WO2021186610A1 - Système, procédé et programme de sécurité/d'autofichier/numérique - Google Patents

Système, procédé et programme de sécurité/d'autofichier/numérique Download PDF

Info

Publication number
WO2021186610A1
WO2021186610A1 PCT/JP2020/011958 JP2020011958W WO2021186610A1 WO 2021186610 A1 WO2021186610 A1 WO 2021186610A1 JP 2020011958 W JP2020011958 W JP 2020011958W WO 2021186610 A1 WO2021186610 A1 WO 2021186610A1
Authority
WO
WIPO (PCT)
Prior art keywords
theft
weight
unit
hand motion
person
Prior art date
Application number
PCT/JP2020/011958
Other languages
English (en)
Japanese (ja)
Inventor
和夫 三輪
Original Assignee
株式会社 テクノミライ
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 株式会社 テクノミライ filed Critical 株式会社 テクノミライ
Priority to PCT/JP2020/011958 priority Critical patent/WO2021186610A1/fr
Priority to PCT/JP2020/018740 priority patent/WO2021186751A1/fr
Priority to JP2020537786A priority patent/JP6773389B1/ja
Publication of WO2021186610A1 publication Critical patent/WO2021186610A1/fr

Links

Images

Classifications

    • GPHYSICS
    • G08SIGNALLING
    • G08BSIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
    • G08B13/00Burglar, theft or intruder alarms
    • G08B13/18Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength
    • G08B13/189Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength using passive radiation detection systems
    • G08B13/194Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength using passive radiation detection systems using image scanning and comparing systems
    • G08B13/196Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength using passive radiation detection systems using image scanning and comparing systems using television cameras
    • GPHYSICS
    • G08SIGNALLING
    • G08BSIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
    • G08B25/00Alarm systems in which the location of the alarm condition is signalled to a central station, e.g. fire or police telegraphic systems

