WO2023008608A1 - System for monitoring security guards and monitoring method using the same - Google Patents

System for monitoring security guards and monitoring method using the same Download PDF

Info

Publication number
WO2023008608A1
WO2023008608A1 PCT/KR2021/009810 KR2021009810W WO2023008608A1 WO 2023008608 A1 WO2023008608 A1 WO 2023008608A1 KR 2021009810 W KR2021009810 W KR 2021009810W WO 2023008608 A1 WO2023008608 A1 WO 2023008608A1
Authority
WO
WIPO (PCT)
Prior art keywords
guard
security
mobile device
biometric information
checkpoint
Prior art date
Application number
PCT/KR2021/009810
Other languages
French (fr)
Inventor
Ahmed ESTIAK
Ahmed Tohameem ALAM
Mohammad Abrar MASUM
S.M. Kamrujjaman PLABON
Original Assignee
Estiak Ahmed
Alam Ahmed Tohameem
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Estiak Ahmed, Alam Ahmed Tohameem filed Critical Estiak Ahmed
Publication of WO2023008608A1 publication Critical patent/WO2023008608A1/en

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/32User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q10/00Administration; Management
    • G06Q10/06Resources, workflows, human or project management; Enterprise or organisation planning; Enterprise or organisation modelling
    • G06Q10/063Operations research, analysis or management
    • G06Q10/0631Resource planning, allocation, distributing or scheduling for enterprises or organisations
    • G06Q10/06311Scheduling, planning or task assignment for a person or group
    • G06Q10/063114Status monitoring or status determination for a person or group
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q10/00Administration; Management
    • G06Q10/06Resources, workflows, human or project management; Enterprise or organisation planning; Enterprise or organisation modelling
    • G06Q10/063Operations research, analysis or management
    • G06Q10/0639Performance analysis of employees; Performance analysis of enterprise or organisation operations
    • G06Q10/06398Performance of employee with respect to a job function
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q10/00Administration; Management
    • G06Q10/10Office automation; Time management
    • G06Q10/105Human resources

Landscapes

  • Business, Economics & Management (AREA)
  • Human Resources & Organizations (AREA)
  • Engineering & Computer Science (AREA)
  • Entrepreneurship & Innovation (AREA)
  • Strategic Management (AREA)
  • Economics (AREA)
  • Theoretical Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Physics & Mathematics (AREA)
  • Tourism & Hospitality (AREA)
  • Educational Administration (AREA)
  • Operations Research (AREA)
  • General Business, Economics & Management (AREA)
  • Marketing (AREA)
  • Quality & Reliability (AREA)
  • Development Economics (AREA)
  • Game Theory and Decision Science (AREA)
  • Data Mining & Analysis (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Hardware Design (AREA)
  • Software Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Alarm Systems (AREA)

Abstract

Provided are a system for monitoring security guards and a monitoring method using the same, which are capable of effectively monitoring security guards using a mobile device and a biometric information scanner, and further calculating reliable security performance based on the monitoring result. In this security guard monitoring method, it is determined which work the security guard corresponds to among patrol guard and stationary guard based on login information, and a different guard monitoring process and performance of guard is applied for each work.

