作される。監視カメラ11は、セキュリティ該当建物の警備対象の外壁周囲、例えば侵入者が出入可能な出入口、窓開口部、敷地境界外周部、該当敷地エリアの各所に設置される。監視カメラ11が撮影した画像は、監視装置100に出力され、録画部160に記録される。
<Surveillance camera 11>
The surveillance camera 11 captures an image (two-dimensional) of the security area specified in two or three dimensions.
A part or all of the surveillance camera 11 is a PTZ camera having a PTZ (pan / tilt / zoom) function, and is remotely controlled by the surveillance device 100. The surveillance cameras 11 are installed around the outer wall of the security target building, for example, at the entrance / exit where an intruder can enter / exit, the window opening, the outer periphery of the site boundary, and the corresponding site area. The image taken by the surveillance camera 11 is output to the surveillance device 100 and recorded in the recording unit 160.
<人感センサ20>
 人感センサ20は、サーモカメラや赤外線カメラ等であり、セキュリティ区域内の感知対象物の温度を検出して、セキュリティ区域内の不審者を検出する。
<Human sensor 20>
The motion sensor 20 is a thermo camera, an infrared camera, or the like, and detects the temperature of a sensing object in the security area to detect a suspicious person in the security area.
<Wi-Fi親機30>
 Wi-Fi親機30は、Wi-Fiを用いて携帯端末装置50のWi-Fi子機51との間で情報をやり取りする。また、Wi-Fi親機30は、Wi-Fi測位による位置情報取得、すなわちWi-Fiアクセスポイントと所定の位置情報サービスを利用した位置情報を取得できる。
<Wi-Fi master unit 30>
The Wi-Fi master unit 30 uses Wi-Fi to exchange information with the Wi-Fi slave unit 51 of the mobile terminal device 50. Further, the Wi-Fi master unit 30 can acquire position information by Wi-Fi positioning, that is, can acquire position information using a Wi-Fi access point and a predetermined position information service.
<ビーコン親機40>
 ビーコン親機40は、玄関等に設置され、BLE(Bluetooth Low Energy)により個体識別符号の入ったビーコン信号を送るBLE送信機である。
 BLEは、近接を検知する無線技術である。BLEは、発信側のビーコン機器であるビーコン親機40と、ビーコン親機40からの電波受信に対応した携帯端末装置50のアプリ(後記ビーコン子機52に対応する)の組み合わせによって構成される。BLEは、識別に必要な固有のID情報を発信し、携帯端末装置50の当該ID情報に紐付けられたアプリにしか反応しない。携帯端末装置50のアプリは、ビーコン親機40と同じ識別子を登録しておく。携帯端末装置50のアプリ(ビーコン子機52)は、BLE機能を搭載したアプリケーション実行によりバックグラウンドで待機し、ビーコン親機40のビーコンに近接したときに所定アクションを励起する。
<Beacon master unit 40>
The beacon master unit 40 is a BLE transmitter installed at an entrance or the like and sends a beacon signal containing an individual identification code by BLE (Bluetooth Low Energy).
BLE is a wireless technology that detects proximity. BLE is composed of a combination of a beacon master unit 40, which is a beacon device on the transmitting side, and an application of a mobile terminal device 50 (corresponding to the beacon slave unit 52 described later) that supports radio wave reception from the beacon master unit 40. The BLE transmits unique ID information necessary for identification, and responds only to the application associated with the ID information of the mobile terminal device 50. The application of the mobile terminal device 50 registers the same identifier as the beacon master unit 40. The application (beacon slave unit 52) of the mobile terminal device 50 stands by in the background by executing an application equipped with a BLE function, and excites a predetermined action when approaching the beacon of the beacon master unit 40.
[携帯端末装置50]
 携帯端末装置50は、家族などがそれぞれ携帯する。携帯端末装置50は、例えばスマートフォン50a、タブレット50b、又はノートパソコン50cなどである。携帯端末装置50は、このほか、携帯電話、PHS(Personal Handy-Phone System)、PDA(Personal Digital Assistants)、又は専用端末などである。本実施の形態では、携帯端末装置50は、家族などが様々な場所(すなわち現在位置)で使用可能であり、図示しない電話回線を介して監視装置100からのメール又は動画を含む映像等を受信可能である。
[Mobile terminal device 50]
The mobile terminal device 50 is carried by a family member or the like. The mobile terminal device 50 is, for example, a smartphone 50a, a tablet 50b, a notebook computer 50c, or the like. The mobile terminal device 50 is also a mobile phone, a PHS (Personal Handy-Phone System), a PDA (Personal Digital Assistants), a dedicated terminal, or the like. In the present embodiment, the mobile terminal device 50 can be used by a family member or the like in various places (that is, the current position), and receives an e-mail or a video including a moving image from the monitoring device 100 via a telephone line (not shown). It is possible.
 本実施の形態では、携帯端末装置50は、スマートフォン50a(ID端末)の利用を想定しており、各個人が様々な場所(すなわち現在位置)で使用可能である。携帯端末装置50のうちの一つは、図示しない警備会社に配置される。 In the present embodiment, the mobile terminal device 50 assumes the use of a smartphone 50a (ID terminal), and each individual can use it in various places (that is, the current position). One of the mobile terminal devices 50 is located at a security company (not shown).
 スマートフォン50aは、デジタルスマート・ディフェンスセキュリティアプリ(以下、「セキュリティアプリ」という)を有する。セキュリティアプリを、例えば各アプリのバックグランド処理で起動させておくと、通信キャリア網(固定網)、ウェブサービスクラウド300(後記図3参照)、又はインターネット303(後記図3参照)を経由して、ウェブサービスクラウド300上のクラウドサーバ301(後記図3参照)に接続でき、クラウドサーバ301から不審者に関するテロップを受け取ることができる。スマートフォン50aは、待受け画面等に不審者を検出したテロップを通知できる。 The smartphone 50a has a digital smart defense security application (hereinafter referred to as "security application"). If the security application is started by the background processing of each application, for example, it is via the communication carrier network (fixed network), the web service cloud 300 (see Fig. 3 below), or the Internet 303 (see Fig. 3 below). , The cloud server 301 on the web service cloud 300 (see FIG. 3 below) can be connected, and the telop about the suspicious person can be received from the cloud server 301. The smartphone 50a can notify a telop in which a suspicious person is detected on a standby screen or the like.
 スマートフォン50aは、Wi-Fi個別識別機(以下「Wi-Fi子機」という)51と、関係者の位置を捕捉するGPS53と、を備える。
 なお、スマートフォン50aは、ビーコン子機52を備えているものでもよい。又は、スマートフォン50aは、Wi-Fi子機51と、ビーコン子機52と、GPS53とのいずれか一つを備えるものでもよい。
The smartphone 50a includes a Wi-Fi individual identification device (hereinafter referred to as a "Wi-Fi slave unit") 51, and a GPS 53 that captures the positions of related parties.
The smartphone 50a may be provided with the beacon slave unit 52. Alternatively, the smartphone 50a may include any one of the Wi-Fi slave unit 51, the beacon slave unit 52, and the GPS 53.
<Wi-Fi子機51>
 Wi-Fi子機51は、業務施設に設置されたWi-Fi親機30の電波を受信及び個別識別する。監視装置100は、施設内に設置されたWi-Fi親機30の配置情報をセフティ関連情報として記憶している。Wi-Fi子機51がWi-Fi親機30に近接すると、携帯端末装置50を携帯する関係者のIDと位置を判定することができる。
<Wi-Fi handset 51>
The Wi-Fi slave unit 51 receives and individually identifies the radio waves of the Wi-Fi master unit 30 installed in the business facility. The monitoring device 100 stores the arrangement information of the Wi-Fi master unit 30 installed in the facility as safety-related information. When the Wi-Fi slave unit 51 approaches the Wi-Fi master unit 30, it is possible to determine the ID and position of the person who carries the mobile terminal device 50.
<ビーコン子機52>
 ビーコン子機52は、ビーコン親機40からの電波受信に対応した携帯端末装置50のアプリである。ビーコン親機40は、ビーコン(識別に必要な固有のID情報)を発信し、携帯端末装置50のアプリ(ビーコン子機52)は、ビーコン親機40のビーコンに近接したときに所定アクションを励起する。
<Beacon slave unit 52>
The beacon slave unit 52 is an application of the mobile terminal device 50 that supports reception of radio waves from the beacon master unit 40. The beacon master unit 40 transmits a beacon (unique ID information necessary for identification), and the application (beacon slave unit 52) of the mobile terminal device 50 excites a predetermined action when approaching the beacon of the beacon master unit 40. To do.
<GPS53>
 GPS53は、位置情報の電波をGPS衛星等から受信する。GPS53は、GPSアンテナを介して受信した情報より、現在位置情報を、緯度、経度及び高度の3つのパラメータとして算出して位置情報を取得する。取得した位置情報は、適時、監視装置100に送信される。
<GPS53>
The GPS 53 receives radio waves of position information from GPS satellites and the like. The GPS 53 acquires the position information by calculating the current position information as three parameters of latitude, longitude and altitude from the information received via the GPS antenna. The acquired position information is timely transmitted to the monitoring device 100.
 なお、本実施形態では、位置情報を取得する手段として、GPS衛星を利用した例を示したが、GPS以外の、基地局との位置関係を利用した方式でもよい。例えば、モバイル端末である携帯端末装置50として、Android(登録商標)スマートフォンやカメラ付き高機能携帯電話機を使用する場合、GPS53に代えて又は併用して、基地局及び携帯電話通信網(図示省略)を介して携帯電話会社サーバと情報の送受信を行い、接近確認から自端末の現在位置情報を取得することも可能である。 In the present embodiment, an example using GPS satellites is shown as a means for acquiring position information, but a method using a positional relationship with a base station other than GPS may also be used. For example, when an Android (registered trademark) smartphone or a high-performance mobile phone with a camera is used as the mobile terminal device 50, which is a mobile terminal, a base station and a mobile phone communication network (not shown) are used in place of or in combination with GPS53. It is also possible to send and receive information to and from the mobile phone company server via the mobile phone company and acquire the current location information of the own terminal from the proximity confirmation.
 また、Wi-Fi測位による位置情報取得、すなわちWi-Fiアクセスポイントと所定の位置情報サービスを利用した位置情報取得を用いてもよい。 Further, location information acquisition by Wi-Fi positioning, that is, location information acquisition using a Wi-Fi access point and a predetermined location information service may be used.
[監視装置100]
 監視装置100は、関係者(例えば家族)の住居に設置され、セキュリティ区域内を集中管理する。監視装置100は、一般的なサーバ計算機、又はパーソナルコンピュータ等であってよい。
[Monitoring device 100]
The monitoring device 100 is installed in the residence of a person concerned (for example, a family member) and centrally manages the security area. The monitoring device 100 may be a general server computer, a personal computer, or the like.
 監視装置100は、制御部110と、入力部120と、記憶部130と、出現頻度付き辞書135(不審語彙格納手段)と、表示部140と、出力部150と、録画部160(録画手段)と、登録者情報DB(データベース)165と、画像処理部170と、インタフェース(I/F)部180と、通信部190と、を備え、各部はバス195により接続される。 The monitoring device 100 includes a control unit 110, an input unit 120, a storage unit 130, a dictionary 135 with appearance frequency (suspicious vocabulary storage means), a display unit 140, an output unit 150, and a recording unit 160 (recording means). A registrant information DB (database) 165, an image processing unit 170, an interface (I / F) unit 180, and a communication unit 190 are provided, and each unit is connected by a bus 195.
 以降、「○○部は」と主体を記した場合は、制御部110が必要に応じROMから各プログラムを読み出した上でRAMにロードし、各機能(後記)を実行するものとする。各プログラムは、予め記憶部130に記憶されていてもよいし、他の記憶媒体又は通信媒体を介して、必要なときに監視装置100に取り込まれてもよい。 After that, when the subject is described as "○○ part is", the control unit 110 shall read each program from the ROM as necessary, load it into the RAM, and execute each function (described later). Each program may be stored in the storage unit 130 in advance, or may be incorporated into the monitoring device 100 when necessary via another storage medium or communication medium.
 制御部110は、CPU(Central Processing Unit)等により構成され、監視装置100全体を制御するとともに、制御プログラムを実行して、デジタルスマート・ディフェンスセキュリティシステムとして機能させる。制御部110の詳細な構成については、後記する。 The control unit 110 is composed of a CPU (Central Processing Unit) and the like, controls the entire monitoring device 100, executes a control program, and functions as a digital smart defense security system. The detailed configuration of the control unit 110 will be described later.
 入力部120は、キーボード、マウス、表示部140の画面上に設けられたタッチパネル、マイクなど、監視装置100のユーザが指示などを入力するための入力機器である。 The input unit 120 is an input device for the user of the monitoring device 100 to input instructions and the like, such as a keyboard, a mouse, a touch panel provided on the screen of the display unit 140, and a microphone.
 記憶部130は、ROM(Read Only Memory)、RAM(Random Access Memory)、EEPROM(Electrically Erasable Programmable Read-Only Memory)などのメモリからなり、制御部110が用いる各種データ及びプログラムなどを記憶する。記憶部130は、監視カメラ11から受信した静止画又は動画、制御部110が用いる各種データ及びプログラムなどを記憶する。 The storage unit 130 is composed of memories such as ROM (ReadOnlyMemory), RAM (RandomAccessMemory), and EEPROM (ElectricallyErasableProgrammableRead-OnlyMemory), and stores various data and programs used by the control unit 110. The storage unit 130 stores still images or moving images received from the surveillance camera 11, various data and programs used by the control unit 110, and the like.
 出現頻度付き辞書135は、特殊詐欺、アポ電強盗、押売、押買及び空き巣(以下、「特殊詐欺・アポ電強盗」という。)等で使用される語彙の出現頻度付き辞書である(図12参照)。出現頻度付き辞書135は、特殊詐欺・アポ電強盗等の不審会話で使用される語彙を格納する。
 なお、出現頻度付き辞書135は、記憶部130のメモリ領域の一部を使用するものでもよい。
The dictionary 135 with frequency of appearance is a dictionary with frequency of appearance of vocabulary used in special fraud, apoden robbery, foreclosure, foreclosure and burglary (hereinafter referred to as "special fraud / apoden robbery") (FIG. 12). reference). The frequency-appearing dictionary 135 stores vocabulary used in suspicious conversations such as special fraud and apo-den robbery.
The dictionary 135 with appearance frequency may use a part of the memory area of the storage unit 130.
 表示部140は、監視装置100の動作状況をはじめ、監視カメラ11から受信した画像、又は監視装置100を操作するためのGUI(Graphical User Interface)などを表示する。 The display unit 140 displays the operating status of the monitoring device 100, the image received from the monitoring camera 11, the GUI (Graphical User Interface) for operating the monitoring device 100, and the like.
 出力部150は、例えばオーディオインタフェースであり、セキュリティ区域内の音響システム158に対して監視装置100からの音声信号を出力する。監視装置100から音響システム158へ出力する音声信号としては、例えば、入力部120に設けられたマイクなどの音声入力装置から入力された音声信号、又は記憶部130に記憶された音楽データを制御部110が再生した音声信号であってよい。音響システム158は、アンプ及び敷地内に配置された複数のスピーカを備え、監視装置100から入力された信号を敷地内に発声する。 The output unit 150 is, for example, an audio interface, and outputs an audio signal from the monitoring device 100 to the sound system 158 in the security area. As the audio signal output from the monitoring device 100 to the acoustic system 158, for example, an audio signal input from an audio input device such as a microphone provided in the input unit 120, or music data stored in the storage unit 130 is controlled by the control unit. 110 may be the reproduced audio signal. The sound system 158 includes an amplifier and a plurality of speakers arranged on the premises, and emits a signal input from the monitoring device 100 on the premises.
 録画部160は、HDD(Hard Disk Drive)などの外部記憶装置により構成され、監視カメラ11が撮影したセキュリティ区域内の画像を記録する。録画部160は、撮影後所定の短時間は高画質で録画し、その所定の短時間経過後は低画質に変換して所定の長時間まで録画する。 The recording unit 160 is composed of an external storage device such as an HDD (Hard Disk Drive), and records an image in the security area taken by the surveillance camera 11. The recording unit 160 records high image quality for a predetermined short time after shooting, converts it to low image quality after the predetermined short time elapses, and records for a predetermined long time.
 登録者情報DB165は、家族、保護者、管理者、来訪者など登録者情報を蓄積する。
 なお、登録者情報DB165とは、別個に顔情報DB(図示省略)を設置して、不審者、及び店舗関係者等の顔画像(顔情報)を蓄積してもよい。この顔情報DBに登録されている人物の顔などの基礎データは、I/F部180を介して図示しない本部、本社又は警備会社などからデータを入手して、顔情報DBが構築される。また、図示しない本部、本社又は警備会社などと情報を交換して、相互の顔情報DBが最新の顔画像(顔情報)に更新可能である。
The registrant information DB 165 stores registrant information such as family members, parents, managers, and visitors.
In addition, a face information DB (not shown) may be set up separately from the registrant information DB 165 to store face images (face information) of suspicious persons, store personnel, and the like. Basic data such as the face of a person registered in this face information DB is obtained from a headquarters, a head office, a security company, etc. (not shown) via the I / F unit 180, and a face information DB is constructed. In addition, mutual face information DB can be updated to the latest face image (face information) by exchanging information with the headquarters, head office, security company, etc. (not shown).
 また、監視カメラ11によって撮影された画像の2次元の各位置と監視カメラ11によって撮影された3次元空間内の各位置とを対応付けて記憶する画像対応DB(図示省略)を備える。制御部110は、3次元空間内に定義した形状を2次元面上に投影する投影変換によって対応付けて画像対応DBに記憶する。画像対応DBは、記憶部130のメモリ領域の一部を使用するものでもよい。 Further, it is provided with an image correspondence DB (not shown) that stores each position in two dimensions of the image taken by the surveillance camera 11 and each position in the three-dimensional space taken by the surveillance camera 11 in association with each other. The control unit 110 stores the shape defined in the three-dimensional space in the image correspondence DB in association with it by a projection transformation that projects it on a two-dimensional surface. The image-corresponding DB may use a part of the memory area of the storage unit 130.
 画像処理部170は、DSP(Digital Signal Processor)等により構成され、受信した画像に対して予め定められた処理を行う。予め定められた処理には、輪郭抽出、画像のリサイズ、又は解像度変換処理などがある。 The image processing unit 170 is composed of a DSP (Digital Signal Processor) or the like, and performs predetermined processing on the received image. Predetermined processing includes contour extraction, image resizing, resolution conversion processing, and the like.
 監視カメラ11で1秒間に撮影する画像が例えば5コマの画像である場合、1/5秒画像、2/5秒画像、3/5秒画像、4/5秒画像、5/5秒画像の動きで、1秒間に10コマの画像である場合には、10個の画像の動きで、対象物の外形形状線を入力すれば、動く対象物の大きさが分かる。
 画像処理部170は、監視カメラ11で撮影された画像データを処理し、セキュリティ区域内の画像を出力する。
When the image captured by the surveillance camera 11 in 1 second is, for example, a 5-frame image, the 1/5 second image, the 2/5 second image, the 3/5 second image, the 4/5 second image, and the 5/5 second image. In the case of 10 frames of images per second in motion, the size of the moving object can be known by inputting the outer shape line of the object in the motion of 10 images.
The image processing unit 170 processes the image data taken by the surveillance camera 11 and outputs the image in the security area.
 I/F部180は、セキュリティ区域内に配置された各監視カメラ11と監視装置100とを接続する。また、I/F部180は、図示しない本部、本社又は警備会社などにネットワーク又は専用回線により接続する。
 通信部190は、基地局を介して携帯端末装置50とデータを送受信する。通信部190は、無線通信機能を有し、例えばUART(Universal Asynchronous Receiver Transmitter)を用いて制御基板に接続される。
The I / F unit 180 connects each surveillance camera 11 arranged in the security area with the surveillance device 100. Further, the I / F unit 180 is connected to a headquarters, a head office, a security company, etc. (not shown) by a network or a dedicated line.
The communication unit 190 transmits / receives data to / from the mobile terminal device 50 via the base station. The communication unit 190 has a wireless communication function, and is connected to a control board using, for example, a UART (Universal Asynchronous Receiver Transmitter).
[制御部110]
 図2は、本発明の実施の形態に係るデジタルスマート・ディフェンスセキュリティシステムの制御部110のブロック図である。
 図2に示すように、制御部110は、CPU(Central Processing Unit)等により構成され、監視装置100全体を制御するとともに、制御プログラムを実行して、デジタルスマート・ディフェンスセキュリティシステムとして機能させる。
 制御部110は、人検出部111(人検出手段)と、音声認識部112(音声認識手段)と、ID端末検出部113(ID端末検出手段)と、ID端末登録部114(ID端末登録手段)と、通報部115(通報手段)とを備える。
[Control unit 110]
FIG. 2 is a block diagram of the control unit 110 of the digital smart defense security system according to the embodiment of the present invention.
As shown in FIG. 2, the control unit 110 is configured by a CPU (Central Processing Unit) or the like, controls the entire monitoring device 100, executes a control program, and functions as a digital smart defense security system.
The control unit 110 includes a person detection unit 111 (person detection means), a voice recognition unit 112 (voice recognition means), an ID terminal detection unit 113 (ID terminal detection means), and an ID terminal registration unit 114 (ID terminal registration means). ) And a reporting unit 115 (reporting means).
 制御部110は、ID端末検出部113が検出したID端末(携帯端末装置50;スマートフォン50a)を所持している人(家族など所定のIDを所持している人など)か否かを判別する。 The control unit 110 determines whether or not the person has the ID terminal (mobile terminal device 50; smartphone 50a) detected by the ID terminal detection unit 113 (a person who has a predetermined ID such as a family member). ..
 制御部110は、ID端末検出部113が検出したID端末を所持している人を不審者から除外する。 The control unit 110 excludes the person who possesses the ID terminal detected by the ID terminal detection unit 113 from the suspicious person.
 制御部110は、登録者情報DB165を参照して、ID端末登録部114が登録したID端末(来客などのID)を所持している人か否かを判別し、ID端末(来客などのID)を登録している人を不審者から除外する。 The control unit 110 refers to the registrant information DB 165 to determine whether or not the person has the ID terminal (ID of the visitor or the like) registered by the ID terminal registration unit 114, and determines whether or not the person has the ID terminal (ID of the visitor or the like). ) Is excluded from suspicious persons.
 制御部110は、セキュリティ区域内の人の位置に基づいて侵入の危険度を判定する。例えば、侵入者がセキュリティベルトである、イエローベルトY、オレンジベルトO、レッドベルトR(図8~図9上参照)のどこにいるかにより侵入の危険度を判定する。 The control unit 110 determines the risk of intrusion based on the position of a person in the security area. For example, the risk of intrusion is determined based on where the intruder is on the security belts, the yellow belt Y, the orange belt O, and the red belt R (see the upper parts of FIGS. 8 to 9).
 制御部110は、危険度に応じた画像・音声による対話又は音声による警告を行う。 The control unit 110 performs an image / voice dialogue or a voice warning according to the degree of danger.
 制御部110は、人検出によって検出された人の2次元の位置と人の大きさ(特に、人の頭の大きさ)とに基づいて、画像対応DB(図示省略)によって人の3次元空間内の位置を検出する。具体的には、制御部110は、画像対応DBから、あらかじめ3次元空間内に投影した形状として定義して記憶しておいた投影形状を読み込む。制御部110は、セキュリティ区域内で検出した人の2次元画像と人の大きさをもとに、3次元空間内に定義した形状を2次元面上に投影する投影変換の逆変換を行う。制御部110は、1つの監視カメラ11の画像から投影変換の逆変換をすることによって、3次元位置を検出する。原理的には、2次元画像で3次元の位置を検出することはできないはずであるが、人の大きさが既知であるとする(人による頭の大きさの違いはほとんどないことを前提とする)と、1つの監視カメラ11が撮影した2次元画像と、検知した人の大きさ情報とをもとに3次元位置を検出することができる。 The control unit 110 is based on the two-dimensional position of the person and the size of the person (particularly the size of the head of the person) detected by the person detection, and the three-dimensional space of the person by the image correspondence DB (not shown). Detect the position inside. Specifically, the control unit 110 reads the projected shape that has been defined and stored in advance as the shape projected in the three-dimensional space from the image correspondence DB. The control unit 110 performs the inverse conversion of the projection transformation that projects the shape defined in the three-dimensional space onto the two-dimensional plane based on the two-dimensional image of the person detected in the security area and the size of the person. The control unit 110 detects the three-dimensional position by performing the inverse conversion of the projection conversion from the image of one surveillance camera 11. In principle, it should not be possible to detect a 3D position in a 2D image, but it is assumed that the size of the person is known (assuming that there is almost no difference in the size of the head between people). The three-dimensional position can be detected based on the two-dimensional image taken by one surveillance camera 11 and the size information of the detected person.
 人検出部111は、監視カメラ11によって撮影された画像から人を検出し、その人の大きさを検出する。具体的には、人検出部111は、AIアクセラレータ200(後記)を用いてセキュリティ区域内の人を検出する。人検出部111は、AIアクセラレータ200に対して人検出要求を発行し、AIアクセラレータ200は、CPU以外でAIの計算を実行して、人検出結果を人検出部111に送信する。人検出には高速性が求められるので、人検出にAIアクセラレータ200を用いている。 The person detection unit 111 detects a person from the image taken by the surveillance camera 11 and detects the size of the person. Specifically, the person detection unit 111 detects a person in the security area by using the AI accelerator 200 (described later). The human detection unit 111 issues a human detection request to the AI accelerator 200, and the AI accelerator 200 executes an AI calculation other than the CPU and transmits the human detection result to the human detection unit 111. Since high speed is required for human detection, the AI accelerator 200 is used for human detection.
 デジタルスマート・ディフェンスセキュリティシステム1000は、AIアクセラレータ200を用いた人検出によりセキュリティ区域内への侵入者を検出する。
 デジタルスマート・ディフェンスセキュリティシステム1000は、AIアクセラレータ200による深層学習において、特に、人のみを監視対象とすることで、従来の画像差分を用いた動体検出型の監視カメラによる画像認識に比べて極めて高い精度での侵入者の検出を行うことができる。
The digital smart defense security system 1000 detects an intruder in the security area by detecting a person using the AI accelerator 200.
The digital smart defense security system 1000 is extremely high in deep learning by the AI accelerator 200, in particular, by targeting only people, as compared with image recognition by a conventional motion detection type surveillance camera using image difference. Intruder can be detected with high accuracy.
 本実施形態では、人検出部111は、AIアクセラレータ200を用いて人を検出しているが、サーモカメラ(又は人感センサ20)で人を検出するようにしてもよい。すなわち、人感センサ20は、セキュリティ区域内の温度を検出する。そして、人検出部111は、人感センサ20が人の体温を検出し、かつ、監視カメラ11がその撮影画像の変化を検出したことによって人(不審者候補)の存在を検出する。 In the present embodiment, the person detection unit 111 detects a person by using the AI accelerator 200, but the person may be detected by the thermo camera (or the motion sensor 20). That is, the motion sensor 20 detects the temperature in the security area. Then, the human detection unit 111 detects the presence of a person (suspicious person candidate) by detecting the body temperature of the person by the motion sensor 20 and detecting the change in the captured image by the surveillance camera 11.
 なお、人検出部111は、AIアクセラレータ200を用いた人検出と、サーモカメラ(又は人感センサ)を用いた人検出とを組み合わせてもよい。例えば、セキュリティ区域内のうち、人検出の高速性が要求される、玄関先やベランダ、窓についてはAIアクセラレータ200を用い、人検出の高速性が要求されない敷地と外部の境界の敷地内はサーモカメラ(又は人感センサ)を使用する。 The person detection unit 111 may combine the person detection using the AI accelerator 200 and the person detection using the thermo camera (or motion sensor). For example, in the security area, AI accelerator 200 is used for the entrance, veranda, and windows where high speed of human detection is required, and the site of the boundary between the site and the outside where high speed of human detection is not required is a thermo. Use a camera (or motion sensor).
