WO2021084612A1 - Digital safety response security system, method, and program - Google Patents

Digital safety response security system, method, and program Download PDF

Info

Publication number
WO2021084612A1
WO2021084612A1 PCT/JP2019/042357 JP2019042357W WO2021084612A1 WO 2021084612 A1 WO2021084612 A1 WO 2021084612A1 JP 2019042357 W JP2019042357 W JP 2019042357W WO 2021084612 A1 WO2021084612 A1 WO 2021084612A1
Authority
WO
WIPO (PCT)
Prior art keywords
person
image
warning
safety response
security system
Prior art date
Application number
PCT/JP2019/042357
Other languages
French (fr)
Japanese (ja)
Inventor
和夫 三輪
Original Assignee
株式会社 テクノミライ
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 株式会社 テクノミライ filed Critical 株式会社 テクノミライ
Priority to JP2021553927A priority Critical patent/JP7244135B2/en
Priority to PCT/JP2019/042357 priority patent/WO2021084612A1/en
Publication of WO2021084612A1 publication Critical patent/WO2021084612A1/en

Links

Images

Classifications

    • GPHYSICS
    • G08SIGNALLING
    • G08BSIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
    • G08B25/00Alarm systems in which the location of the alarm condition is signalled to a central station, e.g. fire or police telegraphic systems