Description

SYSTEM FOR MONITORING SECURITY GUARDS AND MONITORING METHOD USING THE SAME
The present invention relates to a system for monitoring security guards and a monitoring method using the same, and more particularly, to a system for monitoring security guards for performing different monitoring processes according to patrol guard or stationary guard and a monitoring method using the same.
Generally, the term "guard" refers to an act of protecting something or such work. The guard work includes facility guard work, a convoy security service, personal protection work, etc.
The facility guard work is guard work that accounts for the most importance, and is the work to protect a building or facilities in a specific area. In particular, many security guards are put into the facility guard work, and the facility guard work is carried out in a way that the security guard is assigned to each specific area and each security guards the corresponding area alone. As described above, due to the characteristics of the guard work performed alone, there is a problem in that it is difficult to monitor whether the security guard perform his or her work properly, and it is difficult to properly grasp the performance or achievement of the security guard unless a special accident occurs.
A problem to be solved by the present invention is to provide a method for monitoring security guards capable of effectively monitoring a security guard using a mobile device and a biometric information scanner, and further calculating reliable performance of guard based on the monitoring result.
Another problem to be solved by the present invention is to provide a system for monitoring security guards that performs this method.
The problems to be solved by the present invention are not limited to the problems mentioned above, and other problems not mentioned will be clearly understood by those of ordinary skill in the art to which the present invention pertains from the following description.
A method for monitoring security guards according to an embodiment of the present invention for achieving the problem described above includes, by a management server that monitors a security guard using a mobile device and a biometric information scanner, a step of receiving login information from the mobile device of the security guard, a step of determining which work the security guard corresponds to among patrol guard and stationary guard based on the login information, a step of performing patrol guard monitoring when the security guard corresponds to the patrol guard, and a step of calculating performance of patrol guard for the security guard based on the monitoring result.
Here, the patrol guard is defined as work performing guard with R rounds of patrols for C checkpoints in a security area, the stationary guard is defined as work of performing guard for any one checkpoint assigned to each security guard (here, C and R are natural numbers), and each checkpoint is provided with the biometric information scanner that collects biometric information of the security guard.
The step of performing the patrol guard monitoring includes a step of receiving usage time information for a plurality of applications installed in the mobile device from the mobile device, a step of checking an entry time when the mobile device enters an i-th checkpoint (1 ≤ i ≤ C; i is a natural number) by using location information of the mobile device, a step of transmitting a biometric information request alarm to the mobile device when the mobile device is located within the i-th checkpoint, a step of receiving biometric information from the biometric information scanner provided in the i-th checkpoint, a step of confirming a fact that the security guard visits when the received biometric information matches biometric information of the security guard, and a step of checking an exit time when the mobile device deviates from the i-th checkpoint by using the location information of the mobile device.
When the received biometric information does not match the biometric information of the security guard, the management server may confirm a fact that the security guard visits by requesting the mobile device to drive a camera and receiving a real-time picture of the security guard from the mobile device.
The performance of patrol guard may be calculated from a function of a 'visit index' regarding whether or not the security guard visits the checkpoint, a 'guard index' regarding a guard efficiency of the security guard at each checkpoint, and a 'time index' regarding an effective guard time of the security guard.
The performance of patrol guard may be calculated from Equation 1 below on a daily basis.
[Equation 1]
(performance of patrol guard) = (visit index) + (guard index) + (time index)
The 'visit index', the 'guard index', and the 'time index' may be calculated from Equations 2-1, 2-2, and 2-3 below, respectively.
[Equation 2-1]
Figure PCTKR2021009810-appb-I000001
[Equation 2-2]
Figure PCTKR2021009810-appb-I000002
[Equation 2-3]
Figure PCTKR2021009810-appb-I000003
Here, C is the total number of checkpoints in the security area (C is a natural number), R is the total round of patrols for the checkpoint (R is a natural number), Vn is the number of checkpoints not visited by the security guard during an n-th patrol (1 ≤ n ≤ R; n is a natural number), and W1 is a relative weight to the visit index.
Gn i is a patrol time spent at the i-th checkpoint during the n-th patrol (1 ≤ i ≤ C; i is a natural number), Wn i is a wasted time using predefined applications that are not related to guard work among applications installed on the mobile device at the i-th checkpoint during the n-th patrol, Ii is a guard time required for guard activities at the i-th checkpoint during each patrol, and W2 is a relative weight to the guard index.
P is the total working hours that the security guard has done his duty during a day, Tw is a wasted time using the predefined applications that are not related to guard work among the applications installed on the mobile device among the total working hours, D is the total guard time required for guard activities during a day, and W3 is a relative weight to the time index.
A step of performing stationary guard monitoring when the security guard corresponds to the stationary guard based on the login information, and a step of calculating performance of stationary guard for the security guard based on the result of the monitoring may be further included.