 音声認識部112は、会話の音声を取得し、会話の内容が不審なものであることを判定する。音声認識部112は、取得した音声に出現する単語を、出現頻度付き辞書135の語彙と照合して、会話の内容が不審なものであることを判定する。 The voice recognition unit 112 acquires the voice of the conversation and determines that the content of the conversation is suspicious. The voice recognition unit 112 collates the words appearing in the acquired voice with the vocabulary of the dictionary 135 with appearance frequency, and determines that the content of the conversation is suspicious.
 ID端末検出部113は、非侵入者が所持するID(Identification)端末を検出する。
 ID端末登録部114は、来客等が所持するID端末を登録者情報DB165に登録する。
The ID terminal detection unit 113 detects an ID (Identification) terminal possessed by a non-intruder.
The ID terminal registration unit 114 registers the ID terminal possessed by the visitor or the like in the registrant information DB 165.
 通報部115は、人検出部111によって検出された人に対して、領域に対応した音声で警告を行うとともに、不審者の存在を通報する。通報部115は、危険度(注意度、緊急度)に応じた通報を行う。 The reporting unit 115 warns the person detected by the person detecting unit 111 with a voice corresponding to the area, and also notifies the existence of a suspicious person. The reporting unit 115 makes a report according to the degree of danger (degree of caution, degree of urgency).
 通報部115は、音声認識部112によって会話の内容が不審なものであると判定されたことを受けて、不審者の存在を通報する。
 通報部115は、ID端末検出部113が検出したID端末を所持している人を通報しない。
The reporting unit 115 reports the existence of a suspicious person after the voice recognition unit 112 determines that the content of the conversation is suspicious.
The reporting unit 115 does not report the person who possesses the ID terminal detected by the ID terminal detecting unit 113.
[AIアクセラレータ200]
 AIアクセラレータ200は、人を検出する専用プロセッサであり、CPU以外の計算リソースを用いる。AIアクセラレータ200は、例えば、GPU(Graphics  Processing Unit)を強化したプロセッサよる画像処理、FPGA(Field Programmable Gate Array)を用いた信号処理のアクセラレートである。また、AIアクセラレータ200は、専用ハード(例えば、GPU)上でAI(Artificial Intelligence:人工知能)の計算を実行する。
[AI Accelerator 200]
The AI accelerator 200 is a dedicated processor that detects a person, and uses a computing resource other than the CPU. The AI accelerator 200 is, for example, an accelerator for image processing by a processor enhanced with a GPU (Graphics Processing Unit) and signal processing using an FPGA (Field Programmable Gate Array). Further, the AI accelerator 200 executes the calculation of AI (Artificial Intelligence) on a dedicated hardware (for example, GPU).
 通常のPCによるコンピュータの処理では、デジタル画像一枚あたり人(人体)の検出の処理を行うのに約1.5秒かかる。このため、本実施形態では、人の検出プロセッサであるAIアクセラレータ200を利用することで、PCによるコンピュータの処理の約10倍のパフォーマンスを得、侵入検出を迅速に実行する。また、本実施形態では、計算負荷が高いAIの計算を専用ハードであるAIアクセラレータ200に任せている。これにより、市販のカメラと安価な機器用いた構成であっても、リアルタイムに挙動不審を検出し、不審者を登録可能であることが実証できた。 In the computer processing by a normal PC, it takes about 1.5 seconds to detect a person (human body) per digital image. Therefore, in the present embodiment, by using the AI accelerator 200, which is a human detection processor, the performance of the computer processing by the PC is about 10 times higher, and the intrusion detection is executed quickly. Further, in the present embodiment, the calculation of AI, which has a high calculation load, is left to the AI accelerator 200, which is a dedicated hardware. As a result, it was demonstrated that suspicious behavior can be detected in real time and suspicious persons can be registered even with a configuration using a commercially available camera and inexpensive equipment.
[デジタルスマート・ディフェンスセキュリティシステム]
 図3は、本発明の実施形態に係るデジタルスマート・ディフェンスセキュリティシステムを用いた全体を示す構成図である。
 図3に示すように、デジタルスマート・ディフェンスセキュリティシステム1000は、ウェブサービスクラウド300上に、デジタルスマート・ディフェンスセキュリティサービスを提供するクラウドサーバ(商用サーバ)301、クラウドサーバ301に連携して能動的に情報を取得してユーザのスマートフォン50a(携帯端末装置;ID端末)に通知するPush通知サーバ302を有する。ウェブサービスクラウド300は、インターネット303に接続される。スマートフォン50aは、インターネット303を経由してウェブサービスクラウド300上のクラウドサーバ301にテキスト及び画像を送信することができる。また、スマートフォン50aは、インターネット303を経由してPush通知サーバ302からPush通知を受信する。さらに、クラウドサーバ301及びPush通知サーバ302は、LTE/3G網などの通信キャリア網(固定網)(図示省略)を経由して、セキュリティアプリが搭載されたスマートフォン50aに接続する。
[Digital Smart Defense Security System]
FIG. 3 is a configuration diagram showing the whole using the digital smart defense security system according to the embodiment of the present invention.
As shown in FIG. 3, the digital smart defense security system 1000 actively cooperates with the cloud server (commercial server) 301 and the cloud server 301 that provide the digital smart defense security service on the web service cloud 300. It has a Push notification server 302 that acquires information and notifies the user's smartphone 50a (portable terminal device; ID terminal). The web service cloud 300 is connected to the Internet 303. The smartphone 50a can transmit texts and images to the cloud server 301 on the web service cloud 300 via the Internet 303. Further, the smartphone 50a receives the push notification from the push notification server 302 via the Internet 303. Further, the cloud server 301 and the push notification server 302 are connected to the smartphone 50a equipped with the security application via a communication carrier network (fixed network) (not shown) such as an LTE / 3G network.
 図3に示すように、デジタルスマート・ディフェンスセキュリティシステム1000は、不審者の敷地内への侵入を検知し、本人・家族等が所持するスマートフォン50aにプッシュ通知する。
 スマートフォン50aに来た通知をユーザがタップすると、セキュリティアプリが起動して不審者のズーム画面を表示し、「1F玄関にて不審者が検知されました」というテロップが流れる。同時にその内容が音声で読み上げられる。このように、スマートフォン50aの画面のテロップと音声とで不審者の通知が行われる。さらに、スマートフォン50aのユーザの操作により、例えば緊急時には関係機関(警察、消防)に通知する。この場合、警備会社や関係企業本社にも自動的に通知される。また、緊急性がない場合や確認したい場合には、警備会社のみに通知する。
As shown in FIG. 3, the digital smart defense security system 1000 detects an intrusion of a suspicious person into the premises and push-notifies the smartphone 50a owned by the person, his / her family, or the like.
When the user taps the notification that comes to the smartphone 50a, the security application is activated and the zoom screen of the suspicious person is displayed, and the telop "A suspicious person has been detected at the entrance on the 1st floor" is played. At the same time, the content is read aloud. In this way, the suspicious person is notified by the telop and voice on the screen of the smartphone 50a. Further, by the operation of the user of the smartphone 50a, for example, in an emergency, the related organizations (police, fire department) are notified. In this case, the security company and the head office of the affiliated company are also automatically notified. Also, if there is no urgency or if you want to confirm, only the security company will be notified.
[セキュリティアプリ動作]
 図4は、本発明の実施の形態に係るデジタルスマート・ディフェンスセキュリティシステムのセキュリティアプリ動作を示す図である。
 図4左に示すように、スマートフォン50aの待受け画面等に不審者を検出したテロップが通知される。ユーザのタップにより、図4中に示すように、スマートフォン50aの表示はセキュリティアプリ動作表示に切り替わり、不審者のズーム画面を表示し、不審者の位置と状況「1F玄関に不審者」を表示する。また、このテロップを自動音声で読み上げる。さらに、ユーザのタップにより、図4右に示すように、スマートフォン50aの表示を時系列の4画面に表示する。
[Security app operation]
FIG. 4 is a diagram showing a security application operation of the digital smart defense security system according to the embodiment of the present invention.
As shown on the left side of FIG. 4, a telop that detects a suspicious person is notified on the standby screen or the like of the smartphone 50a. By tapping the user, as shown in FIG. 4, the display of the smartphone 50a is switched to the security application operation display, the zoom screen of the suspicious person is displayed, and the position and situation of the suspicious person "suspicious person at the entrance on the 1st floor" is displayed. .. In addition, this telop is read aloud by automatic voice. Further, by tapping the user, the display of the smartphone 50a is displayed on four time-series screens as shown on the right side of FIG.
 以下、上述のように構成されたデジタルスマート・ディフェンスセキュリティシステムの動作について説明する。
[デジタルスマート・ディフェンスセキュリティ処理]
 まず、デジタルスマート・ディフェンスセキュリティシステムの警備モード設定について説明する。
The operation of the digital smart defense security system configured as described above will be described below.
[Digital smart defense security processing]
First, the security mode setting of the digital smart defense security system will be described.
 図5は、デジタルスマート・ディフェンスセキュリティシステム1000の監視装置100の警備モード設定処理を示すフローチャートである。本フローは、監視装置100の制御部110(図2参照)により実行される。図6は、警備モードを説明する図である。 FIG. 5 is a flowchart showing a security mode setting process of the monitoring device 100 of the digital smart defense security system 1000. This flow is executed by the control unit 110 (see FIG. 2) of the monitoring device 100. FIG. 6 is a diagram illustrating a security mode.
 ステップS1では、警備モード(在宅警備、外出警備、常時警備等)を定義する。警備モードに応じた防犯機能を提供することができる。図6上は、「常時警備モード」を示している。「常時警備モード」に設定した場合、デジタルスマート・ディフェンスセキュリティシステム1000が常にセキュリティエリアの状況を監視し、適切な対応を人に促すことができる。警備モードの切り替えが不要という利点もある。一方、図6下は、「外出・在宅警備モード」を示している。「外出・在宅警備モード」は、外出警備モードと在宅警備モードとを切り替える。例えば、在宅警備モードは、23:00~5:00に自動オン・オフする。外出警備モードは、外出時にオン、帰宅時にオフする。以下、「外出・在宅警備モード」の場合を例に採る。 In step S1, the security mode (home security, outing security, constant security, etc.) is defined. It is possible to provide a security function according to the security mode. The upper part of FIG. 6 shows the "always-on security mode". When set to the "always-on security mode", the digital smart defense security system 1000 can constantly monitor the status of the security area and prompt people to take appropriate measures. It also has the advantage of not requiring switching of security modes. On the other hand, the lower part of FIG. 6 shows the “outing / home security mode”. "Outing / home security mode" switches between outing security mode and home security mode. For example, the home security mode automatically turns on and off from 23:00 to 5:00. The outing security mode is turned on when going out and turned off when returning home. In the following, the case of "going out / home security mode" will be taken as an example.
 図5のフローに戻って、ステップS2では、時間により警備モードを変更する。
 ステップS3では、スマートフォン50a(携帯端末装置50)から警備モードの変更を受信したか否かを判別する。
 スマートフォン50a(携帯端末装置50)から警備モードの変更を受信した場合(ステップS3:Yes)、ステップS4で指示された警備モードで警備を実行する。
 警備モードの変更を受信しない場合(ステップS3:No)、本フローを終了して定義された警備モードで時間による警備モードを実行する。
 上記警備モードを定義することにより、無駄な処理をなくすことができ、結果的には計算リソースの低減により低コスト化及び処理の高速化を図ることができる。
Returning to the flow of FIG. 5, in step S2, the security mode is changed depending on the time.
In step S3, it is determined whether or not a change in the security mode has been received from the smartphone 50a (mobile terminal device 50).
When a change in the security mode is received from the smartphone 50a (mobile terminal device 50) (step S3: Yes), security is executed in the security mode instructed in step S4.
When the change of the security mode is not received (step S3: No), this flow is terminated and the security mode by time is executed in the defined security mode.
By defining the above security mode, unnecessary processing can be eliminated, and as a result, cost reduction and processing speed can be achieved by reducing calculation resources.
[外出・在宅警備モード]
 デジタルスマート・ディフェンスセキュリティシステム1000の「外出・在宅警備モード」について説明する。
 図6下に示すように、「外出・在宅警備モード」は、利用者が時間帯により外出警備モードと在宅警備モードとを切り替える設定を行う。例えば、在宅警備モードは、23:00~5:00に自動オン・オフする。外出警備モードは、外出時にオン、帰宅時にオフする。利用者は警備モードの切り替えを行うことにより、外出中はセキュリティ強度を上げる、また在宅中はセキュリティ強度を下げるなどの対応が可能になる。デジタルスマート・ディフェンスセキュリティシステム1000は、利用者の実状に合わせたセキュリティを実行でき、キュリティシステムの資源を有効活用することができる。
[Going out / home security mode]
The "outing / home security mode" of the digital smart defense security system 1000 will be described.
As shown in the lower part of FIG. 6, the “outing / home security mode” is set so that the user switches between the outing security mode and the home security mode depending on the time of day. For example, the home security mode automatically turns on and off from 23:00 to 5:00. The outing security mode is turned on when going out and turned off when returning home. By switching the security mode, the user can take measures such as increasing the security strength while going out and lowering the security strength while at home. The digital smart defense security system 1000 can execute security according to the actual situation of the user, and can effectively utilize the resources of the curity system.
[常時警備モード]
 デジタルスマート・ディフェンスセキュリティシステム1000の「常時警備モード」について説明する。
 主婦等が家で家事をしたり、児童等が家で留守番をしたり、高齢者等が独り暮らしをしている場合に、例えば宅配、セールスマン、銀行員等に成りすました不審者が家に来訪する場合がある。こういった不審者を主婦、児童や高齢者等が家に入れてしまうと危険である。このような危険から児童や高齢者等を守るために、児童の両親や高齢者の息子夫婦・孫等の「保護者」を設定しておき、その保護者が来訪者の確認を行うための「常時警備モード」を提供する。また、不審者による電話は、保護者が不在である時間帯を狙ってかけてくることが多い。常時警備モードに設定しておくと、どのような時間帯であっても高齢者等を詐欺電話から守ることができる。また、店舗、事務所、研究所、金融機関、情報資料室等の部外者及び第三者等の関係者以外が重要な所要施設へ、なりすまし侵入すること、及びインターホン、偽装電話等による情報漏洩を阻止することができる。
[Always guard mode]
The "always-on security mode" of the digital smart defense security system 1000 will be described.
When a housewife or the like does household chores at home, a child or the like stays at home, or an elderly person or the like lives alone, a suspicious person who pretends to be a delivery service, a salesman, a bank clerk, etc. visits the house. May be done. It is dangerous for housewives, children, the elderly, etc. to enter such suspicious persons into their homes. In order to protect children and the elderly from such dangers, "guardians" such as children's parents and elderly sons, couples and grandchildren are set, and the guardians can confirm visitors. Provides "always guard mode". In addition, calls made by suspicious persons are often aimed at the time when the guardian is absent. By setting the security mode at all times, it is possible to protect elderly people from fraudulent calls at any time of the day. In addition, information by spoofing intrusion into important required facilities by outsiders such as stores, offices, research institutes, financial institutions, information materials rooms, and related parties such as third parties, and information by intercoms, camouflaged telephones, etc. Leakage can be prevented.
 デジタルスマート・ディフェンスセキュリティシステム1000の「常時警備モード」は、以下の機能を有する。
・児童の両親や高齢者の息子夫婦、孫等の保護者及び管理者が所持する、通知及び対話用のスマートフォンアプリを事前に登録する機能。
・日時等のスケジュールを指定して来訪者を事前に登録者情報DB165に登録する。また、来訪者が正規来訪者であることを本システムに対して示すためのQRコード等を用いた検証機能。
・来訪者(宅配者、郵便配達、ご近所さん、セールスマン、銀行員等)が家の敷地内に入った時、その来訪者が事前に登録された来訪者やご近所さんであるかどうかをQRコード等による検証で確認する機能(図9及び図29参照)。
・未登録の来訪者であった場合、事前に登録しておいた保護者のスマートフォンに対して、未登録の来訪者が来たことを画像つきで通知する機能(図29参照)。
The "always-on security mode" of the digital smart defense security system 1000 has the following functions.
-A function to pre-register smartphone apps for notification and dialogue possessed by parents and managers of children's parents, elderly sons and couples, grandchildren, etc.
-Register the visitor in the registrant information DB 165 in advance by designating a schedule such as the date and time. In addition, a verification function using a QR code or the like to indicate to this system that the visitor is a regular visitor.
・ When a visitor (courier, postman, neighbor, salesman, bank clerk, etc.) enters the premises of the house, whether the visitor is a pre-registered visitor or neighbor A function to confirm by verification using a QR code or the like (see FIGS. 9 and 29).
-If the visitor is unregistered, a function to notify the smartphone of the guardian who has been registered in advance that an unregistered visitor has arrived with an image (see FIG. 29).
・玄関に設置したドアホン型対話システムと保護者が所持するスマートフォン対話システムとの間で、画像・音声による対話を行う機能(図9及び図29参照)。
・家にかかってきた未登録又は不審な電話を自動検知して登録する機能、及び電話の相手が信用できるかどうかの判断が必要なときは保護者のスマートフォンに転送する機能(図11及び図30参照)。
・音声認識により通話相手の注意度を判定する機能(図10、図11、図30及び図31参照)。
・家の玄関等の電子錠を制御し、主婦等が施錠しないまま外出し、一定時間、例えば30分等経過したことを本システムが検知し、自動で施錠する機能。
・家の玄関等の電子錠を制御し、主婦等が所持するスマートフォンから解錠したり、もしくは主婦等が鍵、スマートフォンを携帯せず、自宅の玄関等を解錠できない時に、保護者が遠隔から監視カメラで主婦等が本人であり、かつ誰にも脅迫されていないことを確認した上で遠隔から解錠する機能。
-A function for performing image / voice dialogue between a doorphone type dialogue system installed at the entrance and a smartphone dialogue system owned by a guardian (see FIGS. 9 and 29).
-A function to automatically detect and register unregistered or suspicious calls to the house, and a function to transfer to a guardian's smartphone when it is necessary to judge whether the other party can be trusted (Figs. 11 and 11). See 30).
-A function of determining the attention level of the other party by voice recognition (see FIGS. 10, 11, 30, and 31).
-A function that controls electronic locks at the entrance of a house, etc., and the system detects that a certain period of time, for example, 30 minutes has passed, and automatically locks the housewife when he / she goes out without locking.
・ When the electronic lock at the entrance of the house is controlled and unlocked from the smartphone owned by the housewife, or when the housewife does not carry the key or smartphone and cannot unlock the entrance at home, the guardian is remote. A function to unlock the lock remotely after confirming that the housewife, etc. is the person himself / herself and that no one has threatened him / her with a surveillance camera.
[デジタルスマート・ディフェンスセキュリティシステムの警備例]
 デジタルスマート・ディフェンスセキュリティシステムの警備例について説明する。
<ホーム&ビルディング>
 図7は、個人住宅における警備の例を示す図である。
 デジタルスマート・ディフェンスセキュリティシステムは、個人向けに個人・集合住宅、オフィス、店舗、事務所、研究所、情報資料室、及び金融機関向け等の防犯システムを提供する。主な機能は、以下の通りである。
 警備モード(在宅警備、外出警備等)を定義し、警備モードに応じて防犯機能を提供する。
 時間により警備モードを変更する機能を備える。
 家屋外周に設置された監視カメラ11の映像から侵入者を検出・登録する。
 検出された侵入者の危険度(注意度、緊急度)を判定し、危険度(注意度、緊急度)に応じて利用者に通知する。
 スマートフォン50aにより屋外から警備モードを変更する。
 スマートフォン50a、又は監視カメラ11のスピーカなどを通して侵入者に警告を通知する。
[Security example of digital smart defense security system]
An example of security for a digital smart defense security system will be described.
<Home &Building>
FIG. 7 is a diagram showing an example of security in a private house.
The digital smart defense security system provides security systems for individuals / apartments, offices, stores, offices, research institutes, information materials rooms, and financial institutions. The main functions are as follows.
A security mode (home security, outing security, etc.) is defined, and a security function is provided according to the security mode.
It has a function to change the security mode depending on the time.
An intruder is detected and registered from the image of the surveillance camera 11 installed around the outside of the house.
The detected intruder's risk (attention, urgency) is determined, and the user is notified according to the risk (attention, urgency).
The security mode is changed from the outdoors by the smartphone 50a.
A warning is notified to an intruder through a smartphone 50a, a speaker of a surveillance camera 11, or the like.
 図8は、集合住宅における警備の例を示す図である。
 例えば、集合住宅向けの防犯システムを提供する。主な機能は、以下の通りである。
 警備モードを定義し、警備モードに応じて防犯機能を提供する。
 時間により警備モードを変更する機能を備える。
 居住部外周に設置された監視カメラ11の映像から侵入者を検出・登録する。
 検出された侵入者の危険度(注意度、緊急度)を判定し、危険度(注意度、緊急度)に応じて利用者に通知する。
 スマートフォン50aにより屋外から警備モードを変更する。
 スマートフォン50a、又は監視カメラ11のスピーカなどを通して侵入者に警告を通知する。
FIG. 8 is a diagram showing an example of security in an apartment house.
For example, it provides a security system for apartment houses. The main functions are as follows.
A security mode is defined and a security function is provided according to the security mode.
It has a function to change the security mode depending on the time.
An intruder is detected and registered from the image of the surveillance camera 11 installed on the outer periphery of the living area.
The detected intruder's risk (attention, urgency) is determined, and the user is notified according to the risk (attention, urgency).
The security mode is changed from the outdoors by the smartphone 50a.
A warning is notified to an intruder through a smartphone 50a, a speaker of a surveillance camera 11, or the like.
[セキュリティ区域内の人に応じた自動音声による警告]
 図9は、侵入者の位置に応じて自動音声により警告及び画像・音声による遠隔からの対話機能を説明する図である。図9上は、デジタルスマート・ディフェンスセキュリティシステム1000の「自動音声による警告」を示している。図9中は、図9上のデジタルスマート・ディフェンスセキュリティシステム1000の「自動音声による警告」と対比して説明するための「ドアホン型対話システム」を示し、図9下は、「防犯カメラ型対話システム」を示す。
[Automatic voice warning according to people in the security area]
FIG. 9 is a diagram for explaining a warning by automatic voice and a remote dialogue function by image / voice according to the position of an intruder. FIG. 9 shows an "automatic voice warning" of the Digital Smart Defense Security System 1000. FIG. 9 shows a “doorphone type dialogue system” for explanation in comparison with the “automatic voice warning” of the digital smart defense security system 1000 on FIG. 9, and FIG. 9 bottom shows a “security camera type dialogue”. Indicates "system".
 図9中に示すように、「ドアホン型対話システム」は、来訪者と保護者との間で、ドアホンにより画像・音声による双方向の対話を行う。又は、「ドアホン型対話システム」は、クラウド対話中継システムを介して保護者が携帯する携帯端末(スマートフォン50a)のスマートフォン対話アプリを実行して画像・音声による双方向の対話を行う。 As shown in FIG. 9, the "doorphone type dialogue system" conducts two-way dialogue between the visitor and the guardian by the doorphone by image and voice. Alternatively, the "doorphone type dialogue system" executes a smartphone dialogue application of a mobile terminal (smartphone 50a) carried by a guardian via a cloud dialogue relay system to perform two-way dialogue by image and voice.
 図9下に示すように、「防犯カメラ型対話システム」は、マイク付き防犯カメラで侵入者を撮影・収音し、侵入者に対し家族が、画像・音声による双方向の対話を行う。又は、「防犯カメラ型対話システム」は、クラウド対話中継システムを介して家族が携帯する携帯端末のスマートフォン対話アプリを実行してスピーカ音声による双方向の対話を行う。 As shown in the lower part of FIG. 9, the "security camera type dialogue system" captures and collects sound of an intruder with a security camera equipped with a microphone, and the family engages in two-way dialogue with the intruder by image and voice. Alternatively, the "security camera type dialogue system" executes a smartphone dialogue application of a mobile terminal carried by a family member via a cloud dialogue relay system to perform two-way dialogue by speaker voice.
 これら対話システムに対して、デジタルスマート・ディフェンスセキュリティシステム1000は、セキュリティエリア内に侵入した侵入者の位置をカメラの画像をもとにX、Y、Z座標として正確に測位する。そして、デジタルスマート・ディフェンスセキュリティシステム1000は、セキュリティ区域内に人がいることを判定して、危険度に応じた(例えばイエローベルトY、オレンジベルトO、レッドベルトRに応じた)音声で警告する。
 図9上の例では、侵入者がイエローベルトYやオレンジベルトO、レッドベルトRにいることを判定し、危険度又は状況に応じて自動音声メッセージを流す自動音声による警告を行う。詳細については、図29のフローで後記する。
 デジタルスマート・ディフェンスセキュリティシステム1000は、セキュリティエリア内に侵入した侵入者の位置をカメラの画像をもとにX、Y、Z座標として正確に測位することができる。
With respect to these dialogue systems, the digital smart defense security system 1000 accurately positions the position of an intruder who has invaded the security area as X, Y, and Z coordinates based on the image of the camera. Then, the digital smart defense security system 1000 determines that there is a person in the security area and warns with a voice according to the degree of danger (for example, according to the yellow belt Y, the orange belt O, and the red belt R). ..
In the above example of FIG. 9, it is determined that the intruder is on the yellow belt Y, the orange belt O, and the red belt R, and an automatic voice warning is given by sending an automatic voice message according to the degree of danger or the situation. Details will be described later in the flow of FIG. 29.
The digital smart defense security system 1000 can accurately position the position of an intruder who has invaded the security area as X, Y, and Z coordinates based on the image of the camera.
[デジタルスマート・ディフェンスセキュリティ処理]
 次に、デジタルスマート・ディフェンスセキュリティシステム1000のデジタルスマート・ディフェンスセキュリティ処理について説明する。
 デジタルスマート・ディフェンスセキュリティシステム1000のデジタルスマート・ディフェンスセキュリティ処理は、(I)「侵入者の位置に応じて自動音声により警告、画像及び音声による遠隔からの対話処理」と、(II)「会話の内容による不審判定処理」とがある。上記(I)と上記(II)とは、それぞれ単独で実行してもよいし、組み合わせて実行してもよい。
[Digital smart defense security processing]
Next, the digital smart defense security process of the digital smart defense security system 1000 will be described.
The digital smart defense security processing of the digital smart defense security system 1000 includes (I) "warning by automatic voice according to the position of the intruder, remote dialogue processing by image and voice", and (II) "conversation". There is "suspicious judgment processing based on the content". The above (I) and the above (II) may be executed individually or in combination.
<(I)「侵入者の位置に応じた遠隔からの対話処理」>
 図10は、デジタルスマート・ディフェンスセキュリティシステムの(I)「侵入者の位置に応じた遠隔からの対話処理」を示すフローチャートである。本フローは、監視装置100の制御部110(図2参照)により図5で設定された「常時警備モード」で実行される。
<(I) "Remote dialogue processing according to the position of the intruder">
FIG. 10 is a flowchart showing (I) “remote dialogue processing according to the position of an intruder” of the digital smart defense security system. This flow is executed by the control unit 110 (see FIG. 2) of the monitoring device 100 in the “always-on security mode” set in FIG.
 ステップS11では、3次元で特定されるセキュリティ区域(特定エリア)の画像を撮影する。監視カメラ11は、例えばPTZカメラであり、監視装置100により遠隔操作される。監視カメラ11が撮影した画像は、監視装置100に出力される。
 ステップS12で、制御部110の人検出部111は、監視カメラ11によって撮影された画像から人を検出する。本実施形態では、人検出部111は、AIアクセラレータ200に対してAIによる[人の検出処理]を要求し、人検出部111は、AIアクセラレータ200からの人の検出結果を待つ。なお、人検出部111は、サーモカメラ(又は人感センサ20)による人検出を併用するようにしてもよい。
In step S11, an image of the security area (specific area) specified in three dimensions is taken. The surveillance camera 11 is, for example, a PTZ camera and is remotely controlled by the surveillance device 100. The image taken by the surveillance camera 11 is output to the surveillance device 100.