Definitions

  • the present invention relates to a digital safety response security system, a method and a program for performing crime prevention by photographing the inside of a security area with a surveillance camera.
  • Patent Document 1 describes that "the intrusion detection unit distinguishes the predetermined intrusion pattern according to the staying time of the subject in the predetermined area" (claim 4).
  • the technique of Patent Document 1 relates to an intrusion deterrent device that deters an intruder on a road.
  • Non-Patent Document 1 describes that there are methods of "opening with a password” and “opening with an emergency unlock button” in order for police officers and the like to pass through the auto-lock door.
  • Patent Document 1 and Non-Patent Document 1 merely give a warning in order to prevent intrusion into a predetermined area, and there is a problem that the warning to a suspicious person lacks power and allows intrusion. .. In addition, there is a problem that it takes time for emergency supporters (police officers, etc.) to enter the building because of the auto lock.
  • An object of the present invention is to provide a digital safety response security system, method and program capable of preventing a warning to a suspicious person from being unpowered and allowing intrusion.
  • the digital safety response security system measures a person detecting means for detecting a person in a predetermined area in a security area and a time for a person detected by the person detecting means to stay in the predetermined area. From the stay period notification means that outputs the first notification signal by staying for the first predetermined period and further outputting the second notification signal by staying for the second predetermined period, and the stay period notification means. It is characterized by including a voice warning means that receives the first notification signal and gives a voice warning, and an image warning means that receives the second notification signal and gives an image warning from the stay period notification means.
  • the image warning means By providing the image warning means with the image warning and the reporting means for making an emergency call, it is possible to promptly notify an emergency supporter (police officer, etc.) and deal with a suspicious person.
  • an emergency supporter police officer, etc.
  • An image saving means for saving an image of an emergency supporter, a time measuring means for measuring the passage of time after receiving an emergency call, an image of a person in a predetermined area related to an auto-lock device, and the image saving.
  • the person collating means for collating the image stored in the means and the person collating means measure the time elapsed by the time measuring means within a third predetermined period, and the person collating means matches the image of the person with the stored image.
  • the auto lock is unlocked by recognizing an image of the emergency supporter such as a police officer, paramedic, firefighter, or security company employee. can do.
  • the digital safety response security method measures a person detection step for detecting a person in a predetermined area in a security area and a time for a person detected by the person detecting means to stay in the predetermined area. From the stay period notification step of outputting the first notification signal by staying for the first predetermined period and further outputting the second notification signal by staying for the second predetermined period, and the stay period notification means. It is characterized by including a voice warning step of receiving the first notification signal and giving a voice warning, and an image warning step of receiving the second notification signal and giving an image warning from the stay period notification means.
  • the computer measures a person detecting means for detecting a person in a predetermined area in a security area and a time for a person detected by the person detecting means to stay in the predetermined area, and obtains a first predetermined value.
  • the stay period notification means that outputs a first notification signal by staying for a period of time and further outputs a second notification signal by staying for a second predetermined period, and the first notification from the stay period notification means. It functions as a digital safety response security system including a voice warning means that receives a signal and gives a voice warning, and an image warning means that receives an image warning from the stay period notification means and gives an image warning. It is a program to make it.
  • the auto-lock can prevent emergency supporters from having to enter the building.
  • FIG. 1 is a block diagram showing a configuration of a digital safety response security system according to an embodiment of the present invention.
  • This digital safety response security system is suitable for application to business establishments that require a high degree of management, such as residences, corporate offices, factories, research institutes, information processing rooms, and money collection rooms.
  • the digital safety response security system 1000 includes a surveillance camera 11 (photographing means) installed in each of the security areas, a motion sensor 20, and Wi-Fi (Wi-Fi) installed in the security area. Controls the entire system, including the Wireless Fidelity terminal (hereinafter referred to as "Wi-Fi master unit") 30, the beacon master unit 40, and the mobile terminal device 50 (ID (Identification) terminal) carried by related parties (family members). It includes a monitoring device 100 and an AI (Artificial Intelligence) accelerator 200 (human detection means).
  • the security area is a caution area (security target area), and includes, for example, a site, a front door and a balcony for a residence, and an elevator hall, a balcony and a window for an office.
  • the monitoring device 100 is installed in the security area, it may be installed outside via a network (not shown).
  • a network not shown.
  • the monitoring device 100 is installed on a server on the network, a plurality of security areas can be monitored.
  • the surveillance camera 11 captures an image (two-dimensional) of the security area specified in two or three dimensions.
  • a part or all of the surveillance camera 11 is a PTZ camera having a PTZ (pan / tilt / zoom) function, and is remotely controlled by the surveillance device 100.
  • the surveillance cameras 11 are installed around the outer wall of the security target building, for example, at the entrance / exit where an intruder can enter / exit, the window opening, the outer periphery of the site boundary, and the corresponding site area.
  • the image taken by the surveillance camera 11 is output to the surveillance device 100 and recorded in the recording unit 160.
  • the motion sensor 20 is a thermo camera, an infrared camera, or the like, and detects the temperature of a sensing object in the security area to detect a suspicious person in the security area.
  • the Wi-Fi master unit 30 uses Wi-Fi to exchange information with the Wi-Fi slave unit 51 of the mobile terminal device 50. Further, the Wi-Fi master unit 30 can acquire position information by Wi-Fi positioning, that is, can acquire position information using a Wi-Fi access point and a predetermined position information service.
  • the beacon master unit 40 is a BLE transmitter installed at a front door or the like and transmits a beacon signal containing an individual identification code by BLE (Bluetooth Low Energy).
  • BLE is a wireless technology that detects proximity.
  • BLE is composed of a combination of a beacon master unit 40, which is a beacon device on the transmitting side, and an application of a mobile terminal device 50 (corresponding to the beacon slave unit 52 described later) that supports reception of radio waves from the beacon master unit 40.
  • the BLE transmits unique ID information necessary for identification, and responds only to the application associated with the ID information of the mobile terminal device 50.
  • the application of the mobile terminal device 50 registers the same identifier as the beacon master unit 40.
  • the application (beacon slave unit 52) of the mobile terminal device 50 stands by in the background by executing an application equipped with a BLE function, and excites a predetermined action when approaching the beacon of the beacon master unit 40.
  • the mobile terminal device 50 is carried by a person concerned (family member) or the like.
  • the mobile terminal device 50 is, for example, a smartphone 50a, a tablet 50b, a notebook computer 50c, or the like.
  • the mobile terminal device 50 is also a mobile phone, a PHS (Personal Handy-Phone System), a PDA (Personal Digital Assistants), a dedicated terminal, or the like.
  • the mobile terminal device 50 can be used by related parties and the like in various places (that is, the current position), and a video including an e-mail or a moving image from the monitoring device 100 can be transmitted via a telephone line (not shown). It can be received.
  • the mobile terminal device 50 assumes the use of a smartphone 50a (ID terminal), and each individual can use it in various places (that is, the current position).
  • One of the mobile terminal devices 50 is located at a security company (not shown).
  • the smartphone 50a has a digital safety response application (hereinafter referred to as "safety response application"). If the safety response application is started by the background processing of each application, for example, it goes through the communication carrier network (fixed network), the web service cloud 300 (see Fig. 4 below), or the Internet 303 (see Fig. 4 below). Then, the cloud server 301 (see FIG. 4 below) on the web service cloud 300 can be connected, and the telop about the suspicious person can be received from the cloud server 301. The smartphone 50a can notify a telop in which a suspicious person is detected on a standby screen or the like.
  • safety response application a digital safety response application
  • the smartphone 50a includes a Wi-Fi individual identification device (hereinafter referred to as "Wi-Fi slave unit") 51 and a GPS 53 that captures the positions of related parties.
  • the smartphone 50a may be provided with the beacon slave unit 52.
  • the smartphone 50a may include any one of the Wi-Fi slave unit 51, the beacon slave unit 52, and the GPS 53.
  • the Wi-Fi slave unit 51 receives and individually identifies the radio waves of the Wi-Fi master unit 30 installed in the business facility.
  • the monitoring device 100 stores the arrangement information of the Wi-Fi master unit 30 installed in the facility as safety-related information.
  • the Wi-Fi slave unit 51 approaches the Wi-Fi master unit 30, it is possible to determine the ID and position of the person who carries the mobile terminal device 50.
  • the beacon slave unit 52 is an application of the mobile terminal device 50 that supports reception of radio waves from the beacon master unit 40.
  • the beacon master unit 40 transmits a beacon (unique ID information necessary for identification), and the application (beacon slave unit 52) of the mobile terminal device 50 excites a predetermined action when approaching the beacon of the beacon master unit 40. To do.
  • the GPS 53 receives radio waves of position information from GPS satellites and the like.
  • the GPS 53 acquires the position information by calculating the current position information as three parameters of latitude, longitude and altitude from the information received via the GPS antenna.
  • the acquired position information is timely transmitted to the monitoring device 100.
  • an example using GPS satellites is shown as a means for acquiring position information, but a method using a positional relationship with a base station other than GPS may also be used.
  • a method using a positional relationship with a base station other than GPS may also be used.
  • the mobile terminal device 50 which is a mobile terminal
  • a base station and a mobile phone communication network are used in place of or in combination with GPS53. It is also possible to send and receive information to and from the mobile phone company server via the mobile phone company and acquire the current location information of the own terminal from the proximity confirmation.
  • location information acquisition by Wi-Fi positioning that is, location information acquisition using a Wi-Fi access point and a predetermined location information service may be used.
  • the monitoring device 100 is installed in the residence of a person concerned (for example, a family member) and centrally manages the security area.
  • the monitoring device 100 may be a general server computer, a personal computer, or the like.
  • the monitoring device 100 includes a control unit 110, an input unit 120, a storage unit 130, a display unit 140, an output unit 150, a recording unit 160 (recording means), and a registrant / suspicious person / emergency supporter information DB 165.
  • Image storage means an image processing unit 170, an interface (I / F) unit 180, and a communication unit 190 are provided, and each unit is connected by a bus 195.
  • control unit 110 shall read each program from the ROM as necessary, load it into the RAM, and execute each function (described later).
  • Each program may be stored in the storage unit 130 in advance, or may be incorporated into the monitoring device 100 when necessary via another storage medium or communication medium.
  • the control unit 110 is composed of a CPU (Central Processing Unit) and the like, controls the entire monitoring device 100, executes a control program, and functions as a digital safety response security system. The detailed configuration of the control unit 110 will be described later.
  • CPU Central Processing Unit
  • the input unit 120 is an input device for the user of the monitoring device 100 to input instructions and the like, such as a keyboard, a mouse, a touch panel provided on the screen of the display unit 140, and a microphone.
  • the storage unit 130 includes memories such as ROM (ReadOnlyMemory), RAM (RandomAccessMemory), and EEPROM (ElectricallyErasableProgrammableRead-OnlyMemory), and stores various data and programs used by the control unit 110.
  • the storage unit 130 stores still images or moving images received from the surveillance camera 11, various data and programs used by the control unit 110, and the like.
  • the display unit 140 displays the operating status of the monitoring device 100, the image received from the monitoring camera 11, the GUI (Graphical User Interface) for operating the monitoring device 100, and the like.
  • the output unit 150 is, for example, an audio interface, and outputs an audio signal from the monitoring device 100 to the sound system 158 in the security area.
  • an audio signal output from the monitoring device 100 to the acoustic system 158 for example, an audio signal input from an audio input device such as a microphone provided in the input unit 120, or data stored in the storage unit 130 is stored in the control unit 110. May be the reproduced audio signal.
  • the sound system 158 includes an amplifier and a plurality of speakers arranged on the premises, and emits a signal input from the monitoring device 100 on the premises.
  • the recording unit 160 is composed of an external storage device such as an HDD (Hard Disk Drive), and records an image in the security area taken by the surveillance camera 11.
  • the recording unit 160 records high image quality for a predetermined short time after shooting, converts it to low image quality after the predetermined short time elapses, and records for a predetermined long time.
  • the registrant / suspicious person / emergency supporter information DB 165 stores registrant information such as family members, guardians, managers, and visitors.
  • the registrant / suspicious person / emergency supporter information DB 165 stores the suspicious person information.
  • the registrant / suspicious person / emergency supporter information DB 165 is an image storage unit (image storage means) for storing emergency supporter information (see FIG. 3).
  • a face information DB (not shown) is set up separately from the registrant / suspicious person / emergency supporter information DB 165 to accumulate face images (face information) of suspicious persons and store personnel.
  • Basic data such as the face of a person registered in this face information DB is obtained from a headquarters, a head office, a security company, etc. (not shown) via the I / F unit 180, and a face information DB is constructed.
  • mutual face information DB can be updated to the latest face image (face information) by exchanging information with the headquarters, the head office, a security company, etc. (not shown).
  • an image correspondence DB (not shown) that stores each position in two dimensions of the image taken by the surveillance camera 11 and each position in the three-dimensional space taken by the surveillance camera 11 in association with each other.
  • the control unit 110 stores the shape defined in the three-dimensional space in the image correspondence DB in association with each other by a projection transformation that projects the shape on the two-dimensional surface.
  • the image-corresponding DB may use a part of the memory area of the storage unit 130.
  • the image processing unit 170 is composed of a DSP (Digital Signal Processor) or the like, and performs predetermined processing on the received image. Predetermined processing includes contour extraction, image resizing, resolution conversion processing, and the like.
  • DSP Digital Signal Processor
  • the image captured by the surveillance camera 11 in 1 second is, for example, a 5-frame image, the 1/5 second image, the 2/5 second image, the 3/5 second image, the 4/5 second image, and the 5/5 second image.
  • the size of the moving object can be known by inputting the outer shape line of the object in the motion of 10 images.
  • the image processing unit 170 processes the image data taken by the surveillance camera 11 and outputs the image in the security area.
  • the I / F unit 180 connects each surveillance camera 11 arranged in the security area with the surveillance device 100. Further, the I / F unit 180 is connected to a headquarters, a head office, a security company, etc. (not shown) by a network or a dedicated line.
  • the communication unit 190 transmits / receives data to / from the mobile terminal device 50 via the base station.
  • the communication unit 190 has a wireless communication function, and is connected to a control board using, for example, USB (Universal Serial Bus).
  • FIG. 2 is a block diagram of the control unit 110 of the digital safety response security system according to the embodiment of the present invention.
  • the control unit 110 is configured by a CPU (Central Processing Unit) or the like, controls the entire monitoring device 100, executes a control program, and functions as a digital safety response security system.
  • the control unit 110 includes a person detection unit 111 (person detection means), a stay period notification unit 112 (stay period notification means), a voice warning unit 113 (voice warning means), and an image warning unit 114 (image warning means).
  • a reporting unit 115 (reporting means), a time measuring unit 116 (time measuring means), a person collating unit 117 (person matching means), and an unlocking unit 118 (unlocking means) are provided.
  • the control unit 110 determines whether or not the person has the detected ID (Identification) terminal (mobile terminal device 50; smartphone 50a) (such as a person who has a predetermined ID such as a family member).
  • the control unit 110 excludes the person who possesses the detected ID terminal from the suspicious person.
  • the control unit 110 refers to the registrant / suspicious person / emergency supporter information DB 165, determines whether or not the person has the registered ID terminal (ID of the visitor, etc.), and determines whether or not the person has the registered ID terminal (ID of the visitor, etc.). Exclude people who have registered ID) from suspicious persons.
  • the control unit 110 determines the risk of intrusion based on the position of a person in the security area. For example, the risk of intrusion is determined based on where the intruder is on the security belts, the yellow belt Y, the orange belt O, and the red belt R (see the upper parts of FIGS. 8 to 9).
  • the control unit 110 gives a warning by voice or image according to the degree of danger.
  • the control unit 110 is based on the two-dimensional position of the person and the size of the person (particularly the size of the head of the person) detected by the person detection, and the three-dimensional space of the person by the image correspondence DB (not shown). Detect the position inside. Specifically, the control unit 110 reads the projected shape that has been defined and stored in advance as the shape projected in the three-dimensional space from the image correspondence DB. The control unit 110 performs the inverse transformation of the projection transformation that projects the shape defined in the three-dimensional space onto the two-dimensional plane based on the two-dimensional image of the person detected in the security area and the size of the person. The control unit 110 detects the three-dimensional position by performing the inverse transformation of the projection transformation from the image of one surveillance camera 11.
  • the three-dimensional position can be detected based on the two-dimensional image taken by one surveillance camera 11 and the size information of the detected person.
  • the person detection unit 111 detects a person from the image taken by the surveillance camera 11 and detects the size of the person. Specifically, the person detection unit 111 detects a person in the security area using the AI accelerator 200 (described later). The person detection unit 111 issues a person detection request to the AI accelerator 200, and the AI accelerator 200 executes an AI calculation other than the CPU and transmits the person detection result to the person detection unit 111. Since high speed is required for human detection, the AI accelerator 200 is used for human detection.
  • the digital safety response security system 1000 detects an intruder in the security area by detecting a person using the AI accelerator 200.
  • the digital safety response security system 1000 is extremely high in deep learning by the AI accelerator 200, in particular, by targeting only people, as compared with image recognition by a conventional motion detection type surveillance camera using image difference. Intruder can be detected with high accuracy.
  • the person detection unit 111 detects a person by using the AI accelerator 200, but the person may be detected by a thermo camera (or a motion sensor 20). That is, the motion sensor 20 detects the temperature in the security area. Then, the human detection unit 111 detects the presence of a person (suspicious person candidate) by detecting the body temperature of the person by the motion sensor 20 and detecting the change in the captured image by the surveillance camera 11.
  • the person detection unit 111 may combine the person detection using the AI accelerator 200 and the person detection using the thermo camera (or motion sensor).
  • AI accelerator 200 is used for the entrance, veranda, and windows where high speed of human detection is required, and the site of the boundary between the site and the outside where high speed of human detection is not required is a thermo.
  • the stay period notification unit 112 measures the time that the person detected by the person detection unit 111 stays in the predetermined area, outputs the first notification signal N1 by staying at T1 for the first predetermined period, and further outputs the second notification signal N1.
  • the second notification signal N2 is output by staying at T2 for a predetermined period of time.
  • the voice warning unit 113 receives the first notification signal N1 from the stay period notification unit 112 and gives a voice warning.
  • the image warning unit 114 receives a second notification signal N2 from the stay period notification unit 112 to give an image warning.
  • the reporting unit 115 makes an emergency call with an image warning.
  • the reporting unit 115 warns the person detected by the person detecting unit 111 with a voice corresponding to the area, and also notifies the existence of a suspicious person.
  • the reporting unit 115 does not report in the case of a person who has the detected ID terminal.
  • the time measurement unit 116 receives an emergency call and measures the passage of time thereafter.
  • the person collation unit 117 is an image of a person in a predetermined area associated with the auto-lock device 500 (see FIG. 15) and an emergency supporter stored in the registrant / suspicious person / emergency supporter information DB 165 (image storage means). Collate with the image (specifically, uniform).
  • the unlocking unit 118 receives that the person collation unit 117 determines that the image of the person and the stored image match within the third predetermined period T3 when the time elapsed measured by the time measuring unit 116 has elapsed. , Unlock the auto lock.
  • the AI accelerator 200 is a dedicated processor that detects a person, and uses a computing resource other than the CPU.
  • the AI accelerator 200 is, for example, an accelerator for image processing by a processor enhanced with a GPU (Graphics Processing Unit) and signal processing using an FPGA (Field Programmable Gate Array). Further, the AI accelerator 200 executes the calculation of AI (Artificial Intelligence) on a dedicated hardware (for example, GPU).
  • AI Artificial Intelligence
  • FIG. 3 is a diagram showing an example of emergency supporter information stored in the registrant / suspicious person / emergency supporter information DB 165.
  • the registrant / suspicious person / emergency supporter information DB 165 contains an image of a police officer (see number 1651 in FIG. 3), an image of an emergency worker (see number 1652 in FIG. 3), and images of emergency supporters as emergency supporter information. Images of people wearing their respective uniforms (including caps) such as firefighter images (see number 1653 in FIG. 3) and images of security company employees (see number 1654 in FIG. 3) are stored.
  • the registrant / suspicious person / emergency supporter information DB 165 stores images of a person wearing a plurality of types of uniforms corresponding to the emergency supporter.
  • FIG. 4 is a configuration diagram showing the whole using the digital safety response security system according to the embodiment of the present invention.
  • the digital safety response security system 1000 actively cooperates with the cloud server (commercial server) 301 and the cloud server 301 that provide the digital safety response security service on the web service cloud 300. It has a Push notification server 302 that acquires information and notifies the user's smartphone 50a (mobile terminal device; ID terminal).
  • the web service cloud 300 is connected to the Internet 303.
  • the cloud server 301 is, for example, AWS (Amazon Web Services) (registered trademark).
  • the digital safety response security system 1000 is connected to the Internet 303 (see FIG. 15).
  • the Internet 303 is connected to the Internet 303 by, for example, a VPN (Virtual Private Network).
  • the smartphone 50a can transmit texts and images to the cloud server 301 on the web service cloud 300 via the Internet 303. Further, the smartphone 50a receives the push notification from the push notification server 302 via the Internet 303. Further, the cloud server 301 and the push notification server 302 connect to the smartphone 50a equipped with the safety response application via a communication carrier network (fixed network) (see FIG. 15) such as an LTE / 4G / 5G network. ..
  • a communication carrier network fixed network
  • the digital safety response security system 1000 detects an intrusion of a suspicious person into the premises and push-notifies the smartphone 50a owned by the person, his / her family, or the like.
  • the safety response application is activated and the zoom screen of the suspicious person is displayed, and the telop "A suspicious person has been detected at the entrance on the 1st floor" is played.
  • the content is read aloud.
  • the suspicious person is notified by the telop and voice on the screen of the smartphone 50a.
  • the related organizations for example, in an emergency, the related organizations (police, fire department) are notified. In this case, the security company and the head office of the affiliated company are also automatically notified. Also, if there is no urgency or if you want to confirm, only the security company will be notified.
  • FIG. 5 is a diagram showing the operation of the safety response application of the digital safety response security system according to the embodiment of the present invention.
  • a telop that detects a suspicious person is notified on the standby screen or the like of the smartphone 50a.
  • the display of the smartphone 50a is switched to the safety response application operation display, the zoom screen of the suspicious person is displayed, and the position and situation of the suspicious person "suspicious person at the entrance on the 1st floor" is displayed. indicate.
  • this telop is read aloud by automatic voice.
  • the display of the smartphone 50a is displayed on four time-series screens as shown on the right side of FIG.
  • FIG. 6 is a flowchart showing digital safety response security processing. This flow is executed by the control unit 110 (see FIG. 2) of the monitoring device 100. This flow takes the case of a high-rise condominium in a high-rise building as an example.
  • step S11 an image in the security area (specific area) specified in three dimensions is taken.
  • the surveillance camera 11 is, for example, a PTZ camera, which is remotely controlled by the surveillance device 100.
  • the image taken by the surveillance camera 11 is output to the surveillance device 100.
  • step S12 the person detection unit 111 of the control unit 110 detects a person in a predetermined area within the security area.
  • step S13 the person collation unit 117 of the control unit 110 identifies whether or not the person photographed by the surveillance camera 11 is a suspicious person.
  • the person matching unit 117 requests the AI accelerator 200 to track a person by AI, and the person matching unit 117 waits for the result of tracking a person from the AI accelerator 200.
  • the person collation unit 117 tentatively identifies a person who does not have an ID terminal or an identification number card registered in advance in the registrant / suspicious person / emergency supporter information DB 165 as a suspicious person.
  • the control unit 110 acquires the detailed information of the suspicious person (intruder) in step S14.
  • the suspicious person detailed information is the history information of the suspicious person registered in the registrant / suspicious person / emergency supporter information DB 165 and the image (including moving image) information of the suspicious person taken by the surveillance camera 11. If it is not recognized as a suspicious person (step S13: No), the process of this flow ends.
  • step S15 the stay period notification unit 112 of the control unit 110 measures the time during which the person detected by the person detection unit 111 stays in the predetermined area.
  • the stay period notification unit 112 receives a first notification signal N when a person (suspicious person) stays in a predetermined area (for example, the red belt R in FIG. 7 described later) for a first predetermined period (T1, for example, 10 seconds).
  • T1 first predetermined period
  • (Notification signal) 1 is output
  • the second notification signal N2 is output by staying for a second predetermined period (T2, for example, 20 to 30 seconds).
  • the voice warning unit 113 of the control unit 110 receives the first notification signal N1 from the stay period notification unit 112 and gives a voice warning. That is, the voice warning unit 113 gives a voice warning to the suspicious person by the sound system 158 (see FIG. 1) in response to the suspicious person staying in the predetermined area for the first predetermined period (T1).
  • the voice warning may be a speaker installed in the surveillance camera 11 (see speaker 12 in FIG. 15 below) or a speaker of a TV monitor (see TV monitor 13 in FIG. 18 below).
  • step S17 the image warning unit 114 of the control unit 110 receives the second notification signal N2 from the stay period notification unit 112 and gives an image warning. That is, in response to further staying for the second predetermined period (T2), the image warning unit 114 photographs the suspicious person, for example, on the TV monitor 13 display screen that the suspicious person can see. Display the image you are shooting.