Here, the step of performing the stationary guard monitoring may include a step of receiving usage time information for the plurality of applications installed in the mobile device from the mobile device, a step of checking a checkpoint assigned to the security guard, and determining whether the mobile device is located within the assigned checkpoint using the location information of the mobile device, a step of transmitting a biometric information request alarm to the mobile device randomly a predetermined number of times every hour when the mobile device is located within the assigned checkpoint, a step of receiving biometric information from a biometric information scanner provided in the assigned checkpoint, a step of confirming a fact that the security guard works when the received biometric information matches biometric information of the security guard; and a step of confirming, when the received biometric information does not match the biometric information of the security guard, a fact that the security guard works by requesting the mobile device to drive a camera and receiving a real-time picture of the security guard from the mobile device.
The performance of stationary guard may be calculated from a function of the 'guard index' regarding the guard efficiency of the security guard at the checkpoint and the 'time index' regarding the effective guard time of the security guard.
The performance of stationary guard may be calculated from Equation 3 below on a daily basis.
[Equation 3]
(performance of stationary guard) = (guard index) + (time index)
The 'guard index' and the 'time index' may be calculated from the following Equations 4-1 and 4-2, respectively.
[Equation 4-1]
Figure PCTKR2021009810-appb-I000004
[Equation 4-2]
Figure PCTKR2021009810-appb-I000005
Here, f is the total number of times of receiving matched biometric information, mk is the total number of times of transmitting the biometric information request alarm, and W4 is a relative weight to the guard index.
S is the total working hours that the security guard has done his duty during a day, Tf is a wasted time using predefined applications not related to the guard work among the applications installed on the mobile device among the total working hours, D is the total guard time required for guard activities during a day, and W5 is a relative weight to the time index.
A system for monitoring security guards according to an embodiment of the present invention for achieving another problem includes a mobile device of a security guard, a biometric information scanner that is provided for each of a plurality of checkpoints, the plurality of checkpoints being defined in a security area, and a management server that monitors the security guard according to the monitoring method.
Specific details of other embodiments are included in the specific contents and drawings.
As described above, according to the system for monitoring security guards and the monitoring method using the same according to the present invention, it is possible to divide and define patrol guard and stationary guard according to the characteristics of guard work, and provide different monitoring processes for each of the patrol guard and the stationary guard.
In addition, a movement path of a security guard can be monitored in detail using location information of a mobile device possessed by the security guard, and a subject performing guard work can be authenticated by causing the security guard directly to input biometric information through a biometric information scanner installed at each checkpoint in a security area.
In addition, by analyzing usage time information for a plurality of applications installed on the mobile device of the security guard, it is possible to monitor work efficiency based on usage time of an application that is related to or interfere with guard work.
Based on these monitoring results, it is possible to determine performance of each security guard based on objective data calculated in response to each of the patrol guard and stationary guard.
FIG. 1 is a configuration diagram conceptually illustrating a system for monitoring security guards according to an embodiment of the present invention.
FIG. 2 is a configuration diagram conceptually illustrating a management server of FIG. 1.
FIG. 3 is a flowchart illustrating a method for monitoring security guards according to an embodiment of the present invention.
FIG. 4 is a diagram conceptually illustrating a security area to which the method for monitoring security guards of FIG. 3 is applied.
FIG. 5 is a flowchart illustrating a method for monitoring security guards according to another embodiment of the present invention.
FIG. 6 is a diagram conceptually illustrating a security area to which the method for monitoring security guards of FIG. 5 is applied.
Advantages and features of the present invention, and methods for achieving them will become apparent with reference to the embodiments described below in detail in conjunction with the accompanying drawings. However, the present invention will not be limited to the embodiments disclosed below, but will be implemented in various different forms. Only the present embodiments are provided so that the disclosure of the present invention is complete, and to fully inform those of ordinary skill in the art to which the present invention belongs of the scope of the invention, and the present invention is only defined by the scope of the claims. The same reference numerals refer to the same components throughout the specification.
Hereinafter, a system for monitoring security guards and a method for monitoring security guards using the same according to an embodiment of the present invention will be described in detail with reference to the accompanying drawings.
FIG. 1 is a configuration diagram conceptually illustrating a system for monitoring security guards according to an embodiment of the present invention, and FIG. 2 is a configuration diagram conceptually illustrating a management server of FIG. 1.
In a security area, a plurality of checkpoints to be guarded are defined in advance. The checkpoint is preferably understood as a region having a constant area rather than a single point.
A system for monitoring security guards includes a mobile device 10 possessed by a security guard, a biometric information scanner 20 provided for each checkpoint, and a management server 50 for monitoring the security guard using the mobile device 10 and the biometric information scanner 20.