Definitions

  • the present invention relates to a digital autofile security system, method and program for detecting theft by a person by photographing the inside of a security area with a surveillance camera for crime prevention or the like.
  • Patent Document 1 states that "determine whether or not theft has been performed based on image data” (claim 1), and "in the situation where it is determined that shoplifting has been performed, the product is placed in a bag or a pocket of clothes. It is described as “the act of putting in” (0021).
  • the technique of Patent Document 1 relates to a system for detecting the occurrence of shoplifting.
  • An object of the present invention is to provide a digital autofile security system, a method and a program capable of accurately determining a suspicious person from a captured image.
  • the digital auto file security system has a theft weight storage means for storing the theft weight, which is a parameter of the susceptibility of an article, in association with the article, and an image taken by a camera for capturing a security area.
  • a person extraction means for extracting a person candidate from, a hand movement detection means for detecting a hand movement in an image extracted by the person extraction means, a hand movement data detected by the hand movement detection means, and the theft. It is characterized by comprising a theft act determining means for determining that a theft act has been performed based on the theft weight of an article stored in the weight storage means.
  • the theft weight depends on the past performance, so that a large weight can be added to an article with many theft acts, and the accuracy of the determination of the theft act can be further improved. As a result, theft can be further suppressed.
  • the theft weight depends on the price of the article, a large weight can be added to an expensive article having a large loss when the theft is committed, and the accuracy of the determination of the theft can be further improved. Can be done. As a result, the loss due to theft can be further suppressed.
  • the theft weight is determined by the display shelf on which the goods are displayed, so that a large weight can be added to the product with many theft acts, and the accuracy of the determination of the theft act can be further improved. As a result, the occurrence of theft can be further suppressed.
  • a reporting means for reporting the determination result to a predetermined terminal in response to the determination that the theft act has been performed by the theft act determining means for example, a store-related person can promptly respond to a shoplifting candidate. Can be taken.
  • the digital auto file security method of the present invention was photographed by a theft weight storage step of storing the theft weight, which is a parameter of the susceptibility of an article, in association with the article, and a camera for photographing a security area.
  • a person extraction step for extracting a person candidate from an image a hand motion detection step for detecting a hand motion in an image extracted by the person extraction step, hand motion data detected by the hand motion detection step, and the above. It is characterized by including a theft act determination step for determining that a theft act has been performed based on the theft weight of an article stored in the theft weight storage step.
  • the present invention is a candidate for a person from a theft weight storage means for storing the theft weight, which is a parameter of the susceptibility to theft of an article, in association with the article, and an image taken by a camera for photographing a security area.
  • the hand motion detection means for detecting the hand motion in the image extracted by the person extraction means, the hand motion data detected by the hand motion detection means, and the theft weight storage means.
  • It is a program for functioning as a digital auto file security system, which is provided with a theft act determining means for determining that a theft act has been performed based on the theft weight of a stored article.
  • a suspicious person can be accurately determined from a photographed image by adding information about an article to be stolen.
  • FIG. 1 is a block diagram showing a configuration of a digital auto file security system according to an embodiment of the present invention.
  • This digital auto file security system provides advanced management of stores, commercial facilities, museums, exhibition halls, corporate offices, factories, laboratories, information processing rooms, ATMs, financial institutions, precious metal stores, money counting rooms, etc. It is suitable for business establishments that require
  • This embodiment is an example in which the digital auto file security system is applied to a store. In a store, the target goods are goods, and theft is shoplifting.
  • the digital auto file security system 1000 includes a plurality of surveillance cameras 11 installed in a security area, a human sensor 20, and Wi-Fi (Wireless Fidelity) installed in the security area.
  • a terminal hereinafter referred to as "Wi-Fi master unit" 30, a beacon master unit 40, a mobile terminal device 50 (ID (Identification) terminal) carried by a person concerned (salesperson), and a monitoring device that controls the entire system. It includes 100 and an AI (Artificial Intelligence) accelerator (Accelerator) 200.
  • the security area is a caution area (security target area), for example, a store sales floor.
  • the monitoring device 100 is installed in the security area, it may be installed outside via a network (not shown).
  • a network not shown.
  • the monitoring device 100 is installed on a server on the network, a plurality of security areas can be monitored.
  • the surveillance camera 11 captures an image in the security area.
  • a part or all of the surveillance camera 11 is a PTZ camera having a PTZ (pan / tilt / zoom) function, and is remotely controlled by the surveillance device 100.
  • Surveillance cameras 11 are installed in stores subject to security in buildings subject to security and in various locations in the relevant site area. The image taken by the surveillance camera 11 is output to the surveillance device 100 and recorded in the recording unit 160.
  • the motion sensor 20 is a thermo camera, an infrared camera, or the like, and detects the temperature of a sensing object in the security area to detect a suspicious person in the security area.
  • the Wi-Fi master unit 30 uses Wi-Fi to exchange information with the Wi-Fi slave unit 51 of the mobile terminal device 50. Further, the Wi-Fi master unit 30 can acquire position information by Wi-Fi positioning, that is, can acquire position information using a Wi-Fi access point and a predetermined position information service.
  • Beacon is a wireless technology that uses Bluetooth Low Energy.
  • the beacon is composed of a combination of a beacon master unit 40, which is a beacon device on the transmitting side, and an application of a mobile terminal device 50 (corresponding to the beacon slave unit 52 described later) that supports reception of radio waves from the beacon master unit 40.
  • the beacon transmits unique ID information necessary for identification, and reacts only to the application associated with the ID information of the mobile terminal device 50.
  • the application of the mobile terminal device 50 registers the same identifier as the beacon master unit 40.
  • the application (beacon slave unit 52) of the mobile terminal device 50 stands by in the background by executing an application equipped with a beacon function, and excites a predetermined action when approaching the beacon of the beacon master unit 40.
  • the mobile terminal device 50 is carried by a salesperson of a store or the like.
  • the mobile terminal device 50 is, for example, a smartphone 50a, a tablet 50b, a notebook computer 50c, or the like.
  • the mobile terminal device 50 is also a mobile phone, a PHS (Personal Handy-Phone System), a PDA (Personal Digital Assistants), a dedicated terminal, or the like.
  • the mobile terminal device 50 can be used by a store salesperson or the like in various places (that is, the current position), and is an image including an email or a moving image from the monitoring device 100 via a telephone line (not shown). Etc. can be received.
  • the mobile terminal device 50 assumes the use of a smartphone 50a (ID terminal), and each individual can use it in various places (that is, the current position).
  • One of the mobile terminal devices 50 is located at a security company (not shown).
