Digital smart security system and method, and program

An intelligent security, digital technology that can be used in connection management, instrumentation, location-based services, etc. to solve problems such as troubles or accidents

Inactive Publication Date: 2015-04-22
TECHNOMIRAI
View PDF9 Cites 4 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, the victim threatened by the perpetrator is restrained from making any actions which in many cases lead to trouble or accidents

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Digital smart security system and method, and program
  • Digital smart security system and method, and program
  • Digital smart security system and method, and program

Examples

Experimental program
Comparison scheme
Effect test

no. 1 example

[0039] figure 1 is a block diagram showing the configuration of a digital smart security system according to the first embodiment of the present invention.

[0040] This digital intelligent security system includes a communication terminal 100 worn on the user (personnel), which can receive breathing information from a breathing sensor 10 that detects people's breathing so as to output respiratory information, and a monitoring device 200 as the main body of the digital intelligent security system equipment. , the monitoring device 200 communicates with the communication terminal 100 via the telephone line 210 .

[0041] In addition, when the digital smart security system provides security contract services to the communication terminal 100, from the perspective of the digital smart security system, the user of the communication terminal 100 may be referred to as a user.

[0042] Also, the configuration may be such that monitoring device 200 is incorporated into communication ...

example 1

[0096] Figure 7 is a flowchart showing the reporting control operation of the monitoring device 200 of the digital smart security system. This process mainly consists of the control unit 201 of the monitoring device 200 ( figure 1 )implement.

[0097] First, in step S41, the control unit 201 waits until the input unit 202 receives abnormality determination information from the communication terminal 100 through an electronic mail message. Alternatively, it may be determined whether abnormality determination information and latest position information of communication terminal 100 have been received. In this embodiment, communication terminal 100 is constituted by a mobile phone, a smart phone, etc., is capable of mobile communication, and is used at each person's location (ie, existing location). The monitoring device 200 receives the normal notification every predetermined time (for example, one hour) to store the position of the communication terminal 100 at the normal t...

example 2

[0104] Reporting Example 2 is an example of application to buildings for service operations such as shops, banks, corporate offices, stations / terminals, currency exchanges, cash vans, buses or taxis, and individuals' homes (below called stores, etc.).

[0105] A plurality of monitoring cameras are installed in the above-mentioned shops, etc., and predetermined monitoring areas can be photographed. Moreover, surveillance cameras can follow specific people or shooting locations. Even if the surveillance camera does not follow the shooting position, by installing multiple surveillance cameras, people etc. can be photographed from various angles.

[0106] A digital smart security system in a store or the like will be described.

[0107] Figure 8 is a flowchart showing the report control operation of the monitoring device 200 of the digital smart security system in a store or the like. This process mainly consists of the control unit 201 of the monitoring device 200 ( figure ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

Provided are a digital smart security system and method and a program which make it possible to report the abnormal state of security without a suspicious person knowing even in front of the suspicious person. A digital smart security system is provided with an abnormality determination unit (112) which determines the occurrence of an abnormal state when respiration detected by a respiration sensor (10) for detecting the respiration of a user has a preset respiratory pattern in which the respiration is stopped for a predetermined period and resumed, and a warning issuance unit (203) which reports the abnormal state on the basis of the determination result of the occurrence of the abnormal state. The abnormality determination unit (112) determines the occurrence of the abnormal state when the user stops respiration for a predetermined period (for example, 10-15 seconds) and resumes the respiration. Further, the abnormality determination unit (112) determines the occurrence of the abnormal state of the health of the user when the respiration is stopped and not resumed.

Description

technical field [0001] The present invention relates to a digital intelligent security system and method that allows reporting of security anomalies even in front of suspicious persons without being aware of by suspicious persons. Background technique [0002] Service operations such as stores including department stores, supermarkets and convenience stores, banks, corporate offices, terminal buildings, currency exchanges, cash vans, buses and taxis handle financial instruments, cash and / or merchandise all the time. Their customers include not only people of good faith but also those with criminal intent, so along with their operations there is a high risk of criminal victimization. [0003] In an emergency, it is common for the victim to notify his / her family, people related to the company, the police, etc. of the emergency and wait for help. However, the victim threatened by the perpetrator is restricted from doing any actions which in many cases lead to trouble or accide...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G08B21/02G08B25/00G08B25/04G08B25/08G08B25/10H04W4/02H04W4/80H04W4/90
CPCH04W4/008G08B25/08H04W64/00H04W76/007H04W4/22H04W4/023H04W4/02H04W4/90H04W76/50G08B25/016H04W4/80G08B25/006G08B25/001G08B21/043G08B21/0453H04M11/04
Inventor 三轮和夫
Owner TECHNOMIRAI
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products