The mobile device 10 includes a processor, an internal memory, an input means, and an output means. The input means of the mobile device 10 includes a software or hardware input device, and the output means includes a speaker and a display. The display may include a user interface as a means for detecting a user's touch input in UI/UX of operating system software and UI/UX of application software. The display can be composed of a touch screen that executes a function of an output means to output a screen and a function of the input means to detect a user's touch event.
The internal memory of the mobile device 10 generally provides a place for storing computer code and data used in the device. In the internal memory of the mobile device 10, a monitoring application that communicates with the management server 50 for monitoring the security guard and resources necessary for driving/managing the monitoring application, as well as a basic input and output system, an operating system, various programs, applications, or firmware for any device including user interface functions, processor functions, etc. executed in the device may be stored.
The processor of the mobile device 10, together with the operating system, executes computer code and executes an operation that generates and uses data. In addition, the processor can receive and process input and output data between components of the mobile device 10 using a series of instructions. In addition, the processor serves as a control unit for executing functions of operating system software and various application software installed in the mobile device 10.
For example, the mobile device 10 can include a terminal having a wireless communication function that a user can carry while moving. Such a terminal may be a mobile communication terminal device, a navigation terminal device, a smart phone, a tablet PC, a wearable smart device, a PDA, a notebook computer, etc.
The biometric information scanner 20 is installed at each checkpoint to collect biometric information of the security guard who visits the checkpoint. Here, the biometric information represents measuring items related to human characteristics. Physical characteristics used as biometric information include a fingerprint, an iris, a face, a vein, etc., and behavioral characteristics include voice, signature, etc. For example, when the fingerprint is used as biometric information, a fingerprint scanner can be used as the biometric information scanner. Since the biometric information scanner 20 is physically installed at each checkpoint and the security guard directly visits the checkpoint to input his or her own biometric information, it is possible to check the fact of visit and authenticate himself or herself.
The management server 50 includes a login management unit 51, an app monitoring unit 52, a location information receiving unit 53, a biometric information receiving unit 54, a patrol guard management unit 55, a stationary guard management unit 56, and a database 57 for storing all information.
The login management unit 51 receives login information from the mobile device 10, and determines which work the security guard corresponds to among patrol guard and stationary guard based on the login information. Here, the login information may include, for example, an employee ID, a unique identifier (UID), a phone number, etc.
The app monitoring unit 52 monitors the use of the mobile device 10 that is not related to or interferes with guard work during working hours. Specifically, the app monitoring unit 52 receives usage time information for a plurality of applications installed in the mobile device 10 from the mobile device 10. The app monitoring unit 52 extracts usage time information for an application defined as not related to guard work in advance among the plurality of applications. Applications that are not related to guard work may include all applications other than the monitoring application that communicates with the management server 50 for monitoring the security guard, and may be, for example, a phone call application, a text application, an SNS application, a game application, etc.
The location information receiver 53 receives location information, for example, GPS information from the mobile device 10. The location information receiving unit 53 determines whether or not a security guard enters, exits, or stays at a predetermined checkpoint by using the location information.
The biometric information receiving unit 54 receives biometric information of the security guard from the biometric information scanner 20. The biometric information receiving unit 54 compares pre-stored biometric information of the security guard with the biometric information received from the biometric information scanner 20, and confirms the fact that the security guard visits or works when these information match.
The patrol guard management unit 55 performs patrol guard monitoring when the work of the security guard checked from the login information is patrol guard.
The stationary guard management unit 56 performs stationary guard monitoring when the work of the security guard checked from the login information is stationary guard.
Hereinafter, a method for monitoring security guards according to an embodiment of the present invention, that is, a method for monitoring patrol guard will be described in detail with reference to FIGS. 3 and 4. FIG. 3 is a flow chart illustrating a method for monitoring security guards according to an embodiment of the present invention. FIG. 4 is a diagram conceptually illustrating a security area to which the method for monitoring security guards of FIG. 3 is applied.
First, the mobile device 10 of the security guard transmits login information to the management server 50 (S10).
The management server 50 determines which work the security guard corresponds to among the patrol guard and the stationary guard based on the login information (S12). Here, the login information may include, for example, an employee ID, a phone number, etc. In addition, the patrol guard as work of performing guard with R rounds of patrols for C checkpoints in the security area, and the stationary guard is defined as work of performing guard for any one checkpoint assigned to each security guard (here, C and R are natural numbers).
The management server 50 performs the following patrol guard monitoring when the security guard corresponds to the patrol guard (S60).
The management server 50 receives usage time information for a plurality of applications installed on the mobile device 10 from the mobile device 10 and performs monitoring on a mobile application being used during working hours (S14).
The management server 50 receives location information from the mobile device 10 at a predetermined period (S20). The management server 50 uses the location information of the mobile device 10 to check the entry time at which the mobile device 10 enters an i-th checkpoint (S22; 1 ≤ i ≤ C; i is a natural number).