  • the smartphone 50a has a digital auto file security application (hereinafter referred to as "security application”). If the security application is started by the background processing of each application, for example, it goes through the communication carrier network (mobile communication network), the web service cloud 300 (see Fig. 4 below), or the Internet 303 (see Fig. 4 below). Then, the cloud server 301 (see FIG. 4 below) on the web service cloud 300 can be connected, and the text about the suspicious person can be received from the cloud server 301. The smartphone 50a can notify the text on which the suspicious person is detected to the standby screen or the like.
  • security application a digital auto file security application
  • the smartphone 50a includes a Wi-Fi individual identification device (hereinafter referred to as "Wi-Fi slave unit") 51 and a GPS 53 that captures the positions of related parties.
  • the smartphone 50a may be provided with the beacon slave unit 52.
  • the smartphone 50a may include any one of the Wi-Fi slave unit 51, the beacon slave unit 52, and the GPS 53.
  • the Wi-Fi slave unit 51 receives and individually identifies the radio waves of the Wi-Fi master unit 30 installed in the business facility.
  • the monitoring device 100 stores the arrangement information of the Wi-Fi master unit 30 installed in the facility as safety-related information.
  • the Wi-Fi slave unit 51 approaches the Wi-Fi master unit 30, it is possible to determine the ID and position of the person who carries the mobile terminal device 50.
  • the beacon slave unit 52 is an application of the mobile terminal device 50 that supports reception of radio waves from the beacon master unit 40.
  • the beacon master unit 40 transmits a beacon (unique ID information necessary for identification), and the application (beacon slave unit 52) of the mobile terminal device 50 excites a predetermined action when approaching the beacon of the beacon master unit 40. do.
  • the GPS 53 receives radio waves of position information from GPS satellites and the like.
  • the GPS 53 acquires the position information by calculating the current position information as three parameters of latitude, longitude and altitude from the information received via the GPS antenna.
  • the acquired position information is timely transmitted to the monitoring device 100.
  • an example using GPS satellites is shown as a means for acquiring position information, but a method using a positional relationship with a base station other than GPS may also be used.
  • a method using a positional relationship with a base station other than GPS may also be used.
  • the mobile terminal device 50 which is a mobile terminal
  • a base station and a mobile phone communication network are used in place of or in combination with GPS53. It is also possible to send and receive information to and from the mobile phone company server via the mobile phone company and acquire the current location information of the own terminal from the proximity confirmation.
  • location information acquisition by Wi-Fi positioning that is, location information acquisition using a Wi-Fi access point and a predetermined location information service may be used.
  • the monitoring device 100 is installed in the security area and centrally manages the security area.
  • the monitoring device 100 may be a general server computer, a personal computer, or the like.
  • the monitoring device 100 includes a control unit 110, an input unit 120, a storage unit 130 (theft weight storage means), a display unit 140, an output unit 150, a recording unit 160, an image processing unit 170, and an interface (I). / F) A unit 180 and a communication unit 190 are provided, and each unit is connected by a bus 195.
  • control unit 110 shall read each program from the ROM as necessary, load it into the RAM, and execute each function (described later).
  • Each program may be stored in the storage unit 130 in advance, or may be incorporated into the monitoring device 100 when necessary via another storage medium or communication medium.
  • the control unit 110 is composed of a CPU (Central Processing Unit) and the like, controls the entire monitoring device 100, executes a control program, and functions as a digital auto file security system. The detailed configuration of the control unit 110 will be described later.
  • CPU Central Processing Unit
  • the input unit 120 has an operation panel 120a, and is an input device for the user of the monitoring device 100 to input instructions and the like, such as a keyboard, a mouse, and a touch panel or a microphone provided on the screen of the display unit 140.
  • the storage unit 130 is composed of a non-volatile memory such as a ROM (Read Only Memory), a RAM (Random Access Memory), or an EEPROM (Electrically Erasable Programmable Read-Only Memory), and stores various data and programs used by the control unit 110. ..
  • the storage unit 130 stores still images or moving images received from the surveillance camera 11, various data and programs used by the control unit 110, and the like.
  • the storage unit 130 stores the theft weight parameter 135, which is a parameter of the ease of stealing the article, in association with the article.
  • "goods” also includes cash.
  • FIG. 3 is a diagram illustrating the theft weight parameter 135.
  • the theft weight parameter 135 includes a theft performance weight 135a that depends on the past performance, a theft price weight 135b that depends on the price of the goods, and a display in which the goods are displayed for each product (article).
  • the theft performance weight 135a (theft performance weighting value “A”)
  • the theft price weight 135b (theft price weighting value “B”)
  • the theft position weight 135c (theft position weighting value “C”) are used.
  • the theft weight is set, for example, in the range of "1" to "10"("1" is the minimum and "10" is the maximum).
  • the display unit 140 displays the operating status of the monitoring device 100, the image received from the monitoring camera 11, the GUI (Graphical User Interface) for operating the monitoring device 100, and the like.
  • the output unit 150 is, for example, an audio interface, and outputs an audio signal from the monitoring device 100 to the sound system 158 in the security area.
  • an audio signal output from the monitoring device 100 to the acoustic system 158 for example, an audio signal input from an audio input device such as a microphone provided in the input unit 120, or music data stored in the storage unit 130 is controlled by the control unit. 110 may be the reproduced audio signal.
  • the sound system 158 includes an amplifier and a plurality of speakers arranged in the store, and emits a signal input from the monitoring device 100 into the store.
  • the voice uttered in the store when the theft is detected is music known to the store personnel to notify the visit of a suspicious person.
  • a voice (music) notifying the occurrence of the theft act is notified in the store, so that each employee of the store can be notified of the visit of a suspicious person. Coordination between employees will be possible, and it will be possible to respond more quickly.
  • the recording unit 160 is composed of an external storage device such as an HDD (Hard Disk Drive), and records an image in the security area taken by the surveillance camera 11.
  • the recording unit 160 records high-quality images for a predetermined short time after shooting, converts the image quality to low image quality after a predetermined short time has elapsed, records the images for a predetermined long time, and erases and controls the high-quality shot images.
  • the unit 110 detects a suspicious person, it saves a predetermined short-time high-quality photographed image up to that time.
  • the image processing unit 170 is composed of a DSP (Digital Signal Processor) or the like, and performs predetermined processing on the received image. Predetermined processing includes contour extraction, image resizing, resolution conversion processing, and the like.
  • DSP Digital Signal Processor
  • the image captured by the surveillance camera 11 in 1 second is, for example, a 5-frame image, the 1/5 second image, the 2/5 second image, the 3/5 second image, the 4/5 second image, and the 5/5 second image.
  • the image processing unit 170 processes the image data taken by the surveillance camera 11 and sends it to the control unit 110 in order to determine the presence or absence of a person from the image in the security area.
  • the I / F unit 180 connects each surveillance camera 11 arranged in the security area with the surveillance device 100. Further, the I / F unit 180 is connected to a headquarters, a head office, a security company, etc. (not shown) by a network or a dedicated line.