In step S12, the person detection unit 111 of the control unit 110 detects a person from the image captured by the surveillance camera 11. In the present embodiment, the person detection unit 111 requests the AI accelerator 200 to perform [human detection processing] by AI, and the person detection unit 111 waits for the detection result of the person from the AI accelerator 200. In addition, the person detection unit 111 may also use the person detection by the thermo camera (or the motion sensor 20).
 ステップS13で制御部110は、監視カメラ11によって撮影された画像に人が検出されたか否かを判別する。
 監視カメラ11によって撮影された画像に人が検出された場合(ステップS13:Yes)、ステップS14に進む。監視カメラ11によって撮影された画像に人を検出しない場合(ステップS13:No)、本フローを終了する。
In step S13, the control unit 110 determines whether or not a person has been detected in the image captured by the surveillance camera 11.
When a person is detected in the image captured by the surveillance camera 11 (step S13: Yes), the process proceeds to step S14. If no person is detected in the image captured by the surveillance camera 11 (step S13: No), this flow ends.
 ステップS14で制御部110は、ID端末検出部113が検出したID端末(携帯端末装置50;スマートフォン50a)を所持している人(家族など所定のIDを所持している人など)か否かを判別する。制御部110は、ID端末検出部113が検出したID端末を所持している人を不審者から除外して(ステップS14:No)、ステップS15に進む。 Whether or not the control unit 110 is a person (a person having a predetermined ID such as a family member) who has an ID terminal (mobile terminal device 50; smartphone 50a) detected by the ID terminal detection unit 113 in step S14. To determine. The control unit 110 excludes the person who possesses the ID terminal detected by the ID terminal detection unit 113 from the suspicious person (step S14: No), and proceeds to step S15.
 ステップS15で制御部110は、登録者情報DB165を参照して、ID端末登録部114が登録したID端末(来客などのID)を所持している人か否かを判別する。制御部110は、ID端末(来客などのID)を登録している人を不審者から除外して(ステップS15:No)、ステップS16に進む。
 このように、家族等がID端末を所持している場合及び来客等のID端末をあらかじめ登録した場合、後段の処理をスキップして処理の迅速化を図る。
In step S15, the control unit 110 refers to the registrant information DB 165 and determines whether or not the person has the ID terminal (ID such as a visitor) registered by the ID terminal registration unit 114. The control unit 110 excludes the person who has registered the ID terminal (ID such as a visitor) from the suspicious person (step S15: No), and proceeds to step S16.
In this way, when a family member or the like has an ID terminal or when an ID terminal such as a visitor is registered in advance, the subsequent processing is skipped to speed up the processing.
 ステップS16で制御部110は、セキュリティ区域内の人の位置に基づいて侵入の危険度を判定する。例えば、侵入者がイエローベルトY、オレンジベルトO、レッドベルトR(図8~図9上参照)のどこにいるかにより侵入の危険度を判定する。具体的には、下記のようにして侵入の危険度を判定する。 In step S16, the control unit 110 determines the risk of intrusion based on the position of a person in the security area. For example, the risk of intrusion is determined based on where the intruder is in the yellow belt Y, the orange belt O, or the red belt R (see the upper part of FIGS. 8 to 9). Specifically, the risk of intrusion is determined as follows.
 (1)図8~図9上のようにイエローベルトY内に人が検出された場合、危険度は中程度、またレッドベルトR内に人が検出された場合、危険度は高いと判定できる。また、イエローベルトY外で人が検出された場合は、危険度は小さいと判定できる。 (1) When a person is detected in the yellow belt Y as shown in FIGS. 8 to 9, the risk is moderate, and when a person is detected in the red belt R, the risk is high. .. Further, when a person is detected outside the yellow belt Y, it can be determined that the degree of danger is small.
 (2)不審者の動きよっても、危険度(注意度、緊急度)を判定することができる。不審者の動きは、例えば瞳の動きと首の動き(詳細後記)や腕の動き(詳細後記)である。不審者の動きが不自然である場合、危険度(注意度、緊急度)が高いと判定できる。 (2) The degree of danger (attention, urgency) can be determined by the movement of a suspicious person. The movements of the suspicious person are, for example, the movement of the eyes and the movement of the neck (detailed later) and the movement of the arm (detailed later). If the movement of the suspicious person is unnatural, it can be determined that the degree of danger (attention, urgency) is high.
 ステップS17で制御部110は、危険度に応じた画像・音声による対話又は音声による警告を行う。 In step S17, the control unit 110 performs an image / voice dialogue or a voice warning according to the degree of danger.
 ステップS18で通報部115は、危険度(注意度、緊急度)に応じた通報を行う。通報は、例えば関係者のスマートフォン50aに、不審者に関する情報を送信する。この通報は、侵入犯罪の危険度(危険の度合いのクラス分け)に対応して、危険の度合いを示すメッセージやマーク、強調文字、色分けを付すようにする。また、危険度又は緊急度に対応して、通報先を変える。例えば、侵入者(不審者)が隣家の駐車場の屋根から塀を超えて侵入する場合などは、侵入者が危険で緊急度が高いと判定し、侵入者に関する最も緊急度の高いテロップを通知する。さらに、通報先の関係機関に警察等を入れる。そしてこの通報は、不審者の自動登録処理などより優先して行う。また、レッドベルトR内に人が検出された場合、侵入の緊急度が高いテロップを、イエローベルトY外で人が検出された場合は、侵入の緊急度は中程度のテロップを通知する(図4参照)。 In step S18, the reporting unit 115 makes a report according to the degree of danger (degree of caution, degree of urgency). The report transmits information about the suspicious person to, for example, the smartphone 50a of the person concerned. In this report, a message, a mark, highlighted letters, and a color code indicating the degree of danger should be attached according to the degree of danger of the intrusion crime (classification of the degree of danger). Also, change the report destination according to the degree of danger or urgency. For example, when an intruder (suspicious person) invades from the roof of the parking lot of the next house over the fence, the intruder is judged to be dangerous and urgent, and the most urgent telop about the intruder is notified. To do. In addition, the police will be included in the relevant organizations to be reported. And this report is given priority over the automatic registration process of the suspicious person. In addition, when a person is detected inside the red belt R, a telop with a high urgency of invasion is notified, and when a person is detected outside the yellow belt Y, a telop with a moderate urgency of invasion is notified (Fig. 4).
 上述したように、図4左に示すスマートフォン50aの待受け画面等に不審者の存在を通報するテロップを送信する。ユーザのタップにより、図4中に示すように、不審者のズーム画面を表示し、不審者の位置と状況「1F玄関に不審者」を表示するとともに、このテロップを自動音声で読み上げる。 As described above, a telop for notifying the existence of a suspicious person is transmitted to the standby screen or the like of the smartphone 50a shown on the left side of FIG. By tapping the user, as shown in FIG. 4, the zoom screen of the suspicious person is displayed, the position and situation of the suspicious person "suspicious person at the entrance on the 1st floor" is displayed, and this telop is read out by automatic voice.
 ステップS19で制御部110は、セキュリティ区域内の不審者の情報を記憶部130に登録して本フローの処理を終了する。これにより、不審者の侵入情報が記録され、防犯上有益な情報となる。
 上記ステップS13で監視カメラ11によって撮影された画像から人が検出されない場合、上記ステップS14で家族等のID端末を所持している人である場合、又は上記ステップS15で来客等のID端末を登録した人である場合、本フローを終了する。
In step S19, the control unit 110 registers the information of the suspicious person in the security area in the storage unit 130 and ends the process of this flow. As a result, intrusion information of a suspicious person is recorded, which is useful information for crime prevention.
If no person is detected from the image taken by the surveillance camera 11 in step S13, if the person has an ID terminal such as a family member in step S14, or if the ID terminal such as a visitor is registered in step S15. If you are the person who did, end this flow.
<(II)「会話の内容による不審判定処理」>
 図11は、デジタルスマート・ディフェンスセキュリティシステムの(II)「会話の内容による不審判定処理」を示すフローチャートである。本フローは、監視装置100の制御部110(図2参照)により図5で設定された「常時警備モード」で実行される。
 ステップS21で制御部110は、インターホン及び電話の会話の音声を取得する(詳細後記)。
 ステップS22で制御部110の音声認識部112(図2参照)は、音声認識により、取得した会話の内容の注意度を判定する。音声認識部112は、インターホン又は電話の会話の内容にどれだけ不審な語彙が出現するかその頻度で注意度を判定する(図12参照)。
<(II) "Suspicious judgment processing based on the content of the conversation">
FIG. 11 is a flowchart showing (II) “suspicious determination processing based on the content of conversation” of the digital smart defense security system. This flow is executed by the control unit 110 (see FIG. 2) of the monitoring device 100 in the “always-on security mode” set in FIG.
In step S21, the control unit 110 acquires the voice of the conversation between the intercom and the telephone (details will be described later).
In step S22, the voice recognition unit 112 (see FIG. 2) of the control unit 110 determines the degree of attention of the acquired conversation content by voice recognition. The voice recognition unit 112 determines the degree of attention based on the frequency of appearance of suspicious vocabulary in the contents of conversations on the intercom or telephone (see FIG. 12).
 具体的には、音声認識部112は、出現頻度付き辞書135を参照して、会話の内容を単語の照合によって判定する。照合する単語には、出現頻度に対応して重み付けがなされる。単語の出現頻度が所定閾値より小さい場合は、注意度が小さいと判定する。単語の出現頻度が所定閾値以上の場合は、注意度が大きいと判定するとともに、注意度が所定値以上の場合、会話の内容が不審であると判定する。 Specifically, the voice recognition unit 112 refers to the dictionary 135 with appearance frequency and determines the content of the conversation by collating words. The collated words are weighted according to their frequency of occurrence. When the frequency of occurrence of words is less than a predetermined threshold value, it is determined that the degree of attention is low. When the frequency of appearance of words is equal to or higher than a predetermined threshold value, it is determined that the degree of attention is high, and when the degree of attention is equal to or higher than a predetermined value, it is determined that the content of the conversation is suspicious.
 注意度が所定閾値以上の場合(ステップS22:Yes)、ステップS23で制御部110は、警戒制御に移行する。注意度が所定閾値より小さい場合(ステップS22:No)、正常と判断して本フローの処理を終了する。 When the caution level is equal to or higher than the predetermined threshold value (step S22: Yes), the control unit 110 shifts to the alert control in step S23. When the degree of attention is smaller than the predetermined threshold value (step S22: No), it is determined that it is normal, and the processing of this flow ends.
 ステップS24で制御部110は、取得した音声がインターホンのものであるかを判定する。取得した音声がインターホンのものでない場合(ステップS24:No)、ステップS27に進む。
 取得した音声がインターホンのものである場合(ステップS24:Yes)、ステップS25で制御部110は、登録者情報DB165を参照して、登録端末が存在するか否かを判定する。
In step S24, the control unit 110 determines whether the acquired voice is that of the intercom. If the acquired voice is not that of the intercom (step S24: No), the process proceeds to step S27.
When the acquired voice is that of the intercom (step S24: Yes), in step S25, the control unit 110 refers to the registrant information DB 165 and determines whether or not the registered terminal exists.
 登録端末が存在する場合(ステップS25:Yes)、ステップS26で制御部110は、警戒制御解除して本フローの処理を終了する。
 登録端末が存在しない場合(ステップS25:No)、ステップS27で制御部110は、取得した音声が電話か否かを判定する。
 取得した音声が電話のものである場合(ステップS27:Yes)、ステップS28で制御部110は、会話の内容を単語の照合によって会話の内容が不審か否かを判定する。
 取得した音声が電話のものでない場合(ステップS27:No)、取得した音声はインターホン及び電話のいずれでもない場合であり制御対象外と判断して本フローの処理を終了する。
When the registered terminal exists (step S25: Yes), in step S26, the control unit 110 releases the alert control and ends the process of this flow.
When the registration terminal does not exist (step S25: No), the control unit 110 determines in step S27 whether or not the acquired voice is a telephone.
When the acquired voice is that of a telephone (step S27: Yes), in step S28, the control unit 110 determines whether or not the content of the conversation is suspicious by collating the content of the conversation with words.
When the acquired voice is not that of a telephone (step S27: No), it is determined that the acquired voice is neither an intercom nor a telephone and is not subject to control, and the processing of this flow is terminated.
 上記ステップS28で会話の内容が不審である判定結果の場合(ステップS28:Yes)、ステップS29で制御部110は、警戒制御を継続してこの会話を保存する。
 ステップS30で制御部110は、会話の内容が不審であることを保護者等へ通報して本フローの処理を終了する。
In the case of the determination result that the content of the conversation is suspicious in step S28 (step S28: Yes), the control unit 110 continues the alert control and saves this conversation in step S29.
In step S30, the control unit 110 notifies the guardian or the like that the content of the conversation is suspicious, and ends the process of this flow.
 上記ステップS28で会話の内容が不審である判定結果でない場合(ステップS28:No)、ステップS26で警戒制御を解除して本フローを終了する。 If the content of the conversation is not a suspicious determination result in step S28 (step S28: No), the alert control is released in step S26 and the present flow ends.
[音声認識部112による会話内容の不審判定]
 次に、音声認識部112による会話内容の不審判定について説明する。
 図12は、デジタルスマート・ディフェンスセキュリティシステム1000の音声認識部112の機能を説明する図である。
 デジタルスマート・ディフェンスセキュリティシステム1000は、電話の音声を取得し、音声認識部112が、出現頻度付き辞書135を参照して、会話の内容を単語の照合によって判定する。
[Suspicious judgment of conversation content by voice recognition unit 112]
Next, the suspicious determination of the conversation content by the voice recognition unit 112 will be described.
FIG. 12 is a diagram illustrating the function of the voice recognition unit 112 of the digital smart defense security system 1000.
The digital smart defense security system 1000 acquires the voice of the telephone, and the voice recognition unit 112 refers to the dictionary 135 with the frequency of appearance and determines the content of the conversation by collating words.
 出現頻度付き辞書135は、特殊詐欺・アポ電強盗等で使用される語彙の出現頻度付き辞書である。出現頻度付き辞書135は、単語が(good_freq/bad_freq)の出現頻度で紐付けられている。good_freqは、正常な通話内に現れる語彙の出現頻度、bad_freq: 特殊詐欺・アポ電強盗の通話内に現れる語彙の出現頻度である。例えば、出現頻度付き辞書135は、下記の語彙等を格納する。 The dictionary 135 with frequency of appearance is a dictionary with frequency of appearance of vocabulary used in special fraud, apoden robbery, etc. In the dictionary 135 with frequency of occurrence, words are associated with the frequency of occurrence of (good_freq / bad_freq). good_freq is the frequency of appearance of vocabulary that appears in a normal call, and the frequency of appearance of vocabulary that appears in a call of bad_freq: special fraud / apo-den robbery. For example, the dictionary 135 with frequency of appearance stores the following vocabulary and the like.
俺 (10,000/100,000)
子供 (100/10,000)
孫 (500/10,000)
お父さん (500/50,000)
お母さん (500/50,000)
おじいちゃん (100/40,000)
おばあちゃん (100/60,000)
現金 (1,000/100,000)
へそくり (10/1,000)
預金 (700/80,000)
偽札 (10/500)
カード (100/90,000)
暗証番号 (100/100,000)
口座 (200/90,000)
金庫 (10/20,000)
 その他、「部長、室長、技術本部長、常務、専務、本部、本店、本社、監査」などを含めるのもよい。
 例えば、正常な通話では、現金(1,000/100,000)、暗証番号(100/100,000)、口座(200/90,000)などの語彙は、殆ど出現しない。これらbad_freqの語彙が出現する場合、特殊詐欺・アポ電強盗が疑われる。複合して出現する場合は、より詐欺の可能性が高いと判断できる。
I (10,000 / 100,000)
Children (100 / 10,000)
Grandchildren (500 / 10,000)
Dad (500/50,000)
Mom (500/50,000)
Grandpa (100 / 40,000)
Grandma (100 / 60,000)
Cash (1,000 / 100,000)
Slip (10 / 1,000)
Deposit (700 / 80,000)
Counterfeit bill (10/500)
Card (100 / 90,000)
PIN (100 / 100,000)
Account (200 / 90,000)
Safe (10 / 20,000)
In addition, "general manager, general manager, technical general manager, managing director, managing director, headquarters, head office, head office, audit" may be included.
For example, in a normal call, vocabularies such as cash (1,000 / 100,000), PIN (100 / 100,000), and account (200 / 90,000) rarely appear. If these bad_freq vocabularies appear, special fraud and apo-den robbery are suspected. If they appear in combination, it can be judged that there is a higher possibility of fraud.
[デジタルスマート・ディフェンスセキュリティの特徴]
 次に、デジタルスマート・ディフェンスセキュリティシステムのデジタルスマート・ディフェンスセキュリティの特徴について説明する。
[Characteristics of Digital Smart Defense Security]
Next, the features of the digital smart defense security of the digital smart defense security system will be described.
 デジタルスマート・ディフェンスセキュリティシステム1000は、敷地内侵入検知及び登録機能として、平面的に侵入を判定する技術と、立面的に侵入を判定する技術、平面的、立面的に検知されたものを、時間による侵入を検証する技術を、1つ又は複数組み合せて用いる。以下、詳細に説明する。 The digital smart defense security system 1000 has a technology for determining intrusion in a plane, a technology for determining intrusion in an elevation, and a technology for detecting intrusion in a plane and an elevation as a site intrusion detection and registration function. , Use one or a combination of techniques to verify intrusion over time. The details will be described below.
 不審者を検出するには、まず人間が敷地内に侵入したかどうかをカメラ画像から判定する。この判定ののち、その人間が不審者であるかどうかを検証し登録・通知する。 To detect a suspicious person, first determine from the camera image whether a human has invaded the premises. After this judgment, it is verified whether the person is a suspicious person and registered / notified.
 警戒領域を2次元、3次元、4次元(3次元+時間)的に検査し危険度を評価・登録する。 The warning area is inspected in 2D, 3D, and 4D (3D + time) to evaluate and register the degree of risk.
 敷地境界内を平面的に危険度に応じて以下の3つに分類する。
 ・イエローベルトY:例えば敷地境界の内側30cm~4m
 ・オレンジベルトO:イエローベルトYとレッドベルトRの間
 ・レッドベルト R:例えば家屋の壁面から30cm~4m
The area within the boundary of the site is categorized into the following three according to the degree of risk.
・ Yellow belt Y: For example, 30 cm to 4 m inside the boundary of the site
・ Orange belt O: Between yellow belt Y and red belt R ・ Red belt R: For example, 30 cm to 4 m from the wall surface of the house
<セキュリティベルトについて>
 イエローベルトY(以下、図中はYにより表記)は、早期警戒レベルの状態である。この部分への侵入は危険度イエローで通知されるが、3次元的、4次元的な追加情報を付加して検証し、検証の結果として侵入があれば通知することにより、検出の正確さと早期に対処を行うことが可能となる。また、レッドベルトR(以下、図中はRにより表記)では領域への侵入があれば直ちに通知の対応が必要となるレベルである。
<About security belt>
The yellow belt Y (hereinafter referred to as Y in the figure) is in the state of early warning level. Intrusion into this part is notified with a yellow risk, but by adding 3D and 4D additional information and verifying, and notifying if there is an intrusion as a result of verification, detection accuracy and early It becomes possible to deal with. In addition, the red belt R (hereinafter, indicated by R in the figure) is a level at which it is necessary to immediately notify when there is an intrusion into the area.
<平面における検出>
 図13は、平面における侵入者検出の例を示す図であり、図13左は平面における正常な状態、図13右は平面における異常な状態を示す。
 図13左に示すように、敷地境界の内側にイエローベルトYを設定し、セキュリティゾーンであるオレンジベルトOを挟んで、玄関ドア及び窓を有する家屋の壁面を囲むようにレッドベルトRを設定する。
 図13右には、平面における異常な状態を示している。イエローベルトYを越えて、レッドベルトRの外側まで侵入者が侵入している。
<Detection on a plane>
FIG. 13 is a diagram showing an example of intruder detection in a plane, in which the left side of FIG. 13 shows a normal state in a plane and the right side of FIG. 13 shows an abnormal state in a plane.
As shown on the left side of FIG. 13, a yellow belt Y is set inside the boundary of the site, and a red belt R is set so as to surround the wall surface of the house having the entrance door and the window with the orange belt O which is the security zone sandwiched. ..
The right side of FIG. 13 shows an abnormal state in a plane. An intruder has invaded beyond the yellow belt Y to the outside of the red belt R.
 平面における侵入者検出では、侵入者と境界との包含関係を評価する。例えば、図13右の符号aに示すように、監視カメラ11が10コマ/秒で撮影するものであれば、10コマの画像から侵入された動体を検出し(図13右のフレーム参照)、その平面状での位置を計算する。その10コマ内で(秒5コマの監視カメラなら5コマ)その侵入者が確かに検出されるのであれば、侵入者が存在する可能性があると判断する。 In the intruder detection on the plane, the inclusion relationship between the intruder and the boundary is evaluated. For example, as shown by the symbol a on the right side of FIG. 13, if the surveillance camera 11 shoots at 10 frames / second, an intruded moving object is detected from the images of 10 frames (see the frame on the right side of FIG. 13). Calculate its position on the plane. If the intruder is certainly detected within the 10 frames (5 frames for a surveillance camera with 5 frames per second), it is determined that the intruder may exist.
<立面における検出>
 図14は、立面における侵入者検出の例を示す図であり、図14左は立面における正常な状態、図14右は立面における異常な状態をそれぞれ示す。
 図14左に示すように、敷地境界の内側にイエローベルトYを設定し、オレンジベルトOを挟んで、家屋の壁面を囲むようにレッドベルトRを設定する。
 立面における検出では、監視カメラ11の画像から高さ(図14右のフレーム参照)を評価する。この高さが標準的な人間の高さかどうかを評価する。例えば、図14右の符号bに示すように、監視カメラ11の1秒間の画像数を評価し、確かに侵入者が人間であることを判断する。図14の例では、侵入者がイエローベルトYを超えて侵入することを検出する。
 立面における侵入者検出により、動物の侵入や、植栽の風による動きの誤検知を除去することができる。
<Detection on elevation>
FIG. 14 is a diagram showing an example of intruder detection on an elevation. FIG. 14 left shows a normal state on an elevation, and FIG. 14 right shows an abnormal state on an elevation.
As shown on the left side of FIG. 14, a yellow belt Y is set inside the boundary of the site, and a red belt R is set so as to surround the wall surface of the house with the orange belt O sandwiched between them.
In the detection on the elevation, the height (see the frame on the right of FIG. 14) is evaluated from the image of the surveillance camera 11. Evaluate whether this height is a standard human height. For example, as shown by reference numeral b on the right side of FIG. 14, the number of images per second of the surveillance camera 11 is evaluated, and it is certainly determined that the intruder is a human being. In the example of FIG. 14, it is detected that an intruder invades beyond the yellow belt Y.
By detecting intruders on the elevation, it is possible to eliminate the invasion of animals and the false detection of movement due to the wind of planting.
<時間による検証>
 図15は、時間による侵入者検証の例を示す図であり、図15左は時間における正常な状態、図15右は時間における異常な状態をそれぞれ示す。
 図15右の符号cに示すように、デジタルスマート・ディフェンスセキュリティシステム1000は、立面における侵入者検出により、得られた侵入者の検出について、一秒毎に評価を繰り返す。図15右に示すように、侵入者はイエローベルトY上を歩いている。デジタルスマート・ディフェンスセキュリティシステム1000は、侵入者がイエローベルトY上で継続して侵入検出されたことを受けて、侵入者が確かに侵入したと判断する。
<Verification by time>
FIG. 15 is a diagram showing an example of intruder verification by time, in which the left side of FIG. 15 shows a normal state in time and the right side of FIG. 15 shows an abnormal state in time.
As shown by the reference numeral c on the right side of FIG. 15, the digital smart defense security system 1000 repeats the evaluation every second for the detection of the intruder obtained by the intruder detection on the elevation. As shown on the right side of FIG. 15, an intruder is walking on the yellow belt Y. The digital smart defense security system 1000 determines that the intruder has certainly invaded after the intruder has been continuously detected on the yellow belt Y.
<立面的に侵入を判定する技術:マッピング>
 立面的に侵入を判定する技術を説明する。
 立面的に侵入を判定する技術として、敷地境界の平面配置情報をカメラ画像にマッピングする。
 図16は、敷地境界をカメラ画像にマッピングする例を示す図であり、図16左はその敷地境界の平面図、図16右はその敷地境界をカメラ画像にマッピングした例を示す。マッピングはCG(Computer Graphics)で生成された画像を写真画像に合成する技術である。合成する時、CGの背景部分を透過させることによりCGを写真画像に自然に重畳合成できる。
<Technology for determining intrusion from an elevation: Mapping>
A technique for determining intrusion from an elevation will be described.
As a technique for determining intrusion from an elevation, the plane layout information of the site boundary is mapped to the camera image.
FIG. 16 is a diagram showing an example of mapping the site boundary to the camera image, FIG. 16 left shows a plan view of the site boundary, and FIG. 16 right shows an example of mapping the site boundary to the camera image. Mapping is a technique for synthesizing an image generated by CG (Computer Graphics) with a photographic image. When compositing, the CG can be naturally superimposed and composited on the photographic image by making the background portion of the CG transparent.
 図16左に示すように、監視カメラ(図16左の×印参照)を設置するに当たり、警戒区域(自宅敷地境界などアウトラインとなる形状)の平面図を正確に作成する。また、監視カメラの設置位置、高さ及び向き(ロール、ピッチ、ヨー情報)も与える。上記ロール、ピッチ、ヨーは、3次元空間における視線の回転角を表す。視線方向をX軸、それに直行する左手方向をY軸、視点の上方向をZ軸とすると、X軸周りの回転をロール、Y軸周りの回転をピッチ、Z軸周りの回転をヨーという。 As shown on the left side of Fig. 16, when installing the surveillance camera (see the x mark on the left side of Fig. 16), accurately create a plan view of the caution area (outline shape such as the boundary of the home site). In addition, the installation position, height and orientation (roll, pitch, yaw information) of the surveillance camera are also given. The roll, pitch, and yaw represent the rotation angle of the line of sight in a three-dimensional space. If the line-of-sight direction is the X-axis, the left-hand direction perpendicular to it is the Y-axis, and the upward direction of the viewpoint is the Z-axis, the rotation around the X-axis is called roll, the rotation around the Y-axis is called pitch, and the rotation around the Z-axis is called yaw.
 図16右は、図16左の符号dの監視カメラの画像をマッピングした例を示している。
 警戒区域の位置情報をカメラのパラメータから、投影変換とビューポートによるクリッピングを行い監視カメラから得られる画像のどこが敷地内になるのかを求める(図16右参照)。上記ビューポートは、3次元空間を2次元として認識する場合の2次元の限界を表す。これは監視カメラで写真を取った時の写真に映る範囲に相当する。ビューポートは、監視カメラで撮影できる範囲を表す。また、上記クリッピングは、3次元データで表現されたコンピュータグラフィックス等のようなオブジェクトをビューポートの大きさに切りだす処理をいう。
The right side of FIG. 16 shows an example of mapping the image of the surveillance camera of reference numeral d on the left side of FIG.
The position information of the caution area is projected from the parameters of the camera and clipped by the viewport to find out what part of the image obtained from the surveillance camera is on the site (see the right side of FIG. 16). The viewport represents a two-dimensional limit when recognizing a three-dimensional space as two-dimensional. This corresponds to the range that appears in the picture when the picture is taken with a surveillance camera. The viewport represents the range that can be captured by the surveillance camera. Further, the clipping refers to a process of cutting out an object such as computer graphics represented by three-dimensional data to the size of a viewport.
<立面的に侵入を判定する技術:あらかじめ登録した物体との大きさ比較>
 マッピングされたセキュリティ区域である敷地内にある門扉の高さ、車の高さ、植生の高さ、及び人の高さ(頭の大きさ、直立した高さ、しゃがんだ高さなどの既知の人の大きさ)を比較する。
<Technology for determining intrusion from an elevation: size comparison with a pre-registered object>
Known security areas such as gate height, car height, vegetation height, and human height (head size, upright height, crouching height, etc.) within the site, which is a mapped security area. Compare the size of a person).
 図17は、敷地内にあらかじめあるものの高さを登録する例を説明する図である。
 図17に示すように、マッピングされたセキュリティ区域である敷地内にある門扉の高さ、車の高さ、植生の高さを登録する。また、人が有してる基準となるサイズを、すなわち人の高さ(頭の大きさ、直立した高さ、しゃがんだ高さなどの既知の人の大きさ)を画像対応DB(図示省略)にあらかじめ記憶しておく。人が侵入する場合はあらかじめ登録したセキュリティ区域である敷地内にある門扉の高さ、車の高さ、植生の高さ以外で人間的な高さがあるものが人であり、その形状の複数の画像によって侵入者(図17のフレーム参照)を判定する。
FIG. 17 is a diagram illustrating an example of registering the height of something that is in advance on the site.
As shown in FIG. 17, the height of the gate, the height of the car, and the height of the vegetation in the site, which is the mapped security area, are registered. In addition, the standard size that a person has, that is, the height of the person (the size of a known person such as the size of the head, the height of standing upright, the height of crouching, etc.) is an image-compatible DB (not shown). Remember in advance. When a person invades, a person has a human height other than the height of the gate, the height of the car, and the height of the vegetation in the site, which is a pre-registered security area, and there are multiple shapes. The intruder (see the frame of FIG. 17) is determined by the image of.
 図18は、人間の状態による高さの変化を説明する図である。図18の符号eは、高さに変化のある異常な状態を示す。図18の符号fは、画像対応DBに登録されている色々な高さの物体(門扉など)を示し、図18の符号gは、画像対応DBに登録されている正常な状態の人の大きさ(高さ)を示す。
 図18に示すように、人間の位置と3次元的な高さを(伏せる姿勢、座る姿勢、中腰の姿勢、立脚の姿勢等を判断するため、人間の5体すなわち、頭部、顔の各部部品、体、足などの厚さ、高さとの対比を正しく表せるようにする)反映する。これにより、注意度判断の精度を100%近くまで高める。
 人間の高さは、監視カメラから得られた画像の内の動体を囲む領域(一次ライン)(図17のフレーム参照)のボックスの高さにより求める。
FIG. 18 is a diagram illustrating a change in height due to a human condition. Reference numeral e in FIG. 18 indicates an abnormal state in which the height changes. Reference numeral f in FIG. 18 indicates an object (gate, etc.) of various heights registered in the image correspondence DB, and reference numeral g in FIG. 18 indicates the size of a person in a normal state registered in the image correspondence DB. Indicates the height.
As shown in FIG. 18, in order to determine the position and three-dimensional height of a human (a prone posture, a sitting posture, a mid-waist posture, a standing posture, etc.), five human bodies, that is, head and face parts. (To be able to correctly express the contrast with the thickness and height of parts, body, legs, etc.) Reflect. As a result, the accuracy of the attention level judgment is increased to nearly 100%.
The height of a human is determined by the height of a box in an area (primary line) (see the frame in FIG. 17) surrounding a moving object in an image obtained from a surveillance camera.
<時間による侵入検証>
 立面における侵入者検出を、時間による侵入でより精度よく検証する技術を説明する。
 図19は、人間の状態による高さの変化を説明する図である。図19の符号hは、侵入者が停止している状態、図19の符号iは、侵入者がゆっくり移動している状態、図19の符号jは、侵入者が早く移動している状態をそれぞれ示す。
<Verification by time>
We will explain a technique for more accurately verifying intruder detection on an elevation by intruding over time.
FIG. 19 is a diagram illustrating a change in height depending on a human condition. Reference numeral h in FIG. 19 indicates a state in which the intruder is stopped, reference numeral i in FIG. 19 indicates a state in which the intruder is slowly moving, and reference numeral j in FIG. 19 indicates a state in which the intruder is moving quickly. Each is shown.
 前記立面における侵入者検出では、ある一瞬間に人間が警戒領域(敷地境界内)に侵入しているかどうかを判断することはできるものの、何らかの目的を持って侵入しているかどうかは判別できない。つまり、たまたま一時的に警戒領域(敷地境界内)に侵入してしまったケースを除去できない。このため、デジタルスマート・ディフェンスセキュリティシステム1000では、時間的な継続性を加味する。 In the intruder detection on the elevation, it is possible to determine whether or not a human is invading the caution area (within the boundary of the site) at a certain moment, but it is not possible to determine whether or not the person is invading for some purpose. In other words, it is not possible to remove the case where the guard area (within the boundary of the site) has invaded temporarily. Therefore, in the digital smart defense security system 1000, temporal continuity is added.
 図19に示すように、人間が敷地内に侵入したことを判別した情報が短い時間の間に連続して得られた場合。例えば2秒間に連続して検知されたとすると、それは侵入者が意図をもって侵入したと判断できる。この時間による侵入を検証技術を用いて「人が意図を持って敷地内に侵入した」という事実を判断でき、その状態情報を登録することができる。 As shown in Fig. 19, when the information that determines that a human has invaded the premises is continuously obtained in a short period of time. For example, if it is detected continuously for 2 seconds, it can be determined that the intruder has intentionally invaded. It is possible to determine the fact that "a person intentionally invaded the site" by using the verification technology for the intrusion due to this time, and to register the state information.
[検出された侵入者の注意度評価]
 デジタルスマート・ディフェンスセキュリティシステム1000は、検出された侵入者の注意度を評価し、注意度に応じて利用者に通知する。上述した、図11のフローのステップS19の「危険度(注意度、緊急度)に応じた通報」に対応する。
 具体的には、瞳の動きによる判断技術と、首の動きによる判断技術を用いる。これにより、デジタルスマート・ディフェンスセキュリティシステムは、警戒領域に侵入検知された対象の心理状態を危険度として評価を行うことができる。
[Evaluation of alertness of detected intruders]
The digital smart defense security system 1000 evaluates the alertness of the detected intruder and notifies the user according to the alertness. Corresponds to the above-mentioned "report according to the degree of danger (degree of caution, degree of urgency)" in step S19 of the flow of FIG.
Specifically, a judgment technique based on the movement of the eyes and a judgment technique based on the movement of the neck are used. As a result, the digital smart defense security system can evaluate the psychological state of the target whose intrusion is detected in the caution area as a risk level.
<瞳の動きによる判断>
 図20上段は、瞳の動き(左右)による判断を説明する図である。
 画像処理の技術を用いると顔は「顔器官検出(Facial Landmark Detection)」によって、目鼻口の位置を獲得できる。次の技術により瞳の場所を判断する。
 まず、(1)目の画像を切り出す。これを一次ラインと呼称する。(2)次にその画像を二値化する。瞳は黒くなり、白眼は白となる。(3)目を水平の3つの領域に分ける(右、中央、左)。このそれぞれの領域の黒の画素を数える。この最も多い領域を二次ラインと呼称する。この二次ラインに瞳が有ると判断する。つまり、瞳が右に寄っているか、左に寄っているか、中央にあるかを判断できる。
<Judgment by eye movement>
The upper part of FIG. 20 is a diagram for explaining the judgment based on the movement of the pupil (left and right).
Using image processing technology, the face can acquire the position of the eyes, nose and mouth by "Facial Landmark Detection". The location of the pupil is determined by the following technique.
First, the first image is cut out. This is called a primary line. (2) Next, the image is binarized. The eyes turn black and the white eyes turn white. (3) Divide the eyes into three horizontal areas (right, center, left). The black pixels in each of these areas are counted. This most abundant area is called a secondary line. It is judged that there is a pupil in this secondary line. In other words, it is possible to determine whether the pupil is to the right, to the left, or in the center.
<首の動き(左右)による判断>
 図20中段は、首の動き(左右)による判断を説明する図である。
 首の動き、つまり左右を見渡したり、上をうかがう時、人は首を動かす。この首の動きは顔の向きという形であらわされる。顔器官検出で得られる点を内包する矩形を一次ラインとし、目鼻口を内包する矩形を二次ラインとすると、この一次ラインと二次ラインに囲まれる領域の重心座標の隔たりにより顔の向きをベクトルとして数値的にあらわすことができる。
<Judgment by neck movement (left and right)>
The middle part of FIG. 20 is a diagram for explaining the judgment based on the movement of the neck (left and right).
People move their necks when they look to the left or right or look up. This movement of the neck is expressed in the form of the direction of the face. If the rectangle containing the points obtained by facial organ detection is the primary line and the rectangle containing the eyes, nose and mouth is the secondary line, the orientation of the face is determined by the distance between the primary line and the center of gravity of the area surrounded by the secondary line. It can be expressed numerically as a vector.
 図20中段の矩形枠に示す顔全体の位置に対して、目・眉・鼻・口・顎の輪郭を抽出することで、図20中段の中央のニュートラルな状態から、左に顔を向けるように首を動かす状態と、右に顔を向けるように首を動かす状態とが段階的に判定される。なお、この技術を用いて、ある角度から撮影された顔画像をもとに、ニュートラルな状態の顔画像を生成することもできる。 By extracting the contours of the eyes, eyebrows, nose, mouth, and chin with respect to the position of the entire face shown in the rectangular frame in the middle of Fig. 20, the face can be turned to the left from the neutral state in the center of Fig. 20. The state of moving the neck to the right and the state of moving the neck so as to turn the face to the right are determined step by step. It should be noted that this technique can also be used to generate a face image in a neutral state based on a face image taken from a certain angle.
<首の動き(上下)による判断>
 図20下段は、首の動き(上下)による判断を説明する図である。
 この首の動き(上下)も首の動き(左右)と同様に判断することができる。
<Judgment by neck movement (up and down)>
The lower part of FIG. 20 is a diagram for explaining the judgment based on the movement of the neck (up and down).
This neck movement (up and down) can be judged in the same way as the neck movement (left and right).
<時間の経過による判断>
 図20上段に示す瞳の位置による判断だけでは、瞬間的な状況だけしかわからない。このため、短い時間における状態を追跡する。例えば、1秒間に5フレーム又は10フレームで目の位置情報を取得して記録し、右、中央、左と判断される状況が混在した場合、目が激しく動いていると判断できる。これにより、デジタルスマート・ディフェンスセキュリティシステムは、「人が悪意を持つことにより目を激しく動かせた」と考えられる状態を判断でき、その状態を登録することができる。
<Judgment over time>
Only the momentary situation can be understood only by the judgment based on the position of the pupil shown in the upper part of FIG. Therefore, the state in a short time is tracked. For example, when the position information of the eyes is acquired and recorded at 5 frames or 10 frames per second and the situations of right, center, and left are mixed, it can be determined that the eyes are moving violently. As a result, the digital smart defense security system can determine a state in which it is considered that "a person has moved his eyes violently due to malicious intent" and can register the state.
 また、首の位置についても同様に、首の動き時間の変化を用いることにより動きを判断できる。例えば2秒という短い時間にベクトルが右方向から左方向、或いは上方向から下方向に変化した場合、首が激しく動いたと判断できる。これにより、デジタルスマート・ディフェンスセキュリティシステムは、「人が悪意を持つことにより首を激しく動かせた」と考えられる状態を判断でき、その状態を登録することができる。
 なお、図20の瞳と首の動きの変化による判断処理は、図28の適用例4において後記する。
Similarly, regarding the position of the neck, the movement can be determined by using the change in the movement time of the neck. For example, when the vector changes from right to left or from top to bottom in a short time of 2 seconds, it can be determined that the neck has moved violently. As a result, the digital smart defense security system can determine a state in which it is considered that "a person has moved his or her neck violently due to malicious intent" and can register the state.
The determination process based on the change in the movement of the pupil and the neck in FIG. 20 will be described later in Application Example 4 in FIG. 28.
[BLEによる警備解除]
 図21は、BLEによる一時的な警備解除を説明する図である。
 BLE(Bluetooth Low Energy)は、近接接近を検知する技術である。デジタルスマート・ディフェンスセキュリティシステムは、利用者がスマートフォンにデジタルスマート・ディフェンスセキュリティシステム専用のアプリケーションをインストールすることにより、利用者、その家族が警戒範囲に侵入することを許す機能を持つ。利用者はあらかじめ定められた解除コードを持ち(アプリの中にインストールされている)、近接を感知すると、この解除コードがデジタルスマート・ディフェンスセキュリティシステムに送信され、一時的に警戒モードを解除する(図5のステップS3参照)。これにより、利用者・その家族が敷地内でする行動について検知対象外とすることが可能になり、精度の高い侵入検知を行うことができる。
[Release security by BLE]
FIG. 21 is a diagram illustrating temporary security release by BLE.
BLE (Bluetooth Low Energy) is a technology that detects close proximity. The digital smart defense security system has a function of allowing the user and his / her family to invade the alert range by installing an application dedicated to the digital smart defense security system on the smartphone. The user has a predetermined unlock code (installed in the app), and when it detects proximity, this unlock code is sent to the Digital Smart Defense Security System to temporarily cancel the alert mode ( See step S3 in FIG. 5). As a result, it becomes possible to exclude the behaviors of the user and his / her family from the detection target, and it is possible to perform highly accurate intrusion detection.
[適用例]
 デジタルスマート・ディフェンスセキュリティシステムによる侵入検出の適用例について説明する。
<適用例1>
 図22は、デジタルスマート・ディフェンスセキュリティシステム1000による侵入検出の適用例1を説明する図である。
 図22に示すように、敷地境界の内側にイエローベルトYを設定し、オレンジベルトOを挟んで、玄関ドア及び窓を有する家屋の壁面を囲むようにレッドベルトRを設定する。図22は、平面図であるが、立面による侵入者の検出を示すために、侵入者については、(1)水平位置(X軸,Y軸)と水平位置に垂直な(2)垂直位置(Z軸)を破線により表している。すなわち、侵入者は、上述した「制御部110によって3次元空間内の位置」が検出される。図22の西側スペース及び南側スペースのセキュリティゾーンにいる不審者(しゃがんだ不審者、伏した不審者)についても同様に、立面における侵入者検出が実行される。
[Application example]
An application example of intrusion detection by the digital smart defense security system will be described.
<Application example 1>
FIG. 22 is a diagram illustrating application example 1 of intrusion detection by the digital smart defense security system 1000.
As shown in FIG. 22, a yellow belt Y is set inside the boundary of the site, and a red belt R is set so as to surround the wall surface of the house having the entrance door and the window with the orange belt O sandwiched between them. FIG. 22 is a plan view, but in order to show the detection of an intruder by an elevation, the intruder is (1) a horizontal position (X-axis, Y-axis) and (2) a vertical position perpendicular to the horizontal position. (Z axis) is represented by a broken line. That is, the intruder detects the above-mentioned "position in the three-dimensional space by the control unit 110". Similarly, intruder detection on the elevation is executed for the suspicious persons (crouching suspicious person, prone suspicious person) in the security zones of the western space and the southern space of FIG. 22.
 図23は、図22の適用例1において、デジタルスマート・ディフェンスセキュリティシステム1000、家族、不審者の動作の概要を示すフローチャートである。図23の家族及び不審者のフローは、CPU処理ではないが、便宜上ステップ番号を付して説明する。家族(family)はステップF、不審者(Suspicious person)はステップSPを付している。 FIG. 23 is a flowchart showing an outline of the operations of the digital smart defense security system 1000, the family, and the suspicious person in the application example 1 of FIG. The flow of the family and the suspicious person in FIG. 23 is not CPU processing, but will be described with step numbers for convenience. The family has step F, and the suspicious person has step SP.
《デジタルスマート・ディフェンスセキュリティシステム》
 ステップS101でデジタルスマート・ディフェンスセキュリティシステム1000が警備を開始する(ステップS1)。
 ステップS102で時間により警備モードを変更する(ステップS2)(図5のステップS2に対応)。
《Digital Smart Defense Security System》
In step S101, the digital smart defense security system 1000 starts security (step S1).
The security mode is changed according to the time in step S102 (step S2) (corresponding to step S2 in FIG. 5).
 設定した任意の条件判定を行う(ステップS103)。
 22:00以降など家族全員が帰宅済みの場合、ステップS104で在宅警備を自動開始する。
 夜23:00などの場合、ステップS105で在宅警備を自動開始する。
 朝5:00などの場合、ステップS106で在宅警備を自動解除する。
Arbitrary set condition determination is performed (step S103).
If the whole family has returned home, such as after 22:00, home security is automatically started in step S104.
At 23:00 at night, home security is automatically started in step S105.
In the case of 5:00 in the morning, the home security is automatically canceled in step S106.
 監視カメラから画像を得る(ステップS107)。
 画像の中で人間を囲む矩形を得る(ステップS108)。
 家屋外周に設置された監視カメラ11の映像から、侵入者を検出して登録する(ステップS109)。
 家族のスマートフォンにBLE信号を送る(ステップS110)。
An image is obtained from the surveillance camera (step S107).
Obtain a rectangle that surrounds a human in the image (step S108).
An intruder is detected and registered from the image of the surveillance camera 11 installed around the outside of the house (step S109).
Send a BLE signal to the family's smartphone (step S110).
 BLEによる警備の一時解除が行われたか否か判定する(ステップS111)。
 警備の一時解除が行われた場合、警備を一時解除する(ステップS112)。
 警備の一時解除が行われない場合、ステップS113で侵入者の水平位置、垂直位置を取得する。
It is determined whether or not the security is temporarily released by BLE (step S111).
When the security is temporarily released, the security is temporarily released (step S112).
If the security is not temporarily released, the horizontal position and the vertical position of the intruder are acquired in step S113.
 不審者による敷地内への侵入が行われたか否かを判別する(ステップS114)。
 不審者による敷地内への侵入が行われた場合、ステップS115で検出された侵入者の注意度(図10のステップS17の「危険度判定」に対応)を評価し、注意度に応じて利用者に通知する情報を作成する。
 ステップS116で家族のスマートフォンに発報して通知して(図10のステップS18の「通報」に対応)上記ステップS102に戻る。
It is determined whether or not a suspicious person has invaded the site (step S114).
When a suspicious person invades the site, the intruder's caution level detected in step S115 (corresponding to the “risk level determination” in step S17 in FIG. 10) is evaluated and used according to the caution level. Create information to notify the person.
In step S116, the family's smartphone is notified and notified (corresponding to the “report” in step S18 of FIG. 10), and the process returns to step S102.
《家族》
 家族又は関係者が警備モードを設定する(ステップF1)。家族が不在の時は外出警備にし、家族が在宅の時は在宅警備にする(図6下参照)。家族による警備モードの設定(ステップF1)情報は、デジタルスマート・ディフェンスセキュリティシステム1000に送信され、デジタルスマート・ディフェンスセキュリティシステム1000が警備を開始する(ステップS1)。
"family"
A family member or a related person sets the security mode (step F1). When the family is absent, use out-of-home security, and when the family is at home, use home security (see the bottom of Fig. 6). The family security mode setting (step F1) information is transmitted to the digital smart defense security system 1000, and the digital smart defense security system 1000 starts security (step S1).
 イエローベルトY内に侵入者が侵入する(ステップF2)。例えば、図22に示す北側のイエローベルトYに不審者が侵入する。デジタルスマート・ディフェンスセキュリティシステム1000は、監視カメラから画像を得る(ステップS107)。 An intruder invades the yellow belt Y (step F2). For example, a suspicious person invades the yellow belt Y on the north side shown in FIG. The digital smart defense security system 1000 obtains an image from a surveillance camera (step S107).
 侵入者は家族であるか否かを判定する(ステップF3)。
 侵入者が家族の場合、イエローベルトY内に家族が立ち入っている(ステップF4)。例えば、図22に示す北側のイエローベルトY内に家族が立ち入っている。
It is determined whether the intruder is a family member (step F3).
If the intruder is a family member, the family member is inside the yellow belt Y (step F4). For example, a family is in the yellow belt Y on the north side shown in FIG.
 デジタルスマート・ディフェンスセキュリティシステム1000は、家族のスマートフォンにBLE信号を送り(ステップS110)、家族のスマートフォンがBLE信号を受信する(ステップF5)。 The digital smart defense security system 1000 sends a BLE signal to the family's smartphone (step S110), and the family's smartphone receives the BLE signal (step F5).
 これを受けて、家族又は関係者はスマートフォンにより屋外から警備モードを変更する(ステップF6)。家族がイエローベルトYにいても不審者ではないので、警備を一時解除するためである。
 敷地内で自由に行動する(ステップF7)。
In response to this, the family member or the person concerned changes the security mode from the outdoors using the smartphone (step F6). This is because even if the family is in Yellow Belt Y, they are not suspicious, so the security is temporarily released.
Act freely on the premises (step F7).
 スマートフォンでデジタルスマート・ディフェンスセキュリティシステム1000からの通知を受け取る(ステップF8)。
 スマートフォン、監視カメラのスピーカから侵入者に警告を通知する(ステップF9)。
Receive a notification from the Digital Smart Defense Security System 1000 on your smartphone (step F8).
A warning is notified to an intruder from the speaker of the smartphone or the surveillance camera (step F9).
《侵入者》
 イエローベルトY内に侵入者が侵入し、侵入者が家族でない場合、イエローベルトY内に不審者が立ち入っている(ステップSP1)。
 敷地内で不審者が伏せる姿勢、座る姿勢、中腰の姿勢、立脚の姿勢等をとる(ステップSP2)。
 不審者の目が左右にきょろきょろする(ステップSP3)。
 不審者が首を左右に素早く振る(ステップSP4)。
 不審者が首を上下に素早く振る(ステップSP5)。
 これら不審者の動きは、デジタルスマート・ディフェンスセキュリティシステム1000に送られ、デジタルスマート・ディフェンスセキュリティシステム1000は、不審者の動きに基づいて危険度(注意度、緊急度)を判定する。デジタルスマート・ディフェンスセキュリティシステム1000は、家族や関係機関に、危険度(注意度、緊急度)に応じたレベルの通知を行うことができる。
"invader"
If an intruder has invaded the yellow belt Y and the intruder is not a family member, a suspicious person has entered the yellow belt Y (step SP1).
A suspicious person takes a prone posture, a sitting posture, a mid-waist posture, a standing posture, etc. on the premises (step SP2).
The suspicious person's eyes wander left and right (step SP3).
A suspicious person quickly shakes his head from side to side (step SP4).
A suspicious person quickly shakes his head up and down (step SP5).
The movements of these suspicious persons are sent to the digital smart defense security system 1000, and the digital smart defense security system 1000 determines the degree of danger (attention, urgency) based on the movements of the suspicious person. The digital smart defense security system 1000 can notify family members and related organizations of the level according to the degree of danger (degree of caution, degree of urgency).
<適用例2>
 図24は、デジタルスマート・ディフェンスセキュリティシステム1000による侵入検出の適用例2を説明する図である。図24は、家屋外周に設置された監視カメラの映像から侵入者を検出・登録する例を示している。図25は、図24の適用例2において、デジタルスマート・ディフェンスセキュリティシステム1000の動作を示すフローチャートである。
 図24左は、不審者侵入前(Before)の1秒間に10コマの場合の画像である。図24左に示すように、不審者は、イエローベルトYへ侵入していない。
<Application example 2>
FIG. 24 is a diagram illustrating application example 2 of intrusion detection by the digital smart defense security system 1000. FIG. 24 shows an example of detecting and registering an intruder from the image of a surveillance camera installed around the outside of the house. FIG. 25 is a flowchart showing the operation of the digital smart defense security system 1000 in the application example 2 of FIG. 24.
The left side of FIG. 24 is an image in the case of 10 frames per second before the intrusion of a suspicious person (Before). As shown on the left side of FIG. 24, the suspicious person has not invaded the yellow belt Y.
 図24右は、不審者侵入後(After)の1秒間に10コマの場合の画像である。図24右に示すように、不審者は、イエローベルトYへ侵入した。デジタルスマート・ディフェンスセキュリティシステム1000の制御部110(図2参照)の人検出部111は、監視カメラ11によって撮影された画像から人(不審者)を検出する。図24右において検出された不審者は、矩形の枠で示され、レッドベルトRまでのおおよその2次元距離は破線で示される。図24右に示すように、イエローベルトYを越えて侵入した不審者は、レッドベルトRに近づいて来ている。 The right side of FIG. 24 is an image of 10 frames per second after the intrusion of a suspicious person (After). As shown on the right side of FIG. 24, the suspicious person invaded the yellow belt Y. The person detection unit 111 of the control unit 110 (see FIG. 2) of the digital smart defense security system 1000 detects a person (suspicious person) from the image taken by the surveillance camera 11. The suspicious person detected on the right side of FIG. 24 is indicated by a rectangular frame, and the approximate two-dimensional distance to the red belt R is indicated by a broken line. As shown on the right side of FIG. 24, a suspicious person who has invaded beyond the yellow belt Y is approaching the red belt R.
 図25において、ステップS201でレッドベルトRへの侵入者を検出する。上述したように、デジタルスマート・ディフェンスセキュリティシステム1000の制御部110(図2参照)の人検出部111は、監視カメラ11によって撮影された画像から人を検出する。
 ステップS202でレッドベルトR(家屋の壁面等から例えば30cm~4mの範囲)への侵入者検出を開始する。
In FIG. 25, an intruder into the red belt R is detected in step S201. As described above, the person detection unit 111 of the control unit 110 (see FIG. 2) of the digital smart defense security system 1000 detects a person from the image taken by the surveillance camera 11.
In step S202, detection of an intruder on the red belt R (for example, in the range of 30 cm to 4 m from the wall surface of the house) is started.
 以下、立面における侵入者検出(ステップS203~ステップS209)と、平面における侵入者検出(ステップS210~ステップS214)と、に分岐して、立面と平面のそれぞれにおいて侵入者を検出する。本実施形態は、制御部110(図2参照)は、人検出によって検出された人の2次元の位置と人の大きさとに基づいて、画像対応DBを参照して人の3次元空間内の位置を検出する。そして、制御部110は、検出された人の3次元空間内の位置が3次元のセキュリティ区域内であることを受けて、不審者の存在を通報することに特徴がある。このため、立面における侵入者検出が主要動作であり、図24も立面における侵入者の画像を示している。 Hereinafter, the intruder is detected on each of the elevation and the plane by branching into the intruder detection on the elevation (step S203 to S209) and the intruder detection on the plane (step S210 to S214). In the present embodiment, the control unit 110 (see FIG. 2) refers to the image correspondence DB based on the two-dimensional position of the person and the size of the person detected by the person detection, and is in the three-dimensional space of the person. Detect the position. Then, the control unit 110 is characterized in that the presence of the suspicious person is notified in response to the fact that the position of the detected person in the three-dimensional space is within the three-dimensional security area. Therefore, intruder detection on the elevation is the main operation, and FIG. 24 also shows an image of the intruder on the elevation.
 ステップS203で立面における侵入者検出を開始(1秒間に5~10コマの画像)する。
 ステップS204で1秒間の画像、例えば10コマ/秒の場合1/10~10/10の画像を立面上で検査する。
In step S203, intruder detection on the elevation is started (5 to 10 frames of images per second).
In step S204, an image for 1 second, for example, an image of 1/10 to 10/10 in the case of 10 frames / second is inspected on an elevation.
 ステップS205で侵入検知されたか否かを判定する。
 ステップS205で侵入検知されない場合、ステップS206で侵入なしと判定し、ステップS207で正常と判断して本フローの処理を終了する。
 ステップS205で侵入検知された場合、ステップS208で侵入ありと判定し、ステップS209で異常(要注意)と判断して本フローの処理を終了する。
It is determined in step S205 whether or not the intrusion is detected.
If the intrusion is not detected in step S205, it is determined in step S206 that there is no intrusion, and in step S207 it is determined to be normal, and the processing of this flow is terminated.
When an intrusion is detected in step S205, it is determined in step S208 that there is an intrusion, and in step S209, it is determined that there is an abnormality (need attention), and the processing of this flow ends.
 一方、ステップS210で平面における侵入者検出を開始(1秒間に5~10コマの画像)する。
 ステップS211で1秒間の画像、例えば1秒間に10コマの場合1/10~10/10の画像を平面上で検査する。
On the other hand, in step S210, intruder detection on a flat surface is started (5 to 10 frames of images per second).