When the mobile device 10 is located within the i-th checkpoint, the management server 50 transmits a biometric information request alarm to the mobile device 10 (S24).
The security guard checks the biometric information request alarm through the mobile device 10 and moves to the biometric information scanner 20 provided at the i-th checkpoint. When the security guard inputs his or her biometric information, for example, a fingerprint, into the biometric information scanner 20, the management server 50 receives the biometric information from the biometric information scanner 20 (S26).
The management server 50 compares the biometric information received from the biometric information scanner 20 with the biometric information of the security guard stored in an internal database 57, and confirms the fact that the security guard visits when these information match each other (S28). As described above, in the present invention, it is possible to perform authentication on a subject performing guard work by causing the security guard to directly input biometric information through the biometric information scanner 20 installed at each checkpoint.
When the biometric information received from the biometric information scanner 20 does not match the biometric information of the security guard stored in the internal database 57, the management server 50 requests the mobile device 10 to drive a camera (S30). When the security guard takes a real-time picture of himself or herself through the camera of the mobile device 10, the management server 50 may confirm the fact that the security guard visits by receiving the real-time picture of the security guard from the mobile device 10 (S32).
The management server 50 receives the location information from the mobile device 10 at a predetermined period (S40), and checks the exit time at which the mobile device 10 deviates from the i-th checkpoint using the location information of the mobile device 10 (S42).
When the management server 50 transmits information on the next checkpoint to the mobile device 10, the security guard checks the information and then moves to the corresponding checkpoint (S44). When a movement path between checkpoints is defined in advance or there is no particular restriction on movement between checkpoints, the management server 50 may not transmit information about the next checkpoint to the mobile device 10.
As described above, when patrol guard monitoring for one checkpoint is completed, the security guard moves to a new checkpoint and the patrol guard monitoring for the new checkpoint (S60) is repeatedly performed. For example, when there are C checkpoints in the security area and R rounds of patrol work are given for each checkpoint, preferably, the patrol guard monitoring can be repeated RХC times for the security guard in charge of the checkpoint.
The management server 50 calculates performance of patrol guard for the security guard in charge based on the results of patrol guard monitoring (S50). The performance of patrol guard can be calculated from a function of a visit index, a guard index, and a time index. For example, the performance of patrol guard can be calculated from Equation 1 below on a daily basis.
[Equation 1]
(performance of patrol guard) = (visit index) + (guard index) + (time index)
Here, the 'visit index' relates to whether or not a security guard visits a checkpoint, and a high score can be obtained when the security guard visits all the checkpoints. For example, the 'visit index' can be calculated from Equation 2-1 below.
[Equation 2-1]
Figure PCTKR2021009810-appb-I000006
Here, C is the total number of checkpoints in the security area (C is a natural number), and can be defined by an administrator. R is the total round of patrols for the checkpoint (R is a natural number), and can be defined by the administrator. Vn is the number of checkpoints not visited by the security guard during an n-th patrol (1 ≤ n ≤ R; n is a natural number). W1 is a relative weight to the visit index among the three indices, and can be defined by the administrator.
The 'guard index' relates to a guard efficiency or work concentration of the security guard at each checkpoint, and the less time wasted without doing guard work at each checkpoint, the higher the score can be obtained. For example, when the security guard uses the mobile device 10 to make a phone call, text message, SNS, game, etc. not related to guard work, the guard index is lowered. For example, the 'guard index' can be calculated from Equation 2-2 below.
[Equation 2-2]
Figure PCTKR2021009810-appb-I000007
Here, Gn i is the patrol time spent at the i-th checkpoint during the n-th patrol (1 ≤ i ≤ C; i is a natural number). For example, the patrol time may be a difference between the entry time and the exit time for the i-th checkpoint. Wn i is the wasted time using predefined applications that are not related to guard work among applications installed on the mobile device at the i-th checkpoint during the n-th patrol. Mobile applications that are not related to guard work may be, for example, a phone call application, a text application, an SNS application, a game application, etc. Ii is the guard time required for guard activities at the i-th checkpoint during each patrol, and can be defined by the administrator. W2 is a relative weight to the guard index among the three indices, and can be defined by the administrator.
The 'time Index' relates to the effective guard time of the security guard, and the less time wasted without doing guard work on a daily basis, the higher the score can be obtained. For example, the 'time index' of the security guard can be calculated from Equation 2-3 below.
[Equation 2-3]
Figure PCTKR2021009810-appb-I000008
Here, P is the total working hours that the security guard has done his duty during a day, and may be defined as the difference between the attending time and quitting time. Tw is the wasted time using predefined applications that are not related to guard work among the applications installed on the mobile device among the total working hours. D is the total guard time required for guard activities during a day, and can be defined by the administrator. W3 is a relative weight to the time index among the three indices, and can be defined by the administrator.