  • the communication unit 190 transmits / receives data to / from the mobile terminal device 50 via the base station.
  • the communication unit 190 has a wireless communication function, and is connected to a control board using, for example, USB (Universal Serial Bus).
  • FIG. 2 is a block diagram of the control unit 110 of the monitoring device 100 of the digital autofile security system according to the first embodiment of the present invention.
  • the control unit 110 is configured by a CPU (Central Processing Unit) or the like, controls the entire monitoring device 100, executes a control program, and functions as a digital auto file security system.
  • the control unit 110 includes a person extraction unit 111 (human extraction means), a hand motion detection unit 112 (hand motion detection means), a theft action determination unit 113 (theft action determination means), and a reporting unit 114 (reporting means). , Equipped with.
  • the person extraction unit 111 extracts a person candidate from the image taken by the camera that captures the security area.
  • the control unit 110 determines that a person exists after the person extraction unit 111 determines that the block of the candidate person (see the rectangle shown by the symbol a in the upper figure of FIG. 9) is human.
  • the hand motion detection unit 112 detects the hand motion in the image extracted by the human extraction unit 111.
  • the control unit 110 determines whether or not the theft act is performed by the theft act determination unit 113 based on the hand motion data detected by the hand motion detection unit 112 and the theft weight of the product stored in the storage unit 130. To judge. For example, if the sum of the weighted values of the theft record weight 135a, the theft price weight 135b, and the theft position weight 135c is smaller than the predetermined threshold D), it is determined that the product is not likely to be shoplifted.
  • Theft weight parameter value X ⁇ (A + B + C) ⁇ D
  • the control unit 110 reports the determination result to a predetermined terminal after the reporting unit 114 determines that the theft act has been performed by the theft act determination unit 113.
  • the reporting unit 114 reports, for example, the degree of suspicion of theft (80%, etc.). Upon receiving the report, store personnel carefully observe shoplifting candidates.
  • the control unit 110 records in the recording unit 160 with high image quality for a predetermined short time after shooting, converts the image quality to low image quality after the predetermined short time elapses, and records the captured image with high image quality for a predetermined long time.
  • the high-quality shot image for a predetermined short time up to that time is saved.
  • the control unit 110 analyzes the captured image using the AI accelerator 200 (described later) to detect a person in the security area.
  • the control unit 110 issues a person detection request to the AI accelerator 200, and the AI accelerator 200 executes an AI calculation other than the CPU and transmits the person detection result to the person extraction unit 111. Since high speed is required for human detection, the AI accelerator 200 is used for human detection.
  • control unit 110 uses the AI accelerator 200 to detect a person, but the thermo camera (or motion sensor 20) may detect the person. That is, the motion sensor 20 detects the temperature in the security area. Then, the control unit 110 detects the presence of a person (suspicious person candidate) by detecting the body temperature of the person by the motion sensor 20 and detecting the change in the captured image by the surveillance camera 11.
  • control unit 110 may combine human detection using the AI accelerator 200 and human detection using a thermo camera (or motion sensor).
  • the AI accelerator 200 is used for the store sales floor where high speed of person detection is required, and the thermo camera (or motion sensor) is used outside the store sales floor where high speed of human detection is not required. do.
  • the person extraction unit 111 uses the AI accelerator 200 to convert an image taken by a camera that photographs a security area into a monochrome binary image, and extracts a person candidate from the monochrome binary image.
  • the AI accelerator 200 is used for each process of detecting a person in the present embodiment, it may be performed by a CPU process (execution of a control program of the control unit 110).
  • the AI accelerator 200 is a dedicated processor that detects a person, and uses a computing resource other than the CPU.
  • the AI accelerator 200 is, for example, an accelerator for image processing by a processor enhanced with a GPU (Graphics Processing Unit) and signal processing using an FPGA (Field-Programmable Gate Array). Further, the AI accelerator 200 executes the calculation of AI (Artificial Intelligence) on a dedicated hardware (for example, GPU).
  • AI Artificial Intelligence
  • the AI accelerator 200 which is a human detection processor
  • the performance of the computer processing by the PC is about 10 times higher, and the intrusion detection is executed quickly.
  • the calculation of AI which has a high calculation load, is left to the AI accelerator 200, which is a dedicated hardware.
  • FIG. 4 is a configuration diagram showing a digital auto file security system using the mobile terminal device 50 according to the embodiment of the present invention.
  • the digital auto file security system 1000 is active on the web service cloud 300 in cooperation with the cloud server (commercial server) 301 and the cloud server 301 that provide the digital auto file security service. It has a Push notification server 302 that acquires information and notifies the user's smartphone 50a (portable terminal device; ID terminal).
  • the web service cloud 300 is connected to the Internet 303.
  • the cloud server 301 on the web service cloud 300 can transmit texts and images to the smartphone 50a via the Internet 303.
  • the smartphone 50a receives the push notification from the push notification server 302 via the Internet 303.
  • the cloud server 301 and the push notification server 302 are connected to the smartphone 50a equipped with the security application via a communication carrier network (mobile communication network) (not shown) such as an LTE / 3G network.
  • a communication carrier network mobile communication network
  • the digital auto file security system 1000 detects shoplifting (article theft) candidates and push-notifies the smartphone 50a owned by a store salesperson or the like.
  • shoplifting article theft
  • the security application is activated and the zoom screen of the suspicious person is displayed, and a telop saying "Shoplifting candidate has been detected” is played.
  • the content is read aloud.
  • the suspicious person is notified by the telop and voice on the screen of the smartphone 50a.
  • the related organizations (police / fire department) are notified.
  • the security company and the head office of the affiliated company are also automatically notified. Also, if there is no urgency or if you want to confirm, only the security company will be notified.
  • FIG. 5 is a diagram showing the operation of the security application of the smartphone 50a.
  • a telop that detects a suspicious person is notified on the standby screen or the like of the smartphone 50a.
  • the display of the smartphone 50a is switched to the security application operation display, the zoom screen of the suspicious person is displayed, and the position and situation of the suspicious person " ⁇ sales floor ⁇ block is suspicious person". Is displayed.
  • this telop is read aloud by automatic voice.
  • the display of the smartphone 50a is displayed on four time-series screens as shown on the right side of FIG.
  • FIG. 6 is a flowchart showing a process in which the control unit 110 of the monitoring device 100 of the digital auto file security system determines the theft act. This flow is executed by the control unit 110 (see FIG. 2) of the monitoring device 100.
  • the control unit 110 obtains an image from the digital camera (surveillance camera 11) that captures the security area, for example, every 0.2 seconds according to the processing power of the computer.
  • the person extraction unit 111 (see FIG. 2) of the control unit 110 extracts people with the AI accelerator 200.
  • the hand motion detection unit 112 (see FIG. 2) of the control unit 110 detects the hand motion in the image extracted by the human extraction unit 111 (see FIG. 9 below).
  • the theft action determination unit 113 (see FIG. 2) of the control unit 110 refers to the theft weight parameter 135 (see FIG. 3) stored in the storage unit 130, and the theft weight of the picked-up product.
  • the theft determination unit 113 has a theft record weight 135a (referred to as the theft record weight “A”) that depends on past performance and a theft price weight 135b (theft) that depends on the price of the product.
  • the price weight (referred to as "B”) and the theft position weight 135c (referred to as the theft position weight "C") of the display shelf on which the product is displayed are acquired.
  • step S5 the theft determination unit 113 performs the theft based on the image data (hand movement) detected by the hand motion detection unit 112 and the theft weight parameter 135 of the product stored in the storage unit 130. Determine if it is. For example, even if the movement of the hand is unnatural, the theft weight of the product is small (the sum of the weighted value A of the theft record weight 135a, the weighted value B of the theft price weight 135b, and the weighted value C of the theft position weight 135c). If the product is smaller than the predetermined threshold D), it is determined that the product is not easily shoplifted (see the following equation).
  • Theft weight parameter value X ⁇ (A + B + C) ⁇ D
  • the theft record weight 135a and the theft price weight 135b have the highest rank “10”, so even if the theft position weight 135c has the lowest rank “0”, the weight is given.
  • the weight of the theft record weight 135a of the product can be increased, and in this case, it is easy to determine that the product is shoplifting.
  • the product has a large theft weight (the sum of the weights of the theft record weight 135a, the theft price weight 135b, and the theft position weight 135c is larger than the predetermined threshold). For example, it is determined that the product is easily shoplifted.
  • the above is an example. For example, any one of the theft record weight "A”, the theft price weight "B”, and the theft position weight "C” is added to the product taken by the hand movement detected by the hand movement detection unit 112. If so, it may be determined that the theft has been committed.
  • step S5 When the theft is performed (step S5: Yes), the reporting unit 114 reports the determination result to a predetermined terminal in response to the determination by the theft determination unit 113 that the theft has been performed in step S6. Then, the processing of this flow is completed.
  • the reporting unit 114 reports, for example, the degree of suspicion of theft (80%, etc.). Upon receiving the report, store personnel carefully observe shoplifting candidates. Store officials can quickly determine that shoplifting candidates will put the product in their pockets or my bag, and that the product will not be settled at the cash register.
  • step S5 the temporarily saved image data of the suspicious person (video data such as a face image and behavior) is recorded in the recording unit 160 as evidence. If the theft is not performed (step S5: No), the process of this flow is terminated.
  • FIG. 7 is a diagram illustrating security during business hours in a store such as a supermarket of the monitoring device 100 of the digital auto file security system.
  • FIG. 8 is a flowchart showing the process. This flow is executed by the control unit 110 (see FIG. 2) of the monitoring device 100.
  • 3D cameras 12 such as a digital camera 11 (surveillance camera) and a depth camera are installed and arranged in the security area via a LAN (Local Area Network) 13. It is connected to the monitoring device 100.
  • the LAN 13 may be a wireless LAN.
  • the digital camera 11 and the 3D camera 12 photograph the display shelf (gondola) 15 and the showcase 16 (display shelf) of the store sales floor, and shoppers to acquire image data.
  • the products displayed on the display shelves 15 and the showcase 16 include the theft weight parameter 135 of the storage unit 130 shown in FIG. 3, the theft performance weight 135a depending on the past performance for each product code, and the product.
  • the theft price weight 135b which depends on the price of the goods, and the theft position weight 135c of the display shelf on which the goods are displayed are stored.
  • the product displayed on the display shelf 15a shown in FIG. 7 is a product having a large weighting of the theft record weight 135a
  • the product displayed in the showcase 16b is a product having a large weighting of the theft price weight 135b. be.
  • the shopper puts the product in the shopping cart 17 and moves, or holds the product in his hand and moves to the store sales floor, and pays at the cash register 18.
  • the monitoring device 100 is guarded by the security system at the opening time, for example, in the morning.
  • the control unit 110 obtains an image from the digital camera 11 and the 3D camera 12 installed in front of the display shelf 15 and the showcase 16.
  • the human body is detected.
  • the person is authenticated by face recognition or the like.
  • the hand of the relevant person is detected (see FIG. 9 below).
  • the object is detected.
  • step S106 the person concerned determines whether or not he / she has the shopping cart 17. When possessing the shopping cart 17, it is determined in step S107 that there is a shopping cart 17, and the process proceeds to step S109. If the shopping cart 17 is not possessed, it is determined in step S108 that there is no shopping cart 17, and the process proceeds to step S109.
  • step S109 it is determined whether the product is picked up or returned (see FIG. 9 below).
  • the product is returned to the display shelf 15 or the like, it is determined as “green” in step S110, and the process proceeds to step S123.
  • “green” and “orange” and “red”, which will be described later, are indexes indicating the degree of attention of shoplifting caution persons (shoplifting candidates). "Green” is (normal), “orange” is (caution), and “red” is (abnormal), and they are added to the judgment conditions of the shopper's behavior pattern.
  • step S109 if neither is the case (the product is not touched), the determination of "green” or the like is not performed, and the process proceeds to step S123 as it is.
  • step S111 it is determined in step S111 whether or not the product is put in the shopping cart 17 (see FIG. 10 below).
  • step S112 it is determined as "green” in step S112, and the process proceeds to step S123.
  • step S113 If the product is not in the shopping cart 17, it is determined in step S113 whether or not the product is in the pocket, bag, or the like. When the product is put in a pocket, bag, or the like, it is determined that there is a possibility of shoplifting, and it is determined as "orange” in step S114, and the process proceeds to step S115. When it is determined to be “orange”, the result of person authentication (particularly face authentication) in step S103 and the "orange” determination result are associated and stored in the storage unit 130 (see FIG. 1).
  • step S115 the control unit 110 determines whether or not the relevant person has been determined to be orange in the past based on the past "orange" determination result stored in the storage unit 130, and the relevant person has also been determined to be orange in the past. If the determination is orange, the corresponding person is determined to be “red” in step S116, and the process proceeds to step S123. If the orange determination has not been made in the past, the determination such as "orange” is not performed and the process proceeds to step S123 as it is.
  • a person who is determined to be “red” is recorded in the recording unit 160 as proof of image data (video data such as a face image and behavior) as a shoplifter (theft).
  • step S113 the control unit 110 obtains an image from the digital camera 11a installed in front of the cash register 18 (see FIG. 7) in step S117.
  • step S118 it is determined whether or not the shopper has settled at the cash register 18. When the payment is made at the cash register 18, it is determined as "green" in step S119, and the process proceeds to step S123.
  • step S120 If the payment has not been made at the cash register 18, it is determined as “orange” in step S120 and the process proceeds to step S121. If the orange determination has been made in the past, the determination is determined to be "red” in step S116, and the process proceeds to step S123. If the orange determination has not been made in the past, the "red" determination is not performed and the process proceeds to step S123.
  • step S123 the theft action determination unit 113 (see FIG. 2) of the control unit 110 refers to the theft weight parameter 135 (see FIG. 3) stored in the storage unit 130, and the theft weight of the picked-up product. To get.
  • step S124 the theft determination unit 113 performs the theft based on the image data (hand movement) detected by the hand motion detection unit 112 and the theft weight parameter 135 of the product stored in the storage unit 130. Determine if it is.
  • step S124 When the theft is performed (step S124: Yes), the reporting unit 114 reports the determination result to a predetermined terminal in response to the determination by the theft determination unit 113 that the theft has been performed in step S125. Then, the processing of this flow is completed.
  • the reporting unit 114 reports any of "green”, “orange”, and “red” based on the caution levels of “green”, “orange”, and “red”. Here, instead of “green”, “orange” and “red", the degree of suspicion of theft (80%, etc.) may be reported.
  • FIG. 9 is a diagram illustrating hand motion detection of the monitoring device 100 of the digital auto file security system.
  • the upper figure of FIG. 9 shows an image of a human being detected
  • the lower left figure of FIG. 9 shows the operation of a visitor picking up a product from E2
  • the lower right figure of FIG. 9 shows a visitor changing a product to E2.
  • the returned operation As shown in the upper figure of FIG. 9, the horizontal positions of the display shelves 15 are A, B, C, D, E, ..., And the vertical positions are 1, 2, 3, 4, ....
  • the visitor is image-recognized by the frame surrounded by the rectangle shown by the reference numeral a in the upper figure of FIG. It is assumed that the dominant hand of this visitor is the right hand, and the operation of picking up the product placed on E2 of the display shelf 15 with the right hand (see reference numeral b) is taken as an example.
  • the arrows in the lower left figure of FIG. 9 and the lower right figure of FIG. 9 indicate the movement of the hand over time.
  • the ratio of the intersection region of the rectangle surrounding E2 and the rectangle surrounding the right hand (see reference numeral b) to the entire E2 is calculated. As shown in the upper figure of FIG. 9, the evaluation value of the right hand was required to be "85".
  • the above-mentioned hand motion detection result is used in step S3 of FIG.
  • FIG. 10 is a diagram illustrating a shopping basket determination of a product of the monitoring device 100 of the digital auto file security system.
  • FIG. 11 is a flowchart showing the process. This flow is executed by the control unit 110 (see FIG. 2) of the monitoring device 100.
  • the upper figure of FIG. 10 shows an image of human detection
  • the lower left figure of FIG. 10 shows the operation of a visitor putting a product in a shopping cart
  • the lower right figure of FIG. 10 shows a visitor putting a product in a pocket or the like.
  • the horizontal positions of the display shelves 15 are A, B, C, D, E, ...
  • the vertical positions are 1, 2, 3, 4, ....
  • the visitor is image-recognized by the frame surrounded by the rectangle shown by the reference numeral a in the upper figure of FIG. It is assumed that the dominant hand of the visitor is the right hand, and the operation of putting the product placed on the display shelf 15 into a shopping cart or a pocket or the like is taken as an example. Learn the shapes of shopping carts 17 and carts in stores in advance.
  • step S201 the control unit 110 obtains an image from the digital camera 11 and the 3D camera 12 installed in front of the display shelf 15 and the showcase 16.
  • step S202 the posture of the human body is determined.
  • step S203 the hand of the relevant person is detected (see FIG. 9).
  • step S204 object detection is performed to detect the shopping cart 17 (see FIG. 10).
  • step S205 the person concerned determines whether or not he / she has the product in his / her hand (see FIG. 10). If the product is not in hand, the process proceeds to step S220. If the product is in hand, the right hand (dominant hand) position is determined in step 206.
  • step S207 it is determined whether or not the product is returned to the display shelf 15 or the case. If it is not returned to the display shelf 15 or the case, in step S208, the shelf allocation on which the product is placed, for example, the name of the product placed on 2E is specified (see FIG. 10). In step S209, the product name of the product is specified. By specifying the product name, from the theft weight parameter 135 (see Fig. 3), the theft performance weight 135a, which depends on the past performance, the theft price weight 135b, which depends on the price of the product, and the product can be obtained for each product code. The theft position weight 135c of the displayed display shelf can be obtained. In step S210, the picked product is registered, and information such as the date and time, the camera, the shelving allocation, the product name, the number of products, and the image is acquired.
  • step S207 the product name of the product is specified in step S211.
  • step S212 the returned product is registered, and in step S213, it is determined that the product has been returned to the display shelf 15 or the case, and the process proceeds to step S220.
  • step S214 it is determined in step S214 whether the product is to be stored in the shopping cart 17 (see FIG. 10).
  • step S215 the storage destination of the product in hand is specified.
  • step S216 the storage destination of the product is determined.
  • step S217 When the storage destination of the product is the shopping cart 17, it is determined in step S217 that the product has been placed in the shopping cart 17 (see the lower left figure of FIG. 10), and the process proceeds to step S220.
  • step S2108 When the storage destination of the product is a pocket, in step S218, it is determined that the product has been put in the pocket (see the lower right figure of FIG. 10), and the process proceeds to step S220. If the storage destination of the product is other, it is determined in step S219 that the product has been put in the bag or the like (see the lower right figure of FIG. 10), and the process proceeds to step S220.
  • step S220 the theft action determination unit 113 (see FIG. 2) of the control unit 110 refers to the theft weight parameter 135 (see FIG. 3) stored in the storage unit 130, and the theft weight of the picked-up product. To get.
  • step S221 the theft determination unit 113 performs the theft based on the image data (hand movement) detected by the hand motion detection unit 112 and the theft weight parameter 135 of the product stored in the storage unit 130. Determine if it is.
  • step S221 When the theft is performed (step S221: Yes), the reporting unit 114 reports the determination result to a predetermined terminal in response to the determination by the theft determination unit 113 that the theft has been performed in step S222. Then, the processing of this flow is completed.
  • the reporting unit 114 reports the degree of suspicion of theft (80%, etc.) along with the caution levels of "green”, “orange”, and “red” based on whether or not the product has been placed in the shopping cart 17. do.
  • the degree of suspicion of theft (attention of "green”, “orange” and “red”) is notified according to the product placed in the shopping cart 17, so store personnel can be a candidate for shoplifting. It is possible to take measures according to the degree of caution for sexual shoppers. For example, theft with "red” added can be dealt with more quickly, such as by having a shoplifter in charge.
  • the digital auto file security system 1000 stores the theft weight, which is a parameter of the ease of stealing an article, in association with the article.
  • the theft determination unit 113 that determines that the theft has been performed based on the hand motion data detected by the hand motion detection unit 112 and the theft weight of the article stored in the storage unit 130. Be prepared.
  • the theft action determination unit 113 determines whether or not the theft action has been performed based on the theft weight in addition to the image data, which means not only the movement of the hand but also the movement of the hand ( The purpose action of shoplifting) can be added, and the theft can be accurately determined.
  • the theft weight stored in the storage unit 130 depends on the past performance. As a result, a large weight can be added to a product with many shoplifting acts, and the accuracy of determining the theft act can be further improved. As a result, the occurrence of shoplifting can be further suppressed.
  • the theft weight stored in the storage unit 130 depends on the price of the article.
  • shoplifting when shoplifting is carried out, a large weight can be added to an expensive product having a large loss, and the accuracy of determining the theft can be further improved. As a result, the loss due to shoplifting can be further suppressed.