  • step S18 the reporting unit 115 of the control unit 110 makes an emergency call (such as dialing 110) together with an image warning when the reporting function for staying in the second predetermined period (T2) is set.
  • an emergency call such as dialing 110
  • the emergency call to be made together with the image warning may be set to execute the emergency call after a predetermined period after the image warning, instead of simultaneously performing this emergency call with the image warning.
  • an emergency call may be provided in a time stage, such as first reporting to a person concerned, a security company, or the like, and then reporting to the police or fire department. By doing so, the reliability of the emergency call can be improved by preventing the emergency call from being made when the suspicious person moves out immediately after receiving the image warning (such as when the need for an emergency call is reduced). Can be enhanced.
  • step S18 it is possible to prevent the warning to the suspicious person from being lacking in power and allowing intrusion.
  • step S19 the time measuring unit 116 of the control unit 110 measures the passage of time after receiving the emergency call from the reporting unit 115.
  • step S20 the person collation unit 117 of the control unit 110 includes an image of a person in a predetermined area associated with the auto-lock device and an image stored in the registrant / suspicious person / emergency supporter information DB 165 (image storage means). To match.
  • step S21 the control unit 110 determines whether or not the time elapsed measured by the time measuring unit 116 has elapsed a third predetermined period (T3, for example, 30 minutes).
  • step S21: Yes When the time elapsed measured by the time measuring unit 116 has passed the third predetermined period (T3) (step S21: Yes), the processing of this flow is terminated.
  • the third predetermined period (T3) is the emergency response time until the emergency supporter rushes to the site after receiving the emergency call.
  • the start point (immediately after the emergency call) and the end point (expiration of the third predetermined period T3) of the monitoring control period are clarified, the reliability of this process is improved, and the process of this system is effective. Aim. That is, even if it is determined that the image collations match a little loosely, the emergency supporter can be accurately recognized as a result because the determination is made only for a predetermined period in which the emergency supporter is expected to pass.
  • step S21: No When the time elapsed measured by the time measuring unit 116 is within the third predetermined period (T3) (step S21: No), the person collating unit 117 of the control unit 110 registers with the image of the person in the predetermined area in step S22. It is determined whether or not the image of the emergency supporter stored in the person / suspicious person / emergency supporter information DB165 matches.
  • step S22: Yes When the image of the person and the image of the stored emergency supporter match (step S22: Yes), the unlocking unit 118 of the control unit 110 automatically sets the unlocking signal for unlocking the auto lock in step S23. Output to the lock device 500 (see FIG. 15). That is, this system unlocks the auto lock by outputting the unlock signal to the auto lock device 500. If the image of the person and the image of the emergency supporter stored in step S22 do not match (step S22: No), the process returns to step S21.
  • the auto lock is unlocked by the image recognition (steps S15 to S18) of the emergency supporter after the emergency call, which is performed together with the voice warning and the image warning. Anything may have a process of recognizing a supporter as an image and unlocking the auto lock (steps S19 to S22), and the processes of steps S15 to S18 are not essential. That is, the process of recognizing the image of the emergency supporter and unlocking the auto lock (steps S19 to S22) may be independently executed in a predetermined period after the emergency call.
  • FIG. 7 is a diagram showing an example of security in a private house.
  • the digital safety response security system provides not only individual housing but also security systems for apartments, offices, stores, research institutes, information materials rooms, and financial institutions.
  • the main functions are as follows.
  • a security mode home security, outing security, etc.
  • a security function is provided according to the security mode. It has a function to change the security mode depending on the time.
  • An intruder is detected and registered from the image of the surveillance camera 11 installed around the outside of the house.
  • the detected intruder's risk level (caution level, urgency level) is determined, and the user is notified according to the risk level (caution level, urgency level).
  • the security mode is changed from the outdoors by the smartphone 50a. A warning is notified to an intruder through the microphone of the smartphone 50a and the speaker of the surveillance camera 11.
  • FIG. 8 is a diagram showing an example of security in an apartment house.
  • the main functions are as follows. Define a security mode and provide security functions according to the security mode. It has a function to change the security mode depending on the time.
  • An intruder is detected and registered from the image of the surveillance camera 11 installed on the outer periphery of the living area.
  • the detected intruder's risk level (caution level, urgency level) is determined, and the user is notified according to the risk level (caution level, urgency level).
  • the security mode is changed from the outdoors by the smartphone 50a. A warning is notified to an intruder through the microphone of the smartphone 50a and the speaker of the surveillance camera 11.
  • FIG. 9 is a diagram for explaining a warning by automatic voice and a remote dialogue function by image / voice according to the position of an intruder.
  • FIG. 9 shows an "automatic voice warning" of the Digital Safety Response Security System 1000.
  • FIG. 9 shows a “doorphone type dialogue system” for explanation in comparison with the “automatic voice warning” of the digital safety response security system 1000 on FIG. 9, and
  • FIG. 9 bottom shows a “security camera type dialogue”. Indicates "system”.
  • the "doorphone type dialogue system” conducts two-way dialogue between the visitor and the guardian by the doorphone by image and voice.
  • the "doorphone type dialogue system” executes a smartphone dialogue application of a mobile terminal (smartphone 50a) carried by a guardian via a cloud dialogue relay system to perform two-way dialogue by image and voice.
  • the "security camera type dialogue system” captures and collects sound of an intruder with a security camera equipped with a microphone, and the family engages in two-way dialogue with the intruder by image and voice.
  • the "security camera-type dialogue system” executes a smartphone dialogue application of a mobile terminal carried by a family member via a cloud dialogue relay system to perform two-way dialogue by speaker voice.
  • the digital safety response security system 1000 accurately positions the position of an intruder who has invaded the security area as X, Y, and Z coordinates based on the image of the camera. Then, the digital safety response security system 1000 determines that there is a person in the security area and warns with a voice according to the degree of danger (for example, according to the yellow belt Y, the orange belt O, and the red belt R). .. In the above example of FIG. 9, it is determined that the intruder is on the yellow belt Y, the orange belt O, and the red belt R, and an automatic voice warning is given by sending an automatic voice message according to the degree of danger or the situation. Details will be described later in the flow of FIG.
  • the digital safety response security system 1000 can accurately position the position of an intruder who has invaded the security area as X, Y, and Z coordinates based on the image of the camera.
  • the digital safety response security system 1000 has a technology for determining intrusion in a plane, a technology for determining intrusion in an elevation, and a technology for detecting intrusion in a plane or an elevation as a site intrusion detection and registration function. , Use one or a combination of techniques to verify intrusion over time. Hereinafter, a detailed description will be given.
  • To detect a suspicious person first determine from the camera image whether a human has invaded the premises. After this judgment, it is verified whether the person is a suspicious person and registered / notified.
  • the warning area is inspected in 2D, 3D, and 4D (3D + time), and the degree of risk is evaluated and registered.
  • the area within the boundary of the site is categorized into the following three according to the degree of risk.
  • ⁇ Yellow belt Y For example, 30 cm to 4 m inside the boundary of the site
  • Orange belt O Between yellow belt Y and red belt R
  • Red belt R For example, 30 cm to 4 m from the wall surface of the house
  • the yellow belt Y (hereinafter referred to as Y in the figure) is in the state of early warning level. Intrusion into this part is notified with a yellow risk, but by adding 3D and 4D additional information and verifying, and notifying if there is an intrusion as a result of verification, detection accuracy and early It becomes possible to deal with.
  • the red belt R (hereinafter, indicated by R in the figure) is a level at which it is necessary to immediately notify when there is an intrusion into the area.
  • FIG. 10 is a diagram showing an example of intruder detection on a plane, in which the left side of FIG. 10 shows a normal state in a plane and the right side of FIG. 10 shows an abnormal state in a plane.
  • a yellow belt Y is set inside the boundary of the site, and a red belt R is set so as to surround the wall surface of the house having the entrance door and the window with the orange belt O which is the security zone sandwiched. ..
  • the right side of FIG. 10 shows an abnormal state in a plane. An intruder has invaded beyond the yellow belt Y to the outside of the red belt R.
  • the inclusion relationship between the intruder and the boundary is evaluated. For example, as shown by the symbol a on the right side of FIG. 10, if the surveillance camera 11 shoots at 10 frames / second, an intruded moving object is detected from the images of 10 frames (see the frame on the right side of FIG. 10). Calculate its position on the plane. If the intruder is certainly detected within the 10 frames (5 frames for a surveillance camera with 5 frames per second), it is determined that the intruder may exist.
  • FIG. 11 is a diagram showing an example of intruder detection on an elevation, in which the left side of FIG. 11 shows a normal state on an elevation surface and the right side of FIG. 11 shows an abnormal state on an elevation surface.
  • a yellow belt Y is set inside the boundary of the site, and a red belt R is set so as to surround the wall surface of the house with the orange belt O sandwiched between them.
  • the height is evaluated from the image of the surveillance camera 11. Evaluate whether this height is a standard human height. For example, as shown by reference numeral b on the right side of FIG.
  • the number of images per second of the surveillance camera 11 is evaluated, and it is certainly determined that the intruder is a human being.
  • By detecting an intruder on an elevation it is possible to eliminate the invasion of animals and the false detection of movement due to the wind of planting.
  • FIG. 12 is a diagram showing an example of intruder verification by time, in which the left side of FIG. 12 shows a normal state in time and the right side of FIG. 12 shows an abnormal state in time.
  • the digital safety response security system 1000 repeats the evaluation every second for the detection of the intruder obtained by the intruder detection on the elevation.
  • the intruder is walking on the yellow belt Y.
  • the digital safety response security system 1000 determines that the intruder has certainly invaded after the intruder has been continuously detected on the yellow belt Y.
  • FIG. 13 is a diagram showing an example of mapping the site boundary to the camera image
  • FIG. 13 left is a plan view of the site boundary
  • FIG. 13 right is an example of mapping the site boundary to the camera image.
  • Mapping is a technique for synthesizing an image generated by CG (Computer Graphics) with a photographic image. When compositing, the CG can be naturally superimposed and composited on the photographic image by making the background portion of the CG transparent.
  • CG Computer Graphics
  • a caution area (home site, office of high-rise complex building, front porch of apartment building, boundary of corridor, etc.) Create an accurate plan view of the outline shape). It also gives the installation position, height and orientation (roll, pitch, yaw information) of the surveillance camera.
  • the roll, pitch, and yaw represent the angle of rotation of the line of sight in a three-dimensional space.
  • the rotation around the X-axis is called roll
  • the rotation around the Y-axis is called pitch
  • the rotation around the Z-axis is called yaw.
  • the right side of FIG. 13 shows an example of mapping the image of the surveillance camera of the reference numeral d on the left side of FIG.
  • the position information of the caution area is subjected to projection transformation and clipping by the viewport from the parameters of the camera, and the part of the image obtained from the surveillance camera is obtained on the site (see the right side of FIG. 13).
  • the viewport represents a two-dimensional limit when recognizing a three-dimensional space as two-dimensional. This corresponds to the range that appears in the picture when the picture is taken with a surveillance camera.
  • the viewport represents the range that can be captured by the surveillance camera.
  • the clipping refers to a process of cutting out an object such as computer graphics represented by three-dimensional data to the size of a viewport.
  • ⁇ Technology for determining intrusion from an elevation size comparison with a pre-registered object>
  • Compare known person sizes such as head size, upright height, crouching height, etc.).
  • FIG. 14 is a diagram illustrating an example of registering the height of something that is in advance on the site.
  • the height of the gate, the height of the car, and the height of the vegetation in the site, which is the mapped security area are registered.
  • the standard size that a person has that is, the height of the person (the size of a known person such as the size of the head, the height of standing upright, the height of crouching, etc.) is an image-compatible DB (not shown).
  • image-compatible DB not shown.
  • the intruder is determined by the image of.
  • FIG. 15 is a diagram illustrating an automatic door release command by remote control of the digital safety response security system 1000.
  • the surveillance camera 11 and the speaker 12 are connected to the monitoring device 100 of the digital safety response security system 1000 via the LAN cable 501.
  • the surveillance camera 11 and the speaker 12 are installed at the entrance of each house / room of the building.
  • the speaker 12 interlocks with this system to play an automatic voice of attention and voice.
  • the monitoring device 100 monitors the area of the common area and issues an abnormality alarm. Specifically, when a suspicious person stays in this area for a first predetermined period of time T1, the first notification signal N1 is output, and when the suspicious person stays in this area for a second predetermined period of T2, a second notification signal N2 is output. To do.
  • This system gives a voice warning to the speaker 12 during the first predetermined period T1 stay, and displays a zoomed-up image of the suspicious person on the TV monitor display screen or the like during the second predetermined period T2 stay. Image warning.
  • an emergency call such as dialing 110
  • an emergency alert are transmitted to the smartphones 50a of the persons concerned together with an image warning.
  • the emergency call (110th call, etc.) to be executed together with the image warning during the second predetermined period of stay in T2 may be set to execute the emergency call after the predetermined period after the image warning, instead of simultaneously with the image warning.
  • the smartphone 50a receives the alarm content transmitted from the monitoring device 100 and confirms the display.
  • the above-mentioned emergency call can be made by the system or by the system to notify the person concerned.
  • the LAN cable 501, the input / output device 502, the dedicated cable 503, the automatic door controller 504, the controller 505, the operator 506, and the automatic door 510 together constitute the auto lock device 500.
  • the input / output device 502 is connected to the monitoring device 100 via the LAN cable 501, and the automatic door controller 504 and the controller 505 are connected to the input / output device 502 via the dedicated cable 503.
  • the automatic door controller 504 is controlled by the controller 505.
  • the controller 505 is operated by the actuator 506.
  • the input / output device 502 recognizes the door lock release signal from the monitoring device 100 and outputs the door lock release signal to the automatic door controller 504. Further, the controller 505 recognizes the input signal from the operator 506 and transmits the door lock release signal to the automatic door controller 504 by matching the passwords.
  • the automatic door controller 504 controls the automatic door 510 at the entrance of the building 1F or the like.
  • the automatic door controller 504 receives the door lock release signal and drives the automatic door 510 to the "open" side.
  • the smartphone 50a can transmit texts and images to the cloud server 301 on the web service cloud 300 via the Internet 303. Further, the smartphone 50a receives a push notification from a push notification server (not shown) via the Internet 303. Further, the cloud server 301 and the push notification server connect to the smartphone 50a equipped with the safety response application via a communication carrier network (fixed network) such as an LTE / 4G / 5G network.
  • a communication carrier network fixed network
  • 1 to 2 m in front of the automatic door is defined as a yellow belt Y.
  • a peripheral radius of 1.3 to 2 m of the actuator 506 is defined as a green area G which is a range in which the operator can operate.
  • the surveillance camera 11 near the automatic door controller 504 monitors the yellow belt Y in front of the automatic door and the green area G around the operator, and detects the intrusion of a person into the area.
  • FIG. 16 is a flowchart showing the operation of the digital safety response security system 1000 in the application example 1 of FIG. FIG. 16 shows an example in which a visitor or the like stops in front of the entrance door of each house / room.
  • step S101 the function of detecting the accurate position information of the person detects the accurate position information of the stopped person in cm units. In this case, the location information for each unit and each room is acquired instead of the area unit.
  • step S102 it is monitored whether the person concerned is stopped in front of the entrance of each house / room for 3 to 10 seconds based on the accurate position information.
  • step S103 after confirming that the person concerned has been stopped for 3 to 10 seconds, for example, "I'm in security now, work to the next day” or "What are you doing?" (Corresponding to step S16 in FIG. 6).
  • step S104 after 3 to 10 seconds have passed after the automatic voice warning, if the person concerned does not move out, an image warning is given (corresponding to step S17 in FIG. 6), and an "emergency alert" is sent to the smartphone 50a of the person concerned. (Corresponding to step S18 in FIG. 6).
  • step S105 if the person concerned does not move out after 3 to 10 seconds have passed, the relevant organization is notified and a strong automatic voice (emergency information) for warning such as "Your image has been notified to the relevant organization" is output. Shed. As a result, it is possible to prevent the warning to the suspicious person from being unpowerful and allowing intrusion.
  • a strong automatic voice for warning such as "Your image has been notified to the relevant organization”
  • the suspicious person can be made aware that his / her behavior is constantly monitored, which can be expected to have an effect such as abandoning the suspicious behavior (invasion), and the warning to the suspicious person lacks power and invades. It is possible to prevent forgiveness.
  • FIG. 17 is a flowchart showing another operation of the digital safety response security system 1000 in the application example 1 of FIG. 17 is an example when a person related to the building enters the building when the automatic door for entering the building is normally closed at a predetermined time at night.
  • step S111 a surveillance camera 11 installed in front of the automatic door detects a person (related person) who has entered the yellow belt Y in front of the automatic door.
  • step S112 the surveillance camera 11 monitors whether a person (related person) operates the actuator 506 in the green area G for 20 to 30 seconds to unlock the lock.
  • step S113 a person (related person) completes the input of the password to the actuator 506 within 20 to 30 seconds.
  • step S114 the controller 505 recognizes the password and determines whether or not they match.
  • step S115 If the passwords match in step S115, the "door lock" of the automatic door is released and the user can enter the building.
  • this system performs auto-lock / unlock control based on system judgment. That is, this system includes an image of the person who took the picture and an image of the emergency supporter (image of the person in uniform) stored within the third predetermined period T3 when the measurement is started in response to the emergency call. If they match, unlock the auto lock.
  • the auto lock should be unlocked immediately, but there is no party to unlock the auto lock, or the party is upset and takes time to unlock. This can prevent emergency supporters (police officers, paramedics, firefighters, security company employees, etc.) from having trouble getting inside the building.
  • ⁇ Application example 2> 18 and 19 are diagrams for explaining application example 2 of the TV monitor of the digital safety response security system 1000 and the defense function by automatic voice.
  • a surveillance camera 11, a speaker 12, and a TV monitor 13 are installed at the entrance of a common corridor such as a condominium residential area and a veranda, and are connected to the surveillance device 100 via a LAN cable 501. .. A red belt R is set at this entrance and the veranda.
  • the TV monitor 13 has 1. Normal display and 2. There is a zoom-up image (display image at the time of abnormality). 1. 1.
  • the catch phrase "IoT now and future”, the product name "OOOO”, and the multilingual telop "Security System operation” are displayed as normal displays.
  • This multilingual telop is available in Japanese, English, Chinese, French, Portuguese, Spanish and Hindi, and can be selected.
  • the TV monitor of the digital safety response security system 1000 and the defense function by the automatic voice install the surveillance camera 11, the speaker 12, and the TV monitor 13 at the entrance of the condominium and the red belt R of the balcony.
  • an automatic voice is output (corresponding to step S16 in FIG. 6), and when the intruder stays in the area for a predetermined period (20 to 30 seconds), the intruder invades.
  • the image of the person is output to the TV monitor 13, and the intrusion is suppressed and prevented (corresponding to step S17 in FIG. 6).
  • FIG. 19 is a flowchart showing an outline of the operation of the digital safety response security system 1000 against an intruder (suspicious person) in the application example 2 of FIG. This flow is not necessarily CPU processing, but will be described with step numbers for convenience. Step S is attached to the step of this system, and step I is attached to the invader.
  • step S201 the digital safety response security system 1000 starts monitoring the living room entrance and the veranda by the surveillance camera 11.
  • step S202 an image is acquired from the surveillance camera 11 in front of the entrance of the living room.
  • step S203 it is accurately detected whether or not the human body is inside the red belt R.
  • the count of the intruder's stay time is started in step S204 (corresponding to step S15 in FIG. 6).
  • step S205 the image of the intruder is registered in the registrant / suspicious person / emergency supporter information DB165, and an automatic voice such as "Do you want something?" Is output (corresponding to step S16 in FIG. 6).
  • step S206 the image of the intruder is zoomed up and displayed on the TV monitor 13 (see “2. Zoomed up image” in FIG. 18) (corresponding to step S17 in FIG. 6), and an automatic voice such as “immediately move out” is output. Output.
  • step S207 an image is acquired from the surveillance camera 11 on the balcony.
  • step S208 it is accurately detected whether or not the human body is inside the red belt R.
  • step S209 the count of the intruder's stay time is started.
  • step S210 the image of the intruder is registered in the registrant / suspicious person / emergency supporter information DB165, and an automatic voice such as "Do you want something?" Is output.
  • step S211 the image of the intruder is zoomed up and displayed on the TV monitor 13 (see “2. Zoomed up image” in FIG. 18), and an automatic voice such as “immediately move out” is output.
  • an automatic voice such as “immediately move out” is output.
  • intruder An intruder invades the red belt R shown in FIG.
  • an intruder invades the red belt R at the entrance of the living room shown in FIG. 18 or the red belt R at the balcony (step I11).
  • the digital safety response security system 1000 obtains an image from the surveillance camera 11 and starts counting the staying time of the intruder (steps S204 and S209).
  • the intruder stays in Red Belt R for a predetermined period of time (eg, 10 seconds) (step I12).
  • the digital safety response security system 1000 outputs an automatic voice such as "What do you want?" (Steps S205 and S210).
  • the intruder stays in Red Belt R for a predetermined period of time (eg, 20-30 seconds) (step I13).
  • the digital safety response security system 1000 zooms in on the image of the intruder on the TV monitor 13 and outputs an automatic voice such as "immediately move out" (steps S206 and S211).
  • a process of image-recognizing the emergency supporter and unlocking the auto-lock device 500 (see FIG. 2) during a predetermined period after the emergency call (see steps S19 to S22 of FIG. 6) is performed. You may want to do it. In this way, it is possible to prevent emergency supporters (police officers, paramedics, firefighters, security company employees, etc.) from having trouble entering the building due to the auto-lock.
  • emergency supporters police officers, paramedics, firefighters, security company employees, etc.
  • the digital safety response security system 1000 has a person detection unit 111 for detecting a person in a predetermined area in the security area and a person detection unit 111.
  • the time that the person detected by the unit 111 stays in the predetermined area is measured, the first notification signal N1 is output by staying in the first predetermined period (T1), and further, the second predetermined period (T2).
  • a stay period notification unit 112 that outputs a second notification signal N2 by staying, a voice warning unit 113 that receives a first notification signal N1 from the stay period notification unit 112 and gives a voice warning, and a stay period notification unit 112. Therefore, an image warning unit 114 that receives an image warning by receiving the second notification signal N2 and a notification unit 115 that makes an emergency notification together with the image warning are provided.
  • the suspicious person can be made aware that his / her behavior is constantly monitored, which can be expected to have effects such as abandoning the suspicious behavior (intrusion), and the warning to the suspicious person lacks power and invades. Can be prevented from being forgiven.
  • the digital safety response security system 1000 receives an emergency call from the registrant / suspicious person / emergency supporter information DB 165 that stores the emergency supporter information and the control unit 110, and the time thereafter.
  • the collation unit 117, the notification unit 115 that the recognized person makes an emergency call by staying in the predetermined area for a predetermined period, and the person collation unit 117 that the time elapsed measured by the time measurement unit 116 is within the third predetermined period (T3).
  • the digital safety response security system 1000 includes an AI accelerator 200 which is a computing resource other than the CPU, and the person detection unit 111 of the control unit 110 uses the AI accelerator 200 to detect a person in the security area.
  • the AI accelerator 200 can detect a person existing in a wide security area in real time by executing a person detection process on a dedicated hardware separately from the CPU process. Moreover, even if a configuration using an inexpensive camera device is used, a person can be detected in real time. Further, since the AI accelerator 200 is used, it is possible to detect an intruder with extremely high accuracy as compared with image recognition by a moving object detection type surveillance camera using a conventional image difference.
  • the names of the digital safety response security system and the method are used, but this is for convenience of explanation, and may be a monitoring system, a security system, a smart defense security method, or the like.
  • the digital safety response security system and method of the present invention are also realized by a program for making a computer function as the digital safety response security system or method of the present invention.
  • the program may be stored on a computer-readable recording medium.
  • the recording medium on which this program is recorded may be the ROM itself of the Digital Safety Response Security System, or a program reader such as a CD-ROM drive is provided as an external storage device, and the recording medium is placed therein. It may be a CD-ROM or the like that can be read by inserting it.
  • each of the above configurations, functions, processing units, processing means, etc. may be realized by hardware by designing a part or all of them by, for example, an integrated circuit. Further, each of the above configurations, functions, and the like may be realized by software for the processor to interpret and execute a program that realizes each function. Information such as programs, tables, and files that realize each function can be stored in memory, hard disks, recording devices such as SSDs (Solid State Drives), IC (Integrated Circuit) cards, SD (Secure Digital) cards, optical disks, etc. It can be held on a recording medium.
  • SSDs Solid State Drives
  • IC Integrated Circuit
  • SD Secure Digital
  • the digital safety response security system, method and program according to the present invention are expected to be installed in business establishments requiring a high degree of management such as residences, corporate offices, factories, research institutes, information processing rooms, and money collection rooms. Will be done. In addition, it covers residential and commercial facilities, offices, hospitals, hotels, financial institutions, power plants, air terminals, meeting places, stadiums, museums and other buildings inside and outside, transportation trains, ferries, airplanes, etc. is there.
  • Surveillance camera (shooting means) 20 Motion sensor 30 Wi-Fi master unit 40 Beacon master unit 50 Mobile terminal device (ID terminal) 50a Smartphone (mobile terminal device; ID terminal) 51 Wi-Fi handset 52 Beacon handset 53 GPS 100 Monitoring device 110 Control unit 111 Person detection unit (detection means) 112 Stay period notification unit (stay period notification means) 113 Voice warning section (voice warning means) 114 Image warning section (image warning means) 115 Reporting section (reporting means) 116 Time measurement unit (time measurement means) 117 person collation department (person collation means) 118 Unlocking part (unlocking means) 120 Input unit 130 Storage unit 140 Display unit 150 Output unit 160 Recording unit 165 Registrant / Suspicious person / Emergency support person information DB (image storage means) 170 Image processing unit 180 Interface (I / F) unit 190 Communication unit 200 AI accelerator (human detection means) 500 Auto lock device 501 LAN cable 502 Input / output device 503 Dedicated cable 504 Automatic door controller 505 Controller 506 Operator