Hereinafter, a method for monitoring security guards according to another embodiment of the present invention, that is, a method for monitoring stationary guard will be described in detail with reference to FIGS. 5 and 6. FIG. 5 is a flowchart illustrating a method for monitoring security guards according to another embodiment of the present invention. FIG. 6 is a diagram conceptually illustrating a security area to which the method for monitoring security guards of FIG. 5 is applied.
First, the mobile device 10 of the security guard transmits login information to the management server 50 (S10).
The management server 50 determines which work the security guard corresponds to among the patrol guard and the stationary guard based on the login information (S12).
The management server 50 performs the following stationary guard monitoring when the security guard corresponds to the stationary guard (S100).
The management server 50 receives usage time information for a plurality of applications installed on the mobile device 10 from the mobile device 10 and performs monitoring on the mobile application being used during working hours (S14).
The management server 50 receives location information from the mobile device 10 at a predetermined period (S120). The management server 50 checks the checkpoint assigned to the security guard, and determines whether the mobile device 10 is located within the assigned checkpoint using the location information of the mobile device 10 (S122). When the mobile device 10 is not located within the assigned checkpoint, the management server 50 transmits a warning alarm to the mobile device 10 to request the security guard to move to the assigned checkpoint (S123).
When the mobile device 10 is located within the assigned checkpoint, the management server 50 randomly transmits a biometric information request alarm to the mobile device 10 a predetermined number of times every hour (S124).
The security guard checks the biometric information request alarm through the mobile device 10 and moves to the biometric information scanner 20 provided at the assigned checkpoint. When the security guard inputs his or her biometric information, for example, a fingerprint, into the biometric information scanner 20, the management server 50 receives the biometric information from the biometric information scanner 20 (S126).
The management server 50 compares the biometric information received from the biometric information scanner 20 with biometric information of the security guard stored in the internal database 57, and confirms the fact that the security guard works when these information match each other (S128). In the case of stationary guard monitoring according to the present embodiment, since biometric information is requested at random at any time, it is possible to check the fact that the security guard works. Furthermore, it is possible to perform authentication on a subject performing guard work by causing the security guard to directly input the biometric information through the biometric information scanner 20 installed at the checkpoint.
When the biometric information received from the biometric information scanner 20 does not match the biometric information of the security guard stored in the internal database 57, the management server 50 requests the mobile device 10 to drive the camera (S130). When the security guard takes a real-time picture of himself or herself through the camera of the mobile device 10, the management server 50 can confirm the fact that the security guard works by receiving the real-time picture of the security guard from the mobile device 10 (S132).
The management server 50 can continuously monitor the guard work through the location information of the mobile device 10 and the random biometric information request during the working hours of the security guard. As described above, when stationary guard monitoring for the assigned checkpoint during the working hours is completed, the management server 50 calculates performance of stationary guard for the security guard in charge based on the result of the stationary guard monitoring (S140). The performance of stationary guard can be calculated from a function of the guard index and the time index. For example, the performance of stationary guard may be calculated from Equation 3 below on a daily basis.
[Equation 3]
(performance of stationary guard) = (guard index) + (time index)
Here, the 'guard index' relates to the guard efficiency or work concentration of the security guard at the assigned checkpoint. For example, the 'guard index' can be calculated from Equation 4-1 below.
[Equation 4-1]
Figure PCTKR2021009810-appb-I000009
Here, f is the total number of times of receiving matched biometric information. That is, f denotes the number of times that the biometric information received from the biometric information scanner 20 matches the biometric information of the security guard stored in the internal database 57, and may include the number of times that the real-time picture of the security guard is received through the mobile device 10 because the biometric information does not match. mk is the total number of times of transmitting the biometric information request alarm. W4 is a relative weight to the guard index among the two indices, and can be defined by the administrator.
The 'time index' relates to the effective guard time of the security guard, and the less time wasted without doing guard work on a daily basis, the higher the score can be obtained. For example, when the security guard uses the mobile device 10 to make a phone call, text message, SNS, game, etc. not related to guard work, the time index is lowered. For example, the 'time index' of the security guard can be calculated from Equation 4-2 below.
[Equation 4-2]
Figure PCTKR2021009810-appb-I000010
Here, S is the total working hours that the security guard has done his duty during a day, and may be defined as the difference between the attending time and quitting time of the security guard. Tf is the wasted time using predefined applications not related to the guard work among the applications installed on the mobile device among the total working hours. D is the total guard time required for security activities during a day, and can be defined by the administrator. W5 is a relative weight to the time index among the two indices, and can be defined by the administrator.
Although the embodiments of the present invention have been described with reference to the accompanying drawings, those of ordinary skill in the art to which the present invention pertains will understand that the present invention may be embodied in other specific forms without changing the technical spirit or essential features thereof. Therefore, it should be understood that the embodiments described above are illustrative in all respects and not restrictive.