  • the theft weight stored in the storage unit 130 is determined by the display shelf on which the goods are displayed.
  • a large weight can be added to a product with many shoplifting acts, and the accuracy of determining the theft act can be further improved.
  • the occurrence of shoplifting can be further suppressed.
  • the digital auto file security system 1000 includes a reporting unit 114 that reports the determination result to a predetermined terminal in response to the determination that the theft act determination unit 113 has performed the theft act. ..
  • a reporting unit 114 that reports the determination result to a predetermined terminal in response to the determination that the theft act determination unit 113 has performed the theft act. ..
  • store personnel can promptly respond to shoplifting candidates.
  • shoplifters who may be candidates for shoplifting according to their degree of caution (such as having a person who handles shoplifting take charge). ) Can be taken.
  • the digital auto file security system 1000 includes an AI accelerator 200 which is a computing resource other than the CPU, and the person extraction unit 111 of the control unit 110 uses the AI accelerator 200 to use the AI accelerator 200 to provide a person in the security area. Is detected.
  • the AI accelerator 200 can detect a person existing in a wide security area in real time by executing a person detection process on a dedicated hardware separately from the CPU process. Moreover, even if a configuration using an inexpensive camera device is used, a person can be detected in real time. Further, since the AI accelerator 200 is used, it is possible to detect an intruder with extremely high accuracy as compared with the detection of a human body by a conventional surveillance camera.
  • FIG. 12 is a flowchart showing a process in which the control unit 110 of the monitoring device 100 in a coin laundry, an ATM, a financial institution, or the like of a digital auto file security system determines a theft act. This flow is executed by the control unit 110 (see FIG. 2) of the monitoring device 100.
  • the control unit 110 sets the vicinity of the settlement / exchange machine in a coin laundry or the like, for example, 2 to 3 m around the settlement / exchange machine as a yellow zone, and sets the inside of the yellow zone as a predetermined high theft weight.
  • step S302 the control unit 110 obtains, for example, an image of 1/10 second to 10/10 second from the digital camera (surveillance camera 11) installed in front of the payment / exchange machine according to the processing capacity of the computer. .. Then, using the obtained image, the entry of a visitor into the yellow zone is detected, and the staying time of the detected person is determined. If the staying time is longer than necessary, the possibility of theft is high.
  • step S303 the control unit 110 determines the number of persons who have been detected to enter the yellow zone. If two or more people are detected in the yellow zone near the checkout / exchange machine, the possibility of theft is high.
  • step S304 a digital camera (surveillance camera 11) is installed outside the entrance of the coin laundry or the like, and the control unit 110 monitors and determines whether there is a car, a motorcycle, or the like outside the building. If there is a car or motorcycle, the possibility of theft is high.
  • step S305 the control unit 110 determines whether the person in the yellow zone has a tool for prying open the checkout / exchange machine, such as a crowbar.
  • step S306 the hand movement detection unit 112 (see FIG. 2) of the control unit 110 detects the hand movement in the image extracted by the person extraction unit 111, and determines the hand movement to pry open the settlement / exchange machine. It is considered that there is a high possibility of theft if it is judged that the hand has opened the checkout / exchange machine, but as a result of the judgment error, the error alarm is not issued frequently.
  • Q [1: Two or more people in the yellow zone, 0: No one or no person in the yellow zone]
  • R [1: There is a car or motorcycle outside the building, 0: There are no cars or motorcycles outside the building]
  • S [1: A person has a tool, 0: The person does not have the tools]
  • T [1: Hand is prying open the checkout / exchange machine, 0: Hands have not opened the checkout / change machine]
  • the theft determination unit 113 determines the attention level X as a function of these variables P, Q, R, S, and T.
  • X f (P, Q, R, S, T
  • the above variable is a binary variable, but depending on the variable, it may be a multi-value variable or an analog variable.
  • the variable P may be the staying time itself, or the variable Q may be the number of people itself.
  • the settlement / exchange machine may be a settlement machine.
  • the reporting unit 114 In response to the determination of orange or red in step S307, the reporting unit 114 notifies the determination result to a predetermined terminal in step S308, and calls a suspicious person to end the processing of this flow. ..
  • the reporting unit 114 reports the degree of suspicion of theft (orange or red, or 80%, etc.). Upon receiving the report, the parties concerned can take prompt action.
  • the image data of the suspicious person (video data such as face image and behavior) temporarily saved is recorded in the recording unit 160 as evidence.
  • this digital auto file security system 1000 can be applied to the management of goods in showrooms of commercial facilities, shops in museums, goods in exhibition halls, and the like.
  • the theft weight which is a parameter of the ease of stealing the goods, is stored in the storage unit 130 (see FIG. 1) in association with the goods, as in the case of preventing shoplifting of goods in the store. ..
  • the theft act determination unit 113 determines that the theft act has been performed based on the motion data of the hand and the theft weight of the stored article.
  • an effective crime prevention system can be constructed for valuable (expensive) exhibits.
  • the weight of the theft price weight 135b of the theft weight parameter 135 shown in FIG. 3 is increased for the relevant exhibit (the highest rank is given to the valuable exhibit).
  • articles also include cash, and valuable exhibits can be treated in the same way as cash and given a theft weight.
  • the names of digital autofile security system and method are used, but this is for convenience of explanation, and includes a monitoring system, a security system, a search security method, and the like. May be good.
  • the digital autofile security system and method of the present invention are also realized by a program for making a computer function as the digital autofile security system or method of the present invention.
  • the program may be stored on a computer-readable recording medium.
  • the recording medium on which this program is recorded may be the ROM itself of the digital auto file security system, or a program reading device such as a CD-ROM drive is provided as an external storage device, and the recording medium is provided therein. It may be a CD-ROM or the like that can be read by inserting.
  • each of the above configurations, functions, processing units, processing means, etc. may be realized by hardware by designing a part or all of them by, for example, an integrated circuit. Further, each of the above configurations, functions, and the like may be realized by software for the processor to interpret and execute a program that realizes each function. Information such as programs, tables, and files that realize each function can be stored in memory, hard disks, recording devices such as SSDs (Solid State Drives), IC (Integrated Circuit) cards, SD (Secure Digital) cards, optical disks, etc. It can be held on a recording medium.
  • SSDs Solid State Drives
  • IC Integrated Circuit
  • SD Secure Digital
  • the digital auto file security system, method and program according to the present invention can be applied to business establishments requiring a high degree of management such as stores, coin laundry, factories, research institutes, information processing rooms, ATMs, financial institutions, and money collection rooms. Installation is expected.
  • commercial facilities, museums, exhibition halls, offices, hospitals, hotels, financial institutions, factories, laboratories, power plants, air terminals, meeting places, event halls, stadiums, precious metal stores, outside betting offices, race betting office tickets It also covers the inside and outside of buildings such as sales floors, the inside and outside of transportation trains, ferries, and airplanes.

Landscapes

  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Business, Economics & Management (AREA)
  • Emergency Management (AREA)
  • Alarm Systems (AREA)
  • Burglar Alarm Systems (AREA)

Abstract

L'invention concerne un système, un procédé et un programme de sécurité/d'auto fichier/numérique qui peuvent déterminer avec précision une personne suspecte à partir d'une image capturée. Le système de sécurité/d'autofichier/numérique (1000) est pourvu : d'une unité de stockage (130) qui stocke un poids de vol, qui est un paramètre de la facilité de vol d'un article, en association avec l'article ; d'une unité d'extraction de personne (111) qui extrait une personne candidate à partir d'une image capturée par une caméra qui capture une image d'une zone de sécurité ; d'une unité de détection d'opération de main (112) qui détecte une opération d'une main dans l'image pour laquelle l'extraction est effectuée par l'unité d'extraction de personne (111) ; et d'une unité de détermination de vol (113) qui détermine qu'un vol s'est produit sur la base de données d'opération de la main, qui est détectée par l'unité de détection d'opération de main (112), et du poids de vol de l'article, qui est stocké dans l'unité de stockage (130).
PCT/JP2020/011958 2020-03-18 2020-03-18 Système, procédé et programme de sécurité/d'autofichier/numérique WO2021186610A1 (fr)

Priority Applications (3)

Application Number Priority Date Filing Date Title
PCT/JP2020/011958 WO2021186610A1 (fr) 2020-03-18 2020-03-18 Système, procédé et programme de sécurité/d'autofichier/numérique
PCT/JP2020/018740 WO2021186751A1 (fr) 2020-03-18 2020-05-08 Système, procédé, et programme de sécurité de fichage automatique numérique
JP2020537786A JP6773389B1 (ja) 2020-03-18 2020-05-08 デジタル・オートファイル・セキュリティシステム、方法及びプログラム

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
PCT/JP2020/011958 WO2021186610A1 (fr) 2020-03-18 2020-03-18 Système, procédé et programme de sécurité/d'autofichier/numérique

Publications (1)

Publication Number Publication Date
WO2021186610A1 true WO2021186610A1 (fr) 2021-09-23

Family

ID=77768162

Family Applications (2)

Application Number Title Priority Date Filing Date
PCT/JP2020/011958 WO2021186610A1 (fr) 2020-03-18 2020-03-18 Système, procédé et programme de sécurité/d'autofichier/numérique
PCT/JP2020/018740 WO2021186751A1 (fr) 2020-03-18 2020-05-08 Système, procédé, et programme de sécurité de fichage automatique numérique

Family Applications After (1)

Application Number Title Priority Date Filing Date
PCT/JP2020/018740 WO2021186751A1 (fr) 2020-03-18 2020-05-08 Système, procédé, et programme de sécurité de fichage automatique numérique

Country Status (1)

Country Link
WO (2) WO2021186610A1 (fr)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2023243172A1 (fr) * 2022-06-17 2023-12-21 日立チャネルソリューションズ株式会社 Appareil de surveillance et procédé d'appareil de surveillance

Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JPH06105312A (ja) * 1992-09-22 1994-04-15 Hitachi Ltd 静止物監視方法および装置
JP2005512245A (ja) * 2001-12-11 2005-04-28 コーニンクレッカ フィリップス エレクトロニクス エヌ ヴィ 不審な挙動を検出する監視システム

Family Cites Families (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP5139947B2 (ja) * 2008-10-03 2013-02-06 三菱電機インフォメーションテクノロジー株式会社 監視画像記憶システム及び監視画像記憶システムの監視画像記憶方法
CN105518734A (zh) * 2013-09-06 2016-04-20 日本电气株式会社 顾客行为分析系统、顾客行为分析方法、非暂时性计算机可读介质和货架系统
JP2017033442A (ja) * 2015-08-05 2017-02-09 株式会社ニューロマジック 位置情報収集装置、感応型コンテンツ表示装置、位置情報管理サーバ、及びその方法
JP6756473B2 (ja) * 2015-10-26 2020-09-16 株式会社日立社会情報サービス 行動分析装置及びシステム及び方法

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JPH06105312A (ja) * 1992-09-22 1994-04-15 Hitachi Ltd 静止物監視方法および装置
JP2005512245A (ja) * 2001-12-11 2005-04-28 コーニンクレッカ フィリップス エレクトロニクス エヌ ヴィ 不審な挙動を検出する監視システム

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2023243172A1 (fr) * 2022-06-17 2023-12-21 日立チャネルソリューションズ株式会社 Appareil de surveillance et procédé d'appareil de surveillance

Also Published As

Publication number Publication date
WO2021186751A1 (fr) 2021-09-23

Similar Documents

Publication Publication Date Title
JP5871296B1 (ja) スマートセキュリティ・デジタルシステム、方法及びプログラム
US11527149B2 (en) Emergency alert system
JP5794599B1 (ja) デジタルファインドセキュリティシステム、方法及びプログラム
JP6525229B1 (ja) デジタルサーチ・セキュリティシステム、方法及びプログラム
JP2022527661A (ja) 監視システム
JP5780570B1 (ja) デジタルロス・アクシデントデフェンスシステム、方法及びプログラム
US10854058B2 (en) Emergency alert system
JP6195331B1 (ja) デジタルスマートセキュリティシステム、方法及びプログラム
JP5780569B1 (ja) デジタルロス・デフェンスセキュリティシステム、方法及びプログラム
JP4925419B2 (ja) 情報収集システム、及び、モバイル端末
WO2003067360A2 (fr) Systeme et procede de detection, surveillance et gestion d'alarme fondes sur l'analyse de contenus video
JP6573185B1 (ja) 情報処理システム、情報処理方法及びプログラム
JP2007060528A (ja) 施設における利用者管理システムおよび利用者管理方法
JP6529062B1 (ja) デジタルアキュレート・セキュリティシステム、方法及びプログラム
WO2021186610A1 (fr) Système, procédé et programme de sécurité/d'autofichier/numérique
JP6773389B1 (ja) デジタル・オートファイル・セキュリティシステム、方法及びプログラム
JPWO2018198385A1 (ja) デジタルレジスタセキュリティシステム、方法及びプログラム
JPWO2020213058A1 (ja) デジタルスマート・ディフェンスセキュリティシステム、方法及びプログラム
WO2022059223A1 (fr) Système et procédé d'analyse vidéo
TW202244857A (zh) 監視系統
JP2006163788A (ja) 入場者管理方法及び管理システム
JP7244135B2 (ja) デジタルセフティ・レスポンスセキュリティシステム、方法及びプログラム
WO2024075311A1 (fr) Système numérique de prévention d'intrusion/sécurité
WO2023181155A1 (fr) Appareil de traitement, procédé de traitement et support d'enregistrement
WO2020116023A1 (fr) Dispositif de traitement d'informations, système de traitement d'informations, procédé de traitement d'informations, et programme

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 20925982

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 20925982

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: JP