Landscapes

  • Business, Economics & Management (AREA)
  • Emergency Management (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Alarm Systems (AREA)

Abstract

Provided are a digital safety response security system, method, and program with which it is possible to prevent a situation in which an unpowerful warning to a suspicious person results in an intrusion. A digital safety response security system (1000) comprises: a time measurement unit (115) which starts to measure the elapse of time upon issuance of an emergency call; a person verification unit (116) which compares an image of a person present in a prescribed area associated with an automated locking device with images stored in a registered person/suspicious person/emergency helper information database (165); a warning unit (117) which makes an emergency call if a recognized person has stayed in the prescribed area for a prescribed period of time; and an unlocking unit 118 which unlocks the automated lock if the person verification unit (117) determines, within a third prescribed period of elapsed time (T3) as measured by the time measurement unit (116), that a person's image matches a stored image.

Description

デジタルセフティ・レスポンスセキュリティシステム、方法及びプログラムDigital Safety Response Security Systems, Methods and Programs
 本発明は、監視カメラによりセキュリティ区域内を撮影して防犯を行うデジタルセフティ・レスポンスセキュリティシステム、方法及びプログラムに関する。 The present invention relates to a digital safety response security system, a method and a program for performing crime prevention by photographing the inside of a security area with a surveillance camera.
 特許文献1には、「侵入検知部は、前記被写体の前記所定エリア内の滞在時間によって前記所定の侵入パターンを区別する」(請求項4)と記載されている。特許文献1の技術は、道路の侵入者に対し、抑止を行う侵入抑止装置に関するものである。 Patent Document 1 describes that "the intrusion detection unit distinguishes the predetermined intrusion pattern according to the staying time of the subject in the predetermined area" (claim 4). The technique of Patent Document 1 relates to an intrusion deterrent device that deters an intruder on a road.
 非特許文献1には、警察官等にオートロックの扉を通過させるために、「暗証番号で開ける」、「非常用開錠ボタンで開ける」の手法があることが記載されている。 Non-Patent Document 1 describes that there are methods of "opening with a password" and "opening with an emergency unlock button" in order for police officers and the like to pass through the auto-lock door.
特開2015-022333号公報Japanese Unexamined Patent Publication No. 2015-022333
 特許文献1及び非特許文献1に記載の装置では、所定エリアへの侵入を抑止するために単に警告を行うにすぎず、不審者への警告が迫力に欠けて侵入を許してしまう課題がある。
 また、オートロックがあるために緊急支援者(警察官など)が建物の中に入るのに手間取る課題がある。
 本発明の目的は、不審者への警告が迫力に欠けて侵入を許してしまうことを防止することができるデジタルセフティ・レスポンスセキュリティシステム、方法及びプログラムを提供することにある。
The devices described in Patent Document 1 and Non-Patent Document 1 merely give a warning in order to prevent intrusion into a predetermined area, and there is a problem that the warning to a suspicious person lacks power and allows intrusion. ..
In addition, there is a problem that it takes time for emergency supporters (police officers, etc.) to enter the building because of the auto lock.
An object of the present invention is to provide a digital safety response security system, method and program capable of preventing a warning to a suspicious person from being unpowered and allowing intrusion.
 本発明に係るデジタルセフティ・レスポンスセキュリティシステムは、セキュリティ区域内の所定エリアにいる人を検出する人検出手段と、前記人検出手段によって検出された人が前記所定エリアに滞在する時間を計測して、第1の所定期間滞在したことによって第1の報知信号を出力し、更に第2の所定期間滞在したことによって第2の報知信号を出力する滞在期間報知手段と、前記滞在期間報知手段から、前記第1の報知信号を受けて音声警告する音声警告手段と、前記滞在期間報知手段から、前記第2の報知信号を受けて画像警告する画像警告手段とを備えることを特徴とする。 The digital safety response security system according to the present invention measures a person detecting means for detecting a person in a predetermined area in a security area and a time for a person detected by the person detecting means to stay in the predetermined area. From the stay period notification means that outputs the first notification signal by staying for the first predetermined period and further outputting the second notification signal by staying for the second predetermined period, and the stay period notification means. It is characterized by including a voice warning means that receives the first notification signal and gives a voice warning, and an image warning means that receives the second notification signal and gives an image warning from the stay period notification means.
 この構成により、不審者への警告が迫力に欠けて侵入を許してしまうことを防止することができる。 With this configuration, it is possible to prevent the warning to a suspicious person from being unpowerful and allowing intrusion.
 前記画像警告手段が前記画像警告すると共に緊急通報する通報手段を備えることで、速やかに緊急支援者(警察官など)に通報して、不審者に対処することができる。 By providing the image warning means with the image warning and the reporting means for making an emergency call, it is possible to promptly notify an emergency supporter (police officer, etc.) and deal with a suspicious person.
 緊急支援者の画像を保存する画像保存手段と、緊急通報したことを受けて、その後の時間経過を計測する時間計測手段と、オートロック装置と関連する所定エリアにいる人の画像と前記画像保存手段に保存されている画像とを照合する人照合手段と、前記時間計測手段が計測した時間経過が第3の所定期間内に、前記人照合手段が前記人の画像と前記保存されている画像とが一致したと判断したことを受けて、オートロックを解錠する解錠手段とを備えることで、オートロックがあるために緊急支援者が建物の中に入るのに手間取ることを防止することができる。 An image saving means for saving an image of an emergency supporter, a time measuring means for measuring the passage of time after receiving an emergency call, an image of a person in a predetermined area related to an auto-lock device, and the image saving. The person collating means for collating the image stored in the means and the person collating means measure the time elapsed by the time measuring means within a third predetermined period, and the person collating means matches the image of the person with the stored image. By providing an unlocking means to unlock the auto lock in response to the judgment that the above matches, it is possible to prevent the emergency supporter from taking time to enter the building due to the auto lock. Can be done.
 前記緊急支援者が、警察官、救急隊員、消防士又は警備会社社員であることで、警察官、救急隊員、消防士又は警備会社社員などの緊急支援者を画像認識してオートロックを解錠することができる。 Since the emergency supporter is a police officer, paramedic, firefighter, or security company employee, the auto lock is unlocked by recognizing an image of the emergency supporter such as a police officer, paramedic, firefighter, or security company employee. can do.
 本発明に係るデジタルセフティ・レスポンスセキュリティ方法は、セキュリティ区域内の所定エリアにいる人を検出する人検出ステップと、前記人検出手段によって検出された人が前記所定エリアに滞在する時間を計測して、第1の所定期間滞在したことによって第1の報知信号を出力し、更に第2の所定期間滞在したことによって第2の報知信号を出力する滞在期間報知ステップと、前記滞在期間報知手段から、前記第1の報知信号を受けて音声警告する音声警告ステップと、前記滞在期間報知手段から、前記第2の報知信号を受けて画像警告する画像警告ステップとを備えることを特徴とする。 The digital safety response security method according to the present invention measures a person detection step for detecting a person in a predetermined area in a security area and a time for a person detected by the person detecting means to stay in the predetermined area. From the stay period notification step of outputting the first notification signal by staying for the first predetermined period and further outputting the second notification signal by staying for the second predetermined period, and the stay period notification means. It is characterized by including a voice warning step of receiving the first notification signal and giving a voice warning, and an image warning step of receiving the second notification signal and giving an image warning from the stay period notification means.
 本発明は、コンピュータを、セキュリティ区域内の所定エリアにいる人を検出する人検出手段と、前記人検出手段によって検出された人が前記所定エリアに滞在する時間を計測して、第1の所定期間滞在したことによって第1の報知信号を出力し、更に第2の所定期間滞在したことによって第2の報知信号を出力する滞在期間報知手段と、前記滞在期間報知手段から、前記第1の報知信号を受けて音声警告する音声警告手段と、前記滞在期間報知手段から、前記第2の報知信号を受けて画像警告する画像警告手段とを備えることを特徴とするデジタルセフティ・レスポンスセキュリティシステムとして機能させるためのプログラムである。 In the present invention, the computer measures a person detecting means for detecting a person in a predetermined area in a security area and a time for a person detected by the person detecting means to stay in the predetermined area, and obtains a first predetermined value. The stay period notification means that outputs a first notification signal by staying for a period of time and further outputs a second notification signal by staying for a second predetermined period, and the first notification from the stay period notification means. It functions as a digital safety response security system including a voice warning means that receives a signal and gives a voice warning, and an image warning means that receives an image warning from the stay period notification means and gives an image warning. It is a program to make it.
 本発明によれば、不審者への警告が迫力に欠けて侵入を許してしまうことを防止することができる。また、オートロックがあるために緊急支援者が建物の中に入るのに手間取ることを防止することができる。 According to the present invention, it is possible to prevent the warning to a suspicious person from being unpowerful and allowing intrusion. In addition, the auto-lock can prevent emergency supporters from having to enter the building.
本発明の実施の形態に係るデジタルセフティ・レスポンスセキュリティシステムの構成を示すブロック図である。It is a block diagram which shows the structure of the digital safety response security system which concerns on embodiment of this invention. 本発明の実施の形態に係るデジタルセフティ・レスポンスセキュリティシステムの制御部のブロック図である。It is a block diagram of the control part of the digital safety response security system which concerns on embodiment of this invention. 本発明の実施の形態に係るデジタルセフティ・レスポンスセキュリティシステムの登録者/不審者/緊急支援者情報DBに蓄積される緊急支援者情報の一例を示す図である。It is a figure which shows an example of the emergency support person information stored in the registrant / suspicious person / emergency support person information DB of the digital safety response security system which concerns on embodiment of this invention. 本発明の実施の形態に係るデジタルセフティ・レスポンスセキュリティシステムを用いた全体を示す構成図である。It is a block diagram which shows the whole using the digital safety response security system which concerns on embodiment of this invention. 本発明の実施の形態に係るデジタルセフティ・レスポンスセキュリティシステムのセフティ・レスポンスアプリ動作を示す図である。It is a figure which shows the safety response application operation of the digital safety response security system which concerns on embodiment of this invention. 本発明の実施の形態に係るデジタルセフティ・レスポンスセキュリティシステムのデジタルセフティ・レスポンス処理を示すフローチャートである。It is a flowchart which shows the digital safety response processing of the digital safety response security system which concerns on embodiment of this invention. 本発明の実施の形態に係るデジタルセフティ・レスポンスセキュリティシステムの個人住宅における警備の例を示す図である。It is a figure which shows the example of the security in the private house of the digital safety response security system which concerns on embodiment of this invention. 本発明の実施の形態に係るデジタルセフティ・レスポンスセキュリティシステムの集合住宅における警備の例を示す図である。It is a figure which shows the example of the security in the apartment house of the digital safety response security system which concerns on embodiment of this invention. 本発明の実施の形態に係るデジタルセフティ・レスポンスセキュリティシステムの侵入者の位置に応じて自動音声により警告及び画像・音声による遠隔からの対話機能を説明する図である。It is a figure explaining the warning by the automatic voice and the remote dialogue function by the image, voice according to the position of the intruder of the digital safety response security system which concerns on embodiment of this invention. 本発明の実施の形態に係るデジタルセフティ・レスポンスセキュリティシステムの平面における侵入者検出の例を示す図である。It is a figure which shows the example of the intruder detection in the plane of the digital safety response security system which concerns on embodiment of this invention. 本発明の実施の形態に係るデジタルセフティ・レスポンスセキュリティシステムの立面における侵入者検出の例を示す図である。It is a figure which shows the example of the intruder detection in the elevation of the digital safety response security system which concerns on embodiment of this invention. 本発明の実施の形態に係るデジタルセフティ・レスポンスセキュリティシステムの時間による侵入者検証の例を示す図である。It is a figure which shows the example of the intruder verification by time of the digital safety response security system which concerns on embodiment of this invention. 本発明の実施の形態に係るデジタルセフティ・レスポンスセキュリティシステムが敷地境界をカメラ画像にマッピングする例を示す図である。It is a figure which shows the example which the digital safety response security system which concerns on embodiment of this invention maps a site boundary to a camera image. 本発明の実施の形態に係るデジタルセフティ・レスポンスセキュリティシステムが敷地内に予めあるものの高さを登録する例を説明する図である。It is a figure explaining an example of registering the height of the digital safety response security system which concerns on embodiment of this invention in advance in the site. 本発明の実施の形態に係るデジタルセフティ・レスポンスセキュリティシステムによる侵入検出の適用例1を説明する図である。It is a figure explaining the application example 1 of the intrusion detection by the digital safety response security system which concerns on embodiment of this invention. 本発明の実施の形態に係るデジタルセフティ・レスポンスセキュリティシステムによる侵入検出の適用例1を説明する図である。It is a figure explaining the application example 1 of the intrusion detection by the digital safety response security system which concerns on embodiment of this invention. 本発明の実施の形態に係るデジタルセフティ・レスポンスセキュリティシステムによる侵入検出の適用例1を説明する図である。It is a figure explaining the application example 1 of the intrusion detection by the digital safety response security system which concerns on embodiment of this invention. 本発明の実施の形態に係るデジタルセフティ・レスポンスセキュリティシステムのTVモニタ、自動音声によるディフェンス機能の適用例2を説明する図である。It is a figure explaining the application example 2 of the TV monitor of the digital safety response security system which concerns on embodiment of this invention, and the defense function by automatic voice. 本発明の実施の形態に係るデジタルセフティ・レスポンスセキュリティシステムのTVモニタ、自動音声によるディフェンス機能の適用例2を説明する図である。It is a figure explaining the application example 2 of the TV monitor of the digital safety response security system which concerns on embodiment of this invention, and the defense function by automatic voice.
 以下、添付図面を参照しながら本発明を実施するための形態について詳細に説明する。
(実施の形態)
 図1は、本発明の実施の形態に係るデジタルセフティ・レスポンスセキュリティシステムの構成を示すブロック図である。
 本デジタルセフティ・レスポンスセキュリティシステムは、住居、企業の事務所、工場、研究所、情報処理室、金銭集計室等の高度の管理を要する事業所等に適用して好適である。
Hereinafter, embodiments for carrying out the present invention will be described in detail with reference to the accompanying drawings.
(Embodiment)
FIG. 1 is a block diagram showing a configuration of a digital safety response security system according to an embodiment of the present invention.
This digital safety response security system is suitable for application to business establishments that require a high degree of management, such as residences, corporate offices, factories, research institutes, information processing rooms, and money collection rooms.
 図1に示すように、デジタルセフティ・レスポンスセキュリティシステム1000は、セキュリティ区域のそれぞれに設置された監視カメラ11(撮影手段)と、人感センサ20と、セキュリティ区域内に設置されたWi-Fi(Wireless Fidelity)ターミナル(以下「Wi-Fi親機」という)30と、ビーコン親機40と、関係者(家族)が携帯する携帯端末装置50(ID(Identification)端末)と、システム全体を制御する監視装置100と、AI(Artificial Intelligence:人工知能)アクセラレータ(Accelerator)200(人検出手段)と、を備える。セキュリティ区域は、警戒エリア(警備対象エリア)であり、例えば、住居であれば敷地、玄関先及びベランダ、オフィスであればエレベータホール、ベランダ及び窓を含む。 As shown in FIG. 1, the digital safety response security system 1000 includes a surveillance camera 11 (photographing means) installed in each of the security areas, a motion sensor 20, and Wi-Fi (Wi-Fi) installed in the security area. Controls the entire system, including the Wireless Fidelity terminal (hereinafter referred to as "Wi-Fi master unit") 30, the beacon master unit 40, and the mobile terminal device 50 (ID (Identification) terminal) carried by related parties (family members). It includes a monitoring device 100 and an AI (Artificial Intelligence) accelerator 200 (human detection means). The security area is a caution area (security target area), and includes, for example, a site, a front door and a balcony for a residence, and an elevator hall, a balcony and a window for an office.
 なお、監視装置100は、セキュリティ区域内に設置されているが、図示しないネットワークを介して外部に設置してもよい。監視装置100を、ネットワーク上のサーバに設置すると、複数のセキュリティ区域を監視対象とすることができる。 Although the monitoring device 100 is installed in the security area, it may be installed outside via a network (not shown). When the monitoring device 100 is installed on a server on the network, a plurality of security areas can be monitored.
<監視カメラ11>
 監視カメラ11は、2次元又は3次元で特定されるセキュリティ区域の画像(2次元)を撮影する。
 監視カメラ11の一部又は全部は、PTZ(パン・チルト・ズーム)機能を有するPTZカメラであり、監視装置100により遠隔操作される。監視カメラ11は、セキュリティ該当建物の警備対象の外壁周囲、例えば侵入者が出入可能な出入口、窓開口部、敷地境界外周部、該当敷地エリアの各所に設置される。監視カメラ11が撮影した画像は、監視装置100に出力され、録画部160に記録される。
<Surveillance camera 11>
The surveillance camera 11 captures an image (two-dimensional) of the security area specified in two or three dimensions.
A part or all of the surveillance camera 11 is a PTZ camera having a PTZ (pan / tilt / zoom) function, and is remotely controlled by the surveillance device 100. The surveillance cameras 11 are installed around the outer wall of the security target building, for example, at the entrance / exit where an intruder can enter / exit, the window opening, the outer periphery of the site boundary, and the corresponding site area. The image taken by the surveillance camera 11 is output to the surveillance device 100 and recorded in the recording unit 160.
<人感センサ20>
 人感センサ20は、サーモカメラや赤外線カメラ等であり、セキュリティ区域内の感知対象物の温度を検出して、セキュリティ区域内の不審者を検出する。
<Human sensor 20>
The motion sensor 20 is a thermo camera, an infrared camera, or the like, and detects the temperature of a sensing object in the security area to detect a suspicious person in the security area.
<Wi-Fi親機30>
 Wi-Fi親機30は、Wi-Fiを用いて携帯端末装置50のWi-Fi子機51との間で情報をやり取りする。また、Wi-Fi親機30は、Wi-Fi測位による位置情報取得、すなわちWi-Fiアクセスポイントと所定の位置情報サービスを利用した位置情報を取得できる。
<Wi-Fi master unit 30>
The Wi-Fi master unit 30 uses Wi-Fi to exchange information with the Wi-Fi slave unit 51 of the mobile terminal device 50. Further, the Wi-Fi master unit 30 can acquire position information by Wi-Fi positioning, that is, can acquire position information using a Wi-Fi access point and a predetermined position information service.
<ビーコン親機40>
 ビーコン親機40は、玄関等に設置され、BLE(Bluetooth Low Energy)により個体識別符号の入ったビーコン信号を送るBLE送信機である。
 BLEは、近接を検知する無線技術である。BLEは、発信側のビーコン機器であるビーコン親機40と、ビーコン親機40からの電波受信に対応した携帯端末装置50のアプリ(後記ビーコン子機52に対応する)の組み合わせによって構成される。BLEは、識別に必要な固有のID情報を発信し、携帯端末装置50の当該ID情報に紐付けられたアプリにしか反応しない。携帯端末装置50のアプリは、ビーコン親機40と同じ識別子を登録しておく。携帯端末装置50のアプリ(ビーコン子機52)は、BLE機能を搭載したアプリケーション実行によりバックグラウンドで待機し、ビーコン親機40のビーコンに近接したときに所定アクションを励起する。
<Beacon master unit 40>
The beacon master unit 40 is a BLE transmitter installed at a front door or the like and transmits a beacon signal containing an individual identification code by BLE (Bluetooth Low Energy).
BLE is a wireless technology that detects proximity. BLE is composed of a combination of a beacon master unit 40, which is a beacon device on the transmitting side, and an application of a mobile terminal device 50 (corresponding to the beacon slave unit 52 described later) that supports reception of radio waves from the beacon master unit 40. The BLE transmits unique ID information necessary for identification, and responds only to the application associated with the ID information of the mobile terminal device 50. The application of the mobile terminal device 50 registers the same identifier as the beacon master unit 40. The application (beacon slave unit 52) of the mobile terminal device 50 stands by in the background by executing an application equipped with a BLE function, and excites a predetermined action when approaching the beacon of the beacon master unit 40.
[携帯端末装置50]
 携帯端末装置50は、関係者(家族)などがそれぞれ携帯する。携帯端末装置50は、例えばスマートフォン50a、タブレット50b、又はノートパソコン50cなどである。携帯端末装置50は、このほか、携帯電話、PHS(Personal Handy-Phone System)、PDA(Personal Digital Assistants)、又は専用端末などである。本実施の形態では、携帯端末装置50は、関係者などが様々な場所(すなわち現在位置)で使用可能であり、図示しない電話回線を介して監視装置100からのメール又は動画を含む映像等を受信可能である。
[Mobile terminal device 50]
The mobile terminal device 50 is carried by a person concerned (family member) or the like. The mobile terminal device 50 is, for example, a smartphone 50a, a tablet 50b, a notebook computer 50c, or the like. The mobile terminal device 50 is also a mobile phone, a PHS (Personal Handy-Phone System), a PDA (Personal Digital Assistants), a dedicated terminal, or the like. In the present embodiment, the mobile terminal device 50 can be used by related parties and the like in various places (that is, the current position), and a video including an e-mail or a moving image from the monitoring device 100 can be transmitted via a telephone line (not shown). It can be received.
 本実施の形態では、携帯端末装置50は、スマートフォン50a(ID端末)の利用を想定しており、各個人が様々な場所(すなわち現在位置)で使用可能である。携帯端末装置50のうちの一つは、図示しない警備会社に配置される。 In the present embodiment, the mobile terminal device 50 assumes the use of a smartphone 50a (ID terminal), and each individual can use it in various places (that is, the current position). One of the mobile terminal devices 50 is located at a security company (not shown).
 スマートフォン50aは、デジタルセフティ・レスポンスアプリ(以下、「セフティ・レスポンスアプリ」という)を有する。セフティ・レスポンスアプリを、例えば各アプリのバックグランド処理で起動させておくと、通信キャリア網(固定網)、ウェブサービスクラウド300(後記図4参照)、又はインターネット303(後記図4参照)を経由して、ウェブサービスクラウド300上のクラウドサーバ301(後記図4参照)に接続でき、クラウドサーバ301から不審者に関するテロップを受け取ることができる。スマートフォン50aは、待受け画面等に不審者を検出したテロップを通知できる。 The smartphone 50a has a digital safety response application (hereinafter referred to as "safety response application"). If the safety response application is started by the background processing of each application, for example, it goes through the communication carrier network (fixed network), the web service cloud 300 (see Fig. 4 below), or the Internet 303 (see Fig. 4 below). Then, the cloud server 301 (see FIG. 4 below) on the web service cloud 300 can be connected, and the telop about the suspicious person can be received from the cloud server 301. The smartphone 50a can notify a telop in which a suspicious person is detected on a standby screen or the like.
 スマートフォン50aは、Wi-Fi個別識別機(以下「Wi-Fi子機」という)51と、関係者の位置を捕捉するGPS53と、を備える。
 なお、スマートフォン50aは、ビーコン子機52を備えているものでもよい。又は、スマートフォン50aは、Wi-Fi子機51と、ビーコン子機52と、GPS53とのいずれか一つを備えるものでもよい。
The smartphone 50a includes a Wi-Fi individual identification device (hereinafter referred to as "Wi-Fi slave unit") 51 and a GPS 53 that captures the positions of related parties.
The smartphone 50a may be provided with the beacon slave unit 52. Alternatively, the smartphone 50a may include any one of the Wi-Fi slave unit 51, the beacon slave unit 52, and the GPS 53.
<Wi-Fi子機51>
 Wi-Fi子機51は、業務施設に設置されたWi-Fi親機30の電波を受信及び個別識別する。監視装置100は、施設内に設置されたWi-Fi親機30の配置情報をセフティ関連情報として記憶している。Wi-Fi子機51がWi-Fi親機30に近接すると、携帯端末装置50を携帯する関係者のIDと位置を判定することができる。
<Wi-Fi handset 51>
The Wi-Fi slave unit 51 receives and individually identifies the radio waves of the Wi-Fi master unit 30 installed in the business facility. The monitoring device 100 stores the arrangement information of the Wi-Fi master unit 30 installed in the facility as safety-related information. When the Wi-Fi slave unit 51 approaches the Wi-Fi master unit 30, it is possible to determine the ID and position of the person who carries the mobile terminal device 50.
<ビーコン子機52>
 ビーコン子機52は、ビーコン親機40からの電波受信に対応した携帯端末装置50のアプリである。ビーコン親機40は、ビーコン(識別に必要な固有のID情報)を発信し、携帯端末装置50のアプリ(ビーコン子機52)は、ビーコン親機40のビーコンに近接したときに所定アクションを励起する。
<Beacon handset 52>
The beacon slave unit 52 is an application of the mobile terminal device 50 that supports reception of radio waves from the beacon master unit 40. The beacon master unit 40 transmits a beacon (unique ID information necessary for identification), and the application (beacon slave unit 52) of the mobile terminal device 50 excites a predetermined action when approaching the beacon of the beacon master unit 40. To do.
<GPS53>
 GPS53は、位置情報の電波をGPS衛星等から受信する。GPS53は、GPSアンテナを介して受信した情報より、現在位置情報を、緯度、経度及び高度の3つのパラメータとして算出して位置情報を取得する。取得した位置情報は、適時、監視装置100に送信される。
<GPS53>
The GPS 53 receives radio waves of position information from GPS satellites and the like. The GPS 53 acquires the position information by calculating the current position information as three parameters of latitude, longitude and altitude from the information received via the GPS antenna. The acquired position information is timely transmitted to the monitoring device 100.
 なお、本実施形態では、位置情報を取得する手段として、GPS衛星を利用した例を示したが、GPS以外の、基地局との位置関係を利用した方式でもよい。例えば、モバイル端末である携帯端末装置50として、Android(登録商標)スマートフォンやカメラ付き高機能携帯電話機を使用する場合、GPS53に代えて又は併用して、基地局及び携帯電話通信網(図示省略)を介して携帯電話会社サーバと情報の送受信を行い、接近確認から自端末の現在位置情報を取得することも可能である。 In the present embodiment, an example using GPS satellites is shown as a means for acquiring position information, but a method using a positional relationship with a base station other than GPS may also be used. For example, when an Android (registered trademark) smartphone or a high-performance mobile phone with a camera is used as the mobile terminal device 50, which is a mobile terminal, a base station and a mobile phone communication network (not shown) are used in place of or in combination with GPS53. It is also possible to send and receive information to and from the mobile phone company server via the mobile phone company and acquire the current location information of the own terminal from the proximity confirmation.
 また、Wi-Fi測位による位置情報取得、すなわちWi-Fiアクセスポイントと所定の位置情報サービスを利用した位置情報取得を用いてもよい。 Further, location information acquisition by Wi-Fi positioning, that is, location information acquisition using a Wi-Fi access point and a predetermined location information service may be used.
[監視装置100]
 監視装置100は、関係者(例えば家族)の住居に設置され、セキュリティ区域内を集中管理する。監視装置100は、一般的なサーバ計算機、又はパーソナルコンピュータ等であってよい。
[Monitoring device 100]
The monitoring device 100 is installed in the residence of a person concerned (for example, a family member) and centrally manages the security area. The monitoring device 100 may be a general server computer, a personal computer, or the like.
 監視装置100は、制御部110と、入力部120と、記憶部130と、表示部140と、出力部150と、録画部160(録画手段)と、登録者/不審者/緊急支援者情報DB165(画像保存手段)と、画像処理部170と、インタフェース(I/F)部180と、通信部190と、を備え、各部はバス195により接続される。 The monitoring device 100 includes a control unit 110, an input unit 120, a storage unit 130, a display unit 140, an output unit 150, a recording unit 160 (recording means), and a registrant / suspicious person / emergency supporter information DB 165. (Image storage means), an image processing unit 170, an interface (I / F) unit 180, and a communication unit 190 are provided, and each unit is connected by a bus 195.
 以降、「○○部は」と主体を記した場合は、制御部110が必要に応じROMから各プログラムを読み出した上でRAMにロードし、各機能(後記)を実行するものとする。各プログラムは、予め記憶部130に記憶されていてもよいし、他の記憶媒体又は通信媒体を介して、必要なときに監視装置100に取り込まれてもよい。 After that, when the subject is described as "○○ part is", the control unit 110 shall read each program from the ROM as necessary, load it into the RAM, and execute each function (described later). Each program may be stored in the storage unit 130 in advance, or may be incorporated into the monitoring device 100 when necessary via another storage medium or communication medium.
 制御部110は、CPU(Central Processing Unit)等により構成され、監視装置100全体を制御するとともに、制御プログラムを実行して、デジタルセフティ・レスポンスセキュリティシステムとして機能させる。制御部110の詳細な構成については、後記する。 The control unit 110 is composed of a CPU (Central Processing Unit) and the like, controls the entire monitoring device 100, executes a control program, and functions as a digital safety response security system. The detailed configuration of the control unit 110 will be described later.
 入力部120は、キーボード、マウス、表示部140の画面上に設けられたタッチパネル、マイクなど、監視装置100のユーザが指示などを入力するための入力機器である。 The input unit 120 is an input device for the user of the monitoring device 100 to input instructions and the like, such as a keyboard, a mouse, a touch panel provided on the screen of the display unit 140, and a microphone.