Claims (8)

  1. A method for monitoring security guards comprising:
    by a management server that monitors a security guard using a mobile device and a biometric information scanner,
    a step of receiving login information from the mobile device of the security guard;
    a step of determining which work the security guard corresponds to among patrol guard and stationary guard based on the login information;
    a step of performing patrol guard monitoring when the security guard corresponds to the patrol guard; and
    a step of calculating performance of patrol guard for the security guard based on the monitoring result,
    wherein the patrol guard is defined as work of performing guard with R rounds of patrols for C checkpoints in a security area, the stationary guard is defined as work of performing guard for any one checkpoint assigned to each security guard (here, C and R are natural numbers),
    each checkpoint is provided with the biometric information scanner that collects biometric information of the security guard, and
    the step of performing the patrol guard monitoring includes
    a step of receiving usage time information for a plurality of applications installed in the mobile device from the mobile device,
    a step of checking an entry time when the mobile device enters an i-th checkpoint (1 ≤ i ≤ C; i is a natural number) by using location information of the mobile device,
    a step of transmitting a biometric information request alarm to the mobile device when the mobile device is located within the i-th checkpoint,
    a step of receiving biometric information from the biometric information scanner provided in the i-th checkpoint,
    a step of confirming a fact that the security guard visits when the received biometric information matches biometric information of the security guard, and
    a step of confirming an exit time when the mobile device deviates from the i-th checkpoint by using the location information of the mobile device.
  2. The method according to claim 1,
    wherein, when the received biometric information does not match the biometric information of the security guard, the management server confirms a fact that the security guard visits by requesting the mobile device to drive a camera and receiving a real-time picture of the security guard from the mobile device.
  3. The method according to claim 1,
    wherein the performance of patrol guard is calculated from a function of a 'visit index' regarding whether or not the security guard visits the checkpoint, a 'guard index' regarding a guard efficiency of the security guard at each checkpoint, and a 'time index' regarding an effective guard time of the security guard.
  4. The method according to claim 3,
    wherein the performance of patrol guard is calculated from Equation 1 below on a daily basis,
    [Equation 1]
    (performance of patrol guard) = (visit index) + (guard index) + (time index),
    the 'visit index', the 'guard index', and the 'time index' are calculated from Equations 2-1, 2-2, and 2-3 below, respectively,
    [Equation 2-1]
    Figure PCTKR2021009810-appb-I000011
    [Equation 2-2]
    Figure PCTKR2021009810-appb-I000012
    [Equation 2-3]
    Figure PCTKR2021009810-appb-I000013
    where, C is the total number of checkpoints in the security area (C is a natural number),
    R is the total round of patrols for the checkpoint (R is a natural number),
    Vn is the number of checkpoints not visited by the security guard during an n-th patrol (1 ≤ n ≤ R; n is a natural number),
    W1 is a relative weight to the visit index,
    Gn i is a patrol time spent at the i-th checkpoint during the n-th patrol (1 ≤ i ≤ C; i is a natural number),
    Wn i is a wasted time using predefined applications that are not related to guard work among applications installed on the mobile device at the i-th checkpoint during the n-th patrol,
    Ii is a guard time required for guard activities at the i-th checkpoint during each patrol,
    W2 is a relative weight to the guard index,
    P is the total working hours that the security guard has done his duty during a day,
    Tw is a wasted time using the predefined applications that are not related to guard work among the applications installed on the mobile device among the total working hours,
    D is a total guard time required to guard activities during a day, and
    W3 is the relative weight to the time index.
  5. The method according to claim 1, further comprising:
    a step of performing stationary guard monitoring when the security guard corresponds to the stationary guard based on the login information; and
    a step of calculating performance of stationary guard for the security guard based on the result of the monitoring,
    wherein the step of performing the stationary guard monitoring includes
    a step of receiving usage time information for the plurality of applications installed in the mobile device from the mobile device,
    a step of checking a checkpoint assigned to the security guard and determining whether the mobile device is located within the assigned checkpoint using the location information of the mobile device,
    a step of transmitting a biometric information request alarm to the mobile device randomly a predetermined number of times every hour when the mobile device is located within the assigned checkpoint,
    a step of receiving biometric information from a biometric information scanner provided in the assigned checkpoint,
    a step of confirming a fact that the security guard works when the received biometric information matches biometric information of the security guard, and
    a step of confirming, when the received biometric information does not match the biometric information of the security guard, a fact that the security guard works by requesting the mobile device to drive a camera and receiving a real-time picture of the security guard from the mobile device.
  6. The method according to claim 5,
    wherein the performance of stationary guard is calculated from a function of the 'guard index' regarding a guard efficiency of the security guard at the checkpoint and the 'time index' regarding the effective guard time of the security guard.
  7. The method according to claim 6,
    wherein the performance of stationary guard is calculated from Equation 3 below on a daily basis,
    [Equation 3]
    (performance of stationary guard) = (guard index) + (time index),
    the 'guard index' and the 'time index' are calculated from the following Equations 4-1 and 4-2, respectively,
    [Equation 4-1]
    Figure PCTKR2021009810-appb-I000014
    [Equation 4-2]
    Figure PCTKR2021009810-appb-I000015
    where, f is the total number of times of receiving matched biometric information,
    mk is the total number of times of transmitting the biometric information request alarm,
    W4 is a relative weight to the guard index,
    S is the total working hours that the security guard has done his duty during a day,
    Tf is a wasted time using predefined applications not related to the guard work among the applications installed on the mobile device among the total working hours,
    D is the total guard time required for guard activities during a day, and
    W5 is a relative weight to the time index.
  8. A system for monitoring security guards comprising:
    a mobile device of a security guard;
    a biometric information scanner that is provided for each of a plurality of checkpoints, the plurality of checkpoints being defined in a security area; and
    a management server that monitors the security guard according to the method of any one of claims 1 to 7.
PCT/KR2021/009810 2021-07-28 2021-07-28 System for monitoring security guards and monitoring method using the same WO2023008608A1 (en)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
KR1020210098888A KR20230017432A (en) 2021-07-28 2021-07-28 System for monitoring security guards and monitoring method using the same
KR10-2021-0098888 2021-07-28