In step S211, an image for 1 second, for example, an image of 1/10 to 10/10 in the case of 10 frames per second is inspected on a flat surface.
 ステップS212で侵入検知されたか否かを判定する。
 ステップS212で侵入検知されない場合、ステップS213で侵入なしと判定し、ステップS207で正常と判断して本フローの処理を終了する。
 ステップS212で侵入検知された場合、ステップS214で侵入ありと判定し、ステップS209で異常(要注意)と判断して本フローの処理を終了する。
It is determined in step S212 whether or not the intrusion is detected.
If the intrusion is not detected in step S212, it is determined in step S213 that there is no intrusion, and in step S207 it is determined that the intrusion is normal, and the processing of this flow ends.
When an intrusion is detected in step S212, it is determined in step S214 that there is an intrusion, and in step S209, it is determined that there is an abnormality (need attention), and the processing of this flow ends.
 適用例2では、立面における侵入者検出と平面における侵入者検出とを併用しているので、立面における侵入者検出単体よりも検出の精度を高めることができる。 In Application Example 2, since the intruder detection on the elevation and the intruder detection on the plane are used together, the detection accuracy can be improved as compared with the intruder detection alone on the elevation.
<適用例3>
 図26は、デジタルスマート・ディフェンスセキュリティシステム1000による侵入検出の適用例3を説明する図である。図26左は平面における侵入者検出を示す平面図、図26右は立面における侵入者検出を示す立面図である。
<Application example 3>
FIG. 26 is a diagram illustrating application example 3 of intrusion detection by the digital smart defense security system 1000. FIG. 26 left is a plan view showing intruder detection on a plane, and FIG. 26 right is an elevation view showing intruder detection on an elevation.
 図26右は、図26左の平面図を、上述した「立面的に侵入を判定する技術(図16~図17参照)」により立面による侵入者の検出の3次元空間に投影変換した立面図である。図26右は、カーゲートより内側に侵入者が入っている様子を示す。侵入者は、水平位置(X軸,Y軸)と垂直位置(Z軸)を破線により表される。 On the right side of FIG. 26, the plan view on the left side of FIG. 26 is projected and converted into a three-dimensional space for detecting an intruder by an elevation by the above-mentioned "technology for determining intrusion in an elevation (see FIGS. 16 to 17)". It is an elevation view. The right side of FIG. 26 shows an intruder inside the car gate. An intruder is represented by a broken line in a horizontal position (X-axis, Y-axis) and a vertical position (Z-axis).
 図27は、図26の適用例3において、デジタルスマート・ディフェンスセキュリティシステム1000が家屋外周に設置された監視カメラの映像から侵入者を検出して登録する動作を示すフローチャートである。
 ステップS301でイエローベルトY(セキュリティ該当敷地内、道路境界、隣地境界から例えば30cm~4mの範囲)への侵入者検出を開始する。
FIG. 27 is a flowchart showing an operation in which the digital smart defense security system 1000 detects and registers an intruder from the image of a surveillance camera installed around the outside of the house in the third application of FIG. 26.
In step S301, intruder detection to the yellow belt Y (within the security applicable site, road boundary, adjacent land boundary, for example, in a range of 30 cm to 4 m) is started.
 以下、立面における侵入者検出(ステップS302~ステップS311)と、平面における侵入者検出(ステップS210~ステップS214)と、に分岐して、立面と平面のそれぞれにおいて侵入者を検出する。 Hereinafter, the intruder is detected on each of the elevation and the plane by branching into the intruder detection on the elevation (step S302 to S311) and the intruder detection on the plane (step S210 to S214).
 ステップS302で立面における侵入者検出を開始(5~10コマ/秒の画像)する。
 ステップS303で1秒間の画像(例えば、1秒間に10コマの場合1/10~10/10の画像)を立面上で検査する。
 ステップS304で1秒後から2秒後までの1秒間の画像(例えば、10コマの画像)を立面上で検査する。
In step S302, intruder detection on the elevation is started (image of 5 to 10 frames / sec).
In step S303, an image for 1 second (for example, an image of 1/10 to 10/10 in the case of 10 frames per second) is inspected on an elevation.
In step S304, an image for 1 second (for example, an image of 10 frames) from 1 second to 2 seconds is inspected on an elevation.
 ステップS305で1秒経過後、2秒以内に2コマ以上検知されたか否かを判定する。
 1秒経過後、2秒以内に2コマ以上検知されない場合、ステップS306で侵入がないと判断し、ステップS307で正常と判断して本フローの処理を終了する。
After 1 second has elapsed in step S305, it is determined whether or not two or more frames are detected within 2 seconds.
If two or more frames are not detected within 2 seconds after 1 second elapses, it is determined in step S306 that there is no intrusion, and in step S307, it is determined to be normal, and the processing of this flow ends.
 上記ステップS305で1秒経過後、2秒以内に2コマ以上検知された場合、ステップS308で侵入の可能性があると判断し、ステップS309で時間的検証を開始する。立面における時間的検証は、下記の通りである。
 すなわち、ステップS310で次の1秒間の画像(例えば、10コマ)を立面上で検査する。次いで、ステップS311で上記ステップS310の時間的検証を1~2分間繰り返し行って精度を高める。
If two or more frames are detected within 2 seconds after 1 second has elapsed in step S305, it is determined that there is a possibility of intrusion in step S308, and temporal verification is started in step S309. The temporal verification on the elevation is as follows.
That is, in step S310, the next 1-second image (for example, 10 frames) is inspected on an elevation. Next, in step S311, the temporal verification of step S310 is repeated for 1 to 2 minutes to improve the accuracy.
 ステップS312で侵入者検出を示す画像が一定時間連続検知されたか否かを判定する。
 一定時間連続検知された場合、ステップS313で異常(要注意)と判定して本フローの処理を終了する。
In step S312, it is determined whether or not the image showing the intruder detection is continuously detected for a certain period of time.
If it is continuously detected for a certain period of time, it is determined in step S313 that it is abnormal (need attention), and the processing of this flow is terminated.
 一方、ステップS314で平面における侵入者検出を開始(5~10コマ/秒の画像)する。
 ステップS315で1秒間の画像(例えば、1秒間に10コマの場合1/10~10/10の画像)を平面上で検査する。
 ステップS316で1秒後から2秒後までの1秒間の画像(例えば、10コマの画像)を平面上で検査する。
On the other hand, in step S314, intruder detection on a plane is started (image of 5 to 10 frames / sec).
In step S315, an image for 1 second (for example, an image of 1/10 to 10/10 in the case of 10 frames per second) is inspected on a flat surface.
In step S316, an image for 1 second (for example, an image of 10 frames) from 1 second to 2 seconds is inspected on a flat surface.
 ステップS317で1秒経過後、2秒以内に2コマ以上検知されたか否かを判定する。
 1秒経過後、2秒以内に2コマ以上検知されない場合、ステップS319で侵入がないと判断し、ステップS307で正常と判断して本フローの処理を終了する。
After 1 second has elapsed in step S317, it is determined whether or not two or more frames are detected within 2 seconds.
If two or more frames are not detected within 2 seconds after 1 second has elapsed, it is determined in step S319 that there is no intrusion, and in step S307, it is determined to be normal, and the processing of this flow is terminated.
 上記ステップS317で1秒経過後、2秒以内に2コマ以上検知された場合、ステップS319で侵入の可能性があると判断し、ステップS309で時間的検証を開始する。平面における時間的検証は、下記の通りである。
 すなわち、ステップS320で次の1秒間の画像(例えば、10コマ)を平面上で検査する。次いで、ステップS321で上記ステップS320の時間的検証を1~2分間繰り返し行って精度を高める。
If two or more frames are detected within 2 seconds after 1 second has elapsed in step S317, it is determined that there is a possibility of intrusion in step S319, and temporal verification is started in step S309. The temporal verification on the plane is as follows.
That is, in step S320, the next 1-second image (for example, 10 frames) is inspected on a flat surface. Next, in step S321, the temporal verification of step S320 is repeated for 1 to 2 minutes to improve the accuracy.
 ステップS312で侵入者検出を示す画像が一定時間連続検知されたか否かを判定する。
 一定時間連続検知された場合、ステップS313で異常(要注意)と判定して本フローの処理を終了する。
In step S312, it is determined whether or not the image showing the intruder detection is continuously detected for a certain period of time.
If it is continuously detected for a certain period of time, it is determined in step S313 that it is abnormal (need attention), and the processing of this flow is terminated.
 適用例3では、適用例2と同様に、立面における侵入者検出と平面における侵入者検出とを併用しているので、立面における侵入者検出単体よりも検出の精度を高めることができる。
 また、適用例3では、侵入の可能性がある場合、時間的検証を行っているので、侵入者の侵入があることをより確実に検出することができ、検出の精度を高めることができる。
In the application example 3, since the intruder detection on the elevation and the intruder detection on the plane are used in combination as in the application example 2, the detection accuracy can be improved as compared with the intruder detection alone on the elevation.
Further, in Application Example 3, when there is a possibility of intrusion, time verification is performed, so that it is possible to more reliably detect the intrusion of an intruder and improve the accuracy of detection.
 このように、デジタルスマート・ディフェンスセキュリティシステム1000は、セキュリティ区域内に侵入した侵入者の位置をカメラの画像をもとにX、Y、Z座標として正確に測位する技術をベースとし、従来のセキュリティシステムにあった誤検知の課題を解決することができる。 In this way, the digital smart defense security system 1000 is based on the technology of accurately positioning the position of an intruder who has invaded the security area as X, Y, and Z coordinates based on the image of the camera, and is based on the conventional security. It is possible to solve the problem of false positives in the system.
<適用例4>
 図28は、適用例4において、デジタルスマート・ディフェンスセキュリティシステム1000の注意度に応じて利用者に通知する処理を示すフローチャートである。図28のフローは、図20の瞳と首の動きの変化による判断処理を示している。
 ステップS401で顔器官を検出する。
<Application example 4>
FIG. 28 is a flowchart showing a process of notifying the user according to the degree of attention of the digital smart defense security system 1000 in the application example 4. The flow of FIG. 28 shows the determination process based on the change in the movement of the pupil and the neck of FIG.
The facial organ is detected in step S401.
 以下、瞳の動きによる侵入者検出と、首の左右の動きによる侵入者検出と、首の上下の動きによる侵入者検出と、に分岐して、侵入者を検出する。
《瞳の動き》
 ステップS402で1秒間に5~10コマの画像をもとに、瞳の左右の場所を判断する。
 ステップS403で1秒間の画像、例えば1秒間に10コマの場合1/10~10/10の画像を検査する。
 ステップS404で1秒後から2秒後までの1秒間の画像(例えば、10コマ)を検査する。
Hereinafter, the intruder is detected by branching into an intruder detection by the movement of the pupil, an intruder detection by the left / right movement of the neck, and an intruder detection by the up / down movement of the neck.
《Movement of eyes》
In step S402, the left and right positions of the pupil are determined based on the images of 5 to 10 frames per second.
In step S403, an image for 1 second, for example, an image of 1/10 to 10/10 in the case of 10 frames per second is inspected.
In step S404, an image (for example, 10 frames) for 1 second from 1 second to 2 seconds is inspected.
 ステップS405で1秒経過後、2秒以内に2コマ以上検知されたか否かを判定する。
 1秒経過後、2秒以内に2コマ以上検知されない場合、ステップS406で正常と判断して本フローの処理を終了する。
After 1 second has elapsed in step S405, it is determined whether or not two or more frames are detected within 2 seconds.
If two or more frames are not detected within 2 seconds after 1 second has elapsed, it is determined in step S406 that it is normal, and the processing of this flow is terminated.
 上記ステップS405で1秒経過後、2秒以内に2コマ以上検知された場合、ステップS407で異常の可能性があると判断してステップS408に進む。
 ステップS408で時間的検証を開始する。瞳の動きによる時間的検証は、下記の通りである。
 すなわち、ステップS409で次の1秒間の画像(例えば、10コマ)を検査する。次いで、ステップS410で上記ステップS409の時間的検証を1~2分間繰り返し行って精度を高める。
If two or more frames are detected within 2 seconds after 1 second has elapsed in step S405, it is determined in step S407 that there is a possibility of abnormality, and the process proceeds to step S408.
Temporal verification is started in step S408. The temporal verification by the movement of the pupil is as follows.
That is, in step S409, the next 1-second image (for example, 10 frames) is inspected. Next, in step S410, the temporal verification of step S409 is repeated for 1 to 2 minutes to improve the accuracy.
 ステップS411で侵入者検出を示す画像が一定時間連続検知されたか否かを判定する。
 一定時間連続検知されなかった場合、ステップS412で正常と判定して本フローの処理を終了する。一定時間連続検知された場合、ステップS413で異常(要注意)と判定して本フローの処理を終了する。
In step S411, it is determined whether or not the image showing the intruder detection is continuously detected for a certain period of time.
If it is not continuously detected for a certain period of time, it is determined in step S412 that it is normal, and the processing of this flow ends. If it is continuously detected for a certain period of time, it is determined in step S413 that it is abnormal (need attention), and the processing of this flow is terminated.
《首の左右の動き》
 ステップS414で1秒間に5~10コマの画像をもとに、首の左右の場所を判断する。
 ステップS415で1秒間の画像、例えば1秒間に10コマの場合1/10~10/10の画像を検査する。
 ステップS416で1秒後から2秒後までの1秒間の画像(例えば、10コマ)を検査する。
《Left and right movement of the neck》
In step S414, the left and right positions of the neck are determined based on the images of 5 to 10 frames per second.
In step S415, an image for 1 second, for example, an image of 1/10 to 10/10 in the case of 10 frames per second is inspected.
In step S416, an image (for example, 10 frames) for 1 second from 1 second to 2 seconds is inspected.
 ステップS417で1秒経過後、2秒以内に2コマ以上検知されたか否かを判定する。
 1秒経過後、2秒以内に2コマ以上検知されない場合、ステップS418で正常と判断して本フローの処理を終了する。
After 1 second has elapsed in step S417, it is determined whether or not two or more frames are detected within 2 seconds.
If two or more frames are not detected within 2 seconds after 1 second has elapsed, it is determined in step S418 to be normal, and the processing of this flow is terminated.
 上記ステップS419で1秒経過後、2秒以内に2コマ以上検知された場合、ステップS419で異常の可能性があると判断してステップS408に進む。
 ステップS408で時間的検証を開始する。首の左右の動きによる時間的検証は、下記の通りである。
 すなわち、ステップS420で次の1秒間の画像(例えば、10コマ)を検査する。次いで、ステップS421で上記ステップS409の時間的検証を1~2分間繰り返し行って精度を高める。
If two or more frames are detected within 2 seconds after 1 second has elapsed in step S419, it is determined in step S419 that there is a possibility of abnormality, and the process proceeds to step S408.
Temporal verification is started in step S408. The temporal verification by the left and right movement of the neck is as follows.
That is, in step S420, the next 1-second image (for example, 10 frames) is inspected. Next, in step S421, the temporal verification of step S409 is repeated for 1 to 2 minutes to improve the accuracy.
 ステップS411で侵入者検出を示す画像が一定時間連続検知されたか否かを判定する。
 一定時間連続検知されなかった場合、ステップS412で正常と判定して本フローの処理を終了する。一定時間連続検知された場合、ステップS413で異常(要注意)と判定して本フローの処理を終了する。
In step S411, it is determined whether or not the image showing the intruder detection is continuously detected for a certain period of time.
If it is not continuously detected for a certain period of time, it is determined in step S412 that it is normal, and the processing of this flow ends. If it is continuously detected for a certain period of time, it is determined in step S413 that it is abnormal (need attention), and the processing of this flow is terminated.
《首の上下の動き》
 ステップS422で1秒間に5~10コマの画像をもとに、首の上下の場所を判断する。
 ステップS423で1秒間の画像、例えば1秒間に10コマの場合1/10~10/10の画像を検査する。
 ステップS424で1秒後から2秒後までの1秒間の画像(例えば、10コマ)を検査する。
《Neck up / down movement》
In step S422, the upper and lower positions of the neck are determined based on the images of 5 to 10 frames per second.
In step S423, an image for 1 second, for example, an image of 1/10 to 10/10 in the case of 10 frames per second is inspected.
In step S424, an image (for example, 10 frames) for 1 second from 1 second to 2 seconds is inspected.
 ステップS425で1秒経過後、2秒以内に2コマ以上検知されたか否かを判定する。
 1秒経過後、2秒以内に2コマ以上検知されない場合、ステップS426で正常と判断して本フローの処理を終了する。
After 1 second has elapsed in step S425, it is determined whether or not two or more frames are detected within 2 seconds.
If two or more frames are not detected within 2 seconds after 1 second has elapsed, it is determined in step S426 that it is normal, and the processing of this flow is terminated.
 上記ステップS425で1秒経過後、2秒以内に2コマ以上検知された場合、ステップS427で異常の可能性があると判断してステップS408に進む。
 ステップS408で時間的検証を開始する。首の上下の動きによる時間的検証は、下記の通りである。
 すなわち、ステップS428で次の1秒間の画像(例えば、10コマ)を検査する。次いで、ステップS429で上記ステップS428の時間的検証を1~2分間繰り返し行って精度を高める。
If two or more frames are detected within 2 seconds after 1 second has elapsed in step S425, it is determined in step S427 that there is a possibility of abnormality, and the process proceeds to step S408.
Temporal verification is started in step S408. The temporal verification by the vertical movement of the neck is as follows.
That is, in step S428, the next 1-second image (for example, 10 frames) is inspected. Next, in step S429, the temporal verification of step S428 is repeated for 1 to 2 minutes to improve the accuracy.
 ステップS411で侵入者検出を示す画像が一定時間連続検知されたか否かを判定する。
 一定時間連続検知されなかった場合、ステップS412で正常と判定して本フローの処理を終了する。一定時間連続検知された場合、ステップS413で異常(要注意)と判定して本フローの処理を終了する。
In step S411, it is determined whether or not the image showing the intruder detection is continuously detected for a certain period of time.
If it is not continuously detected for a certain period of time, it is determined in step S412 that it is normal, and the processing of this flow ends. If it is continuously detected for a certain period of time, it is determined in step S413 that it is abnormal (need attention), and the processing of this flow is terminated.
 上記フローにより、瞳の動き、首の左右の動き、首の上下の動きを判定することで、善意の人か悪意のある侵入者かの判断する際の確度を高めることができ、危険度の判定をより精度良く行うことができる。 By judging the movement of the eyes, the left and right movement of the neck, and the up and down movement of the neck by the above flow, it is possible to increase the accuracy when judging whether the person is a well-meaning person or a malicious intruder, and the risk level can be increased. The determination can be made more accurately.
<適用例5>
 図29は、デジタルスマート・ディフェンスセキュリティシステム1000の適用例5において、セキュリティ区域内の人に応じた自動音声による警告のデジタルスマート・ディフェンスセキュリティシステム及び家族・保護者の動作の概要を示すフローチャートである。本フローは、画像及び音声により対話及び警告を行う機能を実行する。
 なお、図29の《家族・保護者》のフローは、CPU処理ではないが、便宜上ステップ番号Fを付して説明する。
<Application example 5>
FIG. 29 is a flowchart showing an outline of the operation of the digital smart defense security system and the family / guardian of the automatic voice warning according to the person in the security area in the application example 5 of the digital smart defense security system 1000. .. This flow executes a function of performing dialogue and warning by image and voice.
The flow of << family / guardian >> in FIG. 29 is not CPU processing, but will be described with step number F for convenience.
《デジタルスマート・ディフェンスセキュリティシステム》
 デジタルスマート・ディフェンスセキュリティシステム1000は、来訪者がイエローベルトY(図9上参照)に侵入したことを検知する(ステップS501)。
 警備モードが、常時警備モードか外出・在宅警備モード(図6下参照)かを判別する(ステップS502)。
 常時警備モードの場合、ステップS503~ステップS511を実行する。また、外出・在宅警備モードの場合、ステップS512~ステップS519を実行する。
《Digital Smart Defense Security System》
The digital smart defense security system 1000 detects that a visitor has invaded the yellow belt Y (see the upper part of FIG. 9) (step S501).
It is determined whether the security mode is the constant security mode or the outing / home security mode (see the bottom of FIG. 6) (step S502).
In the case of the constant security mode, steps S503 to S511 are executed. Further, in the case of the outing / home security mode, steps S512 to S519 are executed.
 常時警備モードでは、自動音声により「ご用の方はドアホンのカメラにQRコードを提示してください」等と伝える(ステップS503)。
 QRコードを識別し、登録者情報DB165(図1参照)と照合する(ステップS504)。
 登録者情報DB165と照合して、来訪者は登録済みか否かを判定する(ステップS505)。
 来訪者が登録済みの場合(ステップS505:Yes)、自動音声で登録済みであることを来訪者に伝えてフローの処理を終了する(ステップS506)。
In the constant security mode, an automatic voice is used to tell the user, "Please show the QR code to the camera of the doorphone" (step S503).
The QR code is identified and collated with the registrant information DB 165 (see FIG. 1) (step S504).
The visitor determines whether or not the information has been registered by collating with the registrant information DB 165 (step S505).
If the visitor has already been registered (step S505: Yes), the visitor is notified by automatic voice that the visitor has been registered, and the flow process ends (step S506).
 上記ステップS505で来訪者が登録済みでない場合(ステップS505:No)、未登録者の来訪を保護者のスマートフォン50a(図1参照)に通知する(ステップS507)。
 ドアホンでの対話を遠隔の保護者との対話に切り替える(ステップS508)。
When the visitor is not registered in step S505 (step S505: No), the visit of the unregistered person is notified to the guardian's smartphone 50a (see FIG. 1) (step S507).
The dialogue with the doorphone is switched to the dialogue with a remote guardian (step S508).
 来訪者がレッドベルトR(図9上参照)に侵入したことを検知する(ステップS509)。
 自動音声により「あなたの画像を登録し関係機関に通報します」等というメッセージを流す(ステップS510)。
 「ドアホン型対話システム」(図9中参照)を使用し、来訪者からの応答をマイク入力で取得し、遠隔の保護者のスマートフォン50aに送る(ステップS511)。
It is detected that a visitor has invaded the red belt R (see the upper part of FIG. 9) (step S509).
A message such as "Register your image and notify related organizations" is sent by automatic voice (step S510).
Using the "doorphone type dialogue system" (see in FIG. 9), the response from the visitor is acquired by the microphone input and sent to the remote guardian's smartphone 50a (step S511).
 一方、上記ステップS502で警備モードが、外出・在宅警備モード(図6下参照)の場合、自動音声により「このエリアは現在警備中です」等というメッセージを流す(ステップS512)。
 来訪者がオレンジベルトO(図9上参照)に侵入したことを検知する(ステップS513)。
 自動音声により「このエリアから直ちに退去して下さい」等というメッセージを流す(ステップS514)。
 侵入ありと家族のスマートフォン50aに通知する(ステップS515)。
 来訪者がレッドベルトR(図9上参照)に侵入したことを検知する(ステップS516)。
 自動音声により「あなたの画像を登録し関係機関に通報します」等というメッセージを流す(ステップS517)。
 「防犯カメラ型対話システム」(図9下参照)を使用し、侵入者からの応答をマイク入力で取得し、遠隔の家族のスマートフォン50aに送る(ステップS518)。
On the other hand, when the security mode is the outing / home security mode (see the bottom of FIG. 6) in step S502, a message such as "This area is currently being guarded" is sent by automatic voice (step S512).
It is detected that a visitor has invaded the orange belt O (see the upper part of FIG. 9) (step S513).
A message such as "Please move out of this area immediately" is sent by automatic voice (step S514).
Notify the family's smartphone 50a that there is an intrusion (step S515).
It is detected that a visitor has invaded the red belt R (see the upper part of FIG. 9) (step S516).
A message such as "Register your image and notify related organizations" is sent by automatic voice (step S517).
Using the "security camera type dialogue system" (see the bottom of FIG. 9), the response from the intruder is acquired by the microphone input and sent to the remote family smartphone 50a (step S518).
 また、図9中及び図9下に示すように、「ドアホン型対話システム」及び「防犯カメラ型対話システム」のいずれのシステムにおいても、クラウド対話中継システムを介在させることにより、現地のシステムと遠隔のスマートフォン50aとの間の画像及び音声を中継する(ステップS519,ステップF13)。 In addition, as shown in the middle of FIG. 9 and the bottom of FIG. 9, both the "doorphone type dialogue system" and the "security camera type dialogue system" are remote from the local system by interposing the cloud dialogue relay system. The image and sound are relayed to and from the smartphone 50a of the above (step S519, step F13).
《家族・保護者》
 家族・保護者は、デジタルスマート・ディフェンスセキュリティシステム1000から、未登録者が来訪したとの通知を受ける(ステップF11)。例えば、家族・保護者は、デジタルスマート・ディフェンスセキュリティシステム1000から、オレンジベルトOに侵入した来訪者に対して「このエリアから直ちに退去して下さい」等という警告を出した旨のメッセージを受け取る(ステップS514)。
《Family / guardian》
The family / guardian is notified by the Digital Smart Defense Security System 1000 that an unregistered person has visited (step F11). For example, a family member / guardian receives a message from the Digital Smart Defense Security System 1000 stating that a visitor who has invaded Orange Belt O has been warned that "Please leave this area immediately" ( Step S514).
 家族・保護者は、デジタルスマート・ディフェンスセキュリティシステム1000から、侵入者が敷地に入ったとの通知を受ける(ステップF12)。
 家族・保護者は、未登録者が来訪したとの通知を受け取った場合、又は侵入者が敷地に入ったとの通知を受け取った場合、スマートフォン50aのアプリを使用し「ご用があるなら用件を言って下さい」等と声掛けし、相手からの応答を聞く(ステップF13)。
The family / guardian is notified by the Digital Smart Defense Security System 1000 that an intruder has entered the premises (step F12).
When a family member / guardian receives a notification that an unregistered person has visited the site, or a notification that an intruder has entered the premises, he / she uses the smartphone 50a app to "use the application of the smartphone 50a. Please say ", etc." and listen to the response from the other party (step F13).
 家族・保護者は、来訪者は問題ないかを判断する(ステップF14)。
 来訪者に問題がない場合、要件を聞いて対応する(ステップF15)。来訪者に問題がある場合、画像と音声を添付して関係機関に通報する(ステップF16)。
The family / guardian determines whether the visitor is okay (step F14).
If there is no problem with the visitor, listen to the requirements and respond (step F15). If there is a problem with the visitor, attach an image and audio and notify the relevant organizations (step F16).
 適用例5に示すように、デジタルスマート・ディフェンスセキュリティシステム1000は、侵入者の位置に応じて自動音声により警告するとともに、画像・音声による遠隔からの対話機能が実現される。 As shown in Application Example 5, the digital smart defense security system 1000 warns by automatic voice according to the position of an intruder, and realizes a remote dialogue function by image and voice.
 また、デジタルスマート・ディフェンスセキュリティシステム1000は、すべての警備モードで以下の画像のプライバシー保護機能を提供する。
・敷地(道路・隣地)境界線の外部、公道、隣地等において、通行人、近隣の住民等の検知された人間の画像にモザイクをかけ、プライバシーを保護する機能を有する。
・上記の通行人、近隣の住民等が敷地(道路、隣地)境界線の内部、イエローベルトY、オレンジベルトO、又はレッドベルトRに侵入したことを検知した場合に画像からモザイクを外す機能を有する。
In addition, the Digital Smart Defense Security System 1000 provides the following image privacy protection features in all security modes.
-It has a function to protect privacy by applying a mosaic to the images of detected humans such as passers-by and neighboring residents outside the boundary line of the site (road / adjacent land), public roads, adjacent land, etc.
-The function to remove the mosaic from the image when it is detected that the above passersby, neighboring residents, etc. have invaded the inside of the boundary line of the site (road, adjacent land), yellow belt Y, orange belt O, or red belt R. Have.
<適用例6>
 図30は、デジタルスマート・ディフェンスセキュリティシステム1000の適用例6において、不審な電話の検知、登録及び転送の概要を示すフローチャートである。本フローは、不審な電話を自動検知して登録、判断が必要なときは保護者のスマートフォンに転送する。
 なお、図30の《保護者》のフローは、CPU処理ではないが、便宜上ステップ番号Fを付して説明する。
<Application example 6>
FIG. 30 is a flowchart showing an outline of detection, registration, and forwarding of a suspicious call in Application Example 6 of the Digital Smart Defense Security System 1000. This flow automatically detects suspicious calls, registers them, and forwards them to the guardian's smartphone when judgment is required.
The flow of << guardian >> in FIG. 30 is not CPU processing, but will be described with step number F for convenience.
《デジタルスマート・ディフェンスセキュリティシステム》
 デジタルスマート・ディフェンスセキュリティシステム1000は、不審者が高齢者等を狙って家の電話に発信する発呼を確認する(ステップS601)。
 デジタルスマート・ディフェンスセキュリティシステム1000は、高齢者等が家の電話をとる前に応答する(ステップS602)。
 発信者番号が取れたか否かを判定する(ステップS603)。
《Digital Smart Defense Security System》
The digital smart defense security system 1000 confirms a call made by a suspicious person to a home telephone targeting an elderly person or the like (step S601).
The digital smart defense security system 1000 responds before the elderly or the like picks up the home phone (step S602).
It is determined whether or not the caller ID has been obtained (step S603).
 発信者番号が取得できた場合、発信者番号を電話帳と照合する(ステップS604)。
 既登録か未登録かを判定する(ステップS605)。
 通常の登録の場合、家の電話を鳴動させる(ステップS606)。
 不審者として登録の場合、不審者と判断し(ステップS607)、電話を切る(ステップS608)。
 また、未登録の場合、ステップS610に進む。
If the caller ID can be obtained, the caller ID is collated with the telephone directory (step S604).
It is determined whether it is registered or unregistered (step S605).
In the case of normal registration, the home telephone is ringed (step S606).
When registered as a suspicious person, it is determined that the person is a suspicious person (step S607) and the telephone is hung up (step S608).
If not registered, the process proceeds to step S610.
 一方、上記ステップS603で発信者番号が取得できない場合、相手が発信者番号を隠匿している(不審者の可能性がある)と判断してステップS610に進む(ステップS609)。 On the other hand, if the caller ID cannot be obtained in step S603, it is determined that the other party is hiding the caller ID (there is a possibility of a suspicious person), and the process proceeds to step S610 (step S609).
 ステップS610では、自動メッセージで「ただいま振り込め詐欺対策モードになっています。この電話を録音します。・・・あなたの名前とご用件または所属機関をおっしゃって下さい」等という不審者であることが疑われる人向けのメッセージを流す。
 発信者番号(取れた場合)を所定DB(図示省略)に登録し、電話の録音を開始する(ステップS611)。
 名前と用件、所属機関を言ったか否かを判定する(ステップS612)。
 名前と用件、所属機関を言わない場合、未登録の不審者と判断し(ステップS613)、電話を切る(ステップS614)。
In step S610, you must be a suspicious person with an automatic message such as "You are in wire fraud countermeasure mode. Record this call .... Please tell us your name and business or your institution." Send a message for those who are suspected of.
The caller ID (if obtained) is registered in a predetermined DB (not shown), and telephone recording is started (step S611).
It is determined whether or not the name, the matter, and the institution to which the person belongs have been mentioned (step S612).
If you do not say your name, requirements, or institution to which you belong, it is determined that you are an unregistered suspicious person (step S613), and you hang up (step S614).
 名前と用件・所属機関を言った場合、所属機関が警察、役所、金融機関等であるか否かを判定する(ステップS615)。
 所属機関が警察、役所、金融機関等である場合、自動メッセージで「折り返し電話します」等というメッセージを流し(ステップS616)、電話を切る(ステップS617)。
When the name, requirements, and affiliated institution are stated, it is determined whether or not the affiliated institution is a police, government office, financial institution, or the like (step S615).
If the institution to which you belong is a police, government office, financial institution, etc., an automatic message such as "Call back" is sent (step S616) and the call is hung up (step S617).
 所属機関が警察、役所、金融機関等でない場合、音声認識により通話相手の注意度を判定する(ステップS618)。音声認識による通話相手の注意度判定の具体的手法については、図11乃至図12で述べた。
 クラウド型IP電話転送システム(図示省略)を通して保護者のスマートフォン50a(図1参照)に転送する(ステップS619)。
 なお、本機能を利用する上での前提として、(1)家庭にひかり電話ルータ等が設置されていること、(2)保護者がスマートフォンにIP電話(VoIP:Voice over Internet Protocol)アプリを導入しておくこと、(3)電話会社との間でナンバーディスプレイ等のサービスを契約しておくことが必要である。
When the affiliated institution is not the police, government office, financial institution, etc., the attention level of the other party is determined by voice recognition (step S618). Specific methods for determining the attention level of the other party by voice recognition have been described with reference to FIGS. 11 to 12.
Transfer to the parent's smartphone 50a (see FIG. 1) through a cloud-type IP phone transfer system (not shown) (step S619).
In addition, as a prerequisite for using this function, (1) a Hikari Denwa router, etc. is installed at home, and (2) a guardian installs an IP phone (VoIP: Voice over Internet Protocol) application on a smartphone. It is necessary to (3) contract services such as number display with the telephone company.
《保護者》
 スマートフォン50aに転送されてきた電話の着信を受ける(ステップF21)。
 電話の相手を確認する(ステップF22)。
 電話の相手が信用できるか否かを判断する(ステップF23)。
 電話の相手が信用できる場合、正常と判断し(ステップF24)、要件を聞く(ステップF25)。
《Guardian》
Receive the incoming call transferred to the smartphone 50a (step F21).
Confirm the other party to call (step F22).
It is determined whether or not the other party of the call can be trusted (step F23).
If the other party on the phone can be trusted, it is judged to be normal (step F24) and the requirements are heard (step F25).
 電話の相手が信用できない場合、未登録の不審者と判断し(ステップF26)、発信者番号を不審者として登録して(ステップF27)、電話を切る(ステップF28)。 If the other party on the phone cannot be trusted, it is determined that the person is an unregistered suspicious person (step F26), the caller ID is registered as a suspicious person (step F27), and the call is hung up (step F28).
 適用例6に示すように、不審者が高齢者等を狙って家の電話に発信した場合、高齢者等が家の電話をとる前にデジタルスマート・ディフェンスセキュリティシステム1000が応答し、不審な電話を自動検知して登録し、判断が必要なときは保護者のスマートフォン50aに転送する。これにより、高齢者等が家の電話をとる前の水際で、アポ電強盗及び振込詐欺を防止することができる。 As shown in Application Example 6, when a suspicious person makes a call to a home phone aiming at an elderly person or the like, the digital smart defense security system 1000 responds before the elderly person or the like picks up the home phone and makes a suspicious call. Is automatically detected and registered, and when a judgment is required, it is transferred to the guardian's smartphone 50a. As a result, it is possible to prevent apo-den robbery and transfer fraud at the water's edge before the elderly or the like pick up the phone at home.
<適用例7>
 図31は、デジタルスマート・ディフェンスセキュリティシステム1000の適用例7において、音声認識により通話相手の注意度を判定する機能を示すフローチャートである。本フローは、図11乃至図12で述べた、音声認識により通話相手の注意度判定の具体例である。
 なお、図31の《不審者》のフローは、CPU処理ではないが、便宜上ステップ番号SPを付して説明する。
<Application example 7>
FIG. 31 is a flowchart showing a function of determining the attention level of the other party by voice recognition in the application example 7 of the digital smart defense security system 1000. This flow is a specific example of determining the attention level of the other party by voice recognition described in FIGS. 11 to 12.
The flow of << suspicious person >> in FIG. 31 is not CPU processing, but will be described with step number SP for convenience.
《不審者》
 不審者が高齢者等を狙って子供、孫等に成りすまそうとする(ステップSP11)。例えば、いわゆる「オレオレ詐欺」では、息子や孫になりすまして電話をし、「電話番号が変わった」「声が変わっているのは風邪を引いているから」と本当の身内だと信じ込ませる。始めに連絡先が変わったことだけを伝え、少し日を空けてから「実はお金が必要で…」と話を切り出してくる場合もある。その後「交通事故を起こしてしまったので示談金を払わなければならない」など、今すぐお金が必要な状況を説明して、指定の口座に振り込むように言う。
"Suspicious person"
A suspicious person tries to impersonate a child, grandchild, etc. by aiming at an elderly person (step SP11). For example, in the so-called "Oreore fraud," you call by pretending to be your son or grandson and make them believe that you are a true relative, saying that "the phone number has changed" and "the voice has changed because you have a cold." In some cases, they only tell them that their contact information has changed at the beginning, and after a while, they start talking about "actually, I need money ...". After that, explain the situation where you need money right now, such as "I have a traffic accident and have to pay the settlement fee", and tell them to transfer it to the designated account.
 不審者が高齢者等からキャッシュカードの暗証番号を聞き出そうとする(ステップSP12)。例えば、いわゆる「還付金詐欺」では、「社会保険事務局」「○○市源泉徴収課」と公的機関の職員を装いながら電話をし、「年金の還付がある」「保険料の一部が戻ってくる」と伝える。また、このとき「受け取るための番号になる」と言ってターゲットの残高の数字を右から読ませたり、口座番号を聞き出す。 A suspicious person tries to find out the PIN code of a cash card from an elderly person or the like (step SP12). For example, in the so-called "refund fraud", the "social insurance secretariat" and "○○ city withholding section" are called while pretending to be employees of a public institution, and "there is a refund of the pension" and "a part of the insurance premium". Will be back. " Also, at this time, you can read the number of the target balance from the right by saying "It will be the number to receive", or ask for the account number.
 不審者が高齢者等を狙って家に現金がどれくらいあるかを聞き出そうとする(ステップSP13)。例えば、いわゆる「融資保険詐欺」や「架空請求詐欺」では、大手金融機関に似せた名前やロゴマークを載せたはがき等を送り、その後、「先にある程度の保証金が必要」などと言ってお金を振り込むように要求する。
 このように、不審者は高齢者等を言葉巧みに誘導して、キャッシュカードの暗証番号を聞き出したり、指定の口座に振り込みをさせる。
A suspicious person tries to find out how much cash is in the house by aiming at elderly people (step SP13). For example, in so-called "loan insurance fraud" and "fictitious billing fraud", you send a postcard with a name and logo mark that resembles a major financial institution, and then say "a certain amount of deposit is required first" and so on. Request to transfer.
In this way, the suspicious person skillfully guides the elderly and the like to ask for the PIN of the cash card or transfer it to a designated account.
 以上、いずれも不審者からの電話が契機となる。デジタルスマート・ディフェンスセキュリティシステム1000は、電話詐欺に対するセキュリティ機能として、音声認識により通話相手の注意度を判定し、電話による会話から不審者を判定することで振込詐欺等を未然に防止する。 As mentioned above, all of them are triggered by a phone call from a suspicious person. As a security function against telephone fraud, the digital smart defense security system 1000 determines the degree of attention of the other party by voice recognition and determines a suspicious person from the telephone conversation to prevent transfer fraud and the like.
《デジタルスマート・ディフェンスセキュリティシステム》
 デジタルスマート・ディフェンスセキュリティシステム1000は、通話相手の音声を音声認識部112(図12参照)に送る(ステップS701)。
 特殊詐欺・アポ電強盗等の時間的検証を開始する(ステップS702)。
 音声を取得する(ステップS703)。
《Digital Smart Defense Security System》
The digital smart defense security system 1000 sends the voice of the other party to the voice recognition unit 112 (see FIG. 12) (step S701).
Time verification of special fraud, apo-den robbery, etc. is started (step S702).
Acquire the voice (step S703).
 取得した音声を特殊詐欺・アポ電強盗等で使用される語彙の出現頻度付き辞書135(図12参照)と照合する(ステップS704)。デジタルスマート・ディフェンスセキュリティシステム1000は、電話の音声を取得し、音声認識部112が、出現頻度付き辞書135を参照して、会話の内容を単語の照合によって判定する。例えば、電話による会話に「俺」「電話番号が変わった」「示談金」「誰にも言わないで」「振り込んで」「至急」「還付金」「口座」等の語彙が正常な通話内に現れる語彙の出現頻度よりも多く出現するときには、通話相手の注意度が高いと判定する。特に、特殊詐欺に直結する語彙である「暗証番号」等が含まれる場合や、これら語彙が複合して出現する場合は、より詐欺の可能性が高いと判定する。 The acquired voice is collated with the dictionary 135 (see FIG. 12) with the frequency of appearance of vocabulary used in special fraud, apo-den robbery, etc. (step S704). The digital smart defense security system 1000 acquires the voice of the telephone, and the voice recognition unit 112 refers to the dictionary 135 with the frequency of appearance and determines the content of the conversation by collating words. For example, in a telephone conversation, the vocabulary such as "I", "phone number has changed", "settlement fee", "don't tell anyone", "transfer", "urgent", "refund", "account", etc. is normal. When it appears more frequently than the vocabulary that appears in, it is judged that the other party's attention is high. In particular, if a vocabulary that is directly linked to special fraud, such as a "password", is included, or if these vocabularies appear in combination, it is determined that the possibility of fraud is higher.
 特殊詐欺・アポ電強盗等の確率を求める(ステップS705)。
 確率が一定のレベル以上(例えば、0.9以上)あるか否かを判定する(ステップS706)。
 確率が一定のレベルに達しない場合、正常と判定して本フローの処理をする(ステップS707)。
Find the probability of special fraud, apo-den robbery, etc. (step S705).
It is determined whether or not the probability is above a certain level (for example, 0.9 or above) (step S706).
If the probability does not reach a certain level, it is determined to be normal and this flow is processed (step S707).
 確率が一定のレベル以上ある場合、異常の可能性ありと判定する(ステップS708)。
 次の音声を取得して新しい確率を求める(ステップS709)。
 最大判定時間(例えば、10秒)に達したか否かを判定する(ステップS710)。
 最大判定時間に達していなければ、判定を継続して上記ステップS707に戻る(ステップS711)。
 最大判定時間に達した場合、確率は一定のレベル以上(例えば、0.9以上)あるか否かを判定する(ステップS712)。
 確率が一定のレベルに達しない場合、正常と判定して本フローの処理をする(ステップS713)。
 確率が一定のレベル以上ある場合、未登録の不審者と判定して本フローの処理をする(ステップS714)。
If the probability is above a certain level, it is determined that there is a possibility of abnormality (step S708).
The next voice is acquired and a new probability is obtained (step S709).
It is determined whether or not the maximum determination time (for example, 10 seconds) has been reached (step S710).
If the maximum determination time has not been reached, the determination is continued and the process returns to step S707 (step S711).
When the maximum determination time is reached, it is determined whether or not the probability is at a certain level or higher (for example, 0.9 or higher) (step S712).
If the probability does not reach a certain level, it is determined to be normal and this flow is processed (step S713).
If the probability is equal to or higher than a certain level, it is determined that the person is an unregistered suspicious person, and this flow is processed (step S714).
 適用例7に示すように、不審者が高齢者等を狙って家の電話に発信した場合、電話による会話から不審者を判定することができ、アポ電強盗及び振込詐欺を未然に防止することができる。 As shown in Application Example 7, when a suspicious person makes a call to a home phone aiming at an elderly person, etc., the suspicious person can be determined from the telephone conversation, and apo-den robbery and transfer fraud can be prevented. Can be done.
 以上詳細に説明したように、本実施の形態によれば、デジタルスマート・ディフェンスセキュリティシステム1000(図1参照)は、複数の領域が危険度に応じて設定されたセキュリティ区域にいる人を検出する人検出部111と、人検出部111によって検出された人に対して、領域に対応した音声で警告を行うとともに、不審者の存在を通報する通報部115と、会話の音声を取得し、会話の内容が不審なものであることを判定する音声認識部112とを備え、通報部115は、音声認識部112によって会話の内容が不審なものであると判定されたことを受けて、不審者の存在を通報する。 As described in detail above, according to the present embodiment, the digital smart defense security system 1000 (see FIG. 1) detects a person in a security area in which a plurality of areas are set according to the degree of risk. The person detection unit 111 and the person detected by the person detection unit 111 are warned by the voice corresponding to the area, and the notification unit 115 that reports the existence of the suspicious person and the voice of the conversation are acquired and the conversation is performed. The reporting unit 115 includes a voice recognition unit 112 that determines that the content of the conversation is suspicious, and the reporting unit 115 receives that the voice recognition unit 112 determines that the content of the conversation is suspicious. Report the existence of.
 この構成により、危険度に応じて設定されたセキュリティ区域にいる人を判定して、危険度に応じた音声で警告するので、セキュリティ区域内の人の位置に応じて迅速かつ適切な警報を出力することができる。例えば、宅配者、セールスマン、銀行員等に成りすました不審者が家に来訪する場合がある。この場合、不審者の位置に応じて危険度に対応した音声で警告するので、不審者であれば、不審行為を躊躇させる、又は不審者を撃退することができる。 With this configuration, a person in a security area set according to the degree of danger is determined and a voice warning is given according to the degree of danger, so a quick and appropriate alarm is output according to the position of the person in the security area. can do. For example, a suspicious person impersonating a courier, a salesman, a bank clerk, etc. may visit the house. In this case, since a voice corresponding to the degree of danger is given according to the position of the suspicious person, the suspicious person can hesitate the suspicious act or repel the suspicious person.
 また、会話の内容が不審なものであると判定されたことを受けて、不審者の存在を通報することで、不審者を家へ入れてしまうことを防止することができる。セキュリティ区域内の不審者の位置判定だけでは、不審者を判断できなかった場合であっても不審者との会話から不審者であることを判定することができる。会話はセキュリティ区域内の人には限定されず、電話による会話についても同様である。 In addition, it is possible to prevent a suspicious person from entering the house by reporting the existence of the suspicious person in response to the determination that the content of the conversation is suspicious. Even if the suspicious person cannot be determined only by determining the position of the suspicious person in the security area, it can be determined that the suspicious person is a suspicious person from the conversation with the suspicious person. Conversations are not limited to people in the security zone, as do telephone conversations.
 本実施形態では、音声認識部112が、玄関に設置されたインターホンの会話の音声を認識することで、インターホンの会話を通じて、宅配人、セールスマン、銀行員等に成りすました来訪者を不審者であると判定することができ、不審者を家へ入れてしまうことを防止することができる。 In the present embodiment, the voice recognition unit 112 recognizes the voice of the conversation of the intercom installed at the entrance, and through the conversation of the intercom, the visitor who pretends to be a delivery person, a salesman, a bank employee, etc. is a suspicious person. It can be determined that there is, and it is possible to prevent a suspicious person from entering the house.
 本実施形態では、デジタルスマート・ディフェンスセキュリティシステム1000は、非侵入者が所持するID端末を検出するID端末検出部113を備え、通報部115は、ID端末検出部113が検出したID端末を所持している人を通報しないことで、例えば家族及び関係者のスマートフォンを検出して不審者から除外し、無駄な通報を削減して監視の実効を図ることができる。また、監視におけるリソースを低減して、低コスト化を図ることができる。 In the present embodiment, the digital smart defense security system 1000 includes an ID terminal detection unit 113 that detects an ID terminal possessed by a non-intruder, and the reporting unit 115 possesses an ID terminal detected by the ID terminal detection unit 113. By not reporting the person who is doing so, for example, the smartphones of family members and related persons can be detected and excluded from suspicious persons, unnecessary reports can be reduced, and monitoring can be effective. In addition, resources for monitoring can be reduced to reduce costs.
 本実施形態では、音声認識部112は、電話の通話の音声を認識することで、電話による会話から不審者を判定することができ、アポ電強盗及び振込詐欺を未然に防止することができる。なお、電話による会話は、メールにおける単語にも同様に適用可能である。 In the present embodiment, the voice recognition unit 112 can determine a suspicious person from a telephone conversation by recognizing the voice of a telephone call, and can prevent apoden robbery and transfer fraud. It should be noted that telephone conversations can be similarly applied to words in emails.
 本実施形態では、デジタルスマート・ディフェンスセキュリティシステム1000は、不審会話で使用される語彙を格納した出現頻度付き辞書135を備え、音声認識部112は、取得した音声に出現する単語を、出現頻度付き辞書135の語彙と照合して、会話の内容が不審なものであることを判定することで、不審者判定の精度を高めることができ、アポ電強盗及び振込詐欺を確実に防止することができる。 In the present embodiment, the digital smart defense security system 1000 includes a dictionary 135 with an appearance frequency that stores vocabulary used in suspicious conversations, and the voice recognition unit 112 uses the words that appear in the acquired voice with the appearance frequency. By collating with the vocabulary of the dictionary 135 and determining that the content of the conversation is suspicious, the accuracy of suspicious person determination can be improved, and apo-den robbery and transfer fraud can be reliably prevented. ..
 本実施形態では、デジタルスマート・ディフェンスセキュリティシステム1000は、CPU以外の計算リソースであるAIアクセラレータ200を備え、制御部110の人検出部111は、AIアクセラレータ200を用いて、セキュリティ区域内の人を検出する。AIアクセラレータ200は、CPU処理とは別に人の検出処理を専用ハードで実行することで、広範なセキュリティ区域内に存在する人を実時間で検出することができる。また、安価なカメラ機器用いた構成であっても、リアルタイムで人を検出することができる。
 また、AIアクセラレータ200であることで、従来の画像差分を用いた動体検出型の監視カメラによる画像認識に比べて極めて高い精度での侵入者の検出を行うことができる。
In the present embodiment, the digital smart defense security system 1000 includes an AI accelerator 200 which is a computing resource other than the CPU, and the person detection unit 111 of the control unit 110 uses the AI accelerator 200 to detect a person in the security area. To detect. The AI accelerator 200 can detect a person existing in a wide security area in real time by executing a person detection process on a dedicated hardware separately from the CPU process. In addition, a person can be detected in real time even with a configuration using an inexpensive camera device.
In addition, the AI accelerator 200 can detect an intruder with extremely high accuracy as compared with image recognition by a moving object detection type surveillance camera using a conventional image difference.
 以上の説明は本発明の好適な実施の形態の例証であり、本発明の範囲はこれに限定されることはない。
 例えば、図5及び図6では、スマートフォン50aを使用して屋外から警備モードを変更する例を示したが、利用者が手動で警備モードを変更するものでよい。
The above description is an example of a preferred embodiment of the present invention, and the scope of the present invention is not limited thereto.
For example, in FIGS. 5 and 6, the security mode is changed from the outside by using the smartphone 50a, but the user may manually change the security mode.
 なお、上述したように、デジタルスマート・ディフェンスセキュリティシステム1000のデジタルスマート・ディフェンスセキュリティ処理は、(I)「侵入者の位置に応じて自動音声により警告及び画像・音声による遠隔からの対話処理」(図9上、図10、図29など)と、(II)「会話の内容による不審判定処理」(図11、図30、図31など)とがある。上記(I)と上記(II)とは、それぞれ単独で実行してもよいし、組み合わせて実行してもよい。上記(I)では、主としてセキュリティ区域内の人の位置に応じて迅速かつ適切な警報を出力することができ、上記(II)では、主として人が不審者であることをより精度良く判定することができる。 As described above, the digital smart defense security process of the digital smart defense security system 1000 includes (I) "warning by automatic voice according to the position of the intruder and remote dialogue processing by image / voice" ( There are (FIG. 9, FIG. 10, FIG. 29, etc.) and (II) "suspicious determination processing based on the content of the conversation" (FIG. 11, FIG. 30, FIG. 31, etc.). The above (I) and the above (II) may be executed individually or in combination. In the above (I), a quick and appropriate alarm can be output mainly according to the position of the person in the security area, and in the above (II), it is mainly determined that the person is a suspicious person with higher accuracy. Can be done.
 また、上記実施の形態ではデジタルスマート・ディフェンスセキュリティシステム及び方法という名称を用いたが、これは説明の便宜上であり、監視システム、セキュリティシステム、スマート・ディフェンスセキュリティ方法等であってもよい。 Further, in the above embodiment, the names of digital smart defense security system and method are used, but this is for convenience of explanation, and may be a monitoring system, a security system, a smart defense security method, or the like.
 また、本発明のデジタルスマート・ディフェンスセキュリティシステム及び方法は、コンピュータを本デジタルスマート・ディフェンスセキュリティシステム又は方法として機能させるためのプログラムでも実現される。このプログラムは、コンピュータで読み取り可能な記録媒体に格納されていてもよい。 The digital smart defense security system and method of the present invention are also realized by a program for making a computer function as the digital smart defense security system or method of the present invention. The program may be stored on a computer-readable recording medium.
 このプログラムを記録した記録媒体は、本デジタルスマート・ディフェンスセキュリティシステムのROMそのものであってもよいし、また、外部記憶装置としてCD-ROMドライブ等のプログラム読取装置が設けられ、そこに記録媒体を挿入することで読み取り可能なCD-ROM等であってもよい。 The recording medium on which this program is recorded may be the ROM itself of the Digital Smart Defense Security System, or a program reading device such as a CD-ROM drive is provided as an external storage device, and the recording medium is placed therein. It may be a CD-ROM or the like that can be read by inserting it.
 また、上記の各構成、機能、処理部、処理手段等は、それらの一部又は全部を、例えば集積回路で設計する等によりハードウェアで実現してもよい。また、上記の各構成、機能等は、プロセッサがそれぞれの機能を実現するプログラムを解釈し、実行するためのソフトウェアで実現してもよい。各機能を実現するプログラム、テーブル、ファイル等の情報は、メモリや、ハードディスク、SSD(Solid State Drive)等の記録装置、又は、IC(Integrated Circuit)カード、SD(Secure Digital)カード、光ディスク等の記録媒体に保持することができる。 Further, each of the above configurations, functions, processing units, processing means, etc. may be realized by hardware by designing a part or all of them by, for example, an integrated circuit. In addition, each of the above configurations, functions, and the like may be realized by software for the processor to interpret and execute a program that realizes each function. Information such as programs, tables, and files that realize each function can be stored in memory, hard disks, recording devices such as SSDs (Solid State Drives), IC (Integrated Circuit) cards, SD (Secure Digital) cards, optical disks, etc. It can be held on a recording medium.
 本明細書で引用したすべての刊行物、特許及び特許出願は、そのまま参考として、ここにとり入れるものとする。 All publications, patents and patent applications cited herein are incorporated herein by reference only.
 本発明に係るデジタルスマート・ディフェンスセキュリティシステム、方法及びプログラムは、住居、企業の事務所、工場、研究所、情報処理室、金銭集計室等の高度の管理を要する事業所等への設置が期待される。さらに、住宅、商業施設、事務所、病院、ホテル、金融機関、工場、研究所、発電所、エアーターミナル、集会場、競技場、美術館等の建物屋内外、交通機関の電車、フェリー、飛行機の車内等も対象である。 The digital smart defense security system, method and program according to the present invention are expected to be installed in business establishments requiring a high degree of management such as residences, corporate offices, factories, research institutes, information processing rooms, and money counting rooms. Will be done. In addition, residential, commercial facilities, offices, hospitals, hotels, financial institutions, factories, laboratories, power plants, air terminals, meeting places, stadiums, museums and other buildings indoors and outdoors, transportation trains, ferries, airplanes The inside of the car is also covered.
 11 監視カメラ(撮影手段)
 20 人感センサ
 30 Wi-Fi親機
 40 ビーコン親機
 50 携帯端末装置(ID端末)
 50a スマートフォン(携帯端末装置;ID端末)
 51 Wi-Fi子機
 52 ビーコン子機
 53 GPS
 100 監視装置
 110 制御部
 111 人検出部(人検出手段)
 112 音声認識部(音声認識手段)
 113 ID端末検出部(ID端末検出手段)
 114 ID端末登録部(ID端末登録手段)
 115 通報部(通報手段)
 120 入力部
 130 記憶部
 135 出現頻度付き辞書(不審語彙格納手段)
 140 表示部
 150 出力部
 160 録画部
 165 登録者情報DB
 170 画像処理部
 180 インタフェース(I/F)部
 190 通信部
 200 AIアクセラレータ(人検出手段)
 1000 デジタルスマート・ディフェンスセキュリティシステム
 Y,O,R セキュリティベルト
 
11 Surveillance camera (shooting means)
20 Motion sensor 30 Wi-Fi master unit 40 Beacon master unit 50 Mobile terminal device (ID terminal)
50a Smartphone (mobile terminal device; ID terminal)
51 Wi-Fi handset 52 Beacon handset 53 GPS
100 Monitoring device 110 Control unit 111 Person detection unit (person detection means)
112 Voice recognition unit (voice recognition means)
113 ID terminal detection unit (ID terminal detection means)
114 ID terminal registration unit (ID terminal registration means)
115 Reporting section (reporting means)
120 Input unit 130 Storage unit 135 Dictionary with frequency of appearance (suspicious vocabulary storage means)
140 Display unit 150 Output unit 160 Recording unit 165 Registrant information DB
170 Image processing unit 180 Interface (I / F) unit 190 Communication unit 200 AI accelerator (human detection means)
1000 Digital Smart Defense Security System Y, O, R Security Belt

Claims (8)

  1.  複数の領域が危険度に応じて設定されたセキュリティ区域にいる人を検出する人検出手段と、
     前記人検出手段によって検出された人に対して、前記領域に対応した音声で警告を行うとともに、不審者の存在を通報する通報手段と
    を備えることを特徴とするデジタルスマート・ディフェンスセキュリティシステム。
    A person detection means that detects people in security areas where multiple areas are set according to the degree of risk,
    A digital smart defense security system characterized by providing a reporting means for notifying the existence of a suspicious person while giving a voice warning corresponding to the area to a person detected by the person detecting means.
  2.  会話の音声を取得し、前記会話の内容が不審なものであることを判定する音声認識手段を備え、
     前記通報手段は、前記音声認識手段によって前記会話の内容が不審なものであると判定されたことを受けて、不審者の存在を通報することを特徴とする請求項1記載のデジタルスマート・ディフェンスセキュリティシステム。
    A voice recognition means for acquiring the voice of the conversation and determining that the content of the conversation is suspicious is provided.
    The digital smart defense according to claim 1, wherein the reporting means reports the existence of a suspicious person in response to the determination by the voice recognition means that the content of the conversation is suspicious. Security system.
  3.  前記音声認識手段は、玄関に設置されたインターホンの会話の音声を認識することを特徴とする請求項2記載のデジタルスマート・ディフェンスセキュリティシステム。 The digital smart defense security system according to claim 2, wherein the voice recognition means recognizes the voice of conversation of an intercom installed at the entrance.
  4.  非侵入者が所持するID(Identification)端末を検出するID端末検出手段を備え、
     前記通報手段は、前記ID端末検出手段が検出した前記ID端末を所持している人を通報しないことを特徴とする請求項1乃至請求項3のいずれかに記載のデジタルスマート・ディフェンスセキュリティシステム。
    It is equipped with an ID terminal detecting means for detecting an ID (Identification) terminal possessed by a non-intruder.
    The digital smart defense security system according to any one of claims 1 to 3, wherein the reporting means does not report a person who has the ID terminal detected by the ID terminal detecting means.
  5.  前記音声認識手段は、電話の通話の音声を認識することを特徴とする請求項2記載のデジタルスマート・ディフェンスセキュリティシステム。 The digital smart defense security system according to claim 2, wherein the voice recognition means recognizes the voice of a telephone call.
  6.  不審会話で使用される語彙を格納した不審語彙格納手段を備え、
     前記音声認識手段は、取得した前記音声に出現する単語を、前記不審語彙格納手段の語彙と照合して、前記会話の内容が不審なものであることを判定することを特徴とする請求項2記載のデジタルスマート・ディフェンスセキュリティシステム。
    Equipped with a suspicious vocabulary storage means that stores the vocabulary used in suspicious conversation
    2. The voice recognition means is characterized in that the acquired words appearing in the voice are collated with the vocabulary of the suspicious vocabulary storage means to determine that the content of the conversation is suspicious. Described digital smart defense security system.
  7.  複数の領域が危険度に応じて設定されたセキュリティ区域にいる人を検出する人検出ステップと、
     前記人検出ステップによって検出された人に対して、前記領域に対応した音声で警告を行うとともに、不審者の存在を通報する通報ステップと
    を備えるデジタルスマート・ディフェンスセキュリティ方法。
    A person detection step that detects people in a security area where multiple areas are set according to the degree of risk,
    A digital smart defense security method including a notification step for notifying the presence of a suspicious person while giving a voice warning corresponding to the area to a person detected by the person detection step.
  8.  コンピュータを、
     複数の領域が危険度に応じて設定されたセキュリティ区域にいる人を検出する人検出手段と、前記人検出手段によって検出された人に対して、前記領域に対応した音声で警告を行うとともに、不審者の存在を通報する通報手段とを備えるデジタルスマート・ディフェンスセキュリティシステム
    として機能させるためのプログラム。
     
    Computer,
    A person detecting means for detecting a person in a security area in which a plurality of areas are set according to the degree of danger and a person detected by the person detecting means are warned by a voice corresponding to the area. A program to function as a digital smart defense security system equipped with a means of reporting the existence of a suspicious person.
PCT/JP2019/016324 2019-04-16 2019-04-16 Digital smart defense security system, method, and program WO2020213058A1 (en)

Priority Applications (2)

Application Number Priority Date Filing Date Title
PCT/JP2019/016324 WO2020213058A1 (en) 2019-04-16 2019-04-16 Digital smart defense security system, method, and program
JP2019547539A JPWO2020213058A1 (en) 2019-04-16 2019-04-16 Digital Smart Defense Security Systems, Methods and Programs

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
PCT/JP2019/016324 WO2020213058A1 (en) 2019-04-16 2019-04-16 Digital smart defense security system, method, and program

Publications (1)

Publication Number Publication Date
WO2020213058A1 true WO2020213058A1 (en) 2020-10-22

Family

ID=72838140

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/JP2019/016324 WO2020213058A1 (en) 2019-04-16 2019-04-16 Digital smart defense security system, method, and program

Country Status (2)

Country Link
JP (1) JPWO2020213058A1 (en)
WO (1) WO2020213058A1 (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN114399885A (en) * 2022-01-21 2022-04-26 重庆电子工程职业学院 Tracking system and method based on intelligent wearable equipment
CN115643480A (en) * 2022-10-17 2023-01-24 中国人民解放军海军工程大学 Security intelligent defense system and method for high-risk alert area

Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2010097238A (en) * 2008-10-14 2010-04-30 Toyota Motor Corp Security system and building
JP2011227677A (en) * 2010-04-19 2011-11-10 Secom Co Ltd Notification device

Family Cites Families (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2006196949A (en) * 2005-01-11 2006-07-27 Fujitsu Ltd Telephone set with warning against contents of call
JP2007019842A (en) * 2005-07-07 2007-01-25 Nec Fielding Ltd System and program for information leakage prevention
JP5295701B2 (en) * 2008-09-26 2013-09-18 セコム株式会社 Transaction monitoring device
JP6074999B2 (en) * 2012-10-16 2017-02-08 富士通株式会社 Suspicious communication destination warning system, suspicious communication destination warning method, and program
JP7069854B2 (en) * 2018-03-07 2022-05-18 オムロン株式会社 Monitoring system and server equipment

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2010097238A (en) * 2008-10-14 2010-04-30 Toyota Motor Corp Security system and building
JP2011227677A (en) * 2010-04-19 2011-11-10 Secom Co Ltd Notification device

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN114399885A (en) * 2022-01-21 2022-04-26 重庆电子工程职业学院 Tracking system and method based on intelligent wearable equipment
CN115643480A (en) * 2022-10-17 2023-01-24 中国人民解放军海军工程大学 Security intelligent defense system and method for high-risk alert area

Also Published As

Publication number Publication date
JPWO2020213058A1 (en) 2021-05-06

Similar Documents

Publication Publication Date Title
JP6525229B1 (en) Digital search security system, method and program
JP6529062B1 (en) DIGITAL ACCURATE SECURITY SYSTEM, METHOD, AND PROGRAM
US9685071B1 (en) eReceptionist and eNeighborhood watch system for crime prevention and/or verification
CN104488007B (en) Security network system and method
US8606316B2 (en) Portable blind aid device
JP5871296B1 (en) Smart security digital system, method and program
JP5794599B1 (en) Digital fine security system, method and program
WO2017072923A1 (en) Digital safety support system, method, and program
US10134255B2 (en) Digital future now security system, method, and program
JP6067197B1 (en) Digital smart safety system, method and program
US10922547B1 (en) Leveraging audio/video recording and communication devices during an emergency situation
JP2006325064A (en) Wide area monitoring system
WO2020213058A1 (en) Digital smart defense security system, method, and program
JP6829508B2 (en) Application program and behavior management device
RU2251155C1 (en) Intellectual access and control system
WO2021029086A1 (en) Digital smart guide security system, method, and program
JP3215372U (en) Entrance management system at the condominium facility renovation site
JP2008025278A (en) Comings/goings management system and method
JP7244135B2 (en) Digital safety response security system, method and program
JP3214724U (en) Network type security system and security device
KR101571838B1 (en) Multi functional system utilizing beacon and method for using the same
JP6750931B1 (en) Digital motion formula security system, method and program
Albahri Simulation-based optimization for the placement of surveillance cameras in buildings using BIM

Legal Events

Date Code Title Description
ENP Entry into the national phase

Ref document number: 2019547539

Country of ref document: JP

Kind code of ref document: A

121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 19925092

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 19925092

Country of ref document: EP

Kind code of ref document: A1