 記憶部130は、ROM(Read Only Memory)、RAM(Random Access Memory)、EEPROM(Electrically Erasable Programmable Read-Only Memory)などのメモリからなり、制御部110が用いる各種データ及びプログラムなどを記憶する。記憶部130は、監視カメラ11から受信した静止画又は動画、制御部110が用いる各種データ及びプログラムなどを記憶する。 The storage unit 130 includes memories such as ROM (ReadOnlyMemory), RAM (RandomAccessMemory), and EEPROM (ElectricallyErasableProgrammableRead-OnlyMemory), and stores various data and programs used by the control unit 110. The storage unit 130 stores still images or moving images received from the surveillance camera 11, various data and programs used by the control unit 110, and the like.
 表示部140は、監視装置100の動作状況をはじめ、監視カメラ11から受信した画像、又は監視装置100を操作するためのGUI(Graphical User Interface)などを表示する。 The display unit 140 displays the operating status of the monitoring device 100, the image received from the monitoring camera 11, the GUI (Graphical User Interface) for operating the monitoring device 100, and the like.
 出力部150は、例えばオーディオインタフェースであり、セキュリティ区域内の音響システム158に対して監視装置100からの音声信号を出力する。監視装置100から音響システム158へ出力する音声信号としては、例えば、入力部120に設けられたマイクなどの音声入力装置から入力された音声信号、又は記憶部130に記憶されたデータを制御部110が再生した音声信号であってよい。音響システム158は、アンプ及び敷地内に配置された複数のスピーカを備え、監視装置100から入力された信号を敷地内に発声する。 The output unit 150 is, for example, an audio interface, and outputs an audio signal from the monitoring device 100 to the sound system 158 in the security area. As the audio signal output from the monitoring device 100 to the acoustic system 158, for example, an audio signal input from an audio input device such as a microphone provided in the input unit 120, or data stored in the storage unit 130 is stored in the control unit 110. May be the reproduced audio signal. The sound system 158 includes an amplifier and a plurality of speakers arranged on the premises, and emits a signal input from the monitoring device 100 on the premises.
 録画部160は、HDD(Hard Disk Drive)などの外部記憶装置により構成され、監視カメラ11が撮影したセキュリティ区域内の画像を記録する。録画部160は、撮影後所定の短時間は高画質で録画し、その所定の短時間経過後は低画質に変換して所定の長時間まで録画する。 The recording unit 160 is composed of an external storage device such as an HDD (Hard Disk Drive), and records an image in the security area taken by the surveillance camera 11. The recording unit 160 records high image quality for a predetermined short time after shooting, converts it to low image quality after the predetermined short time elapses, and records for a predetermined long time.
 登録者/不審者/緊急支援者情報DB165は、家族、保護者、管理者、来訪者など登録者情報を保存する。
 登録者/不審者/緊急支援者情報DB165は、不審者情報を保存する。
 登録者/不審者/緊急支援者情報DB165は、緊急支援者情報を保存する画像保存部(画像保存手段)である(図3参照)。
The registrant / suspicious person / emergency supporter information DB 165 stores registrant information such as family members, guardians, managers, and visitors.
The registrant / suspicious person / emergency supporter information DB 165 stores the suspicious person information.
The registrant / suspicious person / emergency supporter information DB 165 is an image storage unit (image storage means) for storing emergency supporter information (see FIG. 3).
 なお、登録者/不審者/緊急支援者情報DB165とは、別個に顔情報DB(図示省略)を設置して、不審者、及び店舗関係者等の顔画像(顔情報)を蓄積してもよい。この顔情報DBに登録されている人物の顔などの基礎データは、I/F部180を介して図示しない本部、本社又は警備会社などからデータを入手して、顔情報DBが構築される。また、図示しない本部、本社又は警備会社などと情報を交換して、相互の顔情報DBが最新の顔画像(顔情報)に更新可能である。 Even if a face information DB (not shown) is set up separately from the registrant / suspicious person / emergency supporter information DB 165 to accumulate face images (face information) of suspicious persons and store personnel. Good. Basic data such as the face of a person registered in this face information DB is obtained from a headquarters, a head office, a security company, etc. (not shown) via the I / F unit 180, and a face information DB is constructed. In addition, mutual face information DB can be updated to the latest face image (face information) by exchanging information with the headquarters, the head office, a security company, etc. (not shown).
 また、監視カメラ11によって撮影された画像の2次元の各位置と監視カメラ11によって撮影された3次元空間内の各位置とを対応付けて記憶する画像対応DB(図示省略)を備える。制御部110は、3次元空間内に定義した形状を2次元面上に投影する投影変換によって対応付けて画像対応DBに記憶する。画像対応DBは、記憶部130のメモリ領域の一部を使用するものでもよい。 Further, it is provided with an image correspondence DB (not shown) that stores each position in two dimensions of the image taken by the surveillance camera 11 and each position in the three-dimensional space taken by the surveillance camera 11 in association with each other. The control unit 110 stores the shape defined in the three-dimensional space in the image correspondence DB in association with each other by a projection transformation that projects the shape on the two-dimensional surface. The image-corresponding DB may use a part of the memory area of the storage unit 130.
 画像処理部170は、DSP(Digital Signal Processor)等により構成され、受信した画像に対して予め定められた処理を行う。予め定められた処理には、輪郭抽出、画像のリサイズ、又は解像度変換処理などがある。 The image processing unit 170 is composed of a DSP (Digital Signal Processor) or the like, and performs predetermined processing on the received image. Predetermined processing includes contour extraction, image resizing, resolution conversion processing, and the like.
 監視カメラ11で1秒間に撮影する画像が例えば5コマの画像である場合、1/5秒画像、2/5秒画像、3/5秒画像、4/5秒画像、5/5秒画像の動きで、1秒間に10コマの画像である場合には、10個の画像の動きで、対象物の外形形状線を入力すれば、動く対象物の大きさが分かる。
 画像処理部170は、監視カメラ11で撮影された画像データを処理し、セキュリティ区域内の画像を出力する。
When the image captured by the surveillance camera 11 in 1 second is, for example, a 5-frame image, the 1/5 second image, the 2/5 second image, the 3/5 second image, the 4/5 second image, and the 5/5 second image. In the case of 10 frames of images per second in motion, the size of the moving object can be known by inputting the outer shape line of the object in the motion of 10 images.
The image processing unit 170 processes the image data taken by the surveillance camera 11 and outputs the image in the security area.
 I/F部180は、セキュリティ区域内に配置された各監視カメラ11と監視装置100とを接続する。また、I/F部180は、図示しない本部、本社又は警備会社などにネットワーク又は専用回線により接続する。
 通信部190は、基地局を介して携帯端末装置50とデータを送受信する。通信部190は、無線通信機能を有し、例えばUSB(Universal Serial Bus)を用いて制御基板に接続される。
The I / F unit 180 connects each surveillance camera 11 arranged in the security area with the surveillance device 100. Further, the I / F unit 180 is connected to a headquarters, a head office, a security company, etc. (not shown) by a network or a dedicated line.
The communication unit 190 transmits / receives data to / from the mobile terminal device 50 via the base station. The communication unit 190 has a wireless communication function, and is connected to a control board using, for example, USB (Universal Serial Bus).
[制御部110]
 図2は、本発明の実施の形態に係るデジタルセフティ・レスポンスセキュリティシステムの制御部110のブロック図である。
 図2に示すように、制御部110は、CPU(Central Processing Unit)等により構成され、監視装置100全体を制御するとともに、制御プログラムを実行して、デジタルセフティ・レスポンスセキュリティシステムとして機能させる。
 制御部110は、人検出部111(人検出手段)と、滞在期間報知部112(滞在期間報知手段)と、音声警告部113(音声警告手段)と、画像警告部114(画像警告手段)と、通報部115(通報手段)と、時間計測部116(時間計測手段)と、人照合部117(人照合手段)と、解錠部118(解錠手段)とを備える。
[Control unit 110]
FIG. 2 is a block diagram of the control unit 110 of the digital safety response security system according to the embodiment of the present invention.
As shown in FIG. 2, the control unit 110 is configured by a CPU (Central Processing Unit) or the like, controls the entire monitoring device 100, executes a control program, and functions as a digital safety response security system.
The control unit 110 includes a person detection unit 111 (person detection means), a stay period notification unit 112 (stay period notification means), a voice warning unit 113 (voice warning means), and an image warning unit 114 (image warning means). A reporting unit 115 (reporting means), a time measuring unit 116 (time measuring means), a person collating unit 117 (person matching means), and an unlocking unit 118 (unlocking means) are provided.
 制御部110は、検出したID(Identification)端末(携帯端末装置50;スマートフォン50a)を所持している人(家族など所定のIDを所持している人など)か否かを判別する。 The control unit 110 determines whether or not the person has the detected ID (Identification) terminal (mobile terminal device 50; smartphone 50a) (such as a person who has a predetermined ID such as a family member).
 制御部110は、検出したID端末を所持している人を不審者から除外する。 The control unit 110 excludes the person who possesses the detected ID terminal from the suspicious person.
 制御部110は、登録者/不審者/緊急支援者情報DB165を参照して、登録したID端末(来客などのID)を所持している人か否かを判別し、ID端末(来客などのID)を登録している人を不審者から除外する。 The control unit 110 refers to the registrant / suspicious person / emergency supporter information DB 165, determines whether or not the person has the registered ID terminal (ID of the visitor, etc.), and determines whether or not the person has the registered ID terminal (ID of the visitor, etc.). Exclude people who have registered ID) from suspicious persons.
 制御部110は、セキュリティ区域内の人の位置に基づいて侵入の危険度を判定する。例えば、侵入者がセキュリティベルトである、イエローベルトY、オレンジベルトO、レッドベルトR(図8~図9上参照)のどこにいるかにより侵入の危険度を判定する。 The control unit 110 determines the risk of intrusion based on the position of a person in the security area. For example, the risk of intrusion is determined based on where the intruder is on the security belts, the yellow belt Y, the orange belt O, and the red belt R (see the upper parts of FIGS. 8 to 9).
 制御部110は、危険度に応じた音声又は画像による警告を行う。 The control unit 110 gives a warning by voice or image according to the degree of danger.
 制御部110は、人検出によって検出された人の2次元の位置と人の大きさ(特に、人の頭の大きさ)とに基づいて、画像対応DB(図示省略)によって人の3次元空間内の位置を検出する。具体的には、制御部110は、画像対応DBから、予め3次元空間内に投影した形状として定義して記憶しておいた投影形状を読み込む。制御部110は、セキュリティ区域内で検出した人の2次元画像と人の大きさをもとに、3次元空間内に定義した形状を2次元面上に投影する投影変換の逆変換を行う。制御部110は、1つの監視カメラ11の画像から投影変換の逆変換をすることによって、3次元位置を検出する。原理的には、2次元画像で3次元の位置を検出することはできないはずであるが、人の大きさが既知であるとする(人による頭の大きさの違いはほとんどないことを前提とする)と、1つの監視カメラ11が撮影した2次元画像と、検知した人の大きさ情報とをもとに3次元位置を検出することができる。 The control unit 110 is based on the two-dimensional position of the person and the size of the person (particularly the size of the head of the person) detected by the person detection, and the three-dimensional space of the person by the image correspondence DB (not shown). Detect the position inside. Specifically, the control unit 110 reads the projected shape that has been defined and stored in advance as the shape projected in the three-dimensional space from the image correspondence DB. The control unit 110 performs the inverse transformation of the projection transformation that projects the shape defined in the three-dimensional space onto the two-dimensional plane based on the two-dimensional image of the person detected in the security area and the size of the person. The control unit 110 detects the three-dimensional position by performing the inverse transformation of the projection transformation from the image of one surveillance camera 11. In principle, it should not be possible to detect a 3D position in a 2D image, but it is assumed that the size of the person is known (assuming that there is almost no difference in the size of the head between people). The three-dimensional position can be detected based on the two-dimensional image taken by one surveillance camera 11 and the size information of the detected person.
 人検出部111は、監視カメラ11によって撮影された画像から人を検出し、その人の大きさを検出する。具体的には、人検出部111は、AIアクセラレータ200(後記)を用いてセキュリティ区域内の人を検出する。人検出部111は、AIアクセラレータ200に対して人検出要求を発行し、AIアクセラレータ200は、CPU以外でAIの計算を実行して、人検出結果を人検出部111に送信する。人検出には高速性が求められるので、人検出にAIアクセラレータ200を用いている。 The person detection unit 111 detects a person from the image taken by the surveillance camera 11 and detects the size of the person. Specifically, the person detection unit 111 detects a person in the security area using the AI accelerator 200 (described later). The person detection unit 111 issues a person detection request to the AI accelerator 200, and the AI accelerator 200 executes an AI calculation other than the CPU and transmits the person detection result to the person detection unit 111. Since high speed is required for human detection, the AI accelerator 200 is used for human detection.
 デジタルセフティ・レスポンスセキュリティシステム1000は、AIアクセラレータ200を用いた人検出によりセキュリティ区域内への侵入者を検出する。
 デジタルセフティ・レスポンスセキュリティシステム1000は、AIアクセラレータ200による深層学習において、特に、人のみを監視対象とすることで、従来の画像差分を用いた動体検出型の監視カメラによる画像認識に比べて極めて高い精度での侵入者の検出を行うことができる。
The digital safety response security system 1000 detects an intruder in the security area by detecting a person using the AI accelerator 200.
The digital safety response security system 1000 is extremely high in deep learning by the AI accelerator 200, in particular, by targeting only people, as compared with image recognition by a conventional motion detection type surveillance camera using image difference. Intruder can be detected with high accuracy.
 本実施形態では、人検出部111は、AIアクセラレータ200を用いて人を検出しているが、サーモカメラ(又は人感センサ20)で人を検出するようにしてもよい。すなわち、人感センサ20は、セキュリティ区域内の温度を検出する。そして、人検出部111は、人感センサ20が人の体温を検出し、かつ、監視カメラ11がその撮影画像の変化を検出したことによって人(不審者候補)の存在を検出する。 In the present embodiment, the person detection unit 111 detects a person by using the AI accelerator 200, but the person may be detected by a thermo camera (or a motion sensor 20). That is, the motion sensor 20 detects the temperature in the security area. Then, the human detection unit 111 detects the presence of a person (suspicious person candidate) by detecting the body temperature of the person by the motion sensor 20 and detecting the change in the captured image by the surveillance camera 11.
 なお、人検出部111は、AIアクセラレータ200を用いた人検出と、サーモカメラ(又は人感センサ)を用いた人検出とを組み合わせてもよい。例えば、セキュリティ区域内のうち、人検出の高速性が要求される、玄関先やベランダ、窓についてはAIアクセラレータ200を用い、人検出の高速性が要求されない敷地と外部の境界の敷地内はサーモカメラ(又は人感センサ)を使用する。 The person detection unit 111 may combine the person detection using the AI accelerator 200 and the person detection using the thermo camera (or motion sensor). For example, in the security area, AI accelerator 200 is used for the entrance, veranda, and windows where high speed of human detection is required, and the site of the boundary between the site and the outside where high speed of human detection is not required is a thermo. Use a camera (or motion sensor).
 滞在期間報知部112は、人検出部111によって検出された人が所定エリアに滞在する時間を計測して、第1の所定期間T1滞在したことによって第1の報知信号N1出力し、更に第2の所定期間T2滞在したことによって第2の報知信号N2を出力する。 The stay period notification unit 112 measures the time that the person detected by the person detection unit 111 stays in the predetermined area, outputs the first notification signal N1 by staying at T1 for the first predetermined period, and further outputs the second notification signal N1. The second notification signal N2 is output by staying at T2 for a predetermined period of time.
 音声警告部113は、滞在期間報知部112から、第1の報知信号N1を受けて音声警告する。 The voice warning unit 113 receives the first notification signal N1 from the stay period notification unit 112 and gives a voice warning.
 画像警告部114は、滞在期間報知部112から、第2の報知信号N2を受けて画像警告する。通報部115は、画像警告と共に緊急通報する。 The image warning unit 114 receives a second notification signal N2 from the stay period notification unit 112 to give an image warning. The reporting unit 115 makes an emergency call with an image warning.
 通報部115は、人検出部111によって検出された人に対して、領域に対応した音声で警告を行うとともに、不審者の存在を通報する。通報部115は、検出したID端末を所持している人の場合には通報しない。 The reporting unit 115 warns the person detected by the person detecting unit 111 with a voice corresponding to the area, and also notifies the existence of a suspicious person. The reporting unit 115 does not report in the case of a person who has the detected ID terminal.
 時間計測部116は、緊急通報したことを受けて、その後の時間経過を計測する。 The time measurement unit 116 receives an emergency call and measures the passage of time thereafter.
 人照合部117は、オートロック装置500(図15参照)と関連する所定エリアにいる人の画像と登録者/不審者/緊急支援者情報DB165(画像保存手段)に保存されている緊急支援者の画像(具体的には制服)とを照合する。 The person collation unit 117 is an image of a person in a predetermined area associated with the auto-lock device 500 (see FIG. 15) and an emergency supporter stored in the registrant / suspicious person / emergency supporter information DB 165 (image storage means). Collate with the image (specifically, uniform).
 解錠部118は、時間計測部116が計測した時間経過が第3の所定期間T3内に、人照合部117が人の画像と保存されている画像とが一致したと判断したことを受けて、オートロックを解錠する。 The unlocking unit 118 receives that the person collation unit 117 determines that the image of the person and the stored image match within the third predetermined period T3 when the time elapsed measured by the time measuring unit 116 has elapsed. , Unlock the auto lock.
[AIアクセラレータ200]
 AIアクセラレータ200は、人を検出する専用プロセッサであり、CPU以外の計算リソースを用いる。AIアクセラレータ200は、例えば、GPU(Graphics  Processing Unit)を強化したプロセッサよる画像処理、FPGA(Field Programmable Gate Array)を用いた信号処理のアクセラレートである。また、AIアクセラレータ200は、専用ハード(例えば、GPU)上でAI(Artificial Intelligence:人工知能)の計算を実行する。
[AI Accelerator 200]
The AI accelerator 200 is a dedicated processor that detects a person, and uses a computing resource other than the CPU. The AI accelerator 200 is, for example, an accelerator for image processing by a processor enhanced with a GPU (Graphics Processing Unit) and signal processing using an FPGA (Field Programmable Gate Array). Further, the AI accelerator 200 executes the calculation of AI (Artificial Intelligence) on a dedicated hardware (for example, GPU).
 通常のPCによるコンピュータの処理では、デジタル画像一枚あたり人(人体)の検出の処理を行うのに約1.5秒かかる。このため、本実施形態では、人の検出プロセッサであるAIアクセラレータ200を利用することで、PCによるコンピュータの処理の約10倍のパフォーマンスを得、侵入検出を迅速に実行する。また、本実施形態では、計算負荷が高いAIの計算を専用ハードであるAIアクセラレータ200に任せている。これにより、市販のカメラと安価な機器用いた構成であっても、リアルタイムに挙動不審を検出し、不審者を登録可能であることが実証できた。 In computer processing by a normal PC, it takes about 1.5 seconds to detect a person (human body) per digital image. Therefore, in the present embodiment, by using the AI accelerator 200, which is a human detection processor, the performance of the computer processing by the PC is about 10 times higher, and the intrusion detection is executed quickly. Further, in the present embodiment, the calculation of AI, which has a high calculation load, is left to the AI accelerator 200, which is a dedicated hardware. As a result, it was demonstrated that suspicious behavior can be detected in real time and suspicious persons can be registered even with a configuration using a commercially available camera and inexpensive equipment.
 図3は、登録者/不審者/緊急支援者情報DB165に蓄積される緊急支援者情報の一例を示す図である。
 図3に示すように、登録者/不審者/緊急支援者情報DB165は、緊急支援者情報として、警察官画像(図3の番号1651参照)、救急隊員画像(図3の番号1652参照)、消防士画像(図3の番号1653参照)、警備会社社員画像(図3の番号1654参照)などのそれぞれの制服(制帽も含む)を着た人の画像を格納する。
 上記は一例であり、登録者/不審者/緊急支援者情報DB165は、緊急支援者に該当する複数種類の制服を着た人の画像を格納する。
FIG. 3 is a diagram showing an example of emergency supporter information stored in the registrant / suspicious person / emergency supporter information DB 165.
As shown in FIG. 3, the registrant / suspicious person / emergency supporter information DB 165 contains an image of a police officer (see number 1651 in FIG. 3), an image of an emergency worker (see number 1652 in FIG. 3), and images of emergency supporters as emergency supporter information. Images of people wearing their respective uniforms (including caps) such as firefighter images (see number 1653 in FIG. 3) and images of security company employees (see number 1654 in FIG. 3) are stored.
The above is an example, and the registrant / suspicious person / emergency supporter information DB 165 stores images of a person wearing a plurality of types of uniforms corresponding to the emergency supporter.
[デジタルセフティ・レスポンスセキュリティシステム]
 図4は、本発明の実施形態に係るデジタルセフティ・レスポンスセキュリティシステムを用いた全体を示す構成図である。
 図4に示すように、デジタルセフティ・レスポンスセキュリティシステム1000は、ウェブサービスクラウド300上に、デジタルセフティ・レスポンスセキュリティサービスを提供するクラウドサーバ(商用サーバ)301、クラウドサーバ301に連携して能動的に情報を取得してユーザのスマートフォン50a(携帯端末装置;ID端末)に通知するPush通知サーバ302を有する。ウェブサービスクラウド300は、インターネット303に接続される。クラウドサーバ301は、例えばAWS(Amazon Web Services)(登録商標)である。
 デジタルセフティ・レスポンスセキュリティシステム1000は、インターネット303に接続される(図15参照)。なお、インターネット303には、例えばVPN(Virtual Private Network:仮想プライベートネットワーク)で接続される。
[Digital Safety Response Security System]
FIG. 4 is a configuration diagram showing the whole using the digital safety response security system according to the embodiment of the present invention.
As shown in FIG. 4, the digital safety response security system 1000 actively cooperates with the cloud server (commercial server) 301 and the cloud server 301 that provide the digital safety response security service on the web service cloud 300. It has a Push notification server 302 that acquires information and notifies the user's smartphone 50a (mobile terminal device; ID terminal). The web service cloud 300 is connected to the Internet 303. The cloud server 301 is, for example, AWS (Amazon Web Services) (registered trademark).
The digital safety response security system 1000 is connected to the Internet 303 (see FIG. 15). The Internet 303 is connected to the Internet 303 by, for example, a VPN (Virtual Private Network).
 スマートフォン50aは、インターネット303を経由してウェブサービスクラウド300上のクラウドサーバ301にテキスト及び画像を送信することができる。また、スマートフォン50aは、インターネット303を経由してPush通知サーバ302からPush通知を受信する。さらに、クラウドサーバ301及びPush通知サーバ302は、LTE・4G・5G網などの通信キャリア網(固定網)(図15参照)を経由して、セフティ・レスポンスアプリが搭載されたスマートフォン50aに接続する。 The smartphone 50a can transmit texts and images to the cloud server 301 on the web service cloud 300 via the Internet 303. Further, the smartphone 50a receives the push notification from the push notification server 302 via the Internet 303. Further, the cloud server 301 and the push notification server 302 connect to the smartphone 50a equipped with the safety response application via a communication carrier network (fixed network) (see FIG. 15) such as an LTE / 4G / 5G network. ..
 図4に示すように、デジタルセフティ・レスポンスセキュリティシステム1000は、不審者の敷地内への侵入を検知し、本人・家族等が所持するスマートフォン50aにプッシュ通知する。
 スマートフォン50aに来た通知をユーザがタップすると、セフティ・レスポンスアプリが起動して不審者のズーム画面を表示し、「1F玄関にて不審者が検知されました」というテロップが流れる。同時にその内容が音声で読み上げられる。このように、スマートフォン50aの画面のテロップと音声とで不審者の通知が行われる。さらに、スマートフォン50aのユーザの操作により、例えば緊急時には関係機関(警察、消防)に通知する。この場合、警備会社や関係企業本社にも自動的に通知される。また、緊急性がない場合や確認したい場合には、警備会社のみに通知する。
As shown in FIG. 4, the digital safety response security system 1000 detects an intrusion of a suspicious person into the premises and push-notifies the smartphone 50a owned by the person, his / her family, or the like.
When the user taps the notification that comes to the smartphone 50a, the safety response application is activated and the zoom screen of the suspicious person is displayed, and the telop "A suspicious person has been detected at the entrance on the 1st floor" is played. At the same time, the content is read aloud. In this way, the suspicious person is notified by the telop and voice on the screen of the smartphone 50a. Further, by the operation of the user of the smartphone 50a, for example, in an emergency, the related organizations (police, fire department) are notified. In this case, the security company and the head office of the affiliated company are also automatically notified. Also, if there is no urgency or if you want to confirm, only the security company will be notified.
[セフティ・レスポンスアプリ動作]
 図5は、本発明の実施の形態に係るデジタルセフティ・レスポンスセキュリティシステムのセフティ・レスポンスアプリ動作を示す図である。
 図5左に示すように、スマートフォン50aの待受け画面等に不審者を検出したテロップが通知される。ユーザのタップにより、図5中に示すように、スマートフォン50aの表示はセフティ・レスポンスアプリ動作表示に切り替わり、不審者のズーム画面を表示し、不審者の位置と状況「1F玄関に不審者」を表示する。また、このテロップを自動音声で読み上げる。さらに、ユーザのタップにより、図5右に示すように、スマートフォン50aの表示を時系列の4画面に表示する。
[Safety response application operation]
FIG. 5 is a diagram showing the operation of the safety response application of the digital safety response security system according to the embodiment of the present invention.
As shown on the left side of FIG. 5, a telop that detects a suspicious person is notified on the standby screen or the like of the smartphone 50a. By tapping the user, as shown in FIG. 5, the display of the smartphone 50a is switched to the safety response application operation display, the zoom screen of the suspicious person is displayed, and the position and situation of the suspicious person "suspicious person at the entrance on the 1st floor" is displayed. indicate. In addition, this telop is read aloud by automatic voice. Further, by tapping the user, the display of the smartphone 50a is displayed on four time-series screens as shown on the right side of FIG.
 以下、上述のように構成されたデジタルセフティ・レスポンスセキュリティシステムの動作について説明する。
[デジタルセフティ・レスポンスセキュリティ処理]
 図6は、デジタルセフティ・レスポンスセキュリティ処理を示すフローチャートである。本フローは、監視装置100の制御部110(図2参照)で実行される。本フローは、高層ビルの高層マンションの場合を例に採る。
Hereinafter, the operation of the digital safety response security system configured as described above will be described.
[Digital Safety Response Security Processing]
FIG. 6 is a flowchart showing digital safety response security processing. This flow is executed by the control unit 110 (see FIG. 2) of the monitoring device 100. This flow takes the case of a high-rise condominium in a high-rise building as an example.
 ステップS11では、3次元で特定されるセキュリティ区域内(特定エリア)の画像を撮影する。監視カメラ11は、例えばPTZカメラであり、監視装置100により遠隔操作される。監視カメラ11が撮影した画像は、監視装置100に出力される。
 ステップS12で制御部110の人検出部111は、セキュリティ区域内の所定エリアにいる人を検出する。
In step S11, an image in the security area (specific area) specified in three dimensions is taken. The surveillance camera 11 is, for example, a PTZ camera, which is remotely controlled by the surveillance device 100. The image taken by the surveillance camera 11 is output to the surveillance device 100.
In step S12, the person detection unit 111 of the control unit 110 detects a person in a predetermined area within the security area.
 ステップS13で制御部110の人照合部117は、監視カメラ11が撮影した人が、不審な人であるか否かを識別する。本実施形態では、人照合部117は、AIアクセラレータ200に対してAIによる人のトラッキングを要求し、人照合部117は、AIアクセラレータ200からの人のトラッキングの結果を待つ。また、人照合部117は、登録者/不審者/緊急支援者情報DB165に予め登録されたID端末や識別番号カードを所持しない人を仮に不審者と識別する。 In step S13, the person collation unit 117 of the control unit 110 identifies whether or not the person photographed by the surveillance camera 11 is a suspicious person. In the present embodiment, the person matching unit 117 requests the AI accelerator 200 to track a person by AI, and the person matching unit 117 waits for the result of tracking a person from the AI accelerator 200. In addition, the person collation unit 117 tentatively identifies a person who does not have an ID terminal or an identification number card registered in advance in the registrant / suspicious person / emergency supporter information DB 165 as a suspicious person.
 不審者と認識した場合(ステップS13:Yes)、ステップS14で制御部110は、不審者(侵入者)の詳細情報を取得する。この不審者詳細情報は、登録者/不審者/緊急支援者情報DB165に登録されている不審者の履歴情報及び監視カメラ11が撮影した不審者の画像(動画像を含む)情報である。
 不審者と認識しない場合(ステップS13:No)、本フローの処理を終了する。
When the suspicious person is recognized (step S13: Yes), the control unit 110 acquires the detailed information of the suspicious person (intruder) in step S14. The suspicious person detailed information is the history information of the suspicious person registered in the registrant / suspicious person / emergency supporter information DB 165 and the image (including moving image) information of the suspicious person taken by the surveillance camera 11.
If it is not recognized as a suspicious person (step S13: No), the process of this flow ends.
 ステップS15で制御部110の滞在期間報知部112は、人検出部111によって検出された人が所定エリアに滞在する時間を計測する。滞在期間報知部112は、人(不審者)が所定エリア(例えば、後記図7等のレッドベルトR)に第1の所定期間(T1、例えば10秒間)滞在したことによって第1の報知信号N(Notification signal)1を出力し、更に第2の所定期間(T2、例えば20~30秒間)滞在したことによって第2の報知信号N2を出力する。 In step S15, the stay period notification unit 112 of the control unit 110 measures the time during which the person detected by the person detection unit 111 stays in the predetermined area. The stay period notification unit 112 receives a first notification signal N when a person (suspicious person) stays in a predetermined area (for example, the red belt R in FIG. 7 described later) for a first predetermined period (T1, for example, 10 seconds). (Notification signal) 1 is output, and the second notification signal N2 is output by staying for a second predetermined period (T2, for example, 20 to 30 seconds).
 ステップS16で制御部110の音声警告部113は、滞在期間報知部112から、第1の報知信号N1を受けて音声警告する。すなわち、音声警告部113は、不審者が所定エリアに第1の所定期間(T1)滞在したことを受けて、不審者に対し、音響システム158(図1参照)で音声警告する。上記音声警告は、監視カメラ11に設置されたスピーカ(後記図15のスピーカ12参照)でもよいし、TVモニタ(後記図18のTVモニタ13参照)のスピーカでもよい。 In step S16, the voice warning unit 113 of the control unit 110 receives the first notification signal N1 from the stay period notification unit 112 and gives a voice warning. That is, the voice warning unit 113 gives a voice warning to the suspicious person by the sound system 158 (see FIG. 1) in response to the suspicious person staying in the predetermined area for the first predetermined period (T1). The voice warning may be a speaker installed in the surveillance camera 11 (see speaker 12 in FIG. 15 below) or a speaker of a TV monitor (see TV monitor 13 in FIG. 18 below).
 ステップS17で制御部110の画像警告部114は、滞在期間報知部112から、第2の報知信号N2を受けて画像警告する。すなわち、画像警告部114は、更に第2の所定期間(T2)滞在したことを受けて、不審者に対し、例えば、不審者が見ることができるTVモニタ13表示画面に不審者を撮影した又は撮影している画像を表示する。 In step S17, the image warning unit 114 of the control unit 110 receives the second notification signal N2 from the stay period notification unit 112 and gives an image warning. That is, in response to further staying for the second predetermined period (T2), the image warning unit 114 photographs the suspicious person, for example, on the TV monitor 13 display screen that the suspicious person can see. Display the image you are shooting.
 ステップS18で制御部110の通報部115は、第2の所定期間(T2)滞在での通報機能が設定されている場合、画像警告と共に緊急通報(110番通報など)する。 In step S18, the reporting unit 115 of the control unit 110 makes an emergency call (such as dialing 110) together with an image warning when the reporting function for staying in the second predetermined period (T2) is set.
 ここで、画像警告と共に行う緊急通報は、この緊急通報を画像警告と同時ではなく、画像警告してから所定期間後に緊急通報を実行する設定でもよい。また、緊急通報は、まず、関係者や警備会社等に通報し、その後、警察・消防に通報するなど、時間的な段階を設けてもよい。このようにすれば、画像警告を受けて不審者が即時退去した場合など(緊急通報の必要性が減じた場合など)に、緊急通報を行わないようにすることで、緊急通報の信頼性を高めることができる。 Here, the emergency call to be made together with the image warning may be set to execute the emergency call after a predetermined period after the image warning, instead of simultaneously performing this emergency call with the image warning. In addition, an emergency call may be provided in a time stage, such as first reporting to a person concerned, a security company, or the like, and then reporting to the police or fire department. By doing so, the reliability of the emergency call can be improved by preventing the emergency call from being made when the suspicious person moves out immediately after receiving the image warning (such as when the need for an emergency call is reduced). Can be enhanced.
 緊急通報は、本システムが通報する方法と、本システムが関係者に知らせて関係者が通報する方法とがある。 There are two types of emergency calls: one is that this system makes a report, and the other is that this system notifies the concerned parties and the related parties make a report.
 上記ステップS18までの処理で、不審者への警告が迫力に欠けて侵入を許してしまうことを防止することができる。 By the process up to step S18, it is possible to prevent the warning to the suspicious person from being lacking in power and allowing intrusion.
 ステップS19で制御部110の時間計測部116は、通報部115が緊急通報したことを受けて、その後の時間経過を計測する。 In step S19, the time measuring unit 116 of the control unit 110 measures the passage of time after receiving the emergency call from the reporting unit 115.
 ステップS20で制御部110の人照合部117は、オートロック装置と関連する所定エリアにいる人の画像と登録者/不審者/緊急支援者情報DB165(画像保存手段)に保存されている画像とを照合する。 In step S20, the person collation unit 117 of the control unit 110 includes an image of a person in a predetermined area associated with the auto-lock device and an image stored in the registrant / suspicious person / emergency supporter information DB 165 (image storage means). To match.
 ステップS21で制御部110は、時間計測部116が計測した時間経過が第3の所定期間(T3、例えば30分間)を経過したか否かを判別する。 In step S21, the control unit 110 determines whether or not the time elapsed measured by the time measuring unit 116 has elapsed a third predetermined period (T3, for example, 30 minutes).
 時間計測部116が計測した時間経過が第3の所定期間(T3)を経過した場合(ステップS21:Yes)、本フローの処理を終了する。 When the time elapsed measured by the time measuring unit 116 has passed the third predetermined period (T3) (step S21: Yes), the processing of this flow is terminated.
 第3の所定期間(T3)は、緊急通報を受けて緊急支援者が現場に急行するまでの緊急対応時間である。この緊急対応時間を設定することで、監視制御期間の始点(緊急通報直後)と終点(第3の所定期間T3満了)を明確にして、本処理の信頼性を高め、本システムの処理の実効を図る。すなわち、画像照合が少し緩く一致するように判断しても、緊急支援者が通行すると想定される所定期間だけ判断しているので、結果的に緊急支援者を正確に認識することができる。 The third predetermined period (T3) is the emergency response time until the emergency supporter rushes to the site after receiving the emergency call. By setting this emergency response time, the start point (immediately after the emergency call) and the end point (expiration of the third predetermined period T3) of the monitoring control period are clarified, the reliability of this process is improved, and the process of this system is effective. Aim. That is, even if it is determined that the image collations match a little loosely, the emergency supporter can be accurately recognized as a result because the determination is made only for a predetermined period in which the emergency supporter is expected to pass.
 時間計測部116が計測した時間経過が第3の所定期間(T3)内の場合(ステップS21:No)、ステップS22で制御部110の人照合部117は、所定エリアにいる人の画像と登録者/不審者/緊急支援者情報DB165に保存されている緊急支援者の画像とが一致したか否かを判別する。 When the time elapsed measured by the time measuring unit 116 is within the third predetermined period (T3) (step S21: No), the person collating unit 117 of the control unit 110 registers with the image of the person in the predetermined area in step S22. It is determined whether or not the image of the emergency supporter stored in the person / suspicious person / emergency supporter information DB165 matches.
 前記人の画像と保存されている緊急支援者の画像とが一致した場合(ステップS22:Yes)、ステップS23で制御部110の解錠部118は、オートロックを解錠する解錠信号をオートロック装置500(図15参照)に出力する。すなわち、本システムは、解錠信号をオートロック装置500に出力することで、オートロックを解錠する。
 上記ステップS22で前記人の画像と保存されている緊急支援者の画像とが一致しない場合(ステップS22:No)、上記ステップS21に戻る。
When the image of the person and the image of the stored emergency supporter match (step S22: Yes), the unlocking unit 118 of the control unit 110 automatically sets the unlocking signal for unlocking the auto lock in step S23. Output to the lock device 500 (see FIG. 15). That is, this system unlocks the auto lock by outputting the unlock signal to the auto lock device 500.
If the image of the person and the image of the emergency supporter stored in step S22 do not match (step S22: No), the process returns to step S21.
 このように、本システムは、緊急通報を受けて計測が開始される第3の所定期間(T3)内に、前記人の画像と保存されている緊急支援者の画像とが一致した場合に、本システムが、オートロックを解錠する。 In this way, in this system, when the image of the person and the image of the stored emergency supporter match within the third predetermined period (T3) when the measurement is started in response to the emergency call, This system unlocks the auto lock.
 上記ステップS19~S23の処理で、オートロックがあるために緊急支援者が建物の中に入るのに手間取る事態を防ぐことができる。 In the processes of steps S19 to S23 above, it is possible to prevent the emergency supporter from taking time to enter the building due to the auto lock.
 本実施形態では、音声警告及び画像警告と共に行われる緊急通報後の緊急支援者の画像認識(ステップS15~S18)でオートロックを解錠するようにしているが、緊急通報後の所定期間に緊急支援者を画像認識してオートロックを解錠する処理(ステップS19~S22)を有するものであればよく、上記ステップS15~S18の処理は必須ではない。すなわち、緊急通報後の所定期間に緊急支援者を画像認識してオートロックを解錠する処理(ステップS19~S22)を単独で実行するものでもよい。 In the present embodiment, the auto lock is unlocked by the image recognition (steps S15 to S18) of the emergency supporter after the emergency call, which is performed together with the voice warning and the image warning. Anything may have a process of recognizing a supporter as an image and unlocking the auto lock (steps S19 to S22), and the processes of steps S15 to S18 are not essential. That is, the process of recognizing the image of the emergency supporter and unlocking the auto lock (steps S19 to S22) may be independently executed in a predetermined period after the emergency call.
[デジタルセフティ・レスポンスセキュリティシステムの警備例]
 デジタルセフティ・レスポンスセキュリティシステムの警備例について説明する。
<ホーム&ビルディング>
 図7は、個人住宅における警備の例を示す図である。
 デジタルセフティ・レスポンスセキュリティシステムは、個人住宅だけでなく集合住宅、オフィス、店舗、研究所、情報資料室、及び金融機関向け等の防犯システムを提供する。主な機能は、以下の通りである。
 警備モード(在宅警備、外出警備等)を定義し、警備モードに応じて防犯機能を提供する。
 時間により警備モードを変更する機能を備える。
 家屋外周に設置された監視カメラ11の映像から侵入者を検出・登録する。
 検出された侵入者の危険度(注意度、緊急度)を判定し、危険度(注意度、緊急度)に応じて利用者に通知する。
 スマートフォン50aにより屋外から警備モードを変更する。
 スマートフォン50aのマイク及び監視カメラ11のスピーカなどを通して侵入者に警告を通知する。
[Security example of digital safety response security system]
An example of security for a digital safety response security system will be described.
<Home &Building>
FIG. 7 is a diagram showing an example of security in a private house.
The digital safety response security system provides not only individual housing but also security systems for apartments, offices, stores, research institutes, information materials rooms, and financial institutions. The main functions are as follows.
A security mode (home security, outing security, etc.) is defined, and a security function is provided according to the security mode.
It has a function to change the security mode depending on the time.
An intruder is detected and registered from the image of the surveillance camera 11 installed around the outside of the house.
The detected intruder's risk level (caution level, urgency level) is determined, and the user is notified according to the risk level (caution level, urgency level).
The security mode is changed from the outdoors by the smartphone 50a.
A warning is notified to an intruder through the microphone of the smartphone 50a and the speaker of the surveillance camera 11.
 図8は、集合住宅における警備の例を示す図である。
 例えば、集合住宅向けの防犯システムを提供する。主な機能は、以下の通りである。
 警備モードを定義し、警備モードに応じて防犯機能を提供する。
 時間により警備モードを変更する機能を備える。
 居住部外周に設置された監視カメラ11の映像から侵入者を検出・登録する。
 検出された侵入者の危険度(注意度、緊急度)を判定し、危険度(注意度、緊急度)に応じて利用者に通知する。
 スマートフォン50aにより屋外から警備モードを変更する。
 スマートフォン50aのマイク及び監視カメラ11のスピーカなどを通して侵入者に警告を通知する。
FIG. 8 is a diagram showing an example of security in an apartment house.
For example, it provides a security system for apartment houses. The main functions are as follows.
Define a security mode and provide security functions according to the security mode.
It has a function to change the security mode depending on the time.
An intruder is detected and registered from the image of the surveillance camera 11 installed on the outer periphery of the living area.
The detected intruder's risk level (caution level, urgency level) is determined, and the user is notified according to the risk level (caution level, urgency level).
The security mode is changed from the outdoors by the smartphone 50a.
A warning is notified to an intruder through the microphone of the smartphone 50a and the speaker of the surveillance camera 11.
[セキュリティ区域内の人に応じた自動音声による警告]
 図9は、侵入者の位置に応じて自動音声により警告及び画像・音声による遠隔からの対話機能を説明する図である。図9上は、デジタルセフティ・レスポンスセキュリティシステム1000の「自動音声による警告」を示している。図9中は、図9上のデジタルセフティ・レスポンスセキュリティシステム1000の「自動音声による警告」と対比して説明するための「ドアホン型対話システム」を示し、図9下は、「防犯カメラ型対話システム」を示す。
[Automatic voice warning according to people in the security area]
FIG. 9 is a diagram for explaining a warning by automatic voice and a remote dialogue function by image / voice according to the position of an intruder. FIG. 9 shows an "automatic voice warning" of the Digital Safety Response Security System 1000. FIG. 9 shows a “doorphone type dialogue system” for explanation in comparison with the “automatic voice warning” of the digital safety response security system 1000 on FIG. 9, and FIG. 9 bottom shows a “security camera type dialogue”. Indicates "system".
 図9中に示すように、「ドアホン型対話システム」は、来訪者と保護者との間で、ドアホンにより画像・音声による双方向の対話を行う。又は、「ドアホン型対話システム」は、クラウド対話中継システムを介して保護者が携帯する携帯端末(スマートフォン50a)のスマートフォン対話アプリを実行して画像・音声による双方向の対話を行う。 As shown in FIG. 9, the "doorphone type dialogue system" conducts two-way dialogue between the visitor and the guardian by the doorphone by image and voice. Alternatively, the "doorphone type dialogue system" executes a smartphone dialogue application of a mobile terminal (smartphone 50a) carried by a guardian via a cloud dialogue relay system to perform two-way dialogue by image and voice.
 図9下に示すように、「防犯カメラ型対話システム」は、マイク付き防犯カメラで侵入者を撮影・収音し、侵入者に対し家族が、画像・音声による双方向の対話を行う。又は、「防犯カメラ型対話システム」は、クラウド対話中継システムを介して家族が携帯する携帯端末のスマートフォン対話アプリを実行してスピーカ音声による双方向の対話を行う。 As shown in the lower part of FIG. 9, the "security camera type dialogue system" captures and collects sound of an intruder with a security camera equipped with a microphone, and the family engages in two-way dialogue with the intruder by image and voice. Alternatively, the "security camera-type dialogue system" executes a smartphone dialogue application of a mobile terminal carried by a family member via a cloud dialogue relay system to perform two-way dialogue by speaker voice.
 これら対話システムに対して、デジタルセフティ・レスポンスセキュリティシステム1000は、セキュリティエリア内に侵入した侵入者の位置をカメラの画像をもとにX、Y、Z座標として正確に測位する。そして、デジタルセフティ・レスポンスセキュリティシステム1000は、セキュリティ区域内に人がいることを判定して、危険度に応じた(例えばイエローベルトY、オレンジベルトO、レッドベルトRに応じた)音声で警告する。
 図9上の例では、侵入者がイエローベルトYやオレンジベルトO、レッドベルトRにいることを判定し、危険度又は状況に応じて自動音声メッセージを流す自動音声による警告を行う。詳細については、図19のフローで後記する。
 デジタルセフティ・レスポンスセキュリティシステム1000は、セキュリティエリア内に侵入した侵入者の位置をカメラの画像をもとにX、Y、Z座標として正確に測位することができる。
With respect to these dialogue systems, the digital safety response security system 1000 accurately positions the position of an intruder who has invaded the security area as X, Y, and Z coordinates based on the image of the camera. Then, the digital safety response security system 1000 determines that there is a person in the security area and warns with a voice according to the degree of danger (for example, according to the yellow belt Y, the orange belt O, and the red belt R). ..
In the above example of FIG. 9, it is determined that the intruder is on the yellow belt Y, the orange belt O, and the red belt R, and an automatic voice warning is given by sending an automatic voice message according to the degree of danger or the situation. Details will be described later in the flow of FIG.
The digital safety response security system 1000 can accurately position the position of an intruder who has invaded the security area as X, Y, and Z coordinates based on the image of the camera.
[デジタルセフティ・レスポンスセキュリティの特徴]
 次に、デジタルセフティ・レスポンスセキュリティシステムの特徴について説明する。
[Characteristics of Digital Safety Response Security]
Next, the features of the digital safety response security system will be described.
 デジタルセフティ・レスポンスセキュリティシステム1000は、敷地内侵入検知及び登録機能として、平面的に侵入を判定する技術と、立面的に侵入を判定する技術、平面的、立面的に検知されたものを、時間による侵入を検証する技術を、1つ又は複数組み合せて用いる。以下、詳細に説明する。 The digital safety response security system 1000 has a technology for determining intrusion in a plane, a technology for determining intrusion in an elevation, and a technology for detecting intrusion in a plane or an elevation as a site intrusion detection and registration function. , Use one or a combination of techniques to verify intrusion over time. Hereinafter, a detailed description will be given.
 不審者を検出するには、まず人間が敷地内に侵入したかどうかをカメラ画像から判定する。この判定ののち、その人間が不審者であるかどうかを検証し登録・通知する。 To detect a suspicious person, first determine from the camera image whether a human has invaded the premises. After this judgment, it is verified whether the person is a suspicious person and registered / notified.
 警戒領域を2次元、3次元、4次元(3次元+時間)的に検査し危険度を評価・登録する。 The warning area is inspected in 2D, 3D, and 4D (3D + time), and the degree of risk is evaluated and registered.
 敷地境界内を平面的に危険度に応じて以下の3つに分類する。
 ・イエローベルトY:例えば敷地境界の内側30cm~4m
 ・オレンジベルトO:イエローベルトYとレッドベルトRの間
 ・レッドベルト R:例えば家屋の壁面から30cm~4m
The area within the boundary of the site is categorized into the following three according to the degree of risk.
・ Yellow belt Y: For example, 30 cm to 4 m inside the boundary of the site
・ Orange belt O: Between yellow belt Y and red belt R ・ Red belt R: For example, 30 cm to 4 m from the wall surface of the house
<セキュリティベルトについて>
 イエローベルトY(以下、図中はYにより表記)は、早期警戒レベルの状態である。この部分への侵入は危険度イエローで通知されるが、3次元的、4次元的な追加情報を付加して検証し、検証の結果として侵入があれば通知することにより、検出の正確さと早期に対処を行うことが可能となる。また、レッドベルトR(以下、図中はRにより表記)では領域への侵入があれば直ちに通知の対応が必要となるレベルである。
<About the security belt>
The yellow belt Y (hereinafter referred to as Y in the figure) is in the state of early warning level. Intrusion into this part is notified with a yellow risk, but by adding 3D and 4D additional information and verifying, and notifying if there is an intrusion as a result of verification, detection accuracy and early It becomes possible to deal with. In addition, the red belt R (hereinafter, indicated by R in the figure) is a level at which it is necessary to immediately notify when there is an intrusion into the area.
<平面における検出>
 図10は、平面における侵入者検出の例を示す図であり、図10左は平面における正常な状態、図10右は平面における異常な状態を示す。
 図10左に示すように、敷地境界の内側にイエローベルトYを設定し、セキュリティゾーンであるオレンジベルトOを挟んで、玄関ドア及び窓を有する家屋の壁面を囲むようにレッドベルトRを設定する。
 図10右には、平面における異常な状態を示している。イエローベルトYを越えて、レッドベルトRの外側まで侵入者が侵入している。
<Detection on a plane>
FIG. 10 is a diagram showing an example of intruder detection on a plane, in which the left side of FIG. 10 shows a normal state in a plane and the right side of FIG. 10 shows an abnormal state in a plane.
As shown on the left side of FIG. 10, a yellow belt Y is set inside the boundary of the site, and a red belt R is set so as to surround the wall surface of the house having the entrance door and the window with the orange belt O which is the security zone sandwiched. ..
The right side of FIG. 10 shows an abnormal state in a plane. An intruder has invaded beyond the yellow belt Y to the outside of the red belt R.
 平面における侵入者検出では、侵入者と境界との包含関係を評価する。例えば、図10右の符号aに示すように、監視カメラ11が10コマ/秒で撮影するものであれば、10コマの画像から侵入された動体を検出し(図10右のフレーム参照)、その平面状での位置を計算する。その10コマ内で(秒5コマの監視カメラなら5コマ)その侵入者が確かに検出されるのであれば、侵入者が存在する可能性があると判断する。 In the intruder detection on the plane, the inclusion relationship between the intruder and the boundary is evaluated. For example, as shown by the symbol a on the right side of FIG. 10, if the surveillance camera 11 shoots at 10 frames / second, an intruded moving object is detected from the images of 10 frames (see the frame on the right side of FIG. 10). Calculate its position on the plane. If the intruder is certainly detected within the 10 frames (5 frames for a surveillance camera with 5 frames per second), it is determined that the intruder may exist.
<立面における検出>
 図11は、立面における侵入者検出の例を示す図であり、図11左は立面における正常な状態、図11右は立面における異常な状態をそれぞれ示す。
 図11左に示すように、敷地境界の内側にイエローベルトYを設定し、オレンジベルトOを挟んで、家屋の壁面を囲むようにレッドベルトRを設定する。
 立面における検出では、監視カメラ11の画像から高さ(図11右のフレーム参照)を評価する。この高さが標準的な人間の高さかどうかを評価する。例えば、図11右の符号bに示すように、監視カメラ11の1秒間の画像数を評価し、確かに侵入者が人間であることを判断する。図11の例では、侵入者がイエローベルトYを超えて侵入することを検出する。
 立面における侵入者検出により、動物の侵入や、植栽の風による動きの誤検知を除去することができる。
<Detection on elevation>
FIG. 11 is a diagram showing an example of intruder detection on an elevation, in which the left side of FIG. 11 shows a normal state on an elevation surface and the right side of FIG. 11 shows an abnormal state on an elevation surface.
As shown on the left side of FIG. 11, a yellow belt Y is set inside the boundary of the site, and a red belt R is set so as to surround the wall surface of the house with the orange belt O sandwiched between them.
In the detection on the elevation, the height (see the frame on the right side of FIG. 11) is evaluated from the image of the surveillance camera 11. Evaluate whether this height is a standard human height. For example, as shown by reference numeral b on the right side of FIG. 11, the number of images per second of the surveillance camera 11 is evaluated, and it is certainly determined that the intruder is a human being. In the example of FIG. 11, it is detected that an intruder invades beyond the yellow belt Y.
By detecting an intruder on an elevation, it is possible to eliminate the invasion of animals and the false detection of movement due to the wind of planting.
<時間による検証>
 図12は、時間による侵入者検証の例を示す図であり、図12左は時間における正常な状態、図12右は時間における異常な状態をそれぞれ示す。
 図12右の符号cに示すように、デジタルセフティ・レスポンスセキュリティシステム1000は、立面における侵入者検出により、得られた侵入者の検出について、一秒毎に評価を繰り返す。図12右に示すように、侵入者はイエローベルトY上を歩いている。デジタルセフティ・レスポンスセキュリティシステム1000は、侵入者がイエローベルトY上で継続して侵入検出されたことを受けて、侵入者が確かに侵入したと判断する。
<Verification by time>
FIG. 12 is a diagram showing an example of intruder verification by time, in which the left side of FIG. 12 shows a normal state in time and the right side of FIG. 12 shows an abnormal state in time.
As shown by the reference numeral c on the right side of FIG. 12, the digital safety response security system 1000 repeats the evaluation every second for the detection of the intruder obtained by the intruder detection on the elevation. As shown on the right side of FIG. 12, the intruder is walking on the yellow belt Y. The digital safety response security system 1000 determines that the intruder has certainly invaded after the intruder has been continuously detected on the yellow belt Y.
<立面的に侵入を判定する技術:マッピング>
 立面的に侵入を判定する技術を説明する。
 立面的に侵入を判定する技術として、敷地境界の平面配置情報をカメラ画像にマッピングする。
 図13は、敷地境界をカメラ画像にマッピングする例を示す図であり、図13左はその敷地境界の平面図、図13右はその敷地境界をカメラ画像にマッピングした例を示す。マッピングはCG(Computer Graphics)で生成された画像を写真画像に合成する技術である。合成する時、CGの背景部分を透過させることによりCGを写真画像に自然に重畳合成できる。
<Technology for determining intrusion from an elevation: Mapping>
A technique for determining intrusion in an elevational manner will be described.
As a technique for determining intrusion from an elevation, the plane layout information of the site boundary is mapped to the camera image.
FIG. 13 is a diagram showing an example of mapping the site boundary to the camera image, FIG. 13 left is a plan view of the site boundary, and FIG. 13 right is an example of mapping the site boundary to the camera image. Mapping is a technique for synthesizing an image generated by CG (Computer Graphics) with a photographic image. When compositing, the CG can be naturally superimposed and composited on the photographic image by making the background portion of the CG transparent.
 図13左に示すように、監視カメラ(図13左の×印参照)を設置するに当たり、警戒区域(自宅敷地、高層複合建物等の事務所、共同住宅等の前面ポーチ及び廊下等の境界等アウトラインとなる形状)の平面図を正確に作成する。また、監視カメラの設置位置、高さ及び向き(ロール、ピッチ、ヨー情報)も与える。上記ロール、ピッチ、ヨーは、3次元空間における視線の回転角を表す。視線方向をX軸、それに直行する左手方向をY軸、視点の上方向をZ軸とすると、X軸周りの回転をロール、Y軸周りの回転をピッチ、Z軸周りの回転をヨーという。 As shown on the left side of FIG. 13, when installing a surveillance camera (see the x mark on the left side of FIG. 13), a caution area (home site, office of high-rise complex building, front porch of apartment building, boundary of corridor, etc.) Create an accurate plan view of the outline shape). It also gives the installation position, height and orientation (roll, pitch, yaw information) of the surveillance camera. The roll, pitch, and yaw represent the angle of rotation of the line of sight in a three-dimensional space. Assuming that the line-of-sight direction is the X-axis, the left-hand direction perpendicular to it is the Y-axis, and the upward direction of the viewpoint is the Z-axis, the rotation around the X-axis is called roll, the rotation around the Y-axis is called pitch, and the rotation around the Z-axis is called yaw.
 図13右は、図13左の符号dの監視カメラの画像をマッピングした例を示している。
 警戒区域の位置情報をカメラのパラメータから、投影変換とビューポートによるクリッピングを行い監視カメラから得られる画像のどこが敷地内になるのかを求める(図13右参照)。上記ビューポートは、3次元空間を2次元として認識する場合の2次元の限界を表す。これは監視カメラで写真を取った時の写真に映る範囲に相当する。ビューポートは、監視カメラで撮影できる範囲を表す。また、上記クリッピングは、3次元データで表現されたコンピュータグラフィックス等のようなオブジェクトをビューポートの大きさに切りだす処理をいう。
The right side of FIG. 13 shows an example of mapping the image of the surveillance camera of the reference numeral d on the left side of FIG.
The position information of the caution area is subjected to projection transformation and clipping by the viewport from the parameters of the camera, and the part of the image obtained from the surveillance camera is obtained on the site (see the right side of FIG. 13). The viewport represents a two-dimensional limit when recognizing a three-dimensional space as two-dimensional. This corresponds to the range that appears in the picture when the picture is taken with a surveillance camera. The viewport represents the range that can be captured by the surveillance camera. Further, the clipping refers to a process of cutting out an object such as computer graphics represented by three-dimensional data to the size of a viewport.
<立面的に侵入を判定する技術:予め登録した物体との大きさ比較>
 マッピングされたセキュリティ区域である敷地、構想複合建物等の事務所、共同住宅等の前面ポーチ及び廊下等の内にある門扉の高さ、車の高さ、植生の高さ、及び人の高さ(頭の大きさ、直立した高さ、しゃがんだ高さなどの既知の人の大きさ)を比較する。
<Technology for determining intrusion from an elevation: size comparison with a pre-registered object>
The height of the gate, the height of the car, the height of the vegetation, and the height of the person in the site, the office such as the concept complex building, the front porch of the apartment house, and the corridor, which are the mapped security areas. Compare (known person sizes such as head size, upright height, crouching height, etc.).
 図14は、敷地内に予めあるものの高さを登録する例を説明する図である。
 図14に示すように、マッピングされたセキュリティ区域である敷地内にある門扉の高さ、車の高さ、植生の高さを登録する。また、人が有してる基準となるサイズを、すなわち人の高さ(頭の大きさ、直立した高さ、しゃがんだ高さなどの既知の人の大きさ)を画像対応DB(図示省略)に予め記憶しておく。人が侵入する場合は予め登録したセキュリティ区域である敷地内にある門扉の高さ、車の高さ、植生の高さ以外で人間的な高さがあるものが人であり、その形状の複数の画像によって侵入者(図14のフレーム参照)を判定する。
FIG. 14 is a diagram illustrating an example of registering the height of something that is in advance on the site.
As shown in FIG. 14, the height of the gate, the height of the car, and the height of the vegetation in the site, which is the mapped security area, are registered. In addition, the standard size that a person has, that is, the height of the person (the size of a known person such as the size of the head, the height of standing upright, the height of crouching, etc.) is an image-compatible DB (not shown). Remember in advance. When a person invades, a person has a human height other than the height of the gate, the height of the car, and the height of the vegetation in the site, which is a pre-registered security area. The intruder (see the frame of FIG. 14) is determined by the image of.
[適用例]
 デジタルセフティ・レスポンスセキュリティシステムによる侵入検出の適用例について説明する。
<適用例1>
 図15~図17は、デジタルセフティ・レスポンスセキュリティシステム1000による侵入検出の適用例1を説明する図である。
 図15は、デジタルセフティ・レスポンスセキュリティシステム1000の遠隔操作による自動ドア解除指令を説明する図である。
 図15に示すように、デジタルセフティ・レスポンスセキュリティシステム1000の監視装置100には、LANケーブル501を介して監視カメラ11及びスピーカ12が接続される。監視カメラ11及びスピーカ12は、建物の各戸・各部屋の入口に設置される。スピーカ12は、本システムと連動し、注意、声掛けの自動音声を流す。
[Application example]
An application example of intrusion detection by a digital safety response security system will be described.
<Application example 1>
15 to 17 are views for explaining application example 1 of intrusion detection by the digital safety response security system 1000.
FIG. 15 is a diagram illustrating an automatic door release command by remote control of the digital safety response security system 1000.
As shown in FIG. 15, the surveillance camera 11 and the speaker 12 are connected to the monitoring device 100 of the digital safety response security system 1000 via the LAN cable 501. The surveillance camera 11 and the speaker 12 are installed at the entrance of each house / room of the building. The speaker 12 interlocks with this system to play an automatic voice of attention and voice.
 監視装置100は、共用部のエリアを監視し、異常時警報を発報する。具体的には、不審者がこのエリアに第1の所定期間T1滞在したことによって第1の報知信号N1を出力し、更に第2の所定期間T2滞在したことによって第2の報知信号N2を出力する。本システムは、不審者に対し、第1の所定期間T1滞在で、スピーカ12に音声警告し、第2の所定期間T2滞在で、TVモニタ表示画面等に不審者のズームアップ画像を表示して画像警告する。また、この第2の所定期間T2滞在で、画像警告と共に緊急通報(110番通報など)、関係者のスマートフォン50aに緊急警報を送信する。
 なお、第2の所定期間T2滞在で、画像警告と共に実行する緊急通報(110番通報など)は、画像警告と同時ではなく、画像警告してから所定期間後に緊急通報を実行する設定でもよい。
The monitoring device 100 monitors the area of the common area and issues an abnormality alarm. Specifically, when a suspicious person stays in this area for a first predetermined period of time T1, the first notification signal N1 is output, and when the suspicious person stays in this area for a second predetermined period of T2, a second notification signal N2 is output. To do. This system gives a voice warning to the speaker 12 during the first predetermined period T1 stay, and displays a zoomed-up image of the suspicious person on the TV monitor display screen or the like during the second predetermined period T2 stay. Image warning. In addition, during this second predetermined period of stay in T2, an emergency call (such as dialing 110) and an emergency alert are transmitted to the smartphones 50a of the persons concerned together with an image warning.
The emergency call (110th call, etc.) to be executed together with the image warning during the second predetermined period of stay in T2 may be set to execute the emergency call after the predetermined period after the image warning, instead of simultaneously with the image warning.
 スマートフォン50aは、緊急時、監視装置100より送信された警報内容を受信して表示確認する。 In an emergency, the smartphone 50a receives the alarm content transmitted from the monitoring device 100 and confirms the display.
 なお、上記緊急通報は、上述のように、本システムが通報する方法と、本システムが関係者に知らせて関係者が通報する方法とがある。 As described above, the above-mentioned emergency call can be made by the system or by the system to notify the person concerned.
 LANケーブル501、入出力装置502、専用ケーブル503、自動扉制御器504、制御器505、操作器506及び自動ドア510は、全体として、オートロック装置500を構成する。
 監視装置100には、LANケーブル501を介して入出力装置502が接続され、入出力装置502は、専用ケーブル503を介して自動扉制御器504及び制御器505が接続される。自動扉制御器504は、制御器505により制御される。制御器505は、操作器506により操作される。
The LAN cable 501, the input / output device 502, the dedicated cable 503, the automatic door controller 504, the controller 505, the operator 506, and the automatic door 510 together constitute the auto lock device 500.
The input / output device 502 is connected to the monitoring device 100 via the LAN cable 501, and the automatic door controller 504 and the controller 505 are connected to the input / output device 502 via the dedicated cable 503. The automatic door controller 504 is controlled by the controller 505. The controller 505 is operated by the actuator 506.
 入出力装置502は、監視装置100からのドアロック解除信号を認識し、自動扉制御器504にドアロック解除信号を出力する。また、制御器505は、操作器506からの入力信号を認識し、暗証番号の一致により、自動扉制御器504にドアロック解除信号を送信する。 The input / output device 502 recognizes the door lock release signal from the monitoring device 100 and outputs the door lock release signal to the automatic door controller 504. Further, the controller 505 recognizes the input signal from the operator 506 and transmits the door lock release signal to the automatic door controller 504 by matching the passwords.
 自動扉制御器504は、建物1F等の入口の自動ドア510を制御する。自動扉制御器504は、ドアロック解除信号を受け、自動ドア510を「開」側へ駆動する。 The automatic door controller 504 controls the automatic door 510 at the entrance of the building 1F or the like. The automatic door controller 504 receives the door lock release signal and drives the automatic door 510 to the "open" side.
 スマートフォン50aは、インターネット303を経由してウェブサービスクラウド300上のクラウドサーバ301にテキスト及び画像を送信することができる。また、スマートフォン50aは、インターネット303を経由してPush通知サーバ(図示省略)からPush通知を受信する。さらに、クラウドサーバ301及びPush通知サーバは、LTE・4G・5G網などの通信キャリア網(固定網)を経由して、セフティ・レスポンスアプリが搭載されたスマートフォン50aに接続する。 The smartphone 50a can transmit texts and images to the cloud server 301 on the web service cloud 300 via the Internet 303. Further, the smartphone 50a receives a push notification from a push notification server (not shown) via the Internet 303. Further, the cloud server 301 and the push notification server connect to the smartphone 50a equipped with the safety response application via a communication carrier network (fixed network) such as an LTE / 4G / 5G network.
 図15に示すように、自動ドア前の例えば1~2mをイエローベルトYとする。また、操作器506の例えば周囲半径1.3~2mを、操作者が操作可能な範囲であるグリーンエリアGとする。 As shown in FIG. 15, for example, 1 to 2 m in front of the automatic door is defined as a yellow belt Y. Further, for example, a peripheral radius of 1.3 to 2 m of the actuator 506 is defined as a green area G which is a range in which the operator can operate.
 自動扉制御器504近傍の監視カメラ11は、自動ドア前のイエローベルトY及び操作器周囲のグリーンエリアGを監視し、エリアへの人の侵入を検知する。 The surveillance camera 11 near the automatic door controller 504 monitors the yellow belt Y in front of the automatic door and the green area G around the operator, and detects the intrusion of a person into the area.
 図16は、図15の適用例1において、デジタルセフティ・レスポンスセキュリティシステム1000の動作を示すフローチャートである。図16は、各戸・各部屋の入口のドアの前に来訪者等が停止した場合の例である。
 ステップS101において、人物の正確位置情報を検知する機能により、停止している人物の正確なcm単位での位置情報を検知する。この場合、エリア単位ではなく1戸毎、部屋毎の位置情報を取得する。
FIG. 16 is a flowchart showing the operation of the digital safety response security system 1000 in the application example 1 of FIG. FIG. 16 shows an example in which a visitor or the like stops in front of the entrance door of each house / room.
In step S101, the function of detecting the accurate position information of the person detects the accurate position information of the stopped person in cm units. In this case, the location information for each unit and each room is acquired instead of the area unit.
 ステップS102において、正確位置情報をもとに該当人物が3~10秒間各戸・各部屋の入口前に停止しているかを監視する。 In step S102, it is monitored whether the person concerned is stopped in front of the entrance of each house / room for 3 to 10 seconds based on the accurate position information.
 ステップS103において、該当人物が3~10秒間停止していることを確認後、例えば「ただ今セキュリティ中、業務は翌日へ」又は「何のご用ですか」等注意、声掛け用自動音声を流す(図6のステップS16に対応)。 In step S103, after confirming that the person concerned has been stopped for 3 to 10 seconds, for example, "I'm in security now, work to the next day" or "What are you doing?" (Corresponding to step S16 in FIG. 6).
 ステップS104において、自動音声での警告後、3~10秒経過してから、該当人物が退去しなければ画像警告するとともに(図6のステップS17に対応)、関係者のスマートフォン50aに「緊急アラート」である画像を送信する(図6のステップS18に対応)。 In step S104, after 3 to 10 seconds have passed after the automatic voice warning, if the person concerned does not move out, an image warning is given (corresponding to step S17 in FIG. 6), and an "emergency alert" is sent to the smartphone 50a of the person concerned. (Corresponding to step S18 in FIG. 6).
 ステップS105において、3~10秒経過後、該当人物が退去しなければ、関係機関に通報するとともに、「あなたの画像を関係機関に通報しました」等の強い警告用自動音声(緊急情報)を流す。
 これにより、不審者への警告が迫力に欠けて侵入を許してしまうことを防止することができる。
In step S105, if the person concerned does not move out after 3 to 10 seconds have passed, the relevant organization is notified and a strong automatic voice (emergency information) for warning such as "Your image has been notified to the relevant organization" is output. Shed.
As a result, it is possible to prevent the warning to the suspicious person from being unpowerful and allowing intrusion.
 これにより、不審者は自身の挙動が常に監視されていることを認識させられることで、不審行動(侵入)を断念するなどの効果が期待でき、不審者への警告が迫力に欠けて侵入を許してしまうことを防止することができる。 As a result, the suspicious person can be made aware that his / her behavior is constantly monitored, which can be expected to have an effect such as abandoning the suspicious behavior (invasion), and the warning to the suspicious person lacks power and invades. It is possible to prevent forgiveness.
 図17は、図15の適用例1において、デジタルセフティ・レスポンスセキュリティシステム1000の他の動作を示すフローチャートである。図17は、通常夜間の所定時間により当該ビルの入館用自動ドアが閉まっている場合の、当該ビル関係者が入館するときの例である。 FIG. 17 is a flowchart showing another operation of the digital safety response security system 1000 in the application example 1 of FIG. FIG. 17 is an example when a person related to the building enters the building when the automatic door for entering the building is normally closed at a predetermined time at night.
 ステップS111において、自動ドア前に設置した監視カメラ11により自動ドア前のイエローベルトYに立ち入った人(関係者)を検知する。 In step S111, a surveillance camera 11 installed in front of the automatic door detects a person (related person) who has entered the yellow belt Y in front of the automatic door.
 ステップS112において、監視カメラ11により人(関係者)が20~30秒間グリーンエリアGにて操作器506を操作し、ロック解除を行っているかを監視する。 In step S112, the surveillance camera 11 monitors whether a person (related person) operates the actuator 506 in the green area G for 20 to 30 seconds to unlock the lock.
 ステップS113において、人(関係者)が20~30秒間以内に操作器506への暗証番号入力を完了する。 In step S113, a person (related person) completes the input of the password to the actuator 506 within 20 to 30 seconds.
 ステップS114において、制御器505が暗証番号を認識し、一致したか否かを判定する。 In step S114, the controller 505 recognizes the password and determines whether or not they match.
 ステップS115において、暗証番号が一致した場合、自動ドアの「ドアロック」が解除され入館可能となる。 If the passwords match in step S115, the "door lock" of the automatic door is released and the user can enter the building.
 上記ステップS111~S115における通常のオートロック解錠動作に加え、本システムは、システム判断によるオートロック解錠制御を行う。すなわち、本システムは、緊急通報を受けて計測が開始される第3の所定期間T3内に、撮影した人の画像と保存されている緊急支援者の画像(制服を着た人の画像)とが一致した場合に、オートロックを解錠する。 In addition to the normal auto-lock / unlock operation in steps S111 to S115, this system performs auto-lock / unlock control based on system judgment. That is, this system includes an image of the person who took the picture and an image of the emergency supporter (image of the person in uniform) stored within the third predetermined period T3 when the measurement is started in response to the emergency call. If they match, unlock the auto lock.
 これにより、緊急支援者の受け入れのために、オートロックを至急解錠すべきなのに、オートロックを解錠する当事者が不在、又はその当事者が気が動転して解錠に手間取るなど、オートロックがあるために緊急支援者(警察官、救急隊員、消防士、警備会社社員など)が建物の中に入るのに手間取ることを防止することができる。 As a result, in order to accept emergency supporters, the auto lock should be unlocked immediately, but there is no party to unlock the auto lock, or the party is upset and takes time to unlock. This can prevent emergency supporters (police officers, paramedics, firefighters, security company employees, etc.) from having trouble getting inside the building.
<適用例2>
 図18及び図19は、デジタルセフティ・レスポンスセキュリティシステム1000のTVモニタ、自動音声によるディフェンス機能の適用例2を説明する図である。
 図18に示すように、マンション居住区等の共用廊下の入口とベランダには、監視カメラ11、スピーカ12、及びTVモニタ13が設置され、LANケーブル501を介して監視装置100に接続されている。この入口とベランダには、レッドベルトRが設定されている。
 TVモニタ13は、1.通常時の表示と、2.ズームアップ画像(異常時の表示画像)とがある。
 1.通常時の表示として、例えば、キャッチコピー「IoT 今未来」、商品名「〇〇〇」、多言語テロップ「Security System 稼働」が表示される。この多言語テロップは、日本語、英語、中国語、仏語、ポルトガル語、スペイン語及びヒンズー語などがあり、選択可能である。
<Application example 2>
18 and 19 are diagrams for explaining application example 2 of the TV monitor of the digital safety response security system 1000 and the defense function by automatic voice.
As shown in FIG. 18, a surveillance camera 11, a speaker 12, and a TV monitor 13 are installed at the entrance of a common corridor such as a condominium residential area and a veranda, and are connected to the surveillance device 100 via a LAN cable 501. .. A red belt R is set at this entrance and the veranda.
The TV monitor 13 has 1. Normal display and 2. There is a zoom-up image (display image at the time of abnormality).
1. 1. For example, the catch phrase "IoT now and future", the product name "OOOO", and the multilingual telop "Security System operation" are displayed as normal displays. This multilingual telop is available in Japanese, English, Chinese, French, Portuguese, Spanish and Hindi, and can be selected.
 2.ズームアップ画像
 侵入者が接近すると、図18の太矢印に示すように、1.通常時の表示から2.ズームアップ画像に切り替わり、監視カメラ11で撮影した侵入者の画像をTVモニタ13に表示する(図6のステップS17に対応)。
2. Zoom-up image When an intruder approaches, 1. From the normal display 2. The image is switched to the zoom-up image, and the image of the intruder taken by the surveillance camera 11 is displayed on the TV monitor 13 (corresponding to step S17 in FIG. 6).
 このように、デジタルセフティ・レスポンスセキュリティシステム1000のTVモニタ、自動音声によるディフェンス機能は、マンション等の入口及びベランダのレッドベルトRに、監視カメラ11、スピーカ12、及びTVモニタ13を設置する。侵入者がレッドベルトRのエリア内に所定期間(10秒)滞在したした場合、自動音声を出力し(図6のステップS16に対応)、更に所定期間(20~30秒)滞在した場合、侵入者の画像をTVモニタ13に出力、侵入行為を抑止、防御する(図6のステップS17に対応)。
 これにより、不審者への警告が迫力に欠けて侵入を許してしまうことを防止することができる。
As described above, the TV monitor of the digital safety response security system 1000 and the defense function by the automatic voice install the surveillance camera 11, the speaker 12, and the TV monitor 13 at the entrance of the condominium and the red belt R of the balcony. When an intruder stays in the area of Red Belt R for a predetermined period (10 seconds), an automatic voice is output (corresponding to step S16 in FIG. 6), and when the intruder stays in the area for a predetermined period (20 to 30 seconds), the intruder invades. The image of the person is output to the TV monitor 13, and the intrusion is suppressed and prevented (corresponding to step S17 in FIG. 6).
As a result, it is possible to prevent the warning to the suspicious person from being unpowerful and allowing intrusion.
 図19は、図18の適用例2において、デジタルセフティ・レスポンスセキュリティシステム1000の侵入者(不審者)に対する動作の概要を示すフローチャートである。本フローは、必ずしもCPU処理ではないが、便宜上ステップ番号を付して説明する。本システムのステップはステップS、侵入者(invader)はステップIを付している。 FIG. 19 is a flowchart showing an outline of the operation of the digital safety response security system 1000 against an intruder (suspicious person) in the application example 2 of FIG. This flow is not necessarily CPU processing, but will be described with step numbers for convenience. Step S is attached to the step of this system, and step I is attached to the invader.
《デジタルセフティ・レスポンスセキュリティシステム》
 ステップS201でデジタルセフティ・レスポンスセキュリティシステム1000が監視カメラ11による居室入口、ベランダの監視を開始する。
《Digital Safety Response Security System》
In step S201, the digital safety response security system 1000 starts monitoring the living room entrance and the veranda by the surveillance camera 11.
 ステップS202で居室入口前の監視カメラ11から画像を取得する。
 ステップS203で人の体がレッドベルトR内に入っているか否かを正確に検知する。
 ステップS204で侵入者の滞在時間のカウントを開始する(図6のステップS15に対応)。
In step S202, an image is acquired from the surveillance camera 11 in front of the entrance of the living room.
In step S203, it is accurately detected whether or not the human body is inside the red belt R.
The count of the intruder's stay time is started in step S204 (corresponding to step S15 in FIG. 6).
 ステップS205で侵入者の画像を登録者/不審者/緊急支援者情報DB165に登録するとともに、「何か御用ですか」等の自動音声を出力する(図6のステップS16に対応)。 In step S205, the image of the intruder is registered in the registrant / suspicious person / emergency supporter information DB165, and an automatic voice such as "Do you want something?" Is output (corresponding to step S16 in FIG. 6).
 ステップS206で侵入者の画像をTVモニタ13にズームアップ表示し(図18の「2.ズームアップ画像」参照)(図6のステップS17に対応)、「即時退去しなさい」等の自動音声を出力する。 In step S206, the image of the intruder is zoomed up and displayed on the TV monitor 13 (see “2. Zoomed up image” in FIG. 18) (corresponding to step S17 in FIG. 6), and an automatic voice such as “immediately move out” is output. Output.
 同様に、ステップS207でベランダの監視カメラ11から画像を取得する。
 ステップS208で人の体がレッドベルトR内に入っているか否かを正確に検知する。
 ステップS209で侵入者の滞在時間のカウントを開始する。
Similarly, in step S207, an image is acquired from the surveillance camera 11 on the balcony.
In step S208, it is accurately detected whether or not the human body is inside the red belt R.
In step S209, the count of the intruder's stay time is started.
 ステップS210で侵入者の画像を登録者/不審者/緊急支援者情報DB165に登録するとともに、「何か御用ですか」等の自動音声を出力する。 In step S210, the image of the intruder is registered in the registrant / suspicious person / emergency supporter information DB165, and an automatic voice such as "Do you want something?" Is output.
 ステップS211で侵入者の画像をTVモニタ13にズームアップ表示し(図18の「2.ズームアップ画像」参照)、「即時退去しなさい」等の自動音声を出力する。
 これにより、不審者への警告が迫力に欠けて侵入を許してしまうことを防止することができる。
In step S211 the image of the intruder is zoomed up and displayed on the TV monitor 13 (see “2. Zoomed up image” in FIG. 18), and an automatic voice such as “immediately move out” is output.
As a result, it is possible to prevent the warning to the suspicious person from being unpowerful and allowing intrusion.
《侵入者》
 図18に示すレッドベルトR内に侵入者が侵入する。例えば、図18に示す居室入口のレッドベルトR、又はベランダのレッドベルトRに侵入者が侵入する(ステップI11)。これを受けて、デジタルセフティ・レスポンスセキュリティシステム1000は、監視カメラ11から画像を得るとともに、侵入者の滞在時間のカウントを開始する(ステップS204,S209)。
"invader"
An intruder invades the red belt R shown in FIG. For example, an intruder invades the red belt R at the entrance of the living room shown in FIG. 18 or the red belt R at the balcony (step I11). In response to this, the digital safety response security system 1000 obtains an image from the surveillance camera 11 and starts counting the staying time of the intruder (steps S204 and S209).
 侵入者はレッドベルトRに所定期間(例えば10秒間)滞在する(ステップI12)。これを受けて、デジタルセフティ・レスポンスセキュリティシステム1000は、「何か御用ですか」等の自動音声を出力する(ステップS205,S210)。
 侵入者はレッドベルトRに所定期間(例えば20~30秒間)滞在する(ステップI13)。これを受けて、デジタルセフティ・レスポンスセキュリティシステム1000は、侵入者の画像をTVモニタ13にズームアップ表示し、「即時退去しなさい」等の自動音声を出力する(ステップS206,S211)。
The intruder stays in Red Belt R for a predetermined period of time (eg, 10 seconds) (step I12). In response to this, the digital safety response security system 1000 outputs an automatic voice such as "What do you want?" (Steps S205 and S210).
The intruder stays in Red Belt R for a predetermined period of time (eg, 20-30 seconds) (step I13). In response to this, the digital safety response security system 1000 zooms in on the image of the intruder on the TV monitor 13 and outputs an automatic voice such as "immediately move out" (steps S206 and S211).
 また、図19のフローに続いて、緊急通報後の所定期間に緊急支援者を画像認識してオートロック装置500(図2参照)を解錠する処理(図6のステップS19~S22参照)を実行するようにしてもよい。このようにすれば、オートロックがあるために緊急支援者(警察官、救急隊員、消防士、警備会社社員など)が建物の中に入るのに手間取る事態を防ぐことができる。 Further, following the flow of FIG. 19, a process of image-recognizing the emergency supporter and unlocking the auto-lock device 500 (see FIG. 2) during a predetermined period after the emergency call (see steps S19 to S22 of FIG. 6) is performed. You may want to do it. In this way, it is possible to prevent emergency supporters (police officers, paramedics, firefighters, security company employees, etc.) from having trouble entering the building due to the auto-lock.
 以上詳細に説明したように、本実施の形態によれば、デジタルセフティ・レスポンスセキュリティシステム1000(図1参照)は、セキュリティ区域内の所定エリアにいる人を検出する人検出部111と、人検出部111によって検出された人が所定エリアに滞在する時間を計測して、第1の所定期間(T1)滞在したことによって第1の報知信号N1を出力し、更に第2の所定期間(T2)滞在したことによって第2の報知信号N2を出力する滞在期間報知部112と、滞在期間報知部112から、第1の報知信号N1を受けて音声警告する音声警告部113と、滞在期間報知部112から、第2の報知信号N2を受けて画像警告する画像警告部114と、画像警告と共に緊急通報する通報部115とを備える。 As described in detail above, according to the present embodiment, the digital safety response security system 1000 (see FIG. 1) has a person detection unit 111 for detecting a person in a predetermined area in the security area and a person detection unit 111. The time that the person detected by the unit 111 stays in the predetermined area is measured, the first notification signal N1 is output by staying in the first predetermined period (T1), and further, the second predetermined period (T2). A stay period notification unit 112 that outputs a second notification signal N2 by staying, a voice warning unit 113 that receives a first notification signal N1 from the stay period notification unit 112 and gives a voice warning, and a stay period notification unit 112. Therefore, an image warning unit 114 that receives an image warning by receiving the second notification signal N2 and a notification unit 115 that makes an emergency notification together with the image warning are provided.
 この構成により、不審者は自身の挙動が常に監視されていることを認識させられることで、不審行動(侵入)を断念するなどの効果が期待でき、不審者への警告が迫力に欠けて侵入を許してしまうことを防止することができる。 With this configuration, the suspicious person can be made aware that his / her behavior is constantly monitored, which can be expected to have effects such as abandoning the suspicious behavior (intrusion), and the warning to the suspicious person lacks power and invades. Can be prevented from being forgiven.
 本実施形態では、デジタルセフティ・レスポンスセキュリティシステム1000は、緊急支援者情報を保存する登録者/不審者/緊急支援者情報DB165と、制御部110が、緊急通報したことを受けて、その後の時間経過を計測する制御部110の時間計測部116と、オートロック装置と関連する所定エリアにいる人の画像と登録者/不審者/緊急支援者情報DB165に保存されている画像とを照合する人照合部117と、認識された人が所定エリアに所定期間滞在で緊急通報する通報部115と、時間計測部116が計測した時間経過が第3の所定期間(T3)内に、人照合部117が人の画像と保存されている画像とが一致したと判断したことを受けて、オートロックを解錠する解錠部118とを備える。 In the present embodiment, the digital safety response security system 1000 receives an emergency call from the registrant / suspicious person / emergency supporter information DB 165 that stores the emergency supporter information and the control unit 110, and the time thereafter. A person who collates an image of a person in a predetermined area associated with an auto-lock device with an image stored in the registrant / suspicious person / emergency supporter information DB 165 with the time measuring unit 116 of the control unit 110 for measuring the progress. The collation unit 117, the notification unit 115 that the recognized person makes an emergency call by staying in the predetermined area for a predetermined period, and the person collation unit 117 that the time elapsed measured by the time measurement unit 116 is within the third predetermined period (T3). It is provided with an unlocking unit 118 for unlocking the auto lock in response to the determination that the image of the person and the stored image match.
 この構成により、オートロックがあるために緊急支援者が建物の中に入るのに手間取ることを防止することができる。 With this configuration, it is possible to prevent the emergency supporter from taking time to enter the building due to the auto lock.
 本実施形態では、デジタルセフティ・レスポンスセキュリティシステム1000は、CPU以外の計算リソースであるAIアクセラレータ200を備え、制御部110の人検出部111は、AIアクセラレータ200を用いて、セキュリティ区域内の人を検出する。AIアクセラレータ200は、CPU処理とは別に人の検出処理を専用ハードで実行することで、広範なセキュリティ区域内に存在する人を実時間で検出することができる。また、安価なカメラ機器用いた構成であっても、リアルタイムで人を検出することができる。
 また、AIアクセラレータ200であることで、従来の画像差分を用いた動体検出型の監視カメラによる画像認識に比べて極めて高い精度での侵入者の検出を行うことができる。
In the present embodiment, the digital safety response security system 1000 includes an AI accelerator 200 which is a computing resource other than the CPU, and the person detection unit 111 of the control unit 110 uses the AI accelerator 200 to detect a person in the security area. To detect. The AI accelerator 200 can detect a person existing in a wide security area in real time by executing a person detection process on a dedicated hardware separately from the CPU process. Moreover, even if a configuration using an inexpensive camera device is used, a person can be detected in real time.
Further, since the AI accelerator 200 is used, it is possible to detect an intruder with extremely high accuracy as compared with image recognition by a moving object detection type surveillance camera using a conventional image difference.
 以上の説明は本発明の好適な実施の形態の例証であり、本発明の範囲はこれに限定されることはない。 The above description is an example of a preferred embodiment of the present invention, and the scope of the present invention is not limited thereto.
 また、上記実施の形態ではデジタルセフティ・レスポンスセキュリティシステム及び方法という名称を用いたが、これは説明の便宜上であり、監視システム、セキュリティシステム、スマート・ディフェンスセキュリティ方法等であってもよい。 Further, in the above embodiment, the names of the digital safety response security system and the method are used, but this is for convenience of explanation, and may be a monitoring system, a security system, a smart defense security method, or the like.
 また、本発明のデジタルセフティ・レスポンスセキュリティシステム及び方法は、コンピュータを本デジタルセフティ・レスポンスセキュリティシステム又は方法として機能させるためのプログラムでも実現される。このプログラムは、コンピュータで読み取り可能な記録媒体に格納されていてもよい。 The digital safety response security system and method of the present invention are also realized by a program for making a computer function as the digital safety response security system or method of the present invention. The program may be stored on a computer-readable recording medium.
 このプログラムを記録した記録媒体は、本デジタルセフティ・レスポンスセキュリティシステムのROMそのものであってもよいし、また、外部記憶装置としてCD-ROMドライブ等のプログラム読取装置が設けられ、そこに記録媒体を挿入することで読み取り可能なCD-ROM等であってもよい。 The recording medium on which this program is recorded may be the ROM itself of the Digital Safety Response Security System, or a program reader such as a CD-ROM drive is provided as an external storage device, and the recording medium is placed therein. It may be a CD-ROM or the like that can be read by inserting it.
 また、上記の各構成、機能、処理部、処理手段等は、それらの一部又は全部を、例えば集積回路で設計する等によりハードウェアで実現してもよい。また、上記の各構成、機能等は、プロセッサがそれぞれの機能を実現するプログラムを解釈し、実行するためのソフトウェアで実現してもよい。各機能を実現するプログラム、テーブル、ファイル等の情報は、メモリや、ハードディスク、SSD(Solid State Drive)等の記録装置、又は、IC(Integrated Circuit)カード、SD(Secure Digital)カード、光ディスク等の記録媒体に保持することができる。 Further, each of the above configurations, functions, processing units, processing means, etc. may be realized by hardware by designing a part or all of them by, for example, an integrated circuit. Further, each of the above configurations, functions, and the like may be realized by software for the processor to interpret and execute a program that realizes each function. Information such as programs, tables, and files that realize each function can be stored in memory, hard disks, recording devices such as SSDs (Solid State Drives), IC (Integrated Circuit) cards, SD (Secure Digital) cards, optical disks, etc. It can be held on a recording medium.
 本明細書で引用したすべての刊行物、特許及び特許出願は、そのまま参考として、ここにとり入れるものとする。 All publications, patents and patent applications cited herein are incorporated herein by reference only.
 本発明に係るデジタルセフティ・レスポンスセキュリティシステム、方法及びプログラムは、住居、企業の事務所、工場、研究所、情報処理室、金銭集計室等の高度の管理を要する事業所等への設置が期待される。さらに、住宅、商業施設、事務所、病院、ホテル、金融機関、発電所、エアーターミナル、集会場、競技場、美術館等の建物屋内外、交通機関の電車、フェリー、飛行機の車内等も対象である。 The digital safety response security system, method and program according to the present invention are expected to be installed in business establishments requiring a high degree of management such as residences, corporate offices, factories, research institutes, information processing rooms, and money collection rooms. Will be done. In addition, it covers residential and commercial facilities, offices, hospitals, hotels, financial institutions, power plants, air terminals, meeting places, stadiums, museums and other buildings inside and outside, transportation trains, ferries, airplanes, etc. is there.
 11 監視カメラ(撮影手段)
 20 人感センサ
 30 Wi-Fi親機
 40 ビーコン親機
 50 携帯端末装置(ID端末)
 50a スマートフォン(携帯端末装置;ID端末)
 51 Wi-Fi子機
 52 ビーコン子機
 53 GPS
 100 監視装置
 110 制御部
 111 人検出部(検出手段)
 112 滞在期間報知部(滞在期間報知手段)
 113 音声警告部(音声警告手段)
 114 画像警告部(画像警告手段)
 115 通報部(通報手段)
 116 時間計測部(時間計測手段)
 117 人照合部(人照合手段)
 118 解錠部(解錠手段)
 120 入力部
 130 記憶部
 140 表示部
 150 出力部
 160 録画部
 165 登録者/不審者/緊急支援者情報DB(画像保存手段)
 170 画像処理部
 180 インタフェース(I/F)部
 190 通信部
 200 AIアクセラレータ(人検出手段)
 500 オートロック装置
 501 LANケーブル
 502 入出力装置
 503 専用ケーブル
 504 自動扉制御器
 505 制御器
 506 操作器
 510 自動ドア
 1000 デジタルセフティ・レスポンスセキュリティシステム
 Y,O,R セキュリティベルト
 
11 Surveillance camera (shooting means)
20 Motion sensor 30 Wi-Fi master unit 40 Beacon master unit 50 Mobile terminal device (ID terminal)
50a Smartphone (mobile terminal device; ID terminal)
51 Wi-Fi handset 52 Beacon handset 53 GPS
100 Monitoring device 110 Control unit 111 Person detection unit (detection means)
112 Stay period notification unit (stay period notification means)
113 Voice warning section (voice warning means)
114 Image warning section (image warning means)
115 Reporting section (reporting means)
116 Time measurement unit (time measurement means)
117 person collation department (person collation means)
118 Unlocking part (unlocking means)
120 Input unit 130 Storage unit 140 Display unit 150 Output unit 160 Recording unit 165 Registrant / Suspicious person / Emergency support person information DB (image storage means)
170 Image processing unit 180 Interface (I / F) unit 190 Communication unit 200 AI accelerator (human detection means)
500 Auto lock device 501 LAN cable 502 Input / output device 503 Dedicated cable 504 Automatic door controller 505 Controller 506 Operator 510 Automatic door 1000 Digital safety response security system Y, O, R Security belt

Claims (9)

  1.  セキュリティ区域内の所定エリアにいる人を検出する人検出手段と、
     前記人検出手段によって検出された人が前記所定エリアに滞在する時間を計測して、第1の所定期間滞在したことによって第1の報知信号を出力し、更に第2の所定期間滞在したことによって第2の報知信号を出力する滞在期間報知手段と、
     前記滞在期間報知手段から、前記第1の報知信号を受けて音声警告する音声警告手段と、
     前記滞在期間報知手段から、前記第2の報知信号を受けて画像警告する画像警告手段と
    を備えることを特徴とするデジタルセフティ・レスポンスセキュリティシステム。
    Person detection means to detect people in a predetermined area within the security area,
    By measuring the time that the person detected by the person detecting means stays in the predetermined area, the first notification signal is output by staying in the first predetermined period, and further by staying in the second predetermined period. A stay period notification means that outputs a second notification signal, and
    A voice warning means that receives the first notification signal from the stay period notification means and gives a voice warning.
    A digital safety response security system comprising: an image warning means for receiving an image warning by receiving the second notification signal from the stay period notification means.
  2.  前記画像警告手段が前記画像警告すると共に緊急通報する通報手段を備えることを特徴とする請求項1記載のデジタルセフティ・レスポンスセキュリティシステム。 The digital safety response security system according to claim 1, wherein the image warning means includes a reporting means for giving an emergency call as well as giving an image warning.
  3.  緊急支援者の画像を保存する画像保存手段と、
     緊急通報したことを受けて、その後の時間経過を計測する時間計測手段と、
     オートロック装置と関連する所定エリアにいる人の画像と前記画像保存手段に保存されている画像とを照合する人照合手段と、
     前記時間計測手段が計測した時間経過が第3の所定期間内に、前記人照合手段が前記人の画像と前記保存されている画像とが一致したと判断したことを受けて、オートロックを解錠する解錠手段と
    を備えることを特徴とする請求項2記載のデジタルセフティ・レスポンスセキュリティシステム。
    Image saving means to save the image of the emergency supporter,
    A time measuring means for measuring the passage of time after receiving an emergency call,
    A person collation means for collating an image of a person in a predetermined area associated with the auto-lock device with an image stored in the image storage means, and a person collation means.
    The auto-lock is released when the person collating means determines that the image of the person and the stored image match within the third predetermined period of time measured by the time measuring means. The digital safety response security system according to claim 2, further comprising an unlocking means for locking.
  4.  前記緊急支援者が、警察官であることを特徴とする請求項3記載のデジタルセフティ・レスポンスセキュリティシステム。 The digital safety response security system according to claim 3, wherein the emergency supporter is a police officer.
  5.  前記緊急支援者が、救急隊員であることを特徴とする請求項3記載のデジタルセフティ・レスポンスセキュリティシステム。 The digital safety response security system according to claim 3, wherein the emergency supporter is an ambulance crew member.
  6.  前記緊急支援者が、消防士であることを特徴とする請求項3記載のデジタルセフティ・レスポンスセキュリティシステム。 The digital safety response security system according to claim 3, wherein the emergency supporter is a firefighter.
  7.  前記緊急支援者が、警備会社社員であることを特徴とする請求項3記載のデジタルセフティ・レスポンスセキュリティシステム。 The digital safety response security system according to claim 3, wherein the emergency supporter is an employee of a security company.
  8.  セキュリティ区域内の所定エリアにいる人を検出する人検出ステップと、
     前記人検出手段によって検出された人が前記所定エリアに滞在する時間を計測して、第1の所定期間滞在したことによって第1の報知信号を出力し、更に第2の所定期間滞在したことによって第2の報知信号を出力する滞在期間報知ステップと、
     前記滞在期間報知手段から、前記第1の報知信号を受けて音声警告する音声警告ステップと、
     前記滞在期間報知手段から、前記第2の報知信号を受けて画像警告する画像警告ステップと
    を備えるデジタルセフティ・レスポンスセキュリティ方法。
    A person detection step that detects a person in a given area within a security area,
    By measuring the time that the person detected by the person detecting means stays in the predetermined area, the first notification signal is output by staying in the first predetermined period, and further by staying in the second predetermined period. A stay period notification step that outputs a second notification signal, and
    A voice warning step of receiving the first notification signal from the stay period notification means and giving a voice warning,
    A digital safety response security method including an image warning step of receiving an image warning from the stay period notification means and giving an image warning.
  9.  コンピュータを、
     セキュリティ区域内の所定エリアにいる人を検出する人検出手段と、前記人検出手段によって検出された人が前記所定エリアに滞在する時間を計測して、第1の所定期間滞在したことによって第1の報知信号を出力し、更に第2の所定期間滞在したことによって第2の報知信号を出力する滞在期間報知手段と、前記滞在期間報知手段から、前記第1の報知信号を受けて音声警告する音声警告手段と、前記滞在期間報知手段から、前記第2の報知信号を受けて画像警告する画像警告手段とを備えることを特徴とするデジタルセフティ・レスポンスセキュリティシステム
    として機能させるためのプログラム。
    Computer,
    A person detecting means for detecting a person in a predetermined area in the security area and a person detected by the person detecting means measure the time spent in the predetermined area, and stay in the predetermined area for a first predetermined period. The first notification signal is received from the stay period notification means that outputs the notification signal of the above and further outputs the second notification signal by staying for the second predetermined period, and the stay period notification means, and gives a voice warning. A program for functioning as a digital safety response security system, comprising: a voice warning means and an image warning means that receives an image warning from the stay period notification means and gives an image warning.
PCT/JP2019/042357 2019-10-29 2019-10-29 Digital safety response security system, method, and program WO2021084612A1 (en)

Priority Applications (2)

Application Number Priority Date Filing Date Title
JP2021553927A JP7244135B2 (en) 2019-10-29 2019-10-29 Digital safety response security system, method and program
PCT/JP2019/042357 WO2021084612A1 (en) 2019-10-29 2019-10-29 Digital safety response security system, method, and program

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
PCT/JP2019/042357 WO2021084612A1 (en) 2019-10-29 2019-10-29 Digital safety response security system, method, and program

Publications (1)

Publication Number Publication Date
WO2021084612A1 true WO2021084612A1 (en) 2021-05-06

Family

ID=75714980

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/JP2019/042357 WO2021084612A1 (en) 2019-10-29 2019-10-29 Digital safety response security system, method, and program

Country Status (2)

Country Link
JP (1) JP7244135B2 (en)
WO (1) WO2021084612A1 (en)

Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JPH1188937A (en) * 1997-07-18 1999-03-30 Toshiba Corp Radio communication system, position detection method for radio terminal and recording medium
JP2016045925A (en) * 2014-08-22 2016-04-04 中興保全股▲分▼有限公司 Cloud type guard authentication system

Family Cites Families (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2003242566A (en) 2002-02-18 2003-08-29 Optex Co Ltd Invasion detection apparatus
JP4441382B2 (en) 2004-11-02 2010-03-31 三菱電機株式会社 Suspicious visitor threatening system
JP5349080B2 (en) 2009-02-27 2013-11-20 株式会社東芝 Admission management system, admission management device, and admission management method
JP2011128782A (en) 2009-12-16 2011-06-30 Information System Research Institute Information terminal device for vehicle
JP2013125469A (en) 2011-12-15 2013-06-24 Sogo Keibi Hosho Co Ltd Security device and security action switching method
JP2014054968A (en) 2012-09-14 2014-03-27 Auto Network Gijutsu Kenkyusho:Kk Security system for vehicle
JP6872963B2 (en) 2017-04-28 2021-05-19 三菱電機ビルテクノサービス株式会社 Surveillance camera system

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JPH1188937A (en) * 1997-07-18 1999-03-30 Toshiba Corp Radio communication system, position detection method for radio terminal and recording medium
JP2016045925A (en) * 2014-08-22 2016-04-04 中興保全股▲分▼有限公司 Cloud type guard authentication system

Also Published As

Publication number Publication date
JPWO2021084612A1 (en) 2021-05-06
JP7244135B2 (en) 2023-03-22

Similar Documents

Publication Publication Date Title
JP6525229B1 (en) Digital search security system, method and program
EP3118826B1 (en) Home, office security, surveillance system using micro mobile drones and ip cameras
JP5871296B1 (en) Smart security digital system, method and program
WO2017072923A1 (en) Digital safety support system, method, and program
KR100897339B1 (en) Total security system of apartment complex and application method thereof
JP6529062B1 (en) DIGITAL ACCURATE SECURITY SYSTEM, METHOD, AND PROGRAM
JP5900941B1 (en) Digital future now security system, method and program
JP2006202062A (en) Facility monitoring system
JP2007128390A (en) Monitor system
JP2006325064A (en) Wide area monitoring system
KR102467814B1 (en) Integrated security system for apartment complexes based on artificial intelligence image analysis
KR102345479B1 (en) Building entrance control system
WO2020213058A1 (en) Digital smart defense security system, method, and program
WO2021029086A1 (en) Digital smart guide security system, method, and program
KR101936390B1 (en) Method And Apparatus for Providing Tracking Service based on Closed Circuit Tele-Vision
JP3215372U (en) Entrance management system at the condominium facility renovation site
WO2021084612A1 (en) Digital safety response security system, method, and program
WO2021186610A1 (en) Digital/autofile/security system, method, and program
KR101571838B1 (en) Multi functional system utilizing beacon and method for using the same
Chaiwongven et al. An analyze movement path of employees in fire drill by indoor location system using Bluetooth
JP6750931B1 (en) Digital motion formula security system, method and program
JP2004104510A (en) Monitoring system
WO2023189476A1 (en) Guidance system, guidance method, and program
KR102560847B1 (en) Image-based face recognition, health check and position tracking system
KR102115260B1 (en) Total security system using One pass tag card

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 19950707

Country of ref document: EP

Kind code of ref document: A1

ENP Entry into the national phase

Ref document number: 2021553927

Country of ref document: JP

Kind code of ref document: A

NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 19950707

Country of ref document: EP

Kind code of ref document: A1