Publications (1)

Publication Number Publication Date
WO2023008608A1 true WO2023008608A1 (en) 2023-02-02

Family

ID=85087375

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/KR2021/009810 WO2023008608A1 (en) 2021-07-28 2021-07-28 System for monitoring security guards and monitoring method using the same

Country Status (2)

Country Link
KR (1) KR20230017432A (en)
WO (1) WO2023008608A1 (en)

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2005010843A1 (en) * 2003-07-31 2005-02-03 Kenetics Innovations Pte Ltd Use of rfid tags and readers to automate real time alert signals in a security system
US20140070946A1 (en) * 2008-03-28 2014-03-13 Joseph T. Ambrefe, Jr. Systems and methods for security checkpoint condition information and sharing
US20150110459A1 (en) * 2013-10-18 2015-04-23 Gomobile Security Solutions Pte Ltd Systems, methods and devices that allow security and security guard functions to be performed using an integrated system and mobile devices
WO2015162621A1 (en) * 2014-04-23 2015-10-29 Laxminarayan Grover Naresh Guard performance and security system
US20180182179A1 (en) * 2016-12-22 2018-06-28 Infostandard Sdn. Bhd. Comprehensive system and method for real-time monitoring and management of security patrolling operations

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2005010843A1 (en) * 2003-07-31 2005-02-03 Kenetics Innovations Pte Ltd Use of rfid tags and readers to automate real time alert signals in a security system
US20140070946A1 (en) * 2008-03-28 2014-03-13 Joseph T. Ambrefe, Jr. Systems and methods for security checkpoint condition information and sharing
US20150110459A1 (en) * 2013-10-18 2015-04-23 Gomobile Security Solutions Pte Ltd Systems, methods and devices that allow security and security guard functions to be performed using an integrated system and mobile devices
WO2015162621A1 (en) * 2014-04-23 2015-10-29 Laxminarayan Grover Naresh Guard performance and security system
US20180182179A1 (en) * 2016-12-22 2018-06-28 Infostandard Sdn. Bhd. Comprehensive system and method for real-time monitoring and management of security patrolling operations

Also Published As

Publication number Publication date
KR20230017432A (en) 2023-02-06

Similar Documents

Publication Publication Date Title
WO2018194368A1 (en) Method and apparatus for access control in distributed blockchain-based internet of things (iot) network
EP1881461B1 (en) System and method for authenticating a person
WO2015056979A1 (en) Security card having fingerprint authentication, processing system and processing method therefor
WO2021150032A1 (en) Method for providing authentication service by using decentralized identity and server using the same
WO2019182368A1 (en) Method, server, and program for providing healthcare data
WO2018194282A1 (en) Server access control system for detecting abnormal user on basis of learning of inputted commands for security enhancement
WO2012060479A1 (en) System for providing location information certification management service, and method for providing same
WO2018169159A1 (en) Authentication system based on variable biometric information, and authentication method using same
WO2021040283A1 (en) Time and attendance management system server capable of performing time and attendance management on basis of wireless ap access information, and operation method thereof
WO2013100320A1 (en) System, user terminal, method, and apparatus for protecting and recovering system file.
WO2021256577A1 (en) Method for diagnosing security of multi-network device
WO2017131355A1 (en) Device for self-defense security based on system environment and user behavior analysis, and operating method therefor
WO2023008608A1 (en) System for monitoring security guards and monitoring method using the same
WO2015163739A1 (en) Cloud-se-based cloud-se system, mobile terminal, and mobile payment method thereof
WO2018169160A1 (en) Complex authentication system based on variable biometric information, and complex authentication method using same
WO2023128341A1 (en) Method and system for fraudulent transaction detection using homomorphically encrypted data
JP4882532B2 (en) Location management system, information management system, server device, location management method, and information management method
WO2013073780A1 (en) Method and server for providing automatic login function
WO2021132831A1 (en) Method for increasing or decreasing number of workers and inspectors in crowdsourcing-based project for creating artificial intelligence learning data
WO2017034098A1 (en) Information change notification service providing method and system for executing same
WO2019212263A1 (en) System and method for resource access authentication
JP6096484B2 (en) COMMUNICATION SYSTEM, COMMUNICATION DEVICE, COMMUNICATION METHOD, AND PROGRAM
WO2021002485A1 (en) Database security device based on user identification via web application server
WO2022139073A1 (en) Method and system for managing infectious disease by utilizing smartphone black box
WO2022231079A1 (en) Wearable device-based healthcare system using lifelog data, and healthcare provision method using same

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 21951